Bug#701227: marked as done (nagios-nrpe: CVE-2013-1362: allows the passing of $() as command arguments to execute shell commands)

2013-03-09 Thread Debian Bug Tracking System
Your message dated Sat, 09 Mar 2013 09:04:37 +
with message-id e1uefhl-mn...@franck.debian.org
and subject line Bug#701227: fixed in nagios-nrpe 2.13-3
has caused the Debian Bug report #701227,
regarding nagios-nrpe: CVE-2013-1362: allows the passing of $() as command 
arguments to execute shell commands
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
701227: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=701227
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Package: nagios-nrpe
Severity: grave
Tags: security

Hi

On bugtraq mailinglist it was reported publicly[1]. If support for
command argument in the daemon are enabled then it would be possible
to pass $() and possibly executing shell commands when run unter bash.

Upstream has released 2.14 containing a patch and disabling bash
command substitutions by default:

2.14 - 12/21/2012
-
- Added configure option to allow bash command substitutions, disabled by 
default [bug #400] (Eric Stanley)
- Patched to shutdown SSL connection completely (Jari Takkala)
- Added SRC support on AIX (Thierry Bertaud)
- Updated RPM SPEC file to support creating RPMs on AIX (Eric Stanley)
- Updated logging to support compiling on AIX (Eric Stanley)

According to [1], there is CVE-2013-1362 assigned to it.

In the debian package we have explicitly --enable-command-args so the
Debian packages looks affected.
 
 [1]: http://seclists.org/bugtraq/2013/Feb/119

Regards,
Salvatore
---End Message---
---BeginMessage---
Source: nagios-nrpe
Source-Version: 2.13-3

We believe that the bug you reported is fixed in the latest version of
nagios-nrpe, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 701...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Alexander Wirt formo...@debian.org (supplier of updated nagios-nrpe package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.8
Date: Sat, 09 Mar 2013 08:42:05 +0100
Source: nagios-nrpe
Binary: nagios-nrpe-server nagios-nrpe-plugin
Architecture: source amd64
Version: 2.13-3
Distribution: unstable
Urgency: high
Maintainer: Debian Nagios Maintainer Group 
pkg-nagios-de...@lists.alioth.debian.org
Changed-By: Alexander Wirt formo...@debian.org
Description: 
 nagios-nrpe-plugin - Nagios Remote Plugin Executor Plugin
 nagios-nrpe-server - Nagios Remote Plugin Executor Server
Closes: 701227
Changes: 
 nagios-nrpe (2.13-3) unstable; urgency=high
 .
   * [e55afd1] Add 08_CVE-2013-1362.dpatch patch.
 If command arguments are enabled in the NRPE configuration, it was
 possible to pass $() as arguments as the checking for nasty caracters
 was not strict enough to catch $(). This allowed executing shell
 commands under a subprocess and pass the output as a parameter to the
 called script (if run under bash). CVE-2013-1362 (Closes: #701227)
Checksums-Sha1: 
 ce797b74315a839d047b9f14e92ec152c7e1664f 1356 nagios-nrpe_2.13-3.dsc
 8af5274412281f9bc77c819c1cf8838351804c73 5 nagios-nrpe_2.13-3.diff.gz
 432c0ba3347aa7aa5e948e84310cfd58ef5380c0 41026 
nagios-nrpe-server_2.13-3_amd64.deb
 a07a26e80cb5bd7cd7404d580a3488c487116141 19692 
nagios-nrpe-plugin_2.13-3_amd64.deb
Checksums-Sha256: 
 b7604c377e9042380be01316394696398a0860fc128d04532c313e3ef2d6a92c 1356 
nagios-nrpe_2.13-3.dsc
 b7bfc6b0d0894bf6660b91292adffc50e28724f905b0df1f59ac561a94a14e4f 5 
nagios-nrpe_2.13-3.diff.gz
 501c8eb1c2d8703f49cb997b9eb585cd301d05b249cd288e7ef4919e01643865 41026 
nagios-nrpe-server_2.13-3_amd64.deb
 6622c8d1bbcb4e7daaedcb9cfd86dd32b69c6a8d046bbf05b34e2b61b1c5fb15 19692 
nagios-nrpe-plugin_2.13-3_amd64.deb
Files: 
 e23df9385fd97d0150e1f7623928c697 1356 net optional nagios-nrpe_2.13-3.dsc
 854eb80d419e8e51d0d7e0b4a14f7be4 5 net optional nagios-nrpe_2.13-3.diff.gz
 545cc2e0a1716e59711fb32f39b39772 41026 net optional 
nagios-nrpe-server_2.13-3_amd64.deb
 768f4a3b8ebc00780ac8f37362ea963f 19692 net optional 
nagios-nrpe-plugin_2.13-3_amd64.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.12 (GNU/Linux)

iEYEARECAAYFAlE66yMACgkQ01u8mbx9AgqSTgCgw5DQjTUnaHd2tfAuAJWP71LV
fVcAoIX4bz0OgymTdVboLfc5s3gOp/Mb
=Rnqy
-END PGP SIGNATUREEnd 

Bug#702609: pidgin-audacious: Not able to activate

2013-03-09 Thread Andrey Rahmatullin
On Fri, Mar 08, 2013 at 11:35:18PM +0100, Christian Britz wrote:
 Package: pidgin-audacious
 Version: 2.0.0-2
 Severity: grave
 Justification: renders package unusable
 
 Dear Maintainer,
 
 when I try to activate the Pidgin-Audacious plugin in pidgin nothing happens.
 
 When I click on Plugin Details the following error message shows up:
 
 Error: undefined symbol: audacious_remote_is_playing
Indeed, /usr/lib/pidgin/pidgin-audacious.so has unresolved references to
audacious_remote_is_playing, audacious_remote_get_playlist_title and
audacious_remote_get_playlist_pos which are defined in libaudclient2.
/usr/lib/pidgin/pidgin-audacious.so needs to be linked against it.

-laudclient2 is not used because only `pkg-config --libs audacious` is
used which includes only -laudcore -laudgui. But as the plugin doesn't
seem to use these libs the correct fix would be replacing `pkg-config
--libs audacious` with `pkg-config --libs audclient`. I'm preparing a
package with this fix.

-- 
WBR, wRAR


signature.asc
Description: Digital signature


Bug#702475: apache2: the itk MPM is underlinked: sys/capability.h symbols are not resolved

2013-03-09 Thread Stefan Fritsch
On Saturday 09 March 2013, Steinar H. Gunderson wrote:
 However, my long-term plan is definitely to build
 mpm-itk out-of-tree and a separate source package; if the Debian
 Apache maintainers want to include the patches needed, I think
 this would make the lives easier for all of us :-)

Yes. Until then, adding

LoadFile libcap.so

to mpm-itk.load could be a workaround. Anyone has time to test this?


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Processed: tagging 702609

2013-03-09 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 tags 702609 + pending
Bug #702609 [pidgin-audacious] pidgin-audacious: Not able to activate
Added tag(s) pending.
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
702609: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=702609
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#702633: CVE-2012-1016: NULL pointer dereference (DoS) in plugins/preauth/pkinit/pkinit_srv.c

2013-03-09 Thread Helmut Grohne
Package: src:krb5
Version: 1.10.1+dfsg-4
Severity: serious
Tags: security

Dear kerberos maintainers,

I noticed that your recent upload of 1.10.1+dfsg-4 fixed CVE-2013-1415,
but it does not say anything about CVE-2012-1016. Those two
vulnerabilities were fixed in the same upstream release 1.10.4. Could
you have a look at whether this particular issue CVE-2012-1016 affects
us and downgrade or close this bug as appropriate?

Helmut


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Processed: retitle 702453 to missing Replaces/Breaks: gir1.0-clutter-1.0

2013-03-09 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 retitle 702453 missing Replaces/Breaks: gir1.0-clutter-1.0
Bug #702453 [gir1.2-cogl-1.0] update from squeeze to wheezy breaks because of 
broken dependencies
Changed Bug title to 'missing Replaces/Breaks: gir1.0-clutter-1.0' from 'update 
from squeeze to wheezy breaks because of broken dependencies'
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
702453: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=702453
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#671483: icedove: crashes on startup with failed assertion

2013-03-09 Thread Guido Günther
Hi Tim,
thanks for the backtrace!

On Mon, Jan 07, 2013 at 05:54:41PM +, Tim Chadburn wrote:
[..snip..]  
 Thread 1 (Thread 0xb70d5730 (LWP 6100)):
 #0  0xb7fe2424 in __kernel_vsyscall ()
 #1  0xb7db9781 in *__GI_raise (sig=6) at 
 ../nptl/sysdeps/unix/sysv/linux/raise.c:64
 #2  0xb7dbcbb2 in *__GI_abort () at abort.c:92
 #3  0xb7db28e8 in *__GI___assert_fail (assertion=0xb7eb3d60 outbuf != ((void 
 *)0)  *outbuf != ((void *)0), file=0xb7eafea4 gconv.c, line=75, 
 function=0xb7eafec8 __gconv) at assert.c:81
 #4  0xb7da758b in __gconv (cd=0xb6ec6920, inbuf=value optimized out, 
 inbufend=value optimized out, outbuf=0xbfffddac, outbufend=0x0, 
 irreversible=0xbfffdcac) at gconv.c:75
 #5  0xb7da6a46 in iconv (cd=0xb6ec6920, inbuf=0xbfffdda4, 
 inbytesleft=0xbfffdd40, outbuf=0xbfffddac, outbytesleft=0xbfffdd3c) at 
 iconv.c:53

This aborts because *outbuf == NULL. 

 #6  0xb7f82e24 in xp_iconv (converter=0x0, input=0x6, inputLeft=0xbfffdd40, 
 output=0xbfffddac, outputLeft=0xbfffdd3c) at nsNativeCharsetUtils.cpp:162
 #7  0xb7f83007 in nsNativeCharsetConverter::NativeToUnicode (this=0xbfffddb3, 
 input=0xbfffdda4, inputLeft=0xbfffdda0, output=0xbfffddac, 
 outputLeft=0xbfffdda8) at nsNativeCharsetUtils.cpp:493
 #8  0xb7f834a9 in NS_CopyNativeToUnicode (input=..., output=...) at 
 nsNativeCharsetUtils.cpp:834

Could you insepct input and output here? Maybe we can get a clue what's
causing this.

 #9  0xb630050b in ConvertibleToNative (name=...) at nsMsgUtils.cpp:383
 #10 NS_MsgHashIfNecessary (name=...) at nsMsgUtils.cpp:478
 #11 0xb62f2285 in nsMsgDBFolder::CreateFileForDB (this=0xa9f9f000, 
 userLeafName=..., path=0xb00c2a00, dbFile=0xbfffe408) at nsMsgDBFolder.cpp:908
 #12 0xb64140f3 in nsImapMailFolder::CreateClientSubfolderInfo 
 (this=0xa9f9f000, folderName=..., hierarchyDelimiter=46 '.', flags=64, 
 suppressNotification=0) at nsImapMailFolder.cpp:986
 #13 0xb641404c in nsImapMailFolder::CreateClientSubfolderInfo 
 (this=0xb27ab400, folderName=..., hierarchyDelimiter=-44 '?', flags=64, 
 suppressNotification=0) at nsImapMailFolder.cpp:970
 #14 0xb63fc51c in nsImapIncomingServer::PossibleImapMailbox (this=0xb4137bf0, 
 folderPath=..., hierarchyDelimiter=-44 '?', boxFlags=64, 
 aNewFolder=0xb09fec50) at nsImapIncomingServer.cpp:1254

Could you check with gdb what folder is causing the trouble here?

 #15 0xb7fa004f in NS_InvokeByIndex_P () from /usr/lib/icedove/libxpcom_core.so
 #16 0xb7f97f43 in nsProxyObjectCallInfo::Run (this=0xa9f445e0) at 
 nsProxyEvent.cpp:181
 #17 0xb7f93653 in nsThread::ProcessNextEvent (this=0xb6ec69c0, mayWait=1, 
 result=0xbfffed3c) at nsThread.cpp:521
 #18 0xb7f637d6 in NS_ProcessNextEvent_P (thread=0x0, mayWait=1) at 
 nsThreadUtils.cpp:247
 #19 0xb5157757 in nsBaseAppShell::Run (this=0xb65bb1a0) at 
 nsBaseAppShell.cpp:170
 #20 0xb4e46350 in nsAppStartup::Run (this=0xb6e92fd0) at nsAppStartup.cpp:193
 #21 0xb7fd2fa2 in XRE_main (argc=1, argv=0xb2e4, aAppData=0xb6e16380) at 
 nsAppRunner.cpp:3321
 #22 0x08049314 in main (argc=1, argv=0xb2e4) at nsMailApp.cpp:103
 in nsAppRunner.cpp
 (gdb) 

Any chance you could check with the Wheezy version? It'd be great to
know if this still affects the upcoming release.
Cheers,
 -- Guido


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Processed: not security related

2013-03-09 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 tag 659994 -security
Bug #659994 [icedove] [regression] icedove: symbol lookup error: 
[...]/libdbusservice.so: undefined symbol: NS_Alloc
Bug #660736 [icedove] Subject: icedove deads on undefined symbol
Bug #691985 [icedove] icedove: aborts on startup
Removed tag(s) security.
Removed tag(s) security.
Removed tag(s) security.
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
659994: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659994
660736: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=660736
691985: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=691985
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Processed: merging 659994 659301

2013-03-09 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 merge 659994 659301
Bug #659994 [icedove] [regression] icedove: symbol lookup error: 
[...]/libdbusservice.so: undefined symbol: NS_Alloc
Bug #660736 [icedove] Subject: icedove deads on undefined symbol
Bug #691985 [icedove] icedove: aborts on startup
Bug #659994 [icedove] [regression] icedove: symbol lookup error: 
[...]/libdbusservice.so: undefined symbol: NS_Alloc
There is no source info for the package 'icedove' at version '3.1.16-1~bpo60+1' 
with architecture ''
Unable to make a source version for version '3.1.16-1~bpo60+1'
Marked as found in versions 3.1.16-1~bpo60+1.
Marked as found in versions 3.1.16-1~bpo60+1.
Marked as found in versions 3.1.16-1~bpo60+1.
Bug #659301 [icedove] icedove: Icedove will not start unless libdbusservice.so 
and libmailcomps.so removed
There is no source info for the package 'icedove' at version '3.1.16-1~bpo60+1' 
with architecture ''
Unable to make a source version for version '3.1.16-1~bpo60+1'
Marked as found in versions icedove/3.0.11-1+squeeze14 and 
icedove/3.0.11-1+squeeze13.
Added tag(s) squeeze.
Bug #660736 [icedove] Subject: icedove deads on undefined symbol
Bug #691985 [icedove] icedove: aborts on startup
Merged 659301 659994 660736 691985
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
659301: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659301
659994: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659994
660736: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=660736
691985: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=691985
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#659994: [regression] icedove: symbol lookup error: [...]/libdbusservice.so: undefined symbol: NS_Alloc

2013-03-09 Thread Guido Günther
On Tue, Feb 21, 2012 at 07:46:04PM +0100, Christoph Goehre wrote:
 Hi Ansgar,
 
 On Mi, Feb 15, 2012 at 05:34:45 +0100, Ansgar Burchardt wrote:
  since the last security update for icedove, the program does not
  start on several computers here.  Instead the following error
  message is displayed:
  
  /usr/lib/icedove/icedove-bin: symbol lookup error:
  /usr/lib/icedove/components/libdbusservice.so: undefined symbol:
  NS_Alloc
 
 I could reproduce it, but I need to move my .icedove profile away. If I
 downgrade to libc6 version 2.11.2-10, everything is working fine. So
 here my steps to reproduce:

Do you have a vm that shows this problem I could ssh into?
Cheers,
 -- Guido

 
 1) add
 
  deb http://snapshot.debian.org/archive/debian/20111215/ squeeze main
 
 to /etc/apt/sources.list and run 'apt-get update'
 
 2) install older libc6
 
 apt-get install libc-bin=2.11.2-10 libc-dev-bin=2.11.2-10 libc6=2.11.2-10 
 libc6-dev=2.11.2-10 libc6-i386=2.11.2-10 locales=2.11.2-10
 
 3) rerun Icedove
 
 Cheers,
 Christoph
 
 
 


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#701792: marked as done (PHP extension installed to wrong directory)

2013-03-09 Thread Debian Bug Tracking System
Your message dated Sat, 09 Mar 2013 12:48:07 +
with message-id e1uejc3-zh...@franck.debian.org
and subject line Bug#701792: fixed in zeroc-ice 3.4.2-8.2
has caused the Debian Bug report #701792,
regarding PHP extension installed to wrong directory
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
701792: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=701792
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Package: php-zeroc-ice
Version: 3.4.2-8.1
Severity: grave

The package php-zeroc-ice.install file hardcodes installation directory:

usr/php/*.so usr/lib/php5/20090626+lfs

which is clearly wrong because the php API version has changed.

rules-php.mk has the correct way of getting the right API version, e.g. using 
php-config5:

$(php-config5 --extension-dir)

O.

-- System Information:
Debian Release: 7.0
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: amd64 (x86_64)

Kernel: Linux 3.2.0-3-amd64 (SMP w/4 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
---End Message---
---BeginMessage---
Source: zeroc-ice
Source-Version: 3.4.2-8.2

We believe that the bug you reported is fixed in the latest version of
zeroc-ice, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 701...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Ondřej Surý ond...@debian.org (supplier of updated zeroc-ice package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.8
Date: Sun, 03 Mar 2013 23:59:54 +0100
Source: zeroc-ice
Binary: zeroc-ice34 ice34-translators ice34-services libicestorm34 libicegrid34 
libicebox34 icebox libicepatch2-34 libglacier2-34 libfreeze34 libicedb34 
ice34-slice libzeroc-ice34 libicessl34 libiceutil34 libicexml34 libslice34 
libzeroc-ice34-dev libzeroc-ice34-dbg python-zeroc-ice php-zeroc-ice 
libzeroc-ice3.4-cil libzeroc-ice-ruby1.8 libzeroc-ice3.4-java icegrid-gui
Architecture: source all amd64
Version: 3.4.2-8.2
Distribution: unstable
Urgency: high
Maintainer: Francisco Moya p...@debian.org
Changed-By: Ondřej Surý ond...@debian.org
Description: 
 ice34-services - Services bundled into ZeroC Ice
 ice34-slice - Slice definitions for Ice 3.4 services
 ice34-translators - Slice translators to several languages
 icebox - Plugin-based meta-application for ZeroC Ice
 icegrid-gui - GUI for IceGrid service
 libfreeze34 - Libraries implementing a persistence framework for ZeroC Ice
 libglacier2-34 - Libraries implementing a firewall service for ZeroC Ice
 libicebox34 - Libraries implementing a plugin framework for ZeroC Ice
 libicedb34 - Libraries for persistent backends for ZeroC Ice
 libicegrid34 - Libraries implementing grid-like services for ZeroC Ice
 libicepatch2-34 - Libraries implementing a distribution service for ZeroC Ice
 libicessl34 - Ice for C++ SSL plug-in
 libicestorm34 - Libraries implementing an event service for ZeroC Ice
 libiceutil34 - Ice for C++ misc utility library
 libicexml34 - ZeroC Ice for C++ XML parser library
 libslice34 - Ice for C++ Slice parser library
 libzeroc-ice-ruby1.8 - Ice for Ruby modules
 libzeroc-ice3.4-cil - Ice for C# libraries
 libzeroc-ice3.4-java - Ice for Java libraries
 libzeroc-ice34 - Ice for C++ runtime library
 libzeroc-ice34-dbg - Ice for C++ debugging symbols
 libzeroc-ice34-dev - Ice for C++ development libraries
 php-zeroc-ice - Ice for PHP extension
 python-zeroc-ice - Ice for Python libraries
 zeroc-ice34 - Internet Communications Engine
Closes: 701792
Changes: 
 zeroc-ice (3.4.2-8.2) unstable; urgency=high
 .
   [Sebastian Ramacher]
   * Non-maintainer upload.
   * Install PHP extension to directory given by php5-config --extension-dir.
 (Closes: #701792)
Checksums-Sha1: 
 2a11c9dab6d56ed0a027e188ed3a270a05fa5b4d 2902 zeroc-ice_3.4.2-8.2.dsc
 43dcd213e266fda82c97fac7564b0c382802b49f 43611 
zeroc-ice_3.4.2-8.2.debian.tar.gz
 8d60283e70e9c65a3080d7553e97b1152a87c8a2 36904 zeroc-ice34_3.4.2-8.2_all.deb
 b4d524804ae7c6a8169d3b1bd5561eae2c951560 220702 ice34-slice_3.4.2-8.2_all.deb
 4f6aac38586129aff7094fef5d5b6c72c16b3a11 736262 
libzeroc-ice3.4-cil_3.4.2-8.2_all.deb
 

Processed: Re: Bug#702526: ruby1.8: CVE-2013-1821: entity expansion DoS vulnerability in REXML

2013-03-09 Thread Debian Bug Tracking System
Processing control commands:

 tags -1 + patch
Bug #702526 [src:ruby1.8] ruby1.8: CVE-2013-1821: entity expansion DoS 
vulnerability in REXML
Ignoring request to alter tags of bug #702526 to the same tags previously set

-- 
702526: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=702526
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#702526: ruby1.8: CVE-2013-1821: entity expansion DoS vulnerability in REXML

2013-03-09 Thread Salvatore Bonaccorso
Control: tags -1 + patch

Hi

Attached is a proposed debdiff, based also on the changes done for
ruby1.9.1. But there is one thing which might be sorted out first:

The binary debdiff shows:

cut-cut-cut-cut-cut-cut-
ri1.8:

[The following lists of changes regard files as different if they have
different names, permissions or owners.]

Files in second .deb but not in first
-
-rw-r--r--  root/root   
/usr/share/ri/1.8/system/IRB/Context/_set_last_value-i.yaml
-rw-r--r--  root/root   
/usr/share/ri/1.8/system/IRB/WorkSpace/__evaluate__-i.yaml
-rw-r--r--  root/root   
/usr/share/ri/1.8/system/REXML/Document/entity_expansion_text_limit%3d-c.yaml
-rw-r--r--  root/root   
/usr/share/ri/1.8/system/REXML/Document/entity_expansion_text_limit-c.yaml
-rw-r--r--  root/root   /usr/share/ri/1.8/system/REXML/Text/expand-c.yaml

Files in first .deb but not in second
-
-rw-r--r--  root/root   
/usr/share/ri/1.8/system/RSS/Rss/Channel/Item/_setup_maker_element-i.yaml
cut-cut-cut-cut-cut-cut-

Regards,
Salvatore
diff -Nru ruby1.8-1.8.7.358/debian/changelog ruby1.8-1.8.7.358/debian/changelog
--- ruby1.8-1.8.7.358/debian/changelog  2012-11-01 01:20:28.0 +0100
+++ ruby1.8-1.8.7.358/debian/changelog  2013-03-09 13:39:28.0 +0100
@@ -1,3 +1,14 @@
+ruby1.8 (1.8.7.358-6.1) unstable; urgency=high
+
+  * Non-maintainer upload.
+  * Add CVE-2013-1821.patch patch.
+CVE-2013-1821: Fix entity expansion DoS vulnerability in REXML. When
+reading text nodes from an XML document, the REXML parser could be
+coerced into allocating extremely large string objects which could
+consume all available memory on the system. (Closes: #702526)
+
+ -- Salvatore Bonaccorso car...@debian.org  Sat, 09 Mar 2013 08:05:35 +0100
+
 ruby1.8 (1.8.7.358-6) unstable; urgency=high
 
   * Timeout the execution of the tests after 2 hours. This should fix the
diff -Nru ruby1.8-1.8.7.358/debian/patches/CVE-2013-1821.patch 
ruby1.8-1.8.7.358/debian/patches/CVE-2013-1821.patch
--- ruby1.8-1.8.7.358/debian/patches/CVE-2013-1821.patch1970-01-01 
01:00:00.0 +0100
+++ ruby1.8-1.8.7.358/debian/patches/CVE-2013-1821.patch2013-03-09 
13:39:28.0 +0100
@@ -0,0 +1,120 @@
+Description: Fix entity expansion DoS vulnerability in REXML
+ CVE-2013-1821
+Origin: upstream, 
http://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=revisionrevision=39384view=patch
+Bug-Debian: http://bugs.debian.org/702526
+Forwarded: not-needed
+Author: Salvatore Bonaccorso car...@debian.org
+Last-Update: 2013-03-09
+
+--- a/lib/rexml/document.rb
 b/lib/rexml/document.rb
+@@ -214,6 +214,18 @@
+   return @@entity_expansion_limit
+ end
+ 
++@@entity_expansion_text_limit = 10_240
++
++# Set the entity expansion limit. By default the limit is set to 10240.
++def Document::entity_expansion_text_limit=( val )
++  @@entity_expansion_text_limit = val
++end
++
++# Get the entity expansion limit. By default the limit is set to 1.
++def Document::entity_expansion_text_limit
++  return @@entity_expansion_text_limit
++end
++
+ attr_reader :entity_expansion_count
+ 
+ def record_entity_expansion
+--- a/test/rexml/test_document.rb
 b/test/rexml/test_document.rb
+@@ -63,4 +63,23 @@
+   ensure
+ REXML::Document.entity_expansion_limit = 1
+   end
++
++  def test_entity_string_limit
++template = '!DOCTYPE bomb [ !ENTITY a ^  ] bomb$/bomb'
++len  = 5120 # 5k per entity
++template.sub!(/\^/, B * len)
++
++# 10k is OK
++entities = 'a;' * 2 # 5k entity * 2 = 10k
++xmldoc = REXML::Document.new(template.sub(/\$/, entities))
++assert_equal(len * 2, xmldoc.root.text.bytesize)
++
++# above 10k explodes
++entities = 'a;' * 3 # 5k entity * 2 = 15k
++xmldoc = REXML::Document.new(template.sub(/\$/, entities))
++assert_raises(RuntimeError) do
++  xmldoc.root.text
++end
++  end
++
+ end
+--- a/lib/rexml/text.rb
 b/lib/rexml/text.rb
+@@ -308,37 +308,35 @@
+ 
+ # Unescapes all possible entities
+ def Text::unnormalize( string, doctype=nil, filter=nil, illegal=nil )
+-  rv = string.clone
+-  rv.gsub!( /\r\n?/, \n )
+-  matches = rv.scan( REFERENCE )
+-  return rv if matches.size == 0
+-  rv.gsub!( NUMERICENTITY ) {|m|
+-m=$1
+-m = 0#{m} if m[0] == ?x
+-[Integer(m)].pack('U*')
++  sum = 0
++  string.gsub( /\r\n?/, \n ).gsub( REFERENCE ) {
++s = Text.expand($, doctype, filter)
++if sum + s.bytesize  Document.entity_expansion_text_limit
++  raise entity expansion has grown too large
++else
++  sum += s.bytesize
++end
++s
+   }
+-  matches.collect!{|x|x[0]}.compact!
+-  if matches.size  0
+-if doctype
+-  matches.each do |entity_reference|
+- 

Bug#702637: matlab-support: fails to install in clean chroot

2013-03-09 Thread Julian Taylor
Package: matlab-support
Version: 0.0.18
Severity: serious

in a clean testing chroot:

Setting up matlab-support (0.0.18) ...
No matlab found and maybe running in non-interactive mode. No way out --
failing...
dpkg: error processing matlab-support (--configure):
 subprocess installed post-installation script returned error exit status 1
Errors were encountered while processing:
 matlab-support
E: Sub-process /usr/bin/dpkg returned an error code (1)


also it has dozens of upgrade and installation failures in ubuntu,
probably not relevant for Debian, but it sheds a bad light on the
quality of the package.


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#702637: matlab-support: fails to install in clean chroot

2013-03-09 Thread Sébastien Villemot
Control: tags -1 + patch

Le samedi 09 mars 2013 à 14:18 +0100, Julian Taylor a écrit :
 Package: matlab-support
 Version: 0.0.18
 Severity: serious
 
 in a clean testing chroot:
 
 Setting up matlab-support (0.0.18) ...
 No matlab found and maybe running in non-interactive mode. No way out --
 failing...
 dpkg: error processing matlab-support (--configure):
  subprocess installed post-installation script returned error exit status 1
 Errors were encountered while processing:
  matlab-support
 E: Sub-process /usr/bin/dpkg returned an error code (1)

The attached patch allows the package to install nicely even if MATLAB
is not present. Otherwise people who install the package by accident end
up with a dpkg error.

Julian: please confirm that it fixes the issue for you.

-- 
 .''`.Sébastien Villemot
: :' :Debian Developer
`. `' http://www.dynare.org/sebastien
  `-  GPG Key: 4096R/381A7594

diff -Nru matlab-support-0.0.18/debian/changelog matlab-support-0.0.18+deb70u1/debian/changelog
--- matlab-support-0.0.18/debian/changelog	2012-03-07 12:19:06.0 +
+++ matlab-support-0.0.18+deb70u1/debian/changelog	2013-03-09 13:51:14.0 +
@@ -1,3 +1,11 @@
+matlab-support (0.0.18+deb70u1) testing-proposed-updates; urgency=low
+
+  * Non-maintainer upload.
+  * Have config and postinst scripts exit nicely if there is no MATLAB
+installation. (Closes: #702637)
+
+ -- Sébastien Villemot sebast...@debian.org  Sat, 09 Mar 2013 13:31:13 +
+
 matlab-support (0.0.18) unstable; urgency=low
 
   * Update debian/copyright.
diff -Nru matlab-support-0.0.18/debian/matlab-support.config matlab-support-0.0.18+deb70u1/debian/matlab-support.config
--- matlab-support-0.0.18/debian/matlab-support.config	2011-01-05 14:53:25.0 +
+++ matlab-support-0.0.18+deb70u1/debian/matlab-support.config	2013-03-09 13:30:48.0 +
@@ -59,7 +59,7 @@
 if [ -z $matlab_install_glob ]; then
 # fail in non-interactive mode
 db_input critical matlab-support/no-matlab-found || \
-{ echo No matlab found and maybe running in non-interactive mode. No way out -- failing...; exit 1; }
+{ echo No matlab found and maybe running in non-interactive mode. Exiting.; exit 0; }
 db_fset matlab-support/matlab-install-glob seen false
 STATE=0
 else
diff -Nru matlab-support-0.0.18/debian/matlab-support.postinst matlab-support-0.0.18+deb70u1/debian/matlab-support.postinst
--- matlab-support-0.0.18/debian/matlab-support.postinst	2012-03-07 11:17:07.0 +
+++ matlab-support-0.0.18+deb70u1/debian/matlab-support.postinst	2013-03-09 13:30:40.0 +
@@ -20,7 +20,7 @@
 # if there is no default path something went wrong
 if [ -z $matlab_default_path ]; then
 echo No default Matlab path found. Exiting.
-exit 1
+exit 0
 fi
 # look whether there is a config file and recreate the config file if
 # missing


signature.asc
Description: This is a digitally signed message part


Processed: Re: Bug#702637: matlab-support: fails to install in clean chroot

2013-03-09 Thread Debian Bug Tracking System
Processing control commands:

 tags -1 + patch
Bug #702637 [matlab-support] matlab-support: fails to install in clean chroot
Added tag(s) patch.

-- 
702637: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=702637
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#642750: GDB stops with sigtrap at 0 address on ia64 wheezy

2013-03-09 Thread Stephan Schreiber

notfound 642750 src:linux/3.5.5-1~experimental.1
notfixed 642750 linux-image-3.0.0-2-mckinley/3.0.0-5
notfixed 642750 linux-image-3.1.0-rc7-mckinley/3.1.0~rc7-1~experimental.1
fixed 642750 3.2.35-2
thanks


The problem with GDB does no longer occur with Kernel 3.2.35-2. I  
don't have a clue why.

A user has confimred that on the debian-i...@lists.debian.org list.

I filed a new bug#702641 for the asm register contraints problem above.

Please could you simply close this bug?

Stephan


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Processed (with 1 errors): GDB stops with sigtrap at 0 address on ia64 wheezy

2013-03-09 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 notfound 642750 src:linux/3.5.5-1~experimental.1
Unknown command or malformed arguments to command.
 notfixed 642750 linux-image-3.0.0-2-mckinley/3.0.0-5
Bug #642750 {Done: Michael Gilbert mgilb...@debian.org} [src:webkit] 
epiphany-browser: *HIGHLY* unstable on ia64 (IA-64/IPF/Itanium) platform
The source linux-image-3.0.0-2-mckinley and version 3.0.0-5 do not appear to 
match any binary packages
Ignoring request to alter fixed versions of bug #642750 to the same values 
previously set
 notfixed 642750 linux-image-3.1.0-rc7-mckinley/3.1.0~rc7-1~experimental.1
Bug #642750 {Done: Michael Gilbert mgilb...@debian.org} [src:webkit] 
epiphany-browser: *HIGHLY* unstable on ia64 (IA-64/IPF/Itanium) platform
The source linux-image-3.1.0-rc7-mckinley and version 
3.1.0~rc7-1~experimental.1 do not appear to match any binary packages
Ignoring request to alter fixed versions of bug #642750 to the same values 
previously set
 fixed 642750 3.2.35-2
Bug #642750 {Done: Michael Gilbert mgilb...@debian.org} [src:webkit] 
epiphany-browser: *HIGHLY* unstable on ia64 (IA-64/IPF/Itanium) platform
The source 'webkit' and version '3.2.35-2' do not appear to match any binary 
packages
Marked as fixed in versions webkit/3.2.35-2.
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
642750: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642750
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#702646: FTBFS: Can't locate File/Slurp.pm

2013-03-09 Thread Michael Tautschnig
Package: cil
Version: 0.07.00-4
Severity: serious
Justification: FTBFS
Usertags: goto-cc

The package fails to build as no test can be run:

Test Summary Report
---
t/00_files.t (Wstat: 512 Tests: 0 Failed: 0)
  Non-zero exit status: 2
  Parse errors: No plan found in TAP output
Files=1, Tests=0,  0 wallclock secs ( 0.01 usr  0.00 sys +  0.02 cusr  0.00 
csys =  0.03 CPU)
Result: FAIL
Failed 1/1 test programs. 0/0 subtests failed.
dh_auto_test: perl Build test returned exit code 2
make: *** [build] Error 2

The reason for the failure is well explained by the package itself:

Checking prerequisites...
  build_requires:
!  Class::Accessor is not installed
!  DateTime is not installed
!  Email::Date is not installed
!  Email::Find is not installed
!  Email::Simple is not installed
!  File::Slurp is not installed
!  File::Touch is not installed
!  Getopt::Mixed is not installed

ERRORS/WARNINGS FOUND IN PREREQUISITES.  You may wish to install the versions
of the modules indicated above before proceeding with this installation


It may be worth taking a peek at Ubuntu's version of the package,
0.07.00-4ubuntu1, which only differs in the respect that all these dependencies
have been added...

Best,
Michael



pgpbTuSixUXUw.pgp
Description: PGP signature


Bug#702637: matlab-support: fails to install in clean chroot

2013-03-09 Thread Yaroslav Halchenko
But should it exit nicely if no matlab is present???
Absent matlab == matlab cannot be supported == error   in my vision of
how things should be handled in this package.  Having it installed
without error should provide some guarantee that Matlab is present so
that dependent packages could rely on that.

If it is in the violation of some statute of the policy -- please
let us know.   Otherwise -- please wait for the main maintainer's
opinion on this issue.

The name and description of the package provide sufficient information
to avoid installation by accident. And if that happens, it should be
removed then.

On Sat, 09 Mar 2013, Sébastien Villemot wrote:

 Control: tags -1 + patch

 Le samedi 09 mars 2013 à 14:18 +0100, Julian Taylor a écrit :
  Package: matlab-support
  Version: 0.0.18
  Severity: serious

  in a clean testing chroot:

  Setting up matlab-support (0.0.18) ...
  No matlab found and maybe running in non-interactive mode. No way out --
  failing...
  dpkg: error processing matlab-support (--configure):
   subprocess installed post-installation script returned error exit status 1
  Errors were encountered while processing:
   matlab-support
  E: Sub-process /usr/bin/dpkg returned an error code (1)

 The attached patch allows the package to install nicely even if MATLAB
 is not present. Otherwise people who install the package by accident end
 up with a dpkg error.

 Julian: please confirm that it fixes the issue for you.
-- 
Yaroslav O. Halchenko
http://neuro.debian.net http://www.pymvpa.org http://www.fail2ban.org
Senior Research Associate, Psychological and Brain Sciences Dept.
Dartmouth College, 419 Moore Hall, Hinman Box 6207, Hanover, NH 03755
Phone: +1 (603) 646-9834   Fax: +1 (603) 646-1419
WWW:   http://www.linkedin.com/in/yarik


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#702637: matlab-support: fails to install in clean chroot

2013-03-09 Thread Yaroslav Halchenko

On Sat, 09 Mar 2013, Julian Taylor wrote:

 also it has dozens of upgrade and installation failures in ubuntu,
 probably not relevant for Debian, but it sheds a bad light on the
 quality of the package.
in Ubuntu...

Meanwhile, this package in Debian has only following bugs:

Status
2 Outstanding
3 Resolved
1 From other Branch
Severity
1 Serious (policy violations or makes package unfit for release)
5 Wishlist items
Classification
1 Patch Available
1 Unclassified

including yours, and regular releases -- seems to be not that bad, and
maintained.

If noone can maintain it properly  in Ubuntu -- feel free to drop it there I
guess.  We will address our users issues while they complain via
NeuroDebian channels.

-- 
Yaroslav O. Halchenko
http://neuro.debian.net http://www.pymvpa.org http://www.fail2ban.org
Senior Research Associate, Psychological and Brain Sciences Dept.
Dartmouth College, 419 Moore Hall, Hinman Box 6207, Hanover, NH 03755
Phone: +1 (603) 646-9834   Fax: +1 (603) 646-1419
WWW:   http://www.linkedin.com/in/yarik


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#702637: matlab-support: fails to install in clean chroot

2013-03-09 Thread Julian Taylor
On 09.03.2013 15:19, Yaroslav Halchenko wrote:
 But should it exit nicely if no matlab is present???
 Absent matlab == matlab cannot be supported == error   in my vision of
 how things should be handled in this package.  Having it installed
 without error should provide some guarantee that Matlab is present so
 that dependent packages could rely on that.
 
 If it is in the violation of some statute of the policy -- please
 let us know.   Otherwise -- please wait for the main maintainer's
 opinion on this issue.
 
 The name and description of the package provide sufficient information
 to avoid installation by accident. And if that happens, it should be
 removed then.
 


in Ubuntu we have around 40 reports (which I'm currently duplicating
into one report) from people who install it and get an error message
sometimes their installation even hangs completely, even though I see no
significant difference to in the installation scripts to Debian.
The number of reports almost is about 1/4 of the popcon in Debian.

While we Debian maintainers know how to deal with dpkg failures, average
users don't.
I don't know if it technically violates policy, but its certainly not
acceptable for a distribution not focused on only technical users.
If not fixed removal from Ubuntu is certainly an option, but I'd prefer
to have it fixed in Debian too.


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#642750: GDB stops with sigtrap at 0 address on ia64 wheezy

2013-03-09 Thread Stephan Schreiber

I'm sorry. Wrong bug number.
Please, ignore my message.

Stephan


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Processed: undo my mistake

2013-03-09 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 notfixed 642750 3.2.35-2
Bug #642750 {Done: Michael Gilbert mgilb...@debian.org} [src:webkit] 
epiphany-browser: *HIGHLY* unstable on ia64 (IA-64/IPF/Itanium) platform
The source 'webkit' and version '3.2.35-2' do not appear to match any binary 
packages
No longer marked as fixed in versions webkit/3.2.35-2.

End of message, stopping processing here.

Please contact me if you need assistance.
-- 
642750: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642750
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#691576: GDB stops with sigtrap at 0 address on ia64 wheezy

2013-03-09 Thread Stephan Schreiber

notfound 691576 src:linux/3.5.5-1~experimental.1
notfixed 691576 linux-image-3.0.0-2-mckinley/3.0.0-5
notfixed 691576 linux-image-3.1.0-rc7-mckinley/3.1.0~rc7-1~experimental.1
fixed 691576 3.2.35-2
thanks


The problem with GDB does no longer occur with Kernel 3.2.35-2. I  
don't have a clue why.

A user has confimred that on the debian-i...@lists.debian.org list.

I filed a new bug#702641 for the asm register contraints problem above.

Please could you simply close this bug?

Stephan


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Processed (with 1 errors): GDB stops with sigtrap at 0 address on ia64 wheezy

2013-03-09 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 notfound 691576 src:linux/3.5.5-1~experimental.1
Unknown command or malformed arguments to command.
 notfixed 691576 linux-image-3.0.0-2-mckinley/3.0.0-5
Bug #691576 [src:linux] GDB stops with sigtrap at 0 address on ia64 wheezy
The source linux-image-3.0.0-2-mckinley and version 3.0.0-5 do not appear to 
match any binary packages
No longer marked as fixed in versions linux-image-3.0.0-2-mckinley/3.0.0-5.
 notfixed 691576 linux-image-3.1.0-rc7-mckinley/3.1.0~rc7-1~experimental.1
Bug #691576 [src:linux] GDB stops with sigtrap at 0 address on ia64 wheezy
The source linux-image-3.1.0-rc7-mckinley and version 
3.1.0~rc7-1~experimental.1 do not appear to match any binary packages
No longer marked as fixed in versions 
linux-image-3.1.0-rc7-mckinley/3.1.0~rc7-1~experimental.1.
 fixed 691576 3.2.35-2
Bug #691576 [src:linux] GDB stops with sigtrap at 0 address on ia64 wheezy
Marked as fixed in versions linux/3.2.35-2.
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
691576: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=691576
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#701868: openssl communication problems with 1.0.1e with AES-NI

2013-03-09 Thread Kurt Roeckx
Hi,

On request of openssl upstream I've put a version of the package
online which is staticly linked against the openssl libraries
and has debug info.

There seem to be various people who run into this problem, but
we seem to be unable to reproduce it on any of our systems.

It's available from:
http://people.debian.org/~kroeckx/openssl/static_debug/

You only need the openssl package from there
(openssl_1.0.1e-1+test1_amd64.deb), since the shared libraries
aren't needed for the test.

So what upstream asks is to try and reproduce it with s_client.
At least 1 person reported that this fails for him:
openssl s_client -connect mail.uni-paderborn.de:465
And then send EHLO test

Others might try to reproduce something simular with their
own servers.

They asked if you use any LD_* environment variables.

lsof -p $pid of s_client process would also be nice.

If you have a custom /etc/ssl/openssl.cnf, it would also be nice
if you could send that.

/proc/cpuinfo would also be nice to have.

If you know how to use gdb, they ask to print print variables and
buffers in e_aes_cbc_hmac_sha1.c

If you want to debug it, debugging might not show you source
code since you might have the source in a different path.
The .deb files can be generated from the source above using:
DEB_BUILD_MAINT_OPTIONS=hardening=-all DEB_BUILD_OPTIONS=noopt nostrip 
dpkg-buildpackage -B -uc 

If you build it yourself, you can also just run the
./openssl.static binary instead of installing the .deb
package.



Kurt


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#702609: marked as done (pidgin-audacious: Not able to activate)

2013-03-09 Thread Debian Bug Tracking System
Your message dated Sat, 09 Mar 2013 14:47:44 +
with message-id e1uel3o-pt...@franck.debian.org
and subject line Bug#702609: fixed in pidgin-audacious 2.0.0-3
has caused the Debian Bug report #702609,
regarding pidgin-audacious: Not able to activate
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
702609: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=702609
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Package: pidgin-audacious
Version: 2.0.0-2
Severity: grave
Justification: renders package unusable

Dear Maintainer,

when I try to activate the Pidgin-Audacious plugin in pidgin nothing happens.

When I click on Plugin Details the following error message shows up:

Error: undefined symbol: audacious_remote_is_playing
Check the plugin website for an update.

Regards,
Christian



-- System Information:
Debian Release: 7.0
  APT prefers testing-updates
  APT policy: (500, 'testing-updates'), (500, 'testing')
Architecture: i386 (i686)

Kernel: Linux 3.2.0-4-686-pae (SMP w/4 CPU cores)
Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages pidgin-audacious depends on:
ii  libatk1.0-0 2.4.0-2
ii  libaudcore1 3.2.4-1
ii  libc6   2.13-38
ii  libcairo2   1.12.2-3
ii  libdbus-1-3 1.6.8-1
ii  libdbus-glib-1-20.100.2-1
ii  libfontconfig1  2.9.0-7.1
ii  libfreetype62.4.9-1.1
ii  libgdk-pixbuf2.0-0  2.26.1-1
ii  libglib2.0-02.33.12+really2.32.4-5
ii  libgtk2.0-0 2.24.10-2
ii  libmcs1 0.7.2-2.1
ii  libmowgli2  1.0.0-1
ii  libpango1.0-0   1.30.0-1
ii  pidgin  2.10.6-3

Versions of packages pidgin-audacious recommends:
ii  audacious  3.2.4-1

pidgin-audacious suggests no packages.

-- no debconf information
---End Message---
---BeginMessage---
Source: pidgin-audacious
Source-Version: 2.0.0-3

We believe that the bug you reported is fixed in the latest version of
pidgin-audacious, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 702...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Andrey Rahmatullin w...@wrar.name (supplier of updated pidgin-audacious 
package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.8
Date: Sat, 09 Mar 2013 15:52:55 +0600
Source: pidgin-audacious
Binary: pidgin-audacious
Architecture: source i386
Version: 2.0.0-3
Distribution: unstable
Urgency: low
Maintainer: Debian QA Group packa...@qa.debian.org
Changed-By: Andrey Rahmatullin w...@wrar.name
Description: 
 pidgin-audacious - pidgin integration with Audacious
Closes: 702609
Changes: 
 pidgin-audacious (2.0.0-3) unstable; urgency=low
 .
   * QA upload.
   * Link with -laudclient2 instead of -laudcore -laudgui (Closes: #702609).
   * Use dh-autoreconf instead of autotools-dev to be able to regenerate
 configure.
Checksums-Sha1: 
 78a33d5e01c399c14c3342c7f9c70c717e4a0c63 1872 pidgin-audacious_2.0.0-3.dsc
 74ca8b28aac824bd7c20120ce89246be5b8be4a0 2632 
pidgin-audacious_2.0.0-3.debian.tar.gz
 c2134d3ebcf45a998cbbbf0adaf6cc247d32db75 9566 pidgin-audacious_2.0.0-3_i386.deb
Checksums-Sha256: 
 93faa6fdbad4940e14812d63deea97baf79072641babcd5dbc2a6ec1d43670cb 1872 
pidgin-audacious_2.0.0-3.dsc
 9b807a0da2b06072228d4a7302aa8aa44e0cfcbbd0b105320cd8cc5903617a41 2632 
pidgin-audacious_2.0.0-3.debian.tar.gz
 6771dff8300b871d095bb9342457a884a0146c44b262c0e85572ee484cf56cfb 9566 
pidgin-audacious_2.0.0-3_i386.deb
Files: 
 0404b2dc29746552e0497c0f62149512 1872 net optional pidgin-audacious_2.0.0-3.dsc
 e95e5e3ea5354707bf0c5f1bd8ebf078 2632 net optional 
pidgin-audacious_2.0.0-3.debian.tar.gz
 532aef44d4e47dd1717e898d23357c7f 9566 net optional 
pidgin-audacious_2.0.0-3_i386.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.12 (GNU/Linux)

iQIcBAEBAgAGBQJRO0fhAAoJENPhc4PPp/8GlvgP/3acodRoJhK5MJ0vVcrSX1P7
iYMCUi4KTaXexc+ZXBERlbK0QUsxbmFjDt/lHQ9JPpmDPqwVs8qa4UI0xOlzDOpd
bPlazQRY12v96NT4WjVmRUjEnBj1TwxpF1TwY7zsmPP4+32N79f370BCAAKRNgoF
rlOmzeBYa6+HVI9+PLe36ePDHS0ZR+ETGa3pskzkU63TCr1X6cZ/JfG7IEYJHYvz
3Kc6vFno54cyq2T4e0RI1/JbSf5gufh6g+qXbp2OMzgiJ881kvyyumFjC3MMU6rb

Processed: forcibly merging 702374 702653

2013-03-09 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 forcemerge 702374 702653
Bug #702374 [postfix] postfix: get message Relay Access Denied, when using SASL
Bug #702653 [postfix] new upstream version broke relay_clientcerts
Severity set to 'grave' from 'important'
Merged 702374 702653
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
702374: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=702374
702653: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=702653
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#691576: marked as done (GDB stops with sigtrap at 0 address on ia64 wheezy)

2013-03-09 Thread Debian Bug Tracking System
Your message dated Sat, 09 Mar 2013 16:11:19 +
with message-id 1362845479.3768.495.ca...@deadeye.wl.decadent.org.uk
and subject line Re: Bug#691576: GDB stops with sigtrap at 0 address on ia64 
wheezy
has caused the Debian Bug report #691576,
regarding GDB stops with sigtrap at 0 address on ia64 wheezy
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
691576: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=691576
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---

Package: gdb
Version: 7.4.1
Severity: serious


Dell PowerEdge 3250
2x Itanium Madison 1.5GHz 6M
4GB RAM


I realized that GDB doesn't work as it should.
When GDB should run *any* target application, it always stops with  
SIGTRAP 0x.

Example:


stephan@itanic:~$ gdb man
GNU gdb (GDB) 7.4.1-debian
Copyright (C) 2012 Free Software Foundation, Inc.
License GPLv3+: GNU GPL version 3 or later http://gnu.org/licenses/gpl.html
This is free software: you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law.  Type show copying
and show warranty for details.
This GDB was configured as ia64-linux-gnu.
For bug reporting instructions, please see:
http://www.gnu.org/software/gdb/bugs/...
Reading symbols from /usr/bin/man...(no debugging symbols found)...done.
(gdb) run
Starting program: /usr/bin/man

Program received signal SIGTRAP, Trace/breakpoint trap.
0x in ?? ()
(gdb) c
Continuing.

Program received signal SIGTRAP, Trace/breakpoint trap.
0x in ?? ()
(gdb) c
Continuing.

Program received signal SIGTRAP, Trace/breakpoint trap.
0x in ?? ()
(gdb)



Debian Wheezy: Kernel 3.2.23, GDB 7.4.1 doesn't work
Debian Wheezy: Kernel 3.2.23, GDB 7.3 doesn't work
Debian Wheezy: with Kernel 3.5.5 (experimental), GDB 7.4.1 doesn't work
Debian Wheezy: with Kernel 3.5.5 (experimental), GDB 7.3 doesn't work
Debian Lenny:  Kernel 2.6.26, a 'debootstrapped' Wheezy userland, GDB  
7.4.1 *works*

Gentoo:Kernel 3.3.8,  GDB 7.3.1 works

I'm surprised that GDB 7.4.1 works on Lenny in the chroot'd Wheezy  
environment.

Please also note that the problem doesn't occur on Gentoo ia64.

In my opinion, it points to the Debian Kernel somehow...

Stephan
---End Message---
---BeginMessage---
On Sat, 2013-03-09 at 15:35 +0100, Stephan Schreiber wrote:
 notfound 691576 src:linux/3.5.5-1~experimental.1
 notfixed 691576 linux-image-3.0.0-2-mckinley/3.0.0-5
 notfixed 691576 linux-image-3.1.0-rc7-mckinley/3.1.0~rc7-1~experimental.1
 fixed 691576 3.2.35-2
 thanks
 
 
 The problem with GDB does no longer occur with Kernel 3.2.35-2. I  
 don't have a clue why.
 A user has confimred that on the debian-i...@lists.debian.org list.
 
 I filed a new bug#702641 for the asm register contraints problem above.
 
 Please could you simply close this bug?

Done.  (But you can close bugs yourself, just as you can change their
versions.)

Ben.

-- 
Ben Hutchings
Always try to do things in chronological order;
it's less confusing that way.


signature.asc
Description: This is a digitally signed message part
---End Message---


Bug#702658: matlab-support: uninteruptable prompt on installation with readline

2013-03-09 Thread Julian Taylor
Package: matlab-support
Version: 0.0.18
Severity: serious

when you use the readline frontend the matlab-support package
installation gets stuck in an uninterruptable question loop asking for
the location of matlab:

DEBIAN_FRONTEND=readline
apt-get install matlab-support
Location of MATLAB installation(s): ...

entering an empty string does not cancel the prompt.
Other frontends are probably ok, they offer a cancel option.


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#702217: proposition for libopenid-ruby/2.1.8debian-1+squeeze1 [CVE-2013-1812]

2013-03-09 Thread Luciano Bello
On Wednesday 06 March 2013, Cédric Boutillier wrote:
 I adapted the patch from upstream and applied it to the version of
 libopenid-ruby currently in squeeze.
 Attached is the debdiff with a possible 2.1.8debian/1+squeeze1
 targetting squeeze if accepted by the security team.

Thanks for your patch! In my opinion, this can be handle via s-p-u.

Cheers, luciano


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#699852: Proposed debdiff

2013-03-09 Thread Tino Keitel
On Fri, Mar 08, 2013 at 07:39:32 +0100, Yves-Alexis Perez wrote:
 I've built a package including the patch pointed by Josselin. Could
 someone test it and report back as I don't have an http-based
 syncevolution setup.

Hi,

I already prepared a -2 version with several fixes, including the
autosync issue, but got interrupted due to the birth of a baby girl. 
I'll try to push it to the alioth git repository, and would appreciate
some help getting it reviewed/accepted for wheezy or wheezy-updates.

Regards,
Tino


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#702637: matlab-support: fails to install in clean chroot

2013-03-09 Thread Yaroslav Halchenko
Yes it would be great to have bugs fixed in Debian too, especially if they get 
reported on Debian systems... as for this particular one I consider it a 
feature :-)
Keep us updated on what you figure out
-- 
Sent from a phone which beats iPhone.


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#700738: valgrind summary

2013-03-09 Thread Sebastian Ramacher
On 2013-03-08 22:25:46, Antoine Beaupré wrote:
 I really wonder what to do at this point. I can certainly upload the 2.0
 version to experimental to allow people to test this more thoroughly
 (but then again, it's just once C file, easy enough to test). But I
 don't feel those bugs are serious enough to block the Wheezy release. It
 doesn't seem those issues are critical enough to justify the serious
 severity, but maybe I am wrong.

 Would I would like to do is to upload a 1.1-2 with Bremner's patch and
 then request an unblock and close this bug report.

Even with David's patch and ttyclock and sig initialized (see the
attached patch), there are some issues left: the incorrect type of
ttyclock-running and calling ncurses stuff in the signal handler.

Anyway, signals intermixed with ncurses is very much out of my comfort
zone. Maybe Thorsten (CCed) can provide additional input on those issues.

Regards
-- 
Sebastian Ramacher
diff --git a/ttyclock.c b/ttyclock.c
index 6df69e6..15e8151 100644
--- a/ttyclock.c
+++ b/ttyclock.c
@@ -58,6 +58,7 @@ init(void)
  refresh();
 
  /* Init signal handler */
+ sigemptyset(sig.sa_mask);
  sig.sa_handler = signal_handler;
  sig.sa_flags   = 0;
  sigaction(SIGWINCH, sig, NULL);
@@ -445,6 +446,7 @@ main(int argc, char **argv)
 
  /* Alloc ttyclock */
  ttyclock = malloc(sizeof(ttyclock_t));
+ memset(ttyclock, 0, sizeof(ttyclock_t));
 
  /* Date format */
  ttyclock-option.format = malloc(sizeof(char) * 100);
@@ -478,14 +480,14 @@ main(int argc, char **argv)
break;
   case 'i':
puts(TTY-Clock 2 © by Martin Duquesnoy (xor...@gmail.com));
-   free(ttyclock);
free(ttyclock-option.format);
+   free(ttyclock);
exit(EXIT_SUCCESS);
break;
   case 'v':
puts(TTY-Clock 2 © devel version);
-   free(ttyclock);
free(ttyclock-option.format);
+   free(ttyclock);
exit(EXIT_SUCCESS);
break;
   case 's':
@@ -527,8 +529,8 @@ main(int argc, char **argv)
   key_event();
  }
 
- free(ttyclock);
  free(ttyclock-option.format);
+ free(ttyclock);
  endwin();
 
  return 0;


signature.asc
Description: Digital signature


Processed: Re: Bug#702658: matlab-support: uninteruptable prompt on installation with readline

2013-03-09 Thread Debian Bug Tracking System
Processing control commands:

 tags -1 + moreinfo
Bug #702658 [matlab-support] matlab-support: uninteruptable prompt on 
installation with readline
Added tag(s) moreinfo.

-- 
702658: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=702658
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#702658: matlab-support: uninteruptable prompt on installation with readline

2013-03-09 Thread Michael Hanke
Control: tags -1 + moreinfo

Hi,

On Sat, Mar 9, 2013 at 5:32 PM, Julian Taylor jtaylor.deb...@googlemail.com
 wrote:

 entering an empty string does not cancel the prompt.
 Other frontends are probably ok, they offer a cancel option.


I can't replicate this. I installed the package, the prompt comes up, I
press Ctrl-C and I am back at the prompt.

I don't think entering an empty string should cancel package installation.

Michael

-- 
Michael Hanke
http://mih.voxindeserto.de


Bug#702658: is there a consistent Cancel across debconf frontends?

2013-03-09 Thread Yaroslav Halchenko

On Sat, 09 Mar 2013, Julian Taylor wrote:
 DEBIAN_FRONTEND=readline
 apt-get install matlab-support
 Location of MATLAB installation(s): ...

 entering an empty string does not cancel the prompt.
 Other frontends are probably ok, they offer a cancel option.

and now I started to wonder on what is the generic solution here (CCing
debconf maintainers on advise) -- some frontends (dialog) do offer
Cancel button for the Type: string entry and some seems to be not
(readline) -- there must be a generic resolution to guarantee uniform
functionality to cancel.  Any clues?

Moreover it seems that in a clean chroot Ctrl-C didn't work for me (to
cancel when I ran into the readline prompt I wanted to cancel) while on
the main system  -- it does interrupt with Ctrl-C

as for emtpy input to cancel logic in matlab-support -- if that is not
a generic approach, ideally then the prompt string would need to be
adjusted (and all translations) -- probably too much at this
point.

-- 
Yaroslav O. Halchenko
http://neuro.debian.net http://www.pymvpa.org http://www.fail2ban.org
Senior Research Associate, Psychological and Brain Sciences Dept.
Dartmouth College, 419 Moore Hall, Hinman Box 6207, Hanover, NH 03755
Phone: +1 (603) 646-9834   Fax: +1 (603) 646-1419
WWW:   http://www.linkedin.com/in/yarik


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#702658: matlab-support: uninteruptable prompt on installation with readline

2013-03-09 Thread Yaroslav Halchenko

On Sat, 09 Mar 2013, Michael Hanke wrote:
  entering an empty string does not cancel the prompt.
  Other frontends are probably ok, they offer a cancel option.
I can't replicate this. I installed the package, the prompt comes up, I
press Ctrl-C and I am back at the prompt.

yeah -- as I just wrote, Ctrl-C works on the main machine but is of no
effect in chroot (tried on our neurohydra in nd+wheezy chroot)

-- 
Yaroslav O. Halchenko
http://neuro.debian.net http://www.pymvpa.org http://www.fail2ban.org
Senior Research Associate, Psychological and Brain Sciences Dept.
Dartmouth College, 419 Moore Hall, Hinman Box 6207, Hanover, NH 03755
Phone: +1 (603) 646-9834   Fax: +1 (603) 646-1419
WWW:   http://www.linkedin.com/in/yarik


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#702637: matlab-support: fails to install in clean chroot

2013-03-09 Thread Michael Hanke
Hi,

On Sat, Mar 9, 2013 at 2:57 PM, Sébastien Villemot sebast...@debian.orgwrote:

 The attached patch allows the package to install nicely even if MATLAB
 is not present. Otherwise people who install the package by accident end
 up with a dpkg error.

 Julian: please confirm that it fixes the issue for you.


I see the problem, but I am not convinced this change is the solution.
Installing this package is pointless without Matlab, it should not be
pulled in as a dependency unless
a package gets installed that requires matlab.

If we make this package install successfully on a system without Matlab, we
need to
make any dependent package handle the situation of a missing matlab itself
-- potentially multiplying the effort. At the moment, any package that
depends on matlab-support can expect a functional matlab installation to be
present at config time.

To me the actual question is, why do people try to install this package
when they do not have matlab? Consequently I see two approaches:

1) Improve the package description to avoid this kind of installations.

2) Improve the error messages.

Any input for improvements is most welcome.

I'd be happy to discuss this further, but at the moment I see no reason to
change the current behavior.

Michael

-- 
Michael Hanke
http://mih.voxindeserto.de


Bug#702637: matlab-support: fails to install in clean chroot

2013-03-09 Thread Julian Taylor
On 09.03.2013 18:26, Michael Hanke wrote:
 Hi,
 
 I see the problem, but I am not convinced this change is the solution.
 Installing this package is pointless without Matlab, it should not be
 pulled in as a dependency unless
 a package gets installed that requires matlab.
 
 If we make this package install successfully on a system without Matlab,
 we need to 
 make any dependent package handle the situation of a missing matlab
 itself -- potentially multiplying the effort. At the moment, any package
 that depends on matlab-support can expect a functional matlab
 installation to be present at config time.

A problem with failing the installation if matlab is missing is that it
prevents migration from Ubuntus proposed repository to the main one.
Migration requires that it installs and does also not make other
packages uninstallable.
E.g. this right now affects dynare, it can't migrate because it depends
on matlab-support which does not install.

I though that the debian unstable - testing works the same way, but
apparently not as e.g. dynare was allowed to go into testing.
We can change the failing in Ubuntu only if you don't want to change Debian.

 
 To me the actual question is, why do people try to install this package
 when they do not have matlab? Consequently I see two approaches:
 
 1) Improve the package description to avoid this kind of installations.
 

The main reason for that is probably that the desktop file says it is
matlab.
The desktop file is used in the (ubuntu) software center to display the
title of the application, not the package short description.
Most novice users install over the software center in Ubuntu, see matlab
and install it without reading the rest of the description.

Software center is also in Debian, but I don't know if it has the same
behavior.


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#702658: matlab-support: uninteruptable prompt on installation with readline

2013-03-09 Thread Julian Taylor
On 09.03.2013 18:21, Yaroslav Halchenko wrote:
 
 On Sat, 09 Mar 2013, Michael Hanke wrote:
  entering an empty string does not cancel the prompt.
  Other frontends are probably ok, they offer a cancel option.
I can't replicate this. I installed the package, the prompt comes up, I
press Ctrl-C and I am back at the prompt.
 
 yeah -- as I just wrote, Ctrl-C works on the main machine but is of no
 effect in chroot (tried on our neurohydra in nd+wheezy chroot)
 

we have a few reports in ubuntu of uninteruptable prompts:
https://bugs.launchpad.net/ubuntu/+source/matlab-support/+bug/1025648

I don't think they were using chroots.


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#702658: matlab-support: uninteruptable prompt on installation with readline

2013-03-09 Thread Yaroslav Halchenko

On Sat, 09 Mar 2013, Julian Taylor wrote:

  yeah -- as I just wrote, Ctrl-C works on the main machine but is of no
  effect in chroot (tried on our neurohydra in nd+wheezy chroot)
 we have a few reports in ubuntu of uninteruptable prompts:
 https://bugs.launchpad.net/ubuntu/+source/matlab-support/+bug/1025648
 I don't think they were using chroots.

altogether this particular one sounds like a bug/misfeature of
debconf to me (differing behavior across environments/frontends)

-- 
Yaroslav O. Halchenko
http://neuro.debian.net http://www.pymvpa.org http://www.fail2ban.org
Senior Research Associate, Psychological and Brain Sciences Dept.
Dartmouth College, 419 Moore Hall, Hinman Box 6207, Hanover, NH 03755
Phone: +1 (603) 646-9834   Fax: +1 (603) 646-1419
WWW:   http://www.linkedin.com/in/yarik


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#702637: matlab-support: fails to install in clean chroot

2013-03-09 Thread Adam D. Barratt
On Sat, 2013-03-09 at 18:45 +0100, Julian Taylor wrote:
 A problem with failing the installation if matlab is missing is that it
 prevents migration from Ubuntus proposed repository to the main one.
 Migration requires that it installs and does also not make other
 packages uninstallable.
 E.g. this right now affects dynare, it can't migrate because it depends
 on matlab-support which does not install.
 
 I though that the debian unstable - testing works the same way, but
 apparently not as e.g. dynare was allowed to go into testing.

In the context of testing migration, installability is determined by
computing package relationships, not by actually attempting to install
the affected packages (which generally wouldn't add much and isn't
feasible given the number of packages involved).

Regards,

Adam


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#702637: matlab-support: fails to install in clean chroot

2013-03-09 Thread Julian Taylor
On 09.03.2013 19:10, Adam D. Barratt wrote:
 On Sat, 2013-03-09 at 18:45 +0100, Julian Taylor wrote:
 A problem with failing the installation if matlab is missing is that it
 prevents migration from Ubuntus proposed repository to the main one.
 Migration requires that it installs and does also not make other
 packages uninstallable.
 E.g. this right now affects dynare, it can't migrate because it depends
 on matlab-support which does not install.

 I though that the debian unstable - testing works the same way, but
 apparently not as e.g. dynare was allowed to go into testing.
 
 In the context of testing migration, installability is determined by
 computing package relationships, not by actually attempting to install
 the affected packages (which generally wouldn't add much and isn't
 feasible given the number of packages involved).
 

makes sense, I probably have misinterpreted the britney(?) output.

dynare is not migrating because of an incomplete libmatio transition.
So the failing install is probably no problem.


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#697230: asterisk: Two security issues: AST-2012-014 / AST-2012-015

2013-03-09 Thread Salvatore Bonaccorso
Hi Tzafrir!

Are there news on this?

I have noticed that in the svn repository for asterisk there is
already:

asterisk (1:1.8.13.1~dfsg-2) unstable; urgency=high

  * Patches backported from Asterisk 1.8.19.1 (Closes: #697230):
- Patch AST-2012-014 (CVE-2012-5976) - fixes Crashes due to large stack
  allocations when using TCP.
  The following two fixes were also pulled in order to easily apply it:
  - Patch fix-sip-tcp-no-FILE - Switch to reading with a recv loop
  - Patch fix-sip-tls-leak - Memory leak in the SIP TLS code
- Patch AST-2012-015 (CVE-2012-5977) - Denial of Service Through
  Exploitation of Device State Caching

 -- Tzafrir Cohen tzaf...@debian.org  Tue, 08 Jan 2013 00:06:09 +0200

Could you have a look if there is only the upload missing?

Regards,
Salvatore


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#702637: matlab-support: fails to install in clean chroot

2013-03-09 Thread Michael Hanke
Am 09.03.2013 19:10 schrieb Adam D. Barratt a...@adam-barratt.org.uk:

 On Sat, 2013-03-09 at 18:45 +0100, Julian Taylor wrote:
  A problem with failing the installation if matlab is missing is that it
  prevents migration from Ubuntus proposed repository to the main one.
  Migration requires that it installs and does also not make other
  packages uninstallable.
  E.g. this right now affects dynare, it can't migrate because it depends
  on matlab-support which does not install.
 
  I though that the debian unstable - testing works the same way, but
  apparently not as e.g. dynare was allowed to go into testing.

 In the context of testing migration, installability is determined by
 computing package relationships, not by actually attempting to install
 the affected packages (which generally wouldn't add much and isn't
 feasible given the number of packages involved).

This seems to indicate that Debian is not affected by this problem. I am
not familiar with the way Ubuntu manages these things in detail, but if
there is a way to solve this problem in Debian for Ubuntu I am all for it.

Right now this package causes a problem with an automated transition rule
checker. Making it install under any condition, will cause problems that
affect users. If this is necessary, the patch should at least handle the
situation where matlab-support is installed, but no matlab, and
something/someone wants to use matlab. This could be a dependent package
trying to compile a MEX file. It would need to install some executable that
brings up a meaningful error message, especially when invoked via the
desktop file in an X session.

Maybe it is leaner to handle this package as an exception in the transition
checker. This was done in Debian's piuparts, AFAIK.

Michael


Bug#701649: Fix for stable

2013-03-09 Thread Guido Günther
Hi,
sorry for the delay but attached is the diff for the stable update. This
addrsses #701649 (CVE-2013-1766) as well as #699224 (kind of
CVE-2013-0170). Is this enough for the security team to issue the DSA?
Let me know if I can help further.
Cheers,
 -- Guido
diff --git a/debian/README.Debian b/debian/README.Debian
index b8c97e0..02c0a49 100644
--- a/debian/README.Debian
+++ b/debian/README.Debian
@@ -56,6 +56,9 @@ Access Control
 Access to the libvirt socket is controlled by membership in the libvirt 
group.
 If you want to manage VMs as non root you need to add a user to that group.
 
+System QEMU/KVM processes are run as user and group libvirt-qemu. This can be
+adjusted via /etc/libvirt/qemu.conf.
+
 QEMU/KVM: Dropping Capabilties
 ==
 Network interfaces of type ethernet use a script like /etc/qemu-ifup to set 
up
diff --git a/debian/changelog b/debian/changelog
index bd3ec0d..719b74e 100644
--- a/debian/changelog
+++ b/debian/changelog
@@ -1,3 +1,17 @@
+libvirt (0.8.3-5+squeeze4) stable-security; urgency=low
+
+  * [9d7846f] CVE-2013-1766: Use libvirt-qemu as group to run qemu/kvm
+instances.  This makes sure we don't chown files to groups possibly used
+by other programs. (Closes: #701649)
+
+ -- Guido Günther a...@sigxcpu.org  Sat, 09 Mar 2013 17:03:01 +0100
+
+libvirt (0.8.3-5+squeeze3) stable-security; urgency=low
+
+  * [0bbbca1] Add missing return on error path (Closes: #699224)
+
+ -- Guido Günther a...@sigxcpu.org  Fri, 22 Feb 2013 20:32:53 +0100
+
 libvirt (0.8.3-5+squeeze2) stable-security; urgency=low
 
   * [ac67c93] CVE-2011-1486: Make error reporting in libvirtd thread safe
diff --git a/debian/libvirt-bin.NEWS b/debian/libvirt-bin.NEWS
index ee32190..c6c40f6 100644
--- a/debian/libvirt-bin.NEWS
+++ b/debian/libvirt-bin.NEWS
@@ -1,3 +1,12 @@
+libvirt (0.8.3-5+squeeze4) experimental; urgency=low
+
+  For qemu:///system KVM/QEMU processes now run as group libvirt-qemu. This
+  makes sure image files and volumes aren't accessible by users in the more
+  general and previously used kvm group. To change this behaviour adjust the
+  group option in /etc/libvirt/qemu.conf.
+
+ -- Guido Günther a...@sigxcpu.org  Tue, 26 Feb 2013 06:30:48 +0100
+
 libvirt (0.8.3-2) unstable; urgency=low
 
   Disk format probing is disabled now by default for security reasons
diff --git a/debian/libvirt-bin.postinst b/debian/libvirt-bin.postinst
index ea85ad2..fed481b 100644
--- a/debian/libvirt-bin.postinst
+++ b/debian/libvirt-bin.postinst
@@ -17,17 +17,16 @@ set -e
 # for details, see http://www.debian.org/doc/debian-policy/ or
 # the debian-policy package
 
-
 case $1 in
 configure)
if ! getent group libvirt /dev/null; then
addgroup --system libvirt
fi
 
-   # user and group libvirt runs qemu/kvm instances with
if ! getent group kvm /dev/null; then
addgroup --quiet --system kvm
fi
+   # user and group libvirt runs qemu/kvm instances with
if ! getent passwd libvirt-qemu /dev/null; then
adduser --quiet \
--system \
@@ -40,6 +39,10 @@ case $1 in
-gecos Libvirt Qemu \
libvirt-qemu
fi
+   if ! getent group libvirt-qemu /dev/null; then
+   addgroup --quiet --system libvirt-qemu
+   adduser libvirt-qemu libvirt-qemu
+   fi
 
# libvirt from 0.6.0 on is safe to restart with running vms:
if [ -n $2 ]   dpkg --compare-versions $2 ge 0.6.0; then
diff --git a/debian/libvirt-bin.postrm b/debian/libvirt-bin.postrm
index d6e9b99..086fda3 100644
--- a/debian/libvirt-bin.postrm
+++ b/debian/libvirt-bin.postrm
@@ -24,7 +24,14 @@ case $1 in
if getent group libvirt /dev/null; then
delgroup libvirt || true
fi
-   
+
+   if getent passwd libvirt-qemu /dev/null; then
+   deluser libvirt-qemu || true
+   fi
+
+   if getent group libvirt-qemu /dev/null; then
+   delgroup libvirt-qemu || true
+   fi
 ;;
 remove|upgrade|failed-upgrade|abort-install|abort-upgrade|disappear)
 ;;
diff --git a/debian/patches/0016-Add-missing-return-on-error-path.patch 
b/debian/patches/0016-Add-missing-return-on-error-path.patch
new file mode 100644
index 000..2da0deb
--- /dev/null
+++ b/debian/patches/0016-Add-missing-return-on-error-path.patch
@@ -0,0 +1,20 @@
+From: =?UTF-8?q?Guido=20G=C3=BCnther?= a...@sigxcpu.org
+Date: Fri, 22 Feb 2013 20:06:25 +0100
+Subject: Add missing return on error path
+
+---
+ daemon/libvirtd.c |1 +
+ 1 file changed, 1 insertion(+)
+
+diff --git a/daemon/libvirtd.c b/daemon/libvirtd.c
+index 711360b..9b88aac 100644
+--- a/daemon/libvirtd.c
 b/daemon/libvirtd.c
+@@ -1820,6 +1820,7 @@ readmore:
+ if (remoteDecodeClientMessageHeader(msg)  0) {
+ VIR_FREE(msg);
+ qemudDispatchClientFailure(client);
++return;
+ }
+ 
+  

Bug#690067: Bug#702195: symlink conffiles are not supported, causing problems for dpkg on upgrade/removal and incorrect debsums reports

2013-03-09 Thread Laszlo Boszormenyi (GCS)
On Wed, 2013-03-06 at 22:31 +0100, Michael Biebl wrote:
 I think something like this should do:
 if [ $1 = upgrade ]  dpkg --compare-versions $2 lt 3.3.5-3; then
 ..
 fi
 Done.

On Thu, 2013-03-07 at 15:53 +0100, Gergely Nagy wrote:
 I checked just now, and some things were picked from the merge-queue/3.5
 branch (the default branch on github), namely Type=notify - that is not
 supported by syslog-ng 3.3, and will be new in 3.5.
 Updated.

It builds fine in Wheezy pbuilder and if you do agree, I'll upload
it[1].

Laszlo/GCS
[1] dget -x http://www.barcikacomp.hu/gcs/syslog-ng_3.3.5-3.dsc


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Processed: Re: Bug#702637: matlab-support: fails to install in clean chroot

2013-03-09 Thread Debian Bug Tracking System
Processing control commands:

 tags -1 - patch
Bug #702637 [matlab-support] matlab-support: fails to install in clean chroot
Removed tag(s) patch.

-- 
702637: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=702637
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#702637: matlab-support: fails to install in clean chroot

2013-03-09 Thread Sébastien Villemot
Control: tags -1 - patch

Le samedi 09 mars 2013 à 18:26 +0100, Michael Hanke a écrit :

 On Sat, Mar 9, 2013 at 2:57 PM, Sébastien Villemot
 sebast...@debian.org wrote:
 The attached patch allows the package to install nicely even
 if MATLAB
 is not present. Otherwise people who install the package by
 accident end
 up with a dpkg error.
 
 Julian: please confirm that it fixes the issue for you.
 
 
 I see the problem, but I am not convinced this change is the
 solution. 

Removing patch tag as a consequence.

 If we make this package install successfully on a system without
 Matlab, we need to 
 make any dependent package handle the situation of a missing matlab
 itself -- potentially multiplying the effort. At the moment, any
 package that depends on matlab-support can expect a functional matlab
 installation to be present at config time.

I confirm this for dynare-matlab which currently assumes that when
matlab-support is correctly configured, there is a working MATLAB
installation.


I think we should first decide whether this issue is RC (because of
Wheezy to be released soon), and this is indeed not obvious. It is of
course expected that packages in main install fine in noninteractive
mode and in a clean chroot. But matlab-support is different since it is
in section contrib and is useless without some nonfree program
(MATLAB) not present in Debian; in some sense MATLAB is a implicit
dependency of matlab-support, so the current behavior also makes sense.
Maybe the Release Team has an opinion on the RCness of this issue?

-- 
 .''`.Sébastien Villemot
: :' :Debian Developer
`. `' http://www.dynare.org/sebastien
  `-  GPG Key: 4096R/381A7594



signature.asc
Description: This is a digitally signed message part


Bug#702669: TYPO3-CORE-SA-2013-001: SQL Injection and Open Redirection in TYPO3 Core

2013-03-09 Thread Carlos Alberto Lopez Perez
Package: typo3
Version: 4.3.9+dfsg1-1+squeeze7
Severity: grave
Tags: security, upstream


Hi,


It has been discovered that TYPO3 Core is susceptible to SQL Injection
and Open Redirection.

Here is the relevant information:

https://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2013-001/

A CVE number was asked at: http://seclists.org/oss-sec/2013/q1/611



The patch that fixes the SQL Injection is the following:

http://git.typo3.org/TYPO3v4/CoreProjects/MVC/extbase.git/commitdiff/d00f4b6523507db3c4c7601cf7758333c8290c1d

However, to make it apply over the older typo3 at Squeeze you have to
apply it first the following ones:

http://git.typo3.org/TYPO3v4/CoreProjects/MVC/extbase.git/commitdiff/76f0c979dd5d221807c086cb7a4eb912055d8318

http://git.typo3.org/TYPO3v4/CoreProjects/MVC/extbase.git/commitdiff/68a2f3d653d77d8ed9a283e30f07e6f718c18f19


I'm attaching the file 10-SecBull-TYPO3-CORE-SA-2013-001.patch that is
ready to drop on debian/patches that is the result of applying, in
order, the above commits:

* 76f0c979dd5d221807c086cb7a4eb912055d8318
* 68a2f3d653d77d8ed9a283e30f07e6f718c18f19
* d00f4b6523507db3c4c7601cf7758333c8290c1d


For the another issue of the security bulletin (open redirection issue),
the relevant commit seems to be
http://git.typo3.org/TYPO3v4/Core.git/commit/71135d82ccb74b3ccf8673ce197cd8c4340d5163
but I don't have a backport of it to squeeze.


Typo3 at squeeze-backports and wheezy is also affected.


Regards!
--- a/typo3/sysext/extbase/Classes/Persistence/Storage/Typo3DbBackend.php
+++ b/typo3/sysext/extbase/Classes/Persistence/Storage/Typo3DbBackend.php
@@ -494,18 +494,17 @@
 $typeOfRelation = $columnMap-getTypeOfRelation();
 if ($typeOfRelation === Tx_Extbase_Persistence_Mapper_ColumnMap::RELATION_HAS_AND_BELONGS_TO_MANY) {
 	$relationTableName = $columnMap-getRelationTableName();
-	$sql['where'][] = $tableName . '.uid IN (SELECT ' . $columnMap-getParentKeyFieldName() . ' FROM ' . $relationTableName . ' WHERE ' . $columnMap-getChildKeyFieldName() . '=' . $this-getPlainValue($operand2) . ')';
+	$sql['where'][] = $tableName . '.uid IN (SELECT ' . $columnMap-getParentKeyFieldName() . ' FROM ' . $relationTableName . ' WHERE ' . $columnMap-getChildKeyFieldName() . '=?)';
+	$parameters[] = intval($this-getPlainValue($operand2));
 } elseif ($typeOfRelation === Tx_Extbase_Persistence_Mapper_ColumnMap::RELATION_HAS_MANY) {
 	$parentKeyFieldName = $columnMap-getParentKeyFieldName();
 	if (isset($parentKeyFieldName)) {
-		$columnName = $this-dataMapper-convertPropertyNameToColumnName($operand1-getPropertyName(), $source-getNodeTypeName());
 		$childTableName = $columnMap-getChildTableName();
-		$sql['where'][] = $tableName . '.uid=(SELECT ' . $childTableName . '.' . $parentKeyFieldName . ' FROM ' . $childTableName . ' WHERE ' . $childTableName . '.uid=' . $this-getPlainValue($operand2) . ')';
+		$sql['where'][] = $tableName . '.uid=(SELECT ' . $childTableName . '.' . $parentKeyFieldName . ' FROM ' . $childTableName . ' WHERE ' . $childTableName . '.uid=?)';
+		$parameters[] = intval($this-getPlainValue($operand2));
 	} else {
-		$statement = '(' . $tableName . '.' . $operand1-getPropertyName() . ' LIKE \'%,' . $this-getPlainValue($operand2) . ',%\'';
-		$statement .= ' OR ' . $tableName . '.' . $operand1-getPropertyName() . ' LIKE \'%,' . $this-getPlainValue($operand2) . '\'';
-		$statement .= ' OR ' . $tableName . '.' . $operand1-getPropertyName() . ' LIKE \'' . $this-getPlainValue($operand2) . ',%\')';
-		$sql['where'][] = $statement;
+		$sql['where'][] = 'FIND_IN_SET(?,' . $tableName . '.' . $columnName . ')';
+		$parameters[] = intval($this-getPlainValue($operand2));
 	}
 } else {
 	throw new Tx_Extbase_Persistence_Exception_RepositoryException('Unsupported relation for contains().', 1267832524);
@@ -830,9 +829,9 @@
 	 */
 	protected function parseLimitAndOffset($limit, $offset, array $sql) {
 		if ($limit !== NULL  $offset !== NULL) {
-			$sql['limit'] = $offset . ', ' . $limit;
+			$sql['limit'] = intval($offset) . ', ' . intval($limit);
 		} elseif ($limit !== NULL) {
-			$sql['limit'] = $limit;
+			$sql['limit'] = intval($limit);
 		}
 	}
 


signature.asc
Description: OpenPGP digital signature


Processed: reassign 702669 to typo3-src, severity of 702669 is critical, tagging 702574 ...

2013-03-09 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 reassign 702669 typo3-src
Bug #702669 [typo3] TYPO3-CORE-SA-2013-001: SQL Injection and Open Redirection 
in TYPO3 Core
Bug reassigned from package 'typo3' to 'typo3-src'.
No longer marked as found in versions typo3-src/4.3.9+dfsg1-1+squeeze7.
Ignoring request to alter fixed versions of bug #702669 to the same values 
previously set
 severity 702669 critical
Bug #702669 [typo3-src] TYPO3-CORE-SA-2013-001: SQL Injection and Open 
Redirection in TYPO3 Core
Severity set to 'critical' from 'grave'
 tags 702574 + upstream
Bug #702574 {Done: Christian Welzel gaw...@camlann.de} [typo3-src] 
TYPO3-CORE-SA-2013-001: SQL Injection and Open Redirection in TYPO3 Core
Added tag(s) upstream.
 forcemerge 702574 702669
Bug #702574 {Done: Christian Welzel gaw...@camlann.de} [typo3-src] 
TYPO3-CORE-SA-2013-001: SQL Injection and Open Redirection in TYPO3 Core
Bug #702669 [typo3-src] TYPO3-CORE-SA-2013-001: SQL Injection and Open 
Redirection in TYPO3 Core
Marked Bug as done
Marked as fixed in versions typo3-src/4.5.19+dfsg1-5.
There is no source info for the package 'typo3-src' at version '4.3.8-1' with 
architecture ''
Unable to make a source version for version '4.3.8-1'
Marked as found in versions 4.3.8-1.
Merged 702574 702669
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
702574: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=702574
702669: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=702669
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#688634: roundcube-sqlite upgrade causes serious data-loss

2013-03-09 Thread Vincent Bernat
 ❦  3 mars 2013 00:28 CET, Holger Levsen hol...@layer-acht.org :

  Here is my proposition:
  http://anonscm.debian.org/gitweb/?p=pkg-roundcube/roundcube.git;a=commitd
  iff;h=15f5a10444c9d4c8bf7b3e83a82dd6f9e2a4b384

 seems right, yes, but it misses a pointer to instructions how to upgrade to a 
 working installation.

 http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=688634#99 is just a start, 
 but at least that.

 I wonder if a pointer there, or somewhere better, could be added.

I will add a minimal page in wiki.debian.net with partial
instructions. ETA: a few days.
-- 
panic(aha1740.c); /* Goodbye */
2.2.16 /usr/src/linux/drivers/scsi/aha1740.c


pgpkManQQpXJC.pgp
Description: PGP signature


Processed: impacts upgrades in stable

2013-03-09 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 severity 657898 serious
Bug #657898 [bugzilla3] bugzilla3: Minor updates should not require package to 
be reconfigured
Severity set to 'serious' from 'important'
 stop
Stopping processing here.

Please contact me if you need assistance.
-- 
657898: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=657898
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#702669: TYPO3-CORE-SA-2013-001: SQL Injection and Open Redirection in TYPO3 Core

2013-03-09 Thread Carlos Alberto Lopez Perez
On 09/03/13 22:43, Carlos Alberto Lopez Perez wrote:
 It has been discovered that TYPO3 Core is susceptible to SQL Injection
 and Open Redirection.
 
 Here is the relevant information:
 
 https://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2013-001/
 
 A CVE number was asked at: http://seclists.org/oss-sec/2013/q1/611

Forgot to mention that the SQL Injection is being exploited on the wild.


Note: It has been reported to the TYPO3 Security Team that this problem
is known and exploited in the wild.




signature.asc
Description: OpenPGP digital signature


Processed: your mail

2013-03-09 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 found 702669 4.3.9+dfsg1-1+squeeze7
Bug #702669 {Done: Christian Welzel gaw...@camlann.de} [typo3-src] 
TYPO3-CORE-SA-2013-001: SQL Injection and Open Redirection in TYPO3 Core
Bug #702574 {Done: Christian Welzel gaw...@camlann.de} [typo3-src] 
TYPO3-CORE-SA-2013-001: SQL Injection and Open Redirection in TYPO3 Core
There is no source info for the package 'typo3-src' at version 
'4.3.9+dfsg1-1+squeeze7' with architecture ''
Unable to make a source version for version '4.3.9+dfsg1-1+squeeze7'
Marked as found in versions 4.3.9+dfsg1-1+squeeze7.
Marked as found in versions 4.3.9+dfsg1-1+squeeze7.
 found 702669 4.5.14+dfsg1-1~bpo60+1
Bug #702669 {Done: Christian Welzel gaw...@camlann.de} [typo3-src] 
TYPO3-CORE-SA-2013-001: SQL Injection and Open Redirection in TYPO3 Core
Bug #702574 {Done: Christian Welzel gaw...@camlann.de} [typo3-src] 
TYPO3-CORE-SA-2013-001: SQL Injection and Open Redirection in TYPO3 Core
There is no source info for the package 'typo3-src' at version 
'4.5.14+dfsg1-1~bpo60+1' with architecture ''
Unable to make a source version for version '4.5.14+dfsg1-1~bpo60+1'
Marked as found in versions 4.5.14+dfsg1-1~bpo60+1.
Marked as found in versions 4.5.14+dfsg1-1~bpo60+1.
 found 702669 4.5.19+dfsg1-4.1
Bug #702669 {Done: Christian Welzel gaw...@camlann.de} [typo3-src] 
TYPO3-CORE-SA-2013-001: SQL Injection and Open Redirection in TYPO3 Core
Bug #702574 {Done: Christian Welzel gaw...@camlann.de} [typo3-src] 
TYPO3-CORE-SA-2013-001: SQL Injection and Open Redirection in TYPO3 Core
There is no source info for the package 'typo3-src' at version 
'4.5.19+dfsg1-4.1' with architecture ''
Unable to make a source version for version '4.5.19+dfsg1-4.1'
Marked as found in versions 4.5.19+dfsg1-4.1.
Marked as found in versions 4.5.19+dfsg1-4.1.
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
702574: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=702574
702669: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=702669
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Processed: your mail

2013-03-09 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 found 702669 4.3.9+dfsg1-1+squeeze7
Bug #702669 {Done: Christian Welzel gaw...@camlann.de} [typo3-src] 
TYPO3-CORE-SA-2013-001: SQL Injection and Open Redirection in TYPO3 Core
Bug #702574 {Done: Christian Welzel gaw...@camlann.de} [typo3-src] 
TYPO3-CORE-SA-2013-001: SQL Injection and Open Redirection in TYPO3 Core
There is no source info for the package 'typo3-src' at version 
'4.3.9+dfsg1-1+squeeze7' with architecture ''
Unable to make a source version for version '4.3.9+dfsg1-1+squeeze7'
Ignoring request to alter found versions of bug #702669 to the same values 
previously set
Ignoring request to alter found versions of bug #702574 to the same values 
previously set
 found 702669 4.5.14+dfsg1-1~bpo60+1
Bug #702669 {Done: Christian Welzel gaw...@camlann.de} [typo3-src] 
TYPO3-CORE-SA-2013-001: SQL Injection and Open Redirection in TYPO3 Core
Bug #702574 {Done: Christian Welzel gaw...@camlann.de} [typo3-src] 
TYPO3-CORE-SA-2013-001: SQL Injection and Open Redirection in TYPO3 Core
There is no source info for the package 'typo3-src' at version 
'4.5.14+dfsg1-1~bpo60+1' with architecture ''
Unable to make a source version for version '4.5.14+dfsg1-1~bpo60+1'
Ignoring request to alter found versions of bug #702669 to the same values 
previously set
Ignoring request to alter found versions of bug #702574 to the same values 
previously set
 found 702669 4.5.19+dfsg1-4.1
Bug #702669 {Done: Christian Welzel gaw...@camlann.de} [typo3-src] 
TYPO3-CORE-SA-2013-001: SQL Injection and Open Redirection in TYPO3 Core
Bug #702574 {Done: Christian Welzel gaw...@camlann.de} [typo3-src] 
TYPO3-CORE-SA-2013-001: SQL Injection and Open Redirection in TYPO3 Core
There is no source info for the package 'typo3-src' at version 
'4.5.19+dfsg1-4.1' with architecture ''
Unable to make a source version for version '4.5.19+dfsg1-4.1'
Ignoring request to alter found versions of bug #702669 to the same values 
previously set
Ignoring request to alter found versions of bug #702574 to the same values 
previously set
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
702574: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=702574
702669: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=702669
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Processed: severity of 699611 is important

2013-03-09 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 # only applies to version in experimental, hence can't be of RC severity
 severity 699611 important
Bug #699611 [xymon] xymon: fails to install: chown: invalid user: 'xymon:xymon'
Severity set to 'important' from 'serious'
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
699611: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=699611
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#702674: fritzing: Fails to build on arm*

2013-03-09 Thread Scott Kitterman
Package: fritzing
Version: 0.7.10b-1
Severity: serious
Tags: patch upstream
Justification: fails to build from source (but built successfully in the past)

On arm*, qreal != double.  See the attached patch for a fix.  Also, already
sent upstream.  See:

http://code.google.com/p/fritzing/issues/detail?id=2464

Since this doesn't affect Wheezy, I don't plan to NMU.
Scott Kitterman scott@kitterman,com
Will forward to Debian/upstream
Qreal != Double on arm*
Index: fritzing-0.7.10b/src/partseditor/pemainwindow.cpp
===
--- fritzing-0.7.10b.orig/src/partseditor/pemainwindow.cpp	2013-03-09 15:53:38.646230842 -0500
+++ fritzing-0.7.10b/src/partseditor/pemainwindow.cpp	2013-03-09 15:54:33.466230836 -0500
@@ -2196,10 +2196,10 @@
 
 QPointF p = pegi-terminalPoint();
 if (coord == x) {
-p.setX(qMax(0.0, qMin(value, pegi-rect().width(;
+p.setX(qMax(qreal(0.0), qMin(qreal(value), pegi-rect().width(;
 }
 else {
-p.setY(qMax(0.0, qMin(value, pegi-rect().height(;
+p.setY(qMax(qreal(0.0), qMin(qreal(value), pegi-rect().height(;
 }
 
 terminalPointChangedAux(pegi, pegi-terminalPoint(), p);


Bug#700738: valgrind summary

2013-03-09 Thread Thorsten Glaser
Sebastian Ramacher dixit:

Anyway, signals intermixed with ncurses is very much out of my comfort
zone. Maybe Thorsten (CCed) can provide additional input on those issues.

Sorry, no, no practical experience either way, but it did raise
all alarm bells here while reading it.

bye,
//mirabilos
-- 
„nein: BerliOS und Sourceforge sind Plattformen für Projekte, github ist
eine Plattform für Einzelkämpfer“
-- dieses Zitat ist ein Beweis dafür, daß auch ein blindes Huhn
   mal ein Korn findet, bzw. – in diesem Fall – Recht haben kann


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#690152: bsaf: FTBFS: Test org.jdesktop.application.TaskMonitorTest failed

2013-03-09 Thread Andres Mejia
On Sun, Mar 3, 2013 at 8:42 AM, gregor herrmann gre...@debian.org wrote:
 On Sat, 02 Mar 2013 19:12:32 -0500, Andres Mejia wrote:

 I just rebuilt bsaf on my machine that has the DISPLAY environment variable
 set and

 In a chroot or in the normal environment?

The normal environment.

 on a sid and wheezy chroot via sbuild-shell (which in turn uses
 schroot) that does not have DISPLAY set. All builds succeeded and passed
 the test suite.

 That's not surprising, since without DISPLAY the otherwise failing
 tests are skipped :)

 FWIW: The tests still fail for me in wheezy and sid cowbuilder amd64
 chroots, with DISPLAY set, with or without my earlier patch (to use
 xvfb).

 As mentioned earlier in this bug log by Matteo, building with
 openjdk-7-jdk works in the same setup.

 Cheers,
 gregor

 --
  .''`.  Homepage: http://info.comodo.priv.at/ - OpenPGP key 0xBB3A68018649AA06
  : :' : Debian GNU/Linux user, admin, and developer  -  http://www.debian.org/
  `. `'  Member of VIBE!AT  SPI, fellow of the Free Software Foundation Europe
`-   NP: David Bowie: Suffragette City

At this time, being this late into the release cycle, I would like to
support only the default-jdk. I am building with sbuild using a chroot
created by sbuild-createchroot as I believe this closely matches what
the buildd machines are running. The bsaf package builds and passes
the test suite for me fine on my machine running Debian wheezy, inside
a wheezy chroot using sbuild, and inside a sid chroot using sbuild. My
machine has a display, the chroot environments do not have a display.

I will be downgrading this bug to important as I don't believe
supporting cowbuilder, xvfb, or openjdk-7-jdk to be release critical.
If someone else can reproduce the test case failure with the version
of bsaf in the archives as is, then feel free to raise it back,
otherwise fixing these other issues of supporting cowbuilder, xvfb,
and openjdk-7-jdk can wait.

-- 
~ Andres


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Processed: your mail

2013-03-09 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 severity 690152 important
Bug #690152 [src:bsaf] bsaf: FTBFS: Test 
org.jdesktop.application.TaskMonitorTest failed
Severity set to 'important' from 'serious'
 tags 690152 unreproducible
Bug #690152 [src:bsaf] bsaf: FTBFS: Test 
org.jdesktop.application.TaskMonitorTest failed
Added tag(s) unreproducible.

End of message, stopping processing here.

Please contact me if you need assistance.
-- 
690152: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=690152
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#698832: Copyright patch

2013-03-09 Thread intrigeri
Hi Felix,

Felix Geyer wrote (02 Mar 2013 18:53:25 GMT) :
 I'm not the initial author of KeePassX 0.4. I only took over
 maintenance at some point

Thanks for maintaining it!

 so I don't know for sure where all icons come from.
 Though I've gone through all of the icons.

You simply rock, much appreciated.

So, in addition to adding license and copyright information for the
other icons, basically it looks like only 10 icons have unknown or
problematic origin and should be replaced. Not as bad as it could have
been :)

 All icons in clientic.png seem to be from Nuvola except the last 7:
[...]
 - Looks a lot like the Apple logo, seems very problematic
[...]
 - Dollar sign, ???
 - Certificate, ???
 - Mobile phone, ???

I see these 4 icons can be selected at least in the password entry
creation dialog. Replacing them with similar free icons with known
copyright and license looks easy.

 I also couldn't find the source for these icons:
 text_bold.png
 text_italic.png
 text_left.png
 text_under.png

I expect the text_*.png ones will be quite easy to replace.

 pwd_hide.png
 pwd_show.png

Replacing pwd_*.png might be a bit more involved.

Felix, have you plans to try and fix this in a timeframe that's
suitable for Wheezy? Perhaps keepass2 has free replacement icons for
the problematic ones? Anyone interested to help Felix?

Cheers,
-- 
  intrigeri
  | GnuPG key @ https://gaffer.ptitcanardnoir.org/intrigeri/intrigeri.asc
  | OTR fingerprint @ https://gaffer.ptitcanardnoir.org/intrigeri/otr.asc


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org