Bug#699021: src:sigx: FTBFS against newer GLib: invalid conversion from 'const volatile void*' to 'volatile void*'

2013-04-07 Thread Simon McVittie
retitle 699021 src:sigx: FTBFS against glib2.0/wheezy: invalid conversion from 
'const volatile void*' to 'volatile void*'
tags 699021 + sid
thanks

On Sat, 26 Jan 2013 at 16:34:36 +, Simon McVittie wrote:
 Using g_atomic_pointer_get ((volatile void *) (blah blah)) would probably
 resolve this for now. I'll open a GLib bug suggesting that it should take
 a const volatile void * parameter.

I fixed this in GLib for 2.36[1] so this can be closed when
glib2.0/experimental reaches unstable after the wheezy release.

S

[1] https://bugzilla.gnome.org/show_bug.cgi?id=692583


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Processed: Re: Bug#699021: src:sigx: FTBFS against newer GLib: invalid conversion from 'const volatile void*' to 'volatile void*'

2013-04-07 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 retitle 699021 src:sigx: FTBFS against glib2.0/wheezy: invalid conversion 
 from 'const volatile void*' to 'volatile void*'
Bug #699021 [src:sigx] src:sigx: FTBFS against newer GLib: invalid conversion 
from 'const volatile void*' to 'volatile void*'
Changed Bug title to 'src:sigx: FTBFS against glib2.0/wheezy: invalid 
conversion from 'const volatile void*' to 'volatile void*'' from 'src:sigx: 
FTBFS against newer GLib: invalid conversion from 'const volatile void*' to 
'volatile void*''
 tags 699021 + sid
Bug #699021 [src:sigx] src:sigx: FTBFS against glib2.0/wheezy: invalid 
conversion from 'const volatile void*' to 'volatile void*'
Added tag(s) sid.
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
699021: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=699021
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#704457: gd extension broken due new embedded libgd functions not added to gd_compat layer

2013-04-07 Thread Riaas Mokiem
I also had this problem, so I was happy to see it was already fixed. Though
i noticed on php.net that another php beta release should be available in a
few days, I was hoping that this an interim version (5.5.0~beta2-2
perhaps?) could be uploaded already, because the owncloud 5.0.3 package was
uploaded yesterday and it seems to require gd to work. So this is no longer
a matter of merely having persistent error notifications.

If this is not possible, I will just have to wait a little while longer
(it's all from experimental anyway, so it's to be expected). It might still
be useful to communicate this to the owncloud maintainers though.


Bug#695224: Locale::Maketext versioning in perl package

2013-04-07 Thread Niels Thykier
On 2013-04-02 21:15, Niko Tyni wrote:
 On Sun, Mar 31, 2013 at 05:46:12PM +0100, Dominic Hargreaves wrote:
  
 There is a problem with the perl package, as discussed in 
 http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=695224#55
 onwards, whereby the application of the security fix in that ticket
 now causes double-escaping problems where people workaround the problem
 by escaping themselves, when they detect an earlier Locale::Maketext
 by version number.

 I am slightly wary about importing the new (1.23) version of
 Locale::Maketext as I mentioned in that bug already, but my fears may
 be unfounded. Could you comment about whether you would accept such
 a change in wheezy at this time? (I can't really decide whether it's
 RC or not).
 
 FWIW, it looks clear to me that the only functional changes in the patch
 are the $VERSION increments in the .pm files. The rest is documentation
 and test cases, and the only important $VERSION is most probably
 the main one in Locale/Maketext.pm.
 

Indeed.

 While that change itself is trivial, it has action-at-distance effects -
 otherwise this wouldn't be an issue at all. I think the risk potential
 is mostly in breaking something that's trusting Module::CoreList
 (dh-make-perl and lintian come to mind, CPAN.pm and CPANPLUS.pm might
 be affected somehow too?), and that it's not a very big risk but still
 a real one.
 

Lintian uses a precomputed static list.  It would at worst lead to
false-negatives for package-superseded-by-perl (i.e. no tag when one
should have been there).
  I suspect dh-make-perl will have a similar case with using the cpan
variant instead of the core variant in dependencies (though I only
gave it a quick scan).

I would suspect that any application code using Module::CoreList would
still have to account for the cpan version being present?

 [...]
 
 In this specific case, upgrading Locale::Maketext fully to 1.23 in wheezy
 would probably have been the right thing to do if we had anticipated
 these issues. But we didn't, and it seems very late in the release
 process to do it now. Also, I can't really see us applying anything but
 the targeted fix for squeeze.
 

I am tempted to take this fix for Wheezy and be done with it.  Can (one
of) you please check up on CPAN.pm/CPANPLUS.pm ?

 I see Fedora/RedHat also upgraded their Locale::Maketext modules without
 incrementing $VERSION (I checked the patches in RHEL 6 / Perl 5.10.1 and
 Fedora Core 16  17 / Perl 5.14.3). So it looks like even if we do try
 to fix this for wheezy, applications still have to check for features
 rather than versions to stay on the safe side.
 

Okay, sounds like it will be fine with leaving Squeeze as is then.

~Niels


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#677795: Bug#704520: RM: midgard2-core/10.05.7.1-1 php5-midgard2/10.05.7-1

2013-04-07 Thread Niels Thykier
user release.debian@packages.debian.org
usertags 677795 + wheezy-will-remove
thanks

On 2013-04-02 13:13, Didier Raboud wrote:
 Package: release.debian.org
 Severity: normal
 User: release.debian@packages.debian.org
 Usertags: rm
 
 Hi dear Release Team, hi dear midgard2-core and php5-midgard2 maintainers,
 
 as explained in http://bugs.debian.org/677795#67 , I think midgard2-core
 (and it's only build-rdep, php5-midgard2) should get removed from
 testing:
 
 As I read it, the package had several packaging-related issues
 summing up to that serious bug, filed two weeks before the freeze.
 Since then, in September, a package supposedly fixing these issues has
 been uploaded and queued in NEW [0]; it hasn't been liberated from NEW
 yet. From here, I see three ways forward: 

 a) a new package enters unstable, and then Wheezy, but that seems
unlikely;
 b) midgard2-core and php5-midgard2 are removed from Wheezy, thereby
removing the RC bug.
 c) that bug either gets downgraded to non-RC severity, or tagged
wheezy-ignore by the release team.

 As I think the concerns originally leading to the severity of that bug
 are correct, I would rather be of the opinion to drop the two
 packages.
 
 As you see, I think that as this point, b) is the only reasonable
 choice.
 
 Cheers,
 
 OdyX
 
 [...]

We have not accepted new (binary) packages in Wheezy for quite a while.
 So option a) is indeed very unlikely.

As it is, I am inclined to agree with OdyX's observations, so I am
tagging the bug as will-remove for now.

~Niels


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#704870: opus: cve-2013-0899

2013-04-07 Thread gregor herrmann
On Sat, 06 Apr 2013 20:00:56 -0400, Michael Gilbert wrote:

 CVE-2013-0899[0]:

 [0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0899
 http://security-tracker.debian.org/tracker/CVE-2013-0899

Clicking through the links in
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0899
I came upon
https://code.google.com/p/chromium/issues/detail?id=160480
which points to a commit
http://git.xiph.org/?p=opus.git;a=commitdiff;h=9345aaa5ca1c2fb7d62981b2a538e0ce20612c38

Same in https://codereview.chromium.org/11575026 which points to
https://codereview.chromium.org/download/issue11575026_5001_6001.diff

(Please note that I haven't checked if this applies to the opus
version in Debian.)


Cheers,
gregor

-- 
 .''`.  Homepage: http://info.comodo.priv.at/ - OpenPGP key 0xBB3A68018649AA06
 : :' : Debian GNU/Linux user, admin, and developer  -  http://www.debian.org/
 `. `'  Member of VIBE!AT  SPI, fellow of the Free Software Foundation Europe
   `-   NP: Tom Waits: Poncho's Lament


signature.asc
Description: Digital signature


Bug#683008: marked as done (FTBFS on kfreebsd-*: zipfile.BadZipfile: File is not a zip file)

2013-04-07 Thread Debian Bug Tracking System
Your message dated Sun, 07 Apr 2013 15:55:23 +0200
with message-id 51617acb.2010...@thykier.net
and subject line libgui-commands-java removed from Debian
has caused the Debian Bug report #683008,
regarding FTBFS on kfreebsd-*: zipfile.BadZipfile: File is not a zip file
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
683008: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=683008
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Source: libgui-commands-java
Version: 1.1.43-6
Severity: serious
Justification: fails to build from source


libgui-commands-java fails to build from source on kfreebsd-*, but built in the 
past:

File /usr/lib/gcc/aotcompile.py, line 184, in find_jobs
job = JarJob(path)
  File /usr/lib/gcc/aotcompile.py, line 320, in __init__
self._walk(zipfile.ZipFile(path, r))
  File /usr/lib/gcc/aotcompile.py, line 326, in _walk
self._walk(zipfile.ZipFile(StringIO.StringIO(bytes)))
  File /usr/lib/python2.7/zipfile.py, line 714, in __init__
self._GetContents()
  File /usr/lib/python2.7/zipfile.py, line 748, in _GetContents
self._RealGetContents()
  File /usr/lib/python2.7/zipfile.py, line 763, in _RealGetContents
raise BadZipfile, File is not a zip file
zipfile.BadZipfile: File is not a zip file
dh_nativejava: aot-compile -L /usr/lib/gcj -c -fsource-filename=/tmp/filepSnHJg 
debian/libgui-commands-java debian/libgui-commands-java-gcj/usr/lib/gcj 
returned exit code 1
make: *** [install/libgui-commands-java-gcj] Error 25

https://buildd.debian.org/status/fetch.php?pkg=libgui-commands-javaarch=kfreebsd-amd64ver=1.1.43-6stamp=1334855746
https://buildd.debian.org/status/fetch.php?pkg=libgui-commands-javaarch=kfreebsd-i386ver=1.1.43-6stamp=1334855764
---End Message---
---BeginMessage---
Version: 1.1.43-6+rm

Hi,

I am closing these bugs now as libgui-commands-java was removed from
Debian unstable (and by now testing as well).  Please refer to #701724
for more information about why the package was removed.

The bugs (if marked as affecting the version in stable) will remain open
for the libgui-commands-java in stable.  Unless these are RC (i.e.
severity = serious), then it is unlikely these bugs will be fixed.

Sorry for the delay and the inconvenience.

~Niels---End Message---


Bug#701793: marked as done (php-horde-sesha fails to build from source)

2013-04-07 Thread Debian Bug Tracking System
Your message dated Sun, 07 Apr 2013 14:51:14 +
with message-id e1uoqw6-00039v...@franck.debian.org
and subject line Bug#701793: fixed in php-horde-sesha 1.0.0~beta1-3
has caused the Debian Bug report #701793,
regarding php-horde-sesha fails to build from source
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
701793: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=701793
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Package: php-horde-sesha
Version: 1.0.0~beta1-2
Severity: serious
Tags: sid

Seen on the Ubuntu buildds, however this is reproducible in Debian unstable too:

This package contains role horde and requires package horde/Role to be used
Parsing of package.xml from file ./sesha-1.0.0beta1/package.xml failed
Cannot download non-local package ./sesha-1.0.0beta1/package.xml
install failed
dh_auto_install: /usr/bin/pear -c debian/pearrc -d download_dir=/tmp -d
include_path=/usr/share/php -d php_bin=/usr/bin/php -d bin_dir=/usr/bin -d
php_dir=/usr/share/php -d data_dir=/usr/share/php/data -d
doc_dir=/usr/share/doc/php-horde-sesha -d test_dir=/usr/share/php/tests install
--offline --nodeps -P
/scratch/packages/tmp/php-horde-sesha-1.0.0~beta1/debian/php-horde-sesha
./sesha-1.0.0beta1/package.xml returned exit code 1
make: *** [binary] Error 1


this looks like a missing build dependency, because if you install
php-horde-sesha itself, the build succeeds. Removing php-horde-sesha again still
lets the build succeed, so it must be some package which php-horde-sesha 
depends on.
---End Message---
---BeginMessage---
Source: php-horde-sesha
Source-Version: 1.0.0~beta1-3

We believe that the bug you reported is fixed in the latest version of
php-horde-sesha, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 701...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Mathieu Parent sath...@debian.org (supplier of updated php-horde-sesha 
package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.8
Date: Sun, 07 Apr 2013 15:50:59 +0200
Source: php-horde-sesha
Binary: php-horde-sesha
Architecture: source all
Version: 1.0.0~beta1-3
Distribution: unstable
Urgency: low
Maintainer: Horde Maintainers pkg-horde-hack...@lists.alioth.debian.org
Changed-By: Mathieu Parent sath...@debian.org
Description: 
 php-horde-sesha - ${phppear:summary}
Closes: 701793
Changes: 
 php-horde-sesha (1.0.0~beta1-3) unstable; urgency=low
 .
   * Add B-D on php-horde-role. Fix FTBFS (Closes: #701793)
Checksums-Sha1: 
 85d889de91eb1fa59d1ded8235b06e9ab6f59fb4 1435 php-horde-sesha_1.0.0~beta1-3.dsc
 22548b64f7aae753357836cb8e61807382d42515 2277 
php-horde-sesha_1.0.0~beta1-3.debian.tar.gz
 975ec7bf78f3f8d117b796c2eb9810ea939bc2b3 238474 
php-horde-sesha_1.0.0~beta1-3_all.deb
Checksums-Sha256: 
 6191f222f78a3a0a2ffc0de98d7eb663dbdfe37e6199fed2921ed17498bb0bef 1435 
php-horde-sesha_1.0.0~beta1-3.dsc
 52c44c94d9c7d261f6a49d2a6cf3f29684dad4bd1ff74caa9b70302b61dd0a4d 2277 
php-horde-sesha_1.0.0~beta1-3.debian.tar.gz
 9d3ae5e721308f68ba8cbd1aac84c81d822b744b2248066cfeb6a8a6013836fc 238474 
php-horde-sesha_1.0.0~beta1-3_all.deb
Files: 
 a025cafab0d5e656d56152796a216e4c 1435 php extra 
php-horde-sesha_1.0.0~beta1-3.dsc
 37a8cd7ccc39ba845a62ac6647e49920 2277 php extra 
php-horde-sesha_1.0.0~beta1-3.debian.tar.gz
 04c2ec0de5535e0032e6e4abda86b9f3 238474 php extra 
php-horde-sesha_1.0.0~beta1-3_all.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.12 (GNU/Linux)

iEYEARECAAYFAlFheekACgkQOW2jYf5fHX8VZwCgnCZpmB1SeI+n/mE3R2OJ8Evf
0RAAnRYrGzo2NVE+541pqhSU8SlIowEJ
=6B0l
-END PGP SIGNATUREEnd Message---


Bug#704914: glx-alternatives: The libGL diversion does not work

2013-04-07 Thread Christian Weeks
Source: glx-alternatives
Version: 0.2.90
Severity: grave
Justification: renders package unusable

There is a severe problem with the libGL diversion strategy as exists at
present.

The desktop is rendered inoperable after any change in the packaging, due to
the diversion in glx-diversions
being replaced by the actual lib from libgl1-mesa-glx. This is because gnome-
session-bin and other current
parts of the gnome desktop have a hardcoded dependency on libgl1-mesa-glx (or
the virtual libgl1).

This means the gnome desktop in 3.8 is NOT co-installable with nvidia graphics
drivers, a situation this
diversion was meant to prevent.

The only fix is to re-run update-alternatives --configure glx, which re-
replaces the symlink diversion
however, if gnome is about to progress beyond experimental, it is likely this
is about to become a critical
pain point.

I read bug 389971, on the reasons the nvidia-glx* packages don't directly
provide libgl1, but it may be
that unless the gnome team changes their libgl deps, this might be the only
solution (or, alternatively,
making the glx-alternatives packages provide libgl1?)

It should be noted, that the nvidia alternative clearly *works*, however,
making it so is pretty challenging.

Info on my system as it stands at present:
# dpkg --search /usr/lib/x86_64-linux-gnu/libGL.so.1
diversion by glx-diversions from: /usr/lib/x86_64-linux-gnu/libGL.so.1
diversion by glx-diversions to: /usr/lib/mesa-diverted/x86_64-linux-
gnu/libGL.so.1
libgl1-mesa-glx:amd64: /usr/lib/x86_64-linux-gnu/libGL.so.1

# dpkg --remove libgl1-mesa-glx:amd64
dpkg: dependency problems prevent removal of libgl1-mesa-glx:amd64:
 gnome-session-bin depends on libgl1-mesa-glx | libgl1; however:
  Package libgl1-mesa-glx:amd64 is to be removed.
  Package libgl1 is not installed.
  Package libgl1-mesa-glx:amd64 which provides libgl1 is to be removed.
 libvisual-0.4-plugins:amd64 depends on libgl1-mesa-glx | libgl1; however:
  Package libgl1-mesa-glx:amd64 is to be removed.
  Package libgl1 is not installed.
  Package libgl1-mesa-glx:amd64 which provides libgl1 is to be removed.
 libglew1.7:amd64 depends on libgl1-mesa-glx | libgl1; however:
  Package libgl1-mesa-glx:amd64 is to be removed.
  Package libgl1 is not installed.
  Package libgl1-mesa-glx:amd64 which provides libgl1 is to be removed.
 enblend depends on libgl1-mesa-glx | libgl1; however:
  Package libgl1-mesa-glx:amd64 is to be removed.
  Package libgl1 is not installed.
  Package libgl1-mesa-glx:amd64 which provides libgl1 is to be removed.
 mplayer depends on libgl1-mesa-glx | libgl1; however:
  Package libgl1-me
dpkg: error processing libgl1-mesa-glx:amd64 (--remove):
 dependency problems - not removing
Errors were encountered while processing:
 libgl1-mesa-glx:amd64

Thanks
Christian



-- System Information:
Debian Release: 7.0
  APT prefers unstable
  APT policy: (501, 'unstable'), (499, 'testing'), (399, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 3.8-trunk-amd64 (SMP w/8 CPU cores)
Locale: LANG=en_CA.UTF-8, LC_CTYPE=en_CA.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#704915: auctex: Fails to install

2013-04-07 Thread Domenico Cufalo
Package: auctex
Version: 11.85-1
Severity: grave
Justification: renders package unusable

Debian Squeeze AMD64.

The package in subject fails to install (fresh install). This is the output
from terminal:

# LC_ALL=C aptitude install auctex
The following NEW packages will be installed:
  auctex
0 packages upgraded, 1 newly installed, 0 to remove and 0 not upgraded.
Need to get 0 B/1305 kB of archives. After unpacking 4678 kB will be used.
Preconfiguring packages ...
Selecting previously deselected package auctex.
(Reading database ... 254909 files and directories currently installed.)
Unpacking auctex (from .../auctex_11.85-1_all.deb) ...
Processing triggers for install-info ...
Processing triggers for man-db ...
Processing triggers for doc-base ...
Processing 2 added doc-base file(s)...
Registering documents with scrollkeeper...
Setting up auctex (11.85-1) ...
install/auctex: Setting up for emacs23 (log file: /usr/share/emacs23/site-
lisp/auctex//CompilationLog)... emacs-package-install: /usr/lib/emacsen-
common/packages/install/auctex emacs23 emacs23 failed at /usr/lib/emacsen-
common/emacs-package-install line 30, TSORT line 1.
dpkg: error processing auctex (--configure):
 subprocess installed post-installation script returned error exit status 1
configured to not write apport reports
  Errors were encountered while processing:
 auctex
E: Sub-process /usr/bin/dpkg returned an error code (1)
A package failed to install.  Trying to recover:
Setting up auctex (11.85-1) ...
install/auctex: Setting up for emacs23 (log file: /usr/share/emacs23/site-
lisp/auctex//CompilationLog)... emacs-package-install: /usr/lib/emacsen-
common/packages/install/auctex emacs23 emacs23 failed at /usr/lib/emacsen-
common/emacs-package-install line 30, TSORT line 1.
dpkg: error processing auctex (--configure):
 subprocess installed post-installation script returned error exit status 1
Errors were encountered while processing:
 auctex


Thank you very much in advance,
Domenico



-- Package-specific info:

Content of '/usr/share/emacs/site-lisp/auctex/'

4445a5aa5b0c6dd4eeb5d6a7b214b9a7  /usr/share/emacs/site-lisp/auctex/ChangeLog
7a5ac7b2ea13114a7237cad95ce9e127  /usr/share/emacs/site-lisp/auctex/Makefile
94b8353848c014c5aad9e29b149ff931  /usr/share/emacs/site-lisp/auctex/Makefile.in
f86b3412ef7d2947d5ab37ab13f2200d  /usr/share/emacs/site-lisp/auctex/aclocal.m4
c515b501a8d5009537edfb0348d3f14e  /usr/share/emacs/site-lisp/auctex/auctex.el
e23e60e9de6051db5156aecaaaea11e7  /usr/share/emacs/site-lisp/auctex/auctex.el.in
3366a99dd44e27fa57e0bcc130c4fa1c  /usr/share/emacs/site-lisp/auctex/bib-cite.el
542b9f88e6d102b497e17c104de7568a  /usr/share/emacs/site-lisp/auctex/confdefs.h
683dbf2998518f1d182da52f12bd1d63  /usr/share/emacs/site-lisp/auctex/config.log
dbb7f49fb883815b70b880b1c047d6b7  
/usr/share/emacs/site-lisp/auctex/config.status
8f868ec2c03618542b54b36547f83afd  /usr/share/emacs/site-lisp/auctex/configure
9ad8e6370c812d9a54f4b76b7b6ccfcd  /usr/share/emacs/site-lisp/auctex/configure.ac
bc74f7b5fa3e81249059523bda2af187  
/usr/share/emacs/site-lisp/auctex/context-en.el
7e5fea718848deb6b66d2f2050c4c4d9  
/usr/share/emacs/site-lisp/auctex/context-nl.el
66cdeaf725eadcbd25f55cefa4fdce88  /usr/share/emacs/site-lisp/auctex/context.el
2b11f4f8c3a4189bf7cc8fec5a51e8c0  /usr/share/emacs/site-lisp/auctex/doc/Makefile
2b11f4f8c3a4189bf7cc8fec5a51e8c0  
/usr/share/emacs/site-lisp/auctex/doc/Makefile.in
6f9d9372928534a7b6549aca174f026e  
/usr/share/emacs/site-lisp/auctex/font-latex.el
f176261b5a5511cbe1401ee72ffb8947  
/usr/share/emacs/site-lisp/auctex/images/amstex.xpm
d33121019448617a3ad3bcafdeb8db40  
/usr/share/emacs/site-lisp/auctex/images/bibtex.xpm
1a43d6438010bceb374ab0a5f2bd05a8  
/usr/share/emacs/site-lisp/auctex/images/dropdown.xpm
41f1ae0341ae2e307d92a7b8b815f868  
/usr/share/emacs/site-lisp/auctex/images/dvipdf.xpm
2e4b8669b0168f32247411be3f999437  
/usr/share/emacs/site-lisp/auctex/images/dvips.xpm
55f7600cadc3a209e94bacf6bbc42a7c  
/usr/share/emacs/site-lisp/auctex/images/error.xpm
c29ad797273fd27201a40bd939a95fe0  
/usr/share/emacs/site-lisp/auctex/images/exec.xpm
79b958849511c67d6b13ef9f5b3673e8  
/usr/share/emacs/site-lisp/auctex/images/execbibtex.xpm
a8570e26e9f96b6f527cdbe218d6c55f  
/usr/share/emacs/site-lisp/auctex/images/execdvips.xpm
e647bc601aef2dc71b134a989df1adff  
/usr/share/emacs/site-lisp/auctex/images/execerror.xpm
4610ec6133f89ceb441c43dfee077361  
/usr/share/emacs/site-lisp/auctex/images/execpdftex.xpm
c9cd1fc9fe4fd122cbf900fae654a67b  
/usr/share/emacs/site-lisp/auctex/images/exectex.xpm
6a6b9af945d4735f048ea8e475f8d9b8  
/usr/share/emacs/site-lisp/auctex/images/execviewdvi.xpm
466466f6d1867510b058a9c184ffce5d  
/usr/share/emacs/site-lisp/auctex/images/execviewpdf.xpm
39d8ccaffb40b0c118e000f45272db05  

Bug#704914: glx-alternatives: The libGL diversion does not work

2013-04-07 Thread Andreas Beckmann
Control: reassign -1 glx-diversions 0.2.90
Control: tag -1 moreinfo

On 2013-04-07 17:43, Christian Weeks wrote:
 There is a severe problem with the libGL diversion strategy as exists at
 present.
 
 The desktop is rendered inoperable after any change in the packaging, due to
 the diversion in glx-diversions
 being replaced by the actual lib from libgl1-mesa-glx. This is because gnome-
 session-bin and other current
 parts of the gnome desktop have a hardcoded dependency on libgl1-mesa-glx (or
 the virtual libgl1).

I'm sorry, but what exactly is the problem you experienced?

 The only fix is to re-run update-alternatives --configure glx, which re-
 replaces the symlink diversion
 however, if gnome is about to progress beyond experimental, it is likely this
 is about to become a critical
 pain point.

So what is broken before this command and fixed afterwards?

 # dpkg --remove libgl1-mesa-glx:amd64

and why would you want to do that?


Unfortunately you reported this against the source package, so no
scripts were run that could collect additional information.
I've reassigned this bug to the glx-diversions package, please run
  reportbug -N 704914
on the *broken* system, that should collect some helpful information.


Andreas


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Processed: Re: Bug#704914: glx-alternatives: The libGL diversion does not work

2013-04-07 Thread Debian Bug Tracking System
Processing control commands:

 reassign -1 glx-diversions 0.2.90
Bug #704914 [src:glx-alternatives] glx-alternatives: The libGL diversion does 
not work
Bug reassigned from package 'src:glx-alternatives' to 'glx-diversions'.
No longer marked as found in versions glx-alternatives/0.2.90.
Ignoring request to alter fixed versions of bug #704914 to the same values 
previously set
Bug #704914 [glx-diversions] glx-alternatives: The libGL diversion does not work
Marked as found in versions glx-alternatives/0.2.90.
 tag -1 moreinfo
Bug #704914 [glx-diversions] glx-alternatives: The libGL diversion does not work
Added tag(s) moreinfo.

-- 
704914: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=704914
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#704914: glx-alternatives: The libGL diversion does not work

2013-04-07 Thread Christian Weeks

On 07/04/13 12:17 PM, Andreas Beckmann wrote:

Control: reassign -1 glx-diversions 0.2.90
Control: tag -1 moreinfo

On 2013-04-07 17:43, Christian Weeks wrote:

There is a severe problem with the libGL diversion strategy as exists at
present.

The desktop is rendered inoperable after any change in the packaging, due to
the diversion in glx-diversions
being replaced by the actual lib from libgl1-mesa-glx. This is because gnome-
session-bin and other current
parts of the gnome desktop have a hardcoded dependency on libgl1-mesa-glx (or
the virtual libgl1).

I'm sorry, but what exactly is the problem you experienced?
libGL is brokenly referring to the libgl from mesa whereas it should be 
referring to the libGL from the nvidia packages. This breaks the gnome 
desktop. Gnome shell fails to start with an error, or any gnome 
application fails to launch, as the link is gone, replaced by the actual 
lib from that libgl-mesa-glx package. This affects almost all desktop 
applications that are linked against gnome.


This is with the current gnome 3.8 environment in experimental.



The only fix is to re-run update-alternatives --configure glx, which re-
replaces the symlink diversion
however, if gnome is about to progress beyond experimental, it is likely this
is about to become a critical
pain point.

So what is broken before this command and fixed afterwards?

Before: (This is reset after almost any packaging change on the system):
The link to libGL isn't a link to the diversions anymore. It is a link 
to somewhere else:

# ls -l /usr/lib/x86_64-linux-gnu/libGL.so.1
lrwxrwxrwx 1 root root 14 Apr  7 11:36 
/usr/lib/x86_64-linux-gnu/libGL.so.1 - libGL.so.1.2.0

# ls -l /usr/lib/x86_64-linux-gnu/libGL.so.1.2.0
-rw-r--r-- 1 root root 414328 Dec 29 22:24 
/usr/lib/x86_64-linux-gnu/libGL.so.1.2.0

# dpkg --search /usr/lib/x86_64-linux-gnu/libGL.so.1.2.0
libgl1-mesa-glx:amd64: /usr/lib/x86_64-linux-gnu/libGL.so.1.2.0

Running the command:
# update-alternatives --config glx
There is only one alternative in link group glx (providing 
/usr/lib/glx): /usr/lib/nvidia

Nothing to configure.
update-alternatives: warning: forcing reinstallation of alternative 
/usr/lib/nvidia because link group glx is broken


After:
# ls -l /usr/lib/x86_64-linux-gnu/libGL.so.1
lrwxrwxrwx 1 root root 50 Apr  7 12:23 
/usr/lib/x86_64-linux-gnu/libGL.so.1 - 
/etc/alternatives/glx--libGL.so.1-x86_64-linux-gnu


If I do not run this command, after any package installation or update, 
Gnome is completely broken, because mesa isn't functional on this 
system, because it is using the NVIDIA libraries.





# dpkg --remove libgl1-mesa-glx:amd64

and why would you want to do that?
Because it's the wrong thing for this system? It keeps replacing the 
nvidia GL with it's own? But I added it here because it shows how the 
libgl1 virtual dependency has crept from the base packages into the 
gnome packages.



Unfortunately you reported this against the source package, so no
scripts were run that could collect additional information.
I've reassigned this bug to the glx-diversions package, please run
   reportbug -N 704914
on the *broken* system, that should collect some helpful information.

Acknowledged. That'll be run forthwith.


Andreas




--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#704914: glx-diversions: More system information

2013-04-07 Thread Christian Weeks
Package: glx-diversions
Version: 0.2.90
Followup-For: Bug #704914

Data from reportbug

-- Package-specific info:
Diversions:
diversion of /usr/lib/i386-linux-gnu/libGL.so to 
/usr/lib/mesa-diverted/i386-linux-gnu/libGL.so by glx-diversions
diversion of /usr/lib/i386-linux-gnu/libGL.so.1 to 
/usr/lib/mesa-diverted/i386-linux-gnu/libGL.so.1 by glx-diversions
diversion of /usr/lib/i386-linux-gnu/libGL.so.1.2 to 
/usr/lib/mesa-diverted/i386-linux-gnu/libGL.so.1.2 by glx-diversions
diversion of /usr/lib/libGL.so to /usr/lib/mesa-diverted/libGL.so by 
glx-diversions
diversion of /usr/lib/libGL.so.1 to /usr/lib/mesa-diverted/libGL.so.1 by 
glx-diversions
diversion of /usr/lib/libGL.so.1.2 to /usr/lib/mesa-diverted/libGL.so.1.2 by 
glx-diversions
diversion of /usr/lib/x86_64-linux-gnu/libGL.so to 
/usr/lib/mesa-diverted/x86_64-linux-gnu/libGL.so by glx-diversions
diversion of /usr/lib/x86_64-linux-gnu/libGL.so.1 to 
/usr/lib/mesa-diverted/x86_64-linux-gnu/libGL.so.1 by glx-diversions
diversion of /usr/lib/x86_64-linux-gnu/libGL.so.1.2 to 
/usr/lib/mesa-diverted/x86_64-linux-gnu/libGL.so.1.2 by glx-diversions
diversion of /usr/lib32/libGL.so to /usr/lib32/nvidia/diversions/libGL.so by 
libgl1-nvidia-alternatives-ia32
diversion of /usr/lib32/libGL.so.1 to /usr/lib32/nvidia/diversions/libGL.so.1 
by libgl1-nvidia-alternatives-ia32
diversion of /usr/lib32/libGL.so.1.2 to 
/usr/lib32/nvidia/diversions/libGL.so.1.2 by libgl1-nvidia-alternatives-ia32

/usr/lib/mesa-diverted:
total 64
drwxr-xr-x   4 root root  4096 Oct  1  2012 .
drwxr-xr-x 236 root root 49152 Apr  7 11:36 ..
drwxr-xr-x   2 root root  4096 Mar 18 12:30 i386-linux-gnu
drwxr-xr-x   2 root root  4096 Mar 18 12:31 x86_64-linux-gnu

/usr/lib/mesa-diverted/i386-linux-gnu/:
total 8
drwxr-xr-x 2 root root 4096 Mar 18 12:30 .
drwxr-xr-x 4 root root 4096 Oct  1  2012 ..
lrwxrwxrwx 1 root root   14 Dec 29 23:03 libGL.so.1 - libGL.so.1.2.0

/usr/lib/mesa-diverted/x86_64-linux-gnu/:
total 8
drwxr-xr-x 2 root root 4096 Mar 18 12:31 .
drwxr-xr-x 4 root root 4096 Oct  1  2012 ..
lrwxrwxrwx 1 root root   14 Dec 29 22:24 libGL.so - libGL.so.1.6.0
lrwxrwxrwx 1 root root   14 Dec 29 22:24 libGL.so.1 - libGL.so.1.2.0

Alternative 'glx':
glx - auto mode
  link currently points to /usr/lib/nvidia
/usr/lib/nvidia - priority 100
  slave glx--libGL.so.1-i386-linux-gnu: 
/usr/lib/i386-linux-gnu/nvidia/libGL.so.1
  slave glx--libGL.so.1-x86_64-linux-gnu: 
/usr/lib/x86_64-linux-gnu/nvidia/libGL.so.1
  slave glx--libnvidia-cfg.so.1-i386-linux-gnu: 
/usr/lib/i386-linux-gnu/nvidia/libnvidia-cfg.so.1
  slave glx--libnvidia-cfg.so.1-x86_64-linux-gnu: 
/usr/lib/x86_64-linux-gnu/nvidia/libnvidia-cfg.so.1
  slave glx--linux-libglx.so: /usr/lib/nvidia/libglx.so
  slave glx--nvidia-blacklists-nouveau.conf: 
/etc/nvidia/nvidia-blacklists-nouveau.conf
  slave glx--nvidia-bug-report.sh: /usr/lib/nvidia/nvidia-bug-report.sh
  slave glx--nvidia_drv.so: /usr/lib/nvidia/nvidia_drv.so
Current 'best' version is '/usr/lib/nvidia'.

lrwxrwxrwx 1 root root 15 Apr  7 12:23 /etc/alternatives/glx - /usr/lib/nvidia
lrwxrwxrwx 1 root root 41 Apr  7 12:23 
/etc/alternatives/glx--libGL.so.1-i386-linux-gnu - 
/usr/lib/i386-linux-gnu/nvidia/libGL.so.1
lrwxrwxrwx 1 root root 43 Apr  7 12:23 
/etc/alternatives/glx--libGL.so.1-x86_64-linux-gnu - 
/usr/lib/x86_64-linux-gnu/nvidia/libGL.so.1
lrwxrwxrwx 1 root root 49 Apr  7 12:23 
/etc/alternatives/glx--libnvidia-cfg.so.1-i386-linux-gnu - 
/usr/lib/i386-linux-gnu/nvidia/libnvidia-cfg.so.1
lrwxrwxrwx 1 root root 51 Apr  7 12:23 
/etc/alternatives/glx--libnvidia-cfg.so.1-x86_64-linux-gnu - 
/usr/lib/x86_64-linux-gnu/nvidia/libnvidia-cfg.so.1
lrwxrwxrwx 1 root root 25 Apr  7 12:23 /etc/alternatives/glx--linux-libglx.so 
- /usr/lib/nvidia/libglx.so
lrwxrwxrwx 1 root root 42 Apr  7 12:23 
/etc/alternatives/glx--nvidia-blacklists-nouveau.conf - 
/etc/nvidia/nvidia-blacklists-nouveau.conf
lrwxrwxrwx 1 root root 36 Apr  7 12:23 
/etc/alternatives/glx--nvidia-bug-report.sh - 
/usr/lib/nvidia/nvidia-bug-report.sh
lrwxrwxrwx 1 root root 29 Apr  7 12:23 /etc/alternatives/glx--nvidia_drv.so - 
/usr/lib/nvidia/nvidia_drv.so

File System:
lrwxrwxrwx 1 root root 21 Apr  7 09:54 /usr/lib/glx - /etc/alternatives/glx
lrwxrwxrwx 1 root root 48 Apr  7 12:23 /usr/lib/i386-linux-gnu/libGL.so.1 
- /etc/alternatives/glx--libGL.so.1-i386-linux-gnu
-rw-r--r-- 1 root root 387532 Dec 29 23:03 
/usr/lib/i386-linux-gnu/libGL.so.1.2.0
lrwxrwxrwx 1 root root 50 Apr  7 12:23 /usr/lib/x86_64-linux-gnu/libGL.so.1 
- /etc/alternatives/glx--libGL.so.1-x86_64-linux-gnu
-rw-r--r-- 1 root root 414328 Dec 29 22:24 
/usr/lib/x86_64-linux-gnu/libGL.so.1.2.0
-rw-r--r-- 1 root root 431600 Feb 23 09:57 
/usr/lib/xorg/modules/extensions/libglx.so


-- System Information:
Debian Release: 7.0
  APT prefers unstable
  APT policy: (501, 'unstable'), (499, 'testing'), (399, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 3.8-trunk-amd64 (SMP w/8 CPU cores)
Locale: 

Bug#704647: krb5: rdns=false does not work

2013-04-07 Thread Sam Hartman
It looks like this patch is redundant with what's actually pending.
I think all I need to do is upload the tip of master.
If I missed anything let me know.


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#704876: hothasktags: FTBFS: cabal: Command not found

2013-04-07 Thread Joachim Breitner
Hi Joey,

Am Samstag, den 06.04.2013, 21:55 -0400 schrieb Aaron M. Ucko:
 Builds of hothasktags in minimal environments, as on the autobuilders,
 have been failing:
 
   cabal clean
   make[1]: cabal: Command not found
   make[1]: *** [override_dh_auto_clean] Error 127
 
 Could you please declare a build dependency on cabal-install and
 confirm with pbuilder or the like that no others were missing?

it seems you are trying to build a cabal package without
haskell-devscripts. I know you are the author of debhelper, but is there
any other reason?

In the next version of haskell-devscripts even supports the installation
of cabal-built binaries in a declarative way, i.e. without modifying
debian/rules. I can upload 0.8.14 if you want to use it for hothasktags.

If you want to avoid cdbs, I’d be happy to see dh support Haskell, but
it should use the same building steps as haskell-devscripts now, I’d
think.

Also, I don’t think we should ever use cabal in the packaging scripts,
it would be similar to using aptitude instead of dpkg when building
packages. Just use the Setup.lhs in every package.

Greetings,
Joachim

-- 
Joachim nomeata Breitner
Debian Developer
  nome...@debian.org | ICQ# 74513189 | GPG-Keyid: 4743206C
  JID: nome...@joachim-breitner.de | http://people.debian.org/~nomeata



signature.asc
Description: This is a digitally signed message part


Bug#704914: glx-alternatives: The libGL diversion does not work

2013-04-07 Thread Andreas Beckmann
Control: severity -1 wishlist
Control: retitle -1 does not divert libGL.so.1.2.0 from mesa 9.0.1-1

On 2013-04-07 18:26, Christian Weeks wrote:
 Before: (This is reset after almost any packaging change on the system):
 The link to libGL isn't a link to the diversions anymore. It is a link
 to somewhere else:
 # ls -l /usr/lib/x86_64-linux-gnu/libGL.so.1
 lrwxrwxrwx 1 root root 14 Apr  7 11:36
 /usr/lib/x86_64-linux-gnu/libGL.so.1 - libGL.so.1.2.0
 # ls -l /usr/lib/x86_64-linux-gnu/libGL.so.1.2.0
 -rw-r--r-- 1 root root 414328 Dec 29 22:24
 /usr/lib/x86_64-linux-gnu/libGL.so.1.2.0
 # dpkg --search /usr/lib/x86_64-linux-gnu/libGL.so.1.2.0
 libgl1-mesa-glx:amd64: /usr/lib/x86_64-linux-gnu/libGL.so.1.2.0

This is not the Debian libgl1-mesa-glx.

That would contain
/usr/lib/x86_64-linux-gnu/libGL.so.1.2
which is properly diverted.

On 2013-04-07 18:30, Christian Weeks wrote:
 Versions of packages glx-diversions is related to:
 ii  libgl1-mesa-glx [libgl1]   9.0.1-1

Exactly :-)

$ rmadison --arch amd64 libgl1-mesa-glx
 libgl1-mesa-glx | 7.7.1-5  | squeeze   | amd64
 libgl1-mesa-glx | 7.10.3-4~bpo60+1 | squeeze-backports | amd64
 libgl1-mesa-glx | 8.0.5-4  | wheezy| amd64
 libgl1-mesa-glx | 8.0.5-4  | sid   | amd64

Andreas


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Processed: Re: Bug#704914: glx-alternatives: The libGL diversion does not work

2013-04-07 Thread Debian Bug Tracking System
Processing control commands:

 severity -1 wishlist
Bug #704914 [glx-diversions] glx-alternatives: The libGL diversion does not work
Severity set to 'wishlist' from 'grave'
 retitle -1 does not divert libGL.so.1.2.0 from mesa 9.0.1-1
Bug #704914 [glx-diversions] glx-alternatives: The libGL diversion does not work
Changed Bug title to 'does not divert libGL.so.1.2.0 from mesa 9.0.1-1' from 
'glx-alternatives: The libGL diversion does not work'

-- 
704914: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=704914
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#704647: marked as done (krb5: rdns=false does not work)

2013-04-07 Thread Debian Bug Tracking System
Your message dated Sun, 07 Apr 2013 17:03:14 +
with message-id e1uoszq-0004xj...@franck.debian.org
and subject line Bug#704647: fixed in krb5 1.10.1+dfsg-5
has caused the Debian Bug report #704647,
regarding krb5: rdns=false does not work
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
704647: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=704647
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Package: krb5
Version: 1.10.1+dfsg-3
Severity: wishlist
User: ubuntu-de...@lists.ubuntu.com
Usertags: origin-ubuntu raring

Dear Maintainer,

This bug report was also filed in Ubuntu and can be found at
http://launchpad.net/bugs/1095757
The description, from nomike, follows:

There is a bug within eglibc [1] and [2] which breaks kerberos authentication
functionality for ssh-servers behind NAT gateways as glibc does a rDNS
cannonicalization of hostnames even if you specify rdns=false in krb5.conf.

There is a workaround implemented in MIT krb5 v. 1.10.2. [3].
The current maintenance release is 1.10.3.

As the bug is still not fixed in eglibc, krb5 should be updated to at least
1.10.3 to fix this issue.

[1] https://bugzilla.redhat.com/show_bug.cgi?id=714823
[2] https://bugs.launchpad.net/ubuntu/+source/eglibc/+bug/1057526
[3] http://krbdev.mit.edu/rt/Ticket/Display.html?id=7124

-- System Information:
Debian Release: wheezy/sid
  APT prefers raring-updates
  APT policy: (500, 'raring-updates'), (500, 'raring-security'), (500,
'raring'), (100, 'raring-backports')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 3.7.0-7-generic (SMP w/1 CPU core)
---End Message---
---BeginMessage---
Source: krb5
Source-Version: 1.10.1+dfsg-5

We believe that the bug you reported is fixed in the latest version of
krb5, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 704...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Benjamin Kaduk ka...@mit.edu (supplier of updated krb5 package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.8
Date: Fri, 05 Apr 2013 14:36:50 -0400
Source: krb5
Binary: krb5-user krb5-kdc krb5-kdc-ldap krb5-admin-server krb5-multidev 
libkrb5-dev libkrb5-dbg krb5-pkinit krb5-doc libkrb5-3 libgssapi-krb5-2 
libgssrpc4 libkadm5srv-mit8 libkadm5clnt-mit8 libk5crypto3 libkdb5-6 
libkrb5support0 krb5-gss-samples krb5-locales
Architecture: source all amd64
Version: 1.10.1+dfsg-5
Distribution: unstable
Urgency: high
Maintainer: Sam Hartman hartm...@debian.org
Changed-By: Benjamin Kaduk ka...@mit.edu
Description: 
 krb5-admin-server - MIT Kerberos master server (kadmind)
 krb5-doc   - Documentation for MIT Kerberos
 krb5-gss-samples - MIT Kerberos GSS Sample applications
 krb5-kdc   - MIT Kerberos key server (KDC)
 krb5-kdc-ldap - MIT Kerberos key server (KDC) LDAP plugin
 krb5-locales - Internationalization support for MIT Kerberos
 krb5-multidev - Development files for MIT Kerberos without Heimdal conflict
 krb5-pkinit - PKINIT plugin for MIT Kerberos
 krb5-user  - Basic programs to authenticate using MIT Kerberos
 libgssapi-krb5-2 - MIT Kerberos runtime libraries - krb5 GSS-API Mechanism
 libgssrpc4 - MIT Kerberos runtime libraries - GSS enabled ONCRPC
 libk5crypto3 - MIT Kerberos runtime libraries - Crypto Library
 libkadm5clnt-mit8 - MIT Kerberos runtime libraries - Administration Clients
 libkadm5srv-mit8 - MIT Kerberos runtime libraries - KDC and Admin Server
 libkdb5-6  - MIT Kerberos runtime libraries - Kerberos database
 libkrb5-3  - MIT Kerberos runtime libraries
 libkrb5-dbg - Debugging files for MIT Kerberos
 libkrb5-dev - Headers and development libraries for MIT Kerberos
 libkrb5support0 - MIT Kerberos runtime libraries - Support library
Closes: 703457 704647 704775
Changes: 
 krb5 (1.10.1+dfsg-5) unstable; urgency=high
 .
   * Import workaround for getaddrinfo bug from upstream.  Described in
 upstream's RT 7124, Closes: #704647
   * Correct CVE number for CVE-2012-1016 in changelog and patches, Closes:
 #703457
   * Import upstream's fix for CVE-2013-1416, Closes: #704775
Checksums-Sha1: 
 96c8b1bae8895213219f4ba35f71c601b4369e92 2287 krb5_1.10.1+dfsg-5.dsc
 

Bug#704775: marked as done (krb5: KDC TGS-REQ null deref (CVE-2013-1416))

2013-04-07 Thread Debian Bug Tracking System
Your message dated Sun, 07 Apr 2013 17:03:14 +
with message-id e1uoszq-0004xp...@franck.debian.org
and subject line Bug#704775: fixed in krb5 1.10.1+dfsg-5
has caused the Debian Bug report #704775,
regarding krb5: KDC TGS-REQ null deref (CVE-2013-1416)
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
704775: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=704775
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---

Package: krb5-kdc
Version: 1.10.1+dfsg-4+nmu1
Severity: serious

Upstream has patched against CVE-2013-1416; Debian should as well.

By sending an unusual but valid TGS-REQ, an authenticated remote attacker 
can cause the KDC process to crash by dereferencing a null pointer.


Only krb5 releases 1.7 to 1.10 are affected; the code in question was 
rewritten for 1.11.
---End Message---
---BeginMessage---
Source: krb5
Source-Version: 1.10.1+dfsg-5

We believe that the bug you reported is fixed in the latest version of
krb5, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 704...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Benjamin Kaduk ka...@mit.edu (supplier of updated krb5 package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.8
Date: Fri, 05 Apr 2013 14:36:50 -0400
Source: krb5
Binary: krb5-user krb5-kdc krb5-kdc-ldap krb5-admin-server krb5-multidev 
libkrb5-dev libkrb5-dbg krb5-pkinit krb5-doc libkrb5-3 libgssapi-krb5-2 
libgssrpc4 libkadm5srv-mit8 libkadm5clnt-mit8 libk5crypto3 libkdb5-6 
libkrb5support0 krb5-gss-samples krb5-locales
Architecture: source all amd64
Version: 1.10.1+dfsg-5
Distribution: unstable
Urgency: high
Maintainer: Sam Hartman hartm...@debian.org
Changed-By: Benjamin Kaduk ka...@mit.edu
Description: 
 krb5-admin-server - MIT Kerberos master server (kadmind)
 krb5-doc   - Documentation for MIT Kerberos
 krb5-gss-samples - MIT Kerberos GSS Sample applications
 krb5-kdc   - MIT Kerberos key server (KDC)
 krb5-kdc-ldap - MIT Kerberos key server (KDC) LDAP plugin
 krb5-locales - Internationalization support for MIT Kerberos
 krb5-multidev - Development files for MIT Kerberos without Heimdal conflict
 krb5-pkinit - PKINIT plugin for MIT Kerberos
 krb5-user  - Basic programs to authenticate using MIT Kerberos
 libgssapi-krb5-2 - MIT Kerberos runtime libraries - krb5 GSS-API Mechanism
 libgssrpc4 - MIT Kerberos runtime libraries - GSS enabled ONCRPC
 libk5crypto3 - MIT Kerberos runtime libraries - Crypto Library
 libkadm5clnt-mit8 - MIT Kerberos runtime libraries - Administration Clients
 libkadm5srv-mit8 - MIT Kerberos runtime libraries - KDC and Admin Server
 libkdb5-6  - MIT Kerberos runtime libraries - Kerberos database
 libkrb5-3  - MIT Kerberos runtime libraries
 libkrb5-dbg - Debugging files for MIT Kerberos
 libkrb5-dev - Headers and development libraries for MIT Kerberos
 libkrb5support0 - MIT Kerberos runtime libraries - Support library
Closes: 703457 704647 704775
Changes: 
 krb5 (1.10.1+dfsg-5) unstable; urgency=high
 .
   * Import workaround for getaddrinfo bug from upstream.  Described in
 upstream's RT 7124, Closes: #704647
   * Correct CVE number for CVE-2012-1016 in changelog and patches, Closes:
 #703457
   * Import upstream's fix for CVE-2013-1416, Closes: #704775
Checksums-Sha1: 
 96c8b1bae8895213219f4ba35f71c601b4369e92 2287 krb5_1.10.1+dfsg-5.dsc
 c4c35fd67f163ed82cb1426e05854eb2bbbcbadb 135076 
krb5_1.10.1+dfsg-5.debian.tar.gz
 5140d04910eb7903a07f6409214cdf53dec4337f 2668656 krb5-doc_1.10.1+dfsg-5_all.deb
 a5fe28590d87acc3b6cc1f95714ac828c9f165d4 1502290 
krb5-locales_1.10.1+dfsg-5_all.deb
 7f788cdebfc288a6fa6bba1602d8bb9046fc379f 153590 
krb5-user_1.10.1+dfsg-5_amd64.deb
 bc79a3ae0868e8ea8e6ff773c53cefafe167bb55 224496 
krb5-kdc_1.10.1+dfsg-5_amd64.deb
 3949c4adff4140439a3d237e07e12e0a402a05d5 119982 
krb5-kdc-ldap_1.10.1+dfsg-5_amd64.deb
 9dff1602d65cb2a8804bad82ac0c9e23a3e97926 121756 
krb5-admin-server_1.10.1+dfsg-5_amd64.deb
 6825190576a7d7c8478f6d4c003a9b6b3173485a 153444 
krb5-multidev_1.10.1+dfsg-5_amd64.deb
 91eff6975c7e88c791952e9996ef2efa2e7c2d37 39762 
libkrb5-dev_1.10.1+dfsg-5_amd64.deb
 8249b60cae4400b5317a02ceec55b46fe031e5b7 2203582 

Processed: limit source to krb5, tagging 703457, tagging 704775

2013-04-07 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 #krb5 (1.10.1+dfsg-5) unstable; urgency=high
 #
 #  * Correct CVE number for CVE-2012-1016 in changelog and patches, Closes:
 ##703457
 #  * Import upstream's fix for CVE-2013-1416, Closes: #704775
 #
 limit source krb5
Limiting to bugs with field 'source' containing at least one of 'krb5'
Limit currently set to 'source':'krb5'

 tags 703457 + pending
Bug #703457 {Done: Benjamin Kaduk ka...@mit.edu} [src:krb5] krb5: fix 
retrospectively CVE entry in 1.10.1+dfsg-4+nmu1 and patch name
Added tag(s) pending.
 tags 704775 + pending
Bug #704775 {Done: Benjamin Kaduk ka...@mit.edu} [krb5-kdc] krb5: KDC TGS-REQ 
null deref (CVE-2013-1416)
Added tag(s) pending.
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
703457: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=703457
704775: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=704775
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#704876: hothasktags: FTBFS: cabal: Command not found

2013-04-07 Thread Joey Hess
Joachim Breitner wrote:
 If you want to avoid cdbs, I’d be happy to see dh support Haskell, but
 it should use the same building steps as haskell-devscripts now, I’d
 think.

I don't know if it's worth putting in the time to make debhelper support
haskell library packages, but it certianly makes sense for it to
automatically handle packages that simply build binaries from a cabal
file. I hope to see an increasing number of such packages in Debian.

-- 
see shy jo


signature.asc
Description: Digital signature


Bug#704876: marked as done (hothasktags: FTBFS: cabal: Command not found)

2013-04-07 Thread Debian Bug Tracking System
Your message dated Sun, 07 Apr 2013 17:47:34 +
with message-id e1uotgk-00078z...@franck.debian.org
and subject line Bug#704876: fixed in hothasktags 0.3.1-1
has caused the Debian Bug report #704876,
regarding hothasktags: FTBFS: cabal: Command not found
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
704876: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=704876
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Source: hothasktags
Version: 0.3.0-1
Severity: serious
Justification: fails to build from source

Builds of hothasktags in minimal environments, as on the autobuilders,
have been failing:

  cabal clean
  make[1]: cabal: Command not found
  make[1]: *** [override_dh_auto_clean] Error 127

Could you please declare a build dependency on cabal-install and
confirm with pbuilder or the like that no others were missing?

Thanks!
---End Message---
---BeginMessage---
Source: hothasktags
Source-Version: 0.3.1-1

We believe that the bug you reported is fixed in the latest version of
hothasktags, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 704...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Joey Hess jo...@debian.org (supplier of updated hothasktags package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Sun, 07 Apr 2013 13:32:05 -0400
Source: hothasktags
Binary: hothasktags
Architecture: source i386
Version: 0.3.1-1
Distribution: unstable
Urgency: low
Maintainer: Debian Haskell Group 
pkg-haskell-maintain...@lists.alioth.debian.org
Changed-By: Joey Hess jo...@debian.org
Description: 
 hothasktags - Haskell ctags generator
Closes: 704876
Changes: 
 hothasktags (0.3.1-1) unstable; urgency=low
 .
   * New upstream release.
   * Avoid running cabal in the build process; among other problems
 cabal writes to $HOME. Closes: #704876
Checksums-Sha1: 
 b45cc84bc095769c3c5f306c944a5d239cfae3bd 1971 hothasktags_0.3.1-1.dsc
 cf6d23dcf4df364aefdddeda154d72ccabcab876 4377 hothasktags_0.3.1.orig.tar.gz
 ddf8e7d15fc357b43062a0fa085121194edf59c9 2200 hothasktags_0.3.1-1.diff.gz
 926bd1d19a56dc8e09a156ee54f306623f6616a2 1349434 hothasktags_0.3.1-1_i386.deb
Checksums-Sha256: 
 2bbf6659a11f49eb23a0903580c97c4a261314b1753f5462928606537105aba2 1971 
hothasktags_0.3.1-1.dsc
 6bce99bd91b76c1850a1cd1a6eec029a63fcd0554c6c8f1e9fca6ebc31b545f3 4377 
hothasktags_0.3.1.orig.tar.gz
 2d95232bf5da43c524f319c40f5643cbc31ce2aef63c07d49b91aababedc 2200 
hothasktags_0.3.1-1.diff.gz
 6b46f4df4696e11c3beacbca0cd3247c9547256956aa1ab0c0af8c0326002e88 1349434 
hothasktags_0.3.1-1_i386.deb
Files: 
 f325cf5c508347fdae49dfee2c5f9f8d 1971 net optional hothasktags_0.3.1-1.dsc
 e4cde70444b03fc8e69cd4d326680351 4377 net optional 
hothasktags_0.3.1.orig.tar.gz
 9a40d552bad0afd28eb4b998243a1886 2200 net optional hothasktags_0.3.1-1.diff.gz
 b7fe812254193362b18d7d380472a2dd 1349434 net optional 
hothasktags_0.3.1-1_i386.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.12 (GNU/Linux)
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=oSCi
-END PGP SIGNATUREEnd Message---


Bug#704876: [Pkg-haskell-maintainers] Bug#704876: hothasktags: FTBFS: cabal: Command not found

2013-04-07 Thread Joachim Breitner
Hi,

Am Sonntag, den 07.04.2013, 13:40 -0400 schrieb Joey Hess:
 Joachim Breitner wrote:
  If you want to avoid cdbs, I’d be happy to see dh support Haskell, but
  it should use the same building steps as haskell-devscripts now, I’d
  think.
 
 I don't know if it's worth putting in the time to make debhelper support
 haskell library packages, but it certianly makes sense for it to
 automatically handle packages that simply build binaries from a cabal
 file. I hope to see an increasing number of such packages in Debian.

I don’t think that there is such a big difference there. The commands
called are the same (compile Setup.*hs, configure, build, install with
--destdir), and the library-sepecifc stuff is already in dh_haskell_*
commands that should go well with dh.

OTOH thinks work well now, so there is no pressing need to change the
running system.


Greetings,
Joachim

-- 
Joachim nomeata Breitner
Debian Developer
  nome...@debian.org | ICQ# 74513189 | GPG-Keyid: 4743206C
  JID: nome...@joachim-breitner.de | http://people.debian.org/~nomeata



signature.asc
Description: This is a digitally signed message part


Bug#704876: marked as done (hothasktags: FTBFS: cabal: Command not found)

2013-04-07 Thread Joachim Breitner
Hi,

--- a/debian/rules
+++ b/debian/rules
@@ -2,14 +2,16 @@
 %:
dh $@
 
+export CABAL=runghc Setup.lhs
+

This does not work well on architectures without ghci support. Not sure
if any of the dependencies of hothasktags prevent these architectures
anyways, but this is not a general solution either. I don’t think there
is a good way to avoid having to compile Setup first.

(One might argue that on such architectures, runghc should compile to a
temporary location. But I’m not sure that we want such differing
behavior depending on the architectures).

Greetings,
Joachim


-- 
Joachim nomeata Breitner
Debian Developer
  nome...@debian.org | ICQ# 74513189 | GPG-Keyid: 4743206C
  JID: nome...@joachim-breitner.de | http://people.debian.org/~nomeata



signature.asc
Description: This is a digitally signed message part


Bug#704484: Upgrading from Squeeze to Wheezy breaks proftpd

2013-04-07 Thread Francesco P. Lovergine
 mod_vroot used to be in proftpd-basic in squeeze, it's moved to a
 separate package in wheezy.
 

and to be honest I would avoid to add proftpd-mod-vroot as a strict
dependency. It is an optional (and experimental) module and the problem
would be simply resolved by installing it by hand after a dist-upgrade.

-- 
Francesco P. Lovergine


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#704704: Acknowledgement (incompatible with iceweasel 20.0)

2013-04-07 Thread Michael Biebl
[Please CC the bug submitter in your reply, if you expected them to answer]

FWIW, a simple recompilation against xulrunner 20.0 was sufficient to
make the extension work again, so requesting a binNMU could be all that
is needed.

That said, I still think it's a bug, that an upgrade of
xulrunner/iceweasel breaks the extension without apt preventing that
situation.

Cheers,
Michael

-- 
Why is it that all of the instruments seeking intelligent life in the
universe are pointed away from Earth?



signature.asc
Description: OpenPGP digital signature


Bug#704647: krb5: rdns=false does not work

2013-04-07 Thread Michael Gilbert
On Sun, Apr 7, 2013 at 12:33 PM, Sam Hartman wrote:
 It looks like this patch is redundant with what's actually pending.
 I think all I need to do is upload the tip of master.
 If I missed anything let me know.

That is correct.  I was going to cancel the nmu, but it looks like
Benjamin just did an upload.

Best wishes,
Mike


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Processed: severity of 704154 is important

2013-04-07 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 severity 704154 important
Bug #704154 [vdr] vdr - Fails if started without any of CAP_SYS_TIME, 
CAP_SYS_NICE or CAP_NET_RAW
Severity set to 'important' from 'serious'
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
704154: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=704154
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#704114: asterisk: asterisk security advisories: AST-2013-001 / AST-2013-002 / AST-2013-003

2013-04-07 Thread Salvatore Bonaccorso
Hi Tzafrir

On Sat, Apr 06, 2013 at 03:25:20PM +0300, Tzafrir Cohen wrote:
 Update:
 
 AST-2013-001 (CVE-2013-2685):
   Not applicable to either Stable or Testing/Unstable:
   new code not included yet even in 1.8.
 
 AST-2013-002 (CVE-2013-2686):
   Applies to Testing/Unstable but not to Stable:
   Testing/Unstable: see patch from Upstream. Stable: httpd code does not
   read HTTP POST variables.
 
 AST-2013-003 (CVE-2013-2264):
   Applies to both Testing and Unstable.
   Testing/Unstable: see patch from Upstream. Stable: Patch backported.
 
 For Unstable/Testing I include two other simple bug fixes. Both trivial
 backports from later 1.8.x reevisions.

Thanks a lot for your updated information. I have updated according to
this and the closing version in unstable the security tracker.

[Btw, I think there where two typos for the CVE's in the latest
changelog for unstable, which might be worth fixing in a future upload
to unstable (only to keep the references correct, should have been
CVE-2013-2686 and CVE-2013-2264).]

Thanks for your work!

Regards,
Salvatore


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#704931: chroot_cleanup should not unmount /proc

2013-04-07 Thread martin f krafft
Package: src:debian-installer-utils
Severity: serious

For a reason unknown to me, helpers like in-target and apt-install,
by way of chroot_setup and chroot_cleanup, might actually cause
/target/proc to be unmounted. This then breaks grub-install.
Arguably, commit 795bfde of grub-installer hacks around this
problem, when actually I don't think there is any reason why
/target/proc (or /target/sys, etc.) should ever be unmounted before
it's time to unmount the /target tree.

In my case, I was experimenting with preseeding when suddenly,
grub-install failed. The reason was a missing /target/proc.

Thinking that /target/proc should not have been unmounted, I used
the console to chdir() to it, thereby causing umount to fail. Here
is what syslog documented:

  Apr  7 15:05:07 in-target: Setting up popularity-contest (1.56) ...
  Apr  7 15:05:08 pkgsel: umount: can't umount /target/proc: Device or resource 
busy
  Apr  7 15:05:08 /bin/in-target: warning: Unable to umount '/target/proc'
  Apr  7 15:05:08 in-target: (Reading database ...·
  Apr  7 15:05:08 in-target: 14789 files and directories currently installed.)
  Apr  7 15:05:08 in-target: Removing popularity-contest ...
  Apr  7 15:05:08 in-target: Purging configuration files for popularity-contest 
...

Later, I used network-console and a while loop to track the state of
/proc/mounts and I found that /target/proc randomly appeared and
disappeared.

By the time grub-install is run, it isn't present. I don't know
whether the above, popcon-associated instance of umount is at fault,
but I do question why /target/proc ever gets unmounted.

The version of d-i I am using doesn't have Steve's commit yet, so
grub-install just fails.

I can reproduce this, I can even give network-console access to the
host I am using for testing, and stand by on IRC for debugging. It's
a KVM instance provisioned by virt-install and preseeded, so it's
trivial to work with…

-- System Information:
Debian Release: 7.0
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 3.8-trunk-amd64 (SMP w/4 CPU cores)
Locale: LANG=en_NZ, LC_CTYPE=en_NZ.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash


-- 
 .''`.   martin f. krafft madduck@d.o  Related projects:
: :'  :  proud Debian developer   http://debiansystem.info
`. `'`   http://people.debian.org/~madduckhttp://vcs-pkg.org
  `-  Debian - when you have better things to do than fixing systems


digital_signature_gpg.asc
Description: Digital signature (see http://martin-krafft.net/gpg/sig-policy/999bbcc4/current)


Bug#704931: chroot_cleanup should not unmount /proc

2013-04-07 Thread Cyril Brulebois
Control: severity -1 normal

martin f krafft madd...@debian.org (07/04/2013):
 Package: src:debian-installer-utils
 Severity: serious
 
 For a reason unknown to me, helpers like in-target and apt-install,
 by way of chroot_setup and chroot_cleanup, might actually cause
 /target/proc to be unmounted. This then breaks grub-install.
 Arguably, commit 795bfde of grub-installer hacks around this
 problem, when actually I don't think there is any reason why
 /target/proc (or /target/sys, etc.) should ever be unmounted before
 it's time to unmount the /target tree.
 
 In my case, I was experimenting with preseeding when suddenly,
 grub-install failed. The reason was a missing /target/proc.
 
 Thinking that /target/proc should not have been unmounted, I used
 the console to chdir() to it, thereby causing umount to fail. Here
 is what syslog documented:
 […]

 The version of d-i I am using doesn't have Steve's commit yet, so
 grub-install just fails.

AFAICT you're the only one having such an issue with the mount/umount
dance (it might be suboptimal as far as “performances” are concerned,
but that's certainly not serious); having that issue with
grub-installer, which already got a fix-or-workaround in the
meanwhile, makes me think it's nowhere like a serious bug.

Downgrading accordingly.

Mraw,
KiBi.


signature.asc
Description: Digital signature


Processed: Re: Bug#704931: chroot_cleanup should not unmount /proc

2013-04-07 Thread Debian Bug Tracking System
Processing control commands:

 severity -1 normal
Bug #704931 [src:debian-installer-utils] chroot_cleanup should not unmount /proc
Severity set to 'normal' from 'serious'

-- 
704931: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=704931
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Processed: Re: system hangs when initializing primary video card (3.2.39-2 - 3.2.41-2 regression)

2013-04-07 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 # Stepan Golosunov wrote:
 #
 #  Severity: grave
 #  Justification: renders package unusable
 #
 # True, on affected systems.
 #
 # regression, hardware support
 severity 704933 important
Bug #704933 [linux-image-3.2.0-4-amd64] linux-image-3.2.0-4-amd64:amd64: system 
hangs when initializing primary video card (3.2.39-2 - 3.2.41-2 regression)
Severity set to 'important' from 'grave'

End of message, stopping processing here.

Please contact me if you need assistance.
-- 
704933: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=704933
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Processed: severity of 704935 is important

2013-04-07 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 severity 704935 important
Bug #704935 [src:mypaint] mypaint: FTBFS with DEB_BUILD_OPTIONS=noopt
Severity set to 'important' from 'serious'
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
704935: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=704935
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#704936: openmpi1.6: FTBFS: inconsistency in debian/libopenmpi1.6.install

2013-04-07 Thread Hiroyuki Yamamoto
Source: openmpi1.6
Version: 1.6.4-1
Severity: serious
Tags: patch sid
Justification: FTBFS

There is inconsistency in debian/libopenmpi1.6.install.

Patch is attached.

Regards,
-- 
Hiroyuki Yamamoto
A75D B285 7050 4BF9 AEDA  91AC 3A10 59C6 5203 04DC
diff -Nurd openmpi1.6-1.6.4.orig/debian/libopenmpi1.6.install openmpi1.6-1.6.4/debian/libopenmpi1.6.install
--- openmpi1.6-1.6.4.orig/debian/libopenmpi1.6.install	2013-02-22 18:35:48.0 +0900
+++ openmpi1.6-1.6.4/debian/libopenmpi1.6.install	2013-04-07 22:04:22.0 +0900
@@ -8,93 +8,6 @@
 usr/lib/openmpi/lib/libopen-pal.so.4.0.4
 usr/lib/openmpi/lib/libopen-rte.so.4.0.3
 ## Plugins
-usr/lib/openmpi/lib/openmpi/libompi_dbg_msgq.so
-usr/lib/openmpi/lib/openmpi/mca_allocator_basic.so
-usr/lib/openmpi/lib/openmpi/mca_allocator_bucket.so
-usr/lib/openmpi/lib/openmpi/mca_bml_r2.so
-usr/lib/openmpi/lib/openmpi/mca_btl_ofud.so
-usr/lib/openmpi/lib/openmpi/mca_btl_openib.so
-usr/lib/openmpi/lib/openmpi/mca_btl_self.so
-usr/lib/openmpi/lib/openmpi/mca_btl_sm.so
-usr/lib/openmpi/lib/openmpi/mca_btl_tcp.so
-usr/lib/openmpi/lib/openmpi/mca_carto_auto_detect.so
-usr/lib/openmpi/lib/openmpi/mca_carto_file.so
-usr/lib/openmpi/lib/openmpi/mca_coll_basic.so
-usr/lib/openmpi/lib/openmpi/mca_coll_hierarch.so
-usr/lib/openmpi/lib/openmpi/mca_coll_inter.so
-usr/lib/openmpi/lib/openmpi/mca_coll_self.so
-usr/lib/openmpi/lib/openmpi/mca_coll_sm.so
-usr/lib/openmpi/lib/openmpi/mca_coll_sync.so
-usr/lib/openmpi/lib/openmpi/mca_coll_tuned.so
-usr/lib/openmpi/lib/openmpi/mca_crcp_bkmrk.so
-usr/lib/openmpi/lib/openmpi/mca_crs_blcr.so
-usr/lib/openmpi/lib/openmpi/mca_crs_none.so
-usr/lib/openmpi/lib/openmpi/mca_crs_self.so
-usr/lib/openmpi/lib/openmpi/mca_dpm_orte.so
-usr/lib/openmpi/lib/openmpi/mca_errmgr_default.so
-usr/lib/openmpi/lib/openmpi/mca_ess_env.so
-usr/lib/openmpi/lib/openmpi/mca_ess_hnp.so
-usr/lib/openmpi/lib/openmpi/mca_ess_singleton.so
-usr/lib/openmpi/lib/openmpi/mca_ess_slave.so
-usr/lib/openmpi/lib/openmpi/mca_ess_slurmd.so
-usr/lib/openmpi/lib/openmpi/mca_ess_slurm.so
-usr/lib/openmpi/lib/openmpi/mca_ess_tm.so
-usr/lib/openmpi/lib/openmpi/mca_ess_tool.so
-usr/lib/openmpi/lib/openmpi/mca_filem_rsh.so
-usr/lib/openmpi/lib/openmpi/mca_grpcomm_bad.so
-usr/lib/openmpi/lib/openmpi/mca_grpcomm_basic.so
-usr/lib/openmpi/lib/openmpi/mca_iof_hnp.so
-usr/lib/openmpi/lib/openmpi/mca_iof_orted.so
-usr/lib/openmpi/lib/openmpi/mca_iof_tool.so
-usr/lib/openmpi/lib/openmpi/mca_maffinity_first_use.so
-usr/lib/openmpi/lib/openmpi/mca_maffinity_hwloc.so
-usr/lib/openmpi/lib/openmpi/mca_mpool_fake.so
-usr/lib/openmpi/lib/openmpi/mca_mpool_rdma.so
-usr/lib/openmpi/lib/openmpi/mca_mpool_sm.so
-usr/lib/openmpi/lib/openmpi/mca_notifier_command.so
-usr/lib/openmpi/lib/openmpi/mca_notifier_syslog.so
-usr/lib/openmpi/lib/openmpi/mca_odls_default.so
-usr/lib/openmpi/lib/openmpi/mca_oob_tcp.so
-usr/lib/openmpi/lib/openmpi/mca_osc_pt2pt.so
-usr/lib/openmpi/lib/openmpi/mca_osc_rdma.so
-usr/lib/openmpi/lib/openmpi/mca_paffinity_hwloc.so
-usr/lib/openmpi/lib/openmpi/mca_plm_rsh.so
-usr/lib/openmpi/lib/openmpi/mca_plm_slurm.so
-usr/lib/openmpi/lib/openmpi/mca_plm_tm.so
-usr/lib/openmpi/lib/openmpi/mca_pml_bfo.so
-usr/lib/openmpi/lib/openmpi/mca_pml_cm.so
-usr/lib/openmpi/lib/openmpi/mca_pml_crcpw.so
-usr/lib/openmpi/lib/openmpi/mca_pml_csum.so
-usr/lib/openmpi/lib/openmpi/mca_pml_ob1.so
-usr/lib/openmpi/lib/openmpi/mca_pml_v.so
-usr/lib/openmpi/lib/openmpi/mca_pstat_linux.so
-usr/lib/openmpi/lib/openmpi/mca_pubsub_orte.so
-usr/lib/openmpi/lib/openmpi/mca_ras_cm.so
-usr/lib/openmpi/lib/openmpi/mca_ras_gridengine.so
-usr/lib/openmpi/lib/openmpi/mca_ras_loadleveler.so
-usr/lib/openmpi/lib/openmpi/mca_ras_slurm.so
-usr/lib/openmpi/lib/openmpi/mca_ras_tm.so
-usr/lib/openmpi/lib/openmpi/mca_rcache_vma.so
-usr/lib/openmpi/lib/openmpi/mca_rmaps_load_balance.so
-usr/lib/openmpi/lib/openmpi/mca_rmaps_rank_file.so
-usr/lib/openmpi/lib/openmpi/mca_rmaps_resilient.so
-usr/lib/openmpi/lib/openmpi/mca_rmaps_round_robin.so
-usr/lib/openmpi/lib/openmpi/mca_rmaps_seq.so
-usr/lib/openmpi/lib/openmpi/mca_rmaps_topo.so
-usr/lib/openmpi/lib/openmpi/mca_rml_ftrm.so
-usr/lib/openmpi/lib/openmpi/mca_rml_oob.so
-usr/lib/openmpi/lib/openmpi/mca_routed_binomial.so
-usr/lib/openmpi/lib/openmpi/mca_routed_cm.so
-usr/lib/openmpi/lib/openmpi/mca_routed_direct.so
-usr/lib/openmpi/lib/openmpi/mca_routed_linear.so
-usr/lib/openmpi/lib/openmpi/mca_routed_radix.so
-usr/lib/openmpi/lib/openmpi/mca_routed_slave.so
-usr/lib/openmpi/lib/openmpi/mca_shmem_mmap.so
-usr/lib/openmpi/lib/openmpi/mca_shmem_posix.so
-usr/lib/openmpi/lib/openmpi/mca_shmem_sysv.so
-usr/lib/openmpi/lib/openmpi/mca_snapc_full.so
-usr/lib/openmpi/lib/openmpi/mca_sysinfo_linux.so
-usr/lib/openmpi/lib/openmpi/mca_topo_unity.so
-usr/lib/openmpi/lib/openmpi/mca_vprotocol_pessimist.so
+usr/lib/openmpi/lib/openmpi/*.so
 ## Other files
 usr/lib/openmpi/lib/mpi.mod
diff -Nurd openmpi1.6-1.6.4.orig/debian/libopenmpi1.6.install.armel 

Processed: your mail

2013-04-07 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 tag 683188 patch
Bug #683188 [python-subversion] API change in python-subversion breaks trac
Added tag(s) patch.
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
683188: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=683188
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#704744: pbuilder: umounts /{dev,run}/shm of the *host* system

2013-04-07 Thread Thorsten Glaser
reopen 704744
thanks

Okay, I just run “sudo env DIST=sid cowbuilder --create” and
it happened again. I micro-tested this and can point out where:

First, debootstrap (via pbuilder --create) runs. Then debootstrap
finishes, and additional magic occurs:

I: Configuring dpkg-dev...
I: Configuring build-essential...
I know at this point /dev/shm/* files still are present.
I: Base system installed successfully.
I: debootstrap finished
I: copying local configuration
I: Installing apt-lines
I: Refreshing the base.tgz
I: upgrading packages
I: mounting /proc filesystem
I: mounting /run/shm filesystem
I believe it is at *this* point where the bug is.
I: mounting /dev/pts filesystem
I: installing dummy policy-rc.d
Hit http://ftp.hosteurope.de sid Release.gpg
I know that, at this point, my /run/shm is empty (umounted).

bye,
//mirabilos
-- 
13:37⎜«Natureshadow» Deep inside, I hate mirabilos. I mean, he's a good
guy. But he's always right! In every fsckin' situation, he's right. Even
with his deeply perverted taste in software and borked ambition towards
broken OSes - in the end, he's damn right about it :(! […] works in mksh


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Processed: pbuilder: umounts /{dev,run}/shm of the *host* system

2013-04-07 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 reopen 704744
Bug #704744 {Done: Junichi Uekawa dan...@netfort.gr.jp} [pbuilder] pbuilder: 
umounts /{dev,run}/shm of the *host* system
Bug reopened
Ignoring request to alter fixed versions of bug #704744 to the same values 
previously set
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
704744: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=704744
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#704915: auctex: Fails to install

2013-04-07 Thread Michael Gilbert
control: fixed -1 11.86-11

It's surprising that this went unnoticed for so long in squeeze.  But
anyway, I just did an auctex install in a clean wheezy chroot, and it
went fine.  So, I've marked the current version in wheezy as fixed
(since that is the version I tested), but this problem was likely
fixed much earlier.

Best wishes,
Mike


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Processed: re: auctex: Fails to install

2013-04-07 Thread Debian Bug Tracking System
Processing control commands:

 fixed -1 11.86-11
Bug #704915 [auctex] auctex: Fails to install
Marked as fixed in versions auctex/11.86-11.

-- 
704915: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=704915
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#704744: pbuilder: umounts /{dev,run}/shm of the *host* system

2013-04-07 Thread Thorsten Glaser
reassign 704744 debootstrap
found 704744 debootstrap/1.0.48
retitle 704744 debootstrap: umounts /{dev,run}/shm of the *host* system
thanks

Dixi quod…

Okay, I just run “sudo env DIST=sid cowbuilder --create” and
it happened again. I micro-tested this and can point out where:

Nevermind, it’s debootstrap not pbuilder.

I changed to include “set -x”, run “mount | fgrep shm” using
the DEBUG trap, and commented out the call to debootstrap as
I had it already… and it kept my shm.

Turns out this looks like being the culprit:

tglase@tglase:~ $ fgrep -ri shm /usr/share/debootstrap/*
/usr/share/debootstrap/functions:   umount_on_exit /dev/shm

The problem here is:

lrwxrwxrwx 1 root root 8 Apr  8 01:03 /var/cache/pbuilder/base.cow-sid/dev/shm 
- /run/shm/

The symlink is then, of course, followed.

Reassigning this RC bug to debootstrap thusly.
Sorry folks, but this does break unrelated software.

My idea to fix this is:

Move the “umount_on_exit /dev/shm” line away from
/usr/share/debootstrap/functions and into the files under
/usr/share/debootstrap/scripts/ and then change it to use
/run/shm from wheezy onwards (this also involves breaking
up the symlink from etch, etch-m68k, lenny, oldstable,
squeeze and stable to sid, and then, for the wheezy release,
reintroducing the symlink from stable to sid).

Unless you’ve got a better one, that is.

bye,
//mirabilos
-- 
Natureshadow Oh, ich hab mim Bauch Mittelklick gemacht, als ich nach dem
Kaffee gegriffen habe…
mirabilos Cool, ich hab ne neue eMail-Signatur
Natureshadow Sag doch sowas nich, wenn ich den Kaffee in der Hand habe!
Gib mir nen Lappen! Schnell! Das kommt aber nicht mit in die Signatur!


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Processed: Re: Bug#704744: pbuilder: umounts /{dev,run}/shm of the *host* system

2013-04-07 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 reassign 704744 debootstrap
Bug #704744 [pbuilder] pbuilder: umounts /{dev,run}/shm of the *host* system
Bug reassigned from package 'pbuilder' to 'debootstrap'.
No longer marked as found in versions pbuilder/0.215.
Ignoring request to alter fixed versions of bug #704744 to the same values 
previously set
 found 704744 debootstrap/1.0.48
Bug #704744 [debootstrap] pbuilder: umounts /{dev,run}/shm of the *host* system
Marked as found in versions debootstrap/1.0.48.
 retitle 704744 debootstrap: umounts /{dev,run}/shm of the *host* system
Bug #704744 [debootstrap] pbuilder: umounts /{dev,run}/shm of the *host* system
Changed Bug title to 'debootstrap: umounts /{dev,run}/shm of the *host* system' 
from 'pbuilder: umounts /{dev,run}/shm of the *host* system'
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
704744: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=704744
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#704940: subversion: cve-2013-1845 cve-2013-1846 cve-2013-1847 cve-2013-1849 cve-2013-1884

2013-04-07 Thread Michael Gilbert
package: src:subversion
severity: serious
version: 1.6.12dfsg-1
tag: security

The following security advisories were published for subversion.  I've
checked, and all versions of subversion in debian are affected.

http://subversion.apache.org/security/CVE-2013-1845-advisory.txt
http://subversion.apache.org/security/CVE-2013-1846-advisory.txt
http://subversion.apache.org/security/CVE-2013-1847-advisory.txt
http://subversion.apache.org/security/CVE-2013-1849-advisory.txt
http://subversion.apache.org/security/CVE-2013-1884-advisory.txt

Best wishes,
Mike


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#704669: marked as done (kdelibs-bin: unable to install kdelibs-bin=4:4.10.2-1 due to issues with kdelibs4c2a)

2013-04-07 Thread Debian Bug Tracking System
Your message dated Mon, 08 Apr 2013 00:48:36 +
with message-id e1up0gc-0004xx...@franck.debian.org
and subject line Bug#704669: fixed in kde4libs 4:4.10.2-2
has caused the Debian Bug report #704669,
regarding kdelibs-bin: unable to install kdelibs-bin=4:4.10.2-1 due to issues 
with kdelibs4c2a
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
704669: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=704669
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Package: kdelibs-bin
Version: 4:4.9.5-0r1
Justification: renders package unusable
Severity: grave

Dear Maintainer,
   Please change the severity of the bug depending on what
is/would be right. Anyways I tried installing the latest kdelibs-bin
and got caught with this :-

$ sudo aptitude install kdelibs-bin=4:4.10.2-1 libnepomukcore4=4:4.10.2-1 -y
The following packages will be upgraded:
  kdelibs-bin libnepomukcore4
The following partially installed packages will be configured:
  kdelibs5-dev kdelibs5-plugins nepomuk-core-runtime
2 packages upgraded, 0 newly installed, 0 to remove and 0 not upgraded.
Need to get 0 B/475 kB of archives. After unpacking 43.0 kB will be used.
The following packages have unmet dependencies:
 libnepomuksync4 : Depends: libnepomukcore4 (= 4:4.9.5-0r0) but
4:4.10.2-1 is to be installed.
The following actions will resolve these dependencies:

 Remove the following packages:
1) libnepomuksync4



The following packages will be REMOVED:
  libnepomuksync4{a}
The following packages will be upgraded:
  kdelibs-bin libnepomukcore4
The following partially installed packages will be configured:
  kdelibs5-dev kdelibs5-plugins nepomuk-core-runtime
2 packages upgraded, 0 newly installed, 1 to remove and 0 not upgraded.
Need to get 0 B/475 kB of archives. After unpacking 106 kB will be freed.
Retrieving bug reports... Done
Parsing Found/Fixed information... Done
(Reading database ... 550290 files and directories currently installed.)
Preparing to replace kdelibs-bin 4:4.9.5-0r1 (using
.../kdelibs-bin_4%3a4.10.2-1_amd64.deb) ...
D01: process_archive oldversionstatus=installed
Unpacking replacement kdelibs-bin ...
dpkg: error processing
/var/cache/apt/archives/kdelibs-bin_4%3a4.10.2-1_amd64.deb (--unpack):
 trying to overwrite '/usr/bin/ktelnetservice', which is also in
package kdelibs4c2a 4:3.5.10.dfsg.1-5
dpkg-deb: error: subprocess paste was killed by signal (Broken pipe)
Errors were encountered while processing:
 /var/cache/apt/archives/kdelibs-bin_4%3a4.10.2-1_amd64.deb
adequate: skipping kdelibs5-dev because it's not installed
adequate: skipping kdelibs5-plugins because it's not installed
adequate: skipping nepomuk-core-runtime because it's not installed
dpkg-query: no packages found matching kdeutils
dpkg-query: no packages found matching libxcb-damage0:amd64
dpkg-query: no packages found matching libakonadi-calendar4:amd64
dpkg-query: no packages found matching libkalarmcal2:amd64
dpkg-query: no packages found matching libkactivities-models1:amd64
dpkg-query: no packages found matching libnepomukwidgets4:amd64
dpkg-query: no packages found matching libkmbox4:amd64
dpkg-query: no packages found matching libakonadi-notes4:amd64
dpkg-query: no packages found matching qtchooser:amd64
dpkg-query -W: failed at /usr/bin/adequate line 165.
E: Problem executing scripts DPkg::Post-Invoke 'adequate --help
/dev/null 21 || exit 0; DEBIAN_FRONTEND=readline exec adequate
--debconf --user nobody --pending'
E: Sub-process returned an error code
E: Sub-process /usr/bin/dpkg returned an error code (1)
A package failed to install.  Trying to recover:
dpkg: dependency problems prevent configuration of kdelibs5-plugins:
 kdelibs5-plugins depends on kdelibs-bin (= 4:4.10.2-1); however:
  Version of kdelibs-bin on system is 4:4.9.5-0r1.

dpkg: error processing kdelibs5-plugins (--configure):
 dependency problems - leaving unconfigured
dpkg: dependency problems prevent configuration of nepomuk-core-runtime:
 nepomuk-core-runtime depends on libnepomukcore4 (= 4:4.10.2-1); however:
  Version of libnepomukcore4 on system is 4:4.9.5-0r0.

dpkg: error processing nepomuk-core-runtime (--configure):
 dependency problems - leaving unconfigured
dpkg: dependency problems prevent configuration of kdelibs5-dev:
 kdelibs5-dev depends on kdelibs-bin (= 4:4.10.2-1); however:
  Version of kdelibs-bin on system is 4:4.9.5-0r1.

dpkg: error processing kdelibs5-dev (--configure):
 dependency problems - leaving unconfigured
Errors were encountered while processing:
 kdelibs5-plugins
 nepomuk-core-runtime
 kdelibs5-dev

Looking at the 

Bug#704775: krb5: KDC TGS-REQ null deref (CVE-2013-1416)

2013-04-07 Thread Benjamin Kaduk

On Sat, 6 Apr 2013, Michael Gilbert wrote:


I'm not seeing any new kerberos releases:
http://web.mit.edu/kerberos/krb5-1.10


Current Kerberos Security Team policy is to not issue security advisories 
for null pointer dereference crashes.  We assign CVE numbers for tracking, 
but do not delay publishing a fix until a new point release is available.



Is this perhaps not meant to be public knowledge yet?


The patch is intentionally public.  Note that a user must be authenticated 
in order to trigger the crash.


-Ben


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#690128: marked as done (inn2: conffile disappearing during squeeze-wheezy upgrade: /etc/news/motd.news)

2013-04-07 Thread Debian Bug Tracking System
Your message dated Mon, 08 Apr 2013 03:32:43 +
with message-id e1up2p1-0002up...@franck.debian.org
and subject line Bug#690128: fixed in inn2 2.5.3-2
has caused the Debian Bug report #690128,
regarding inn2: conffile disappearing during squeeze-wheezy upgrade: 
/etc/news/motd.news
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
690128: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=690128
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Package: inn2
Version: 2.5.3-1
Severity: serious
User: debian...@lists.debian.org
Usertags: piuparts

Hi,

during a test with piuparts I noticed your package deletes a conffile
during the upgrade from squeeze to wheezy, debsums reports an error
afterwards:

1m24.8s ERROR: FAIL: debsums reports modifications inside the chroot:
  debsums: missing file /etc/news/motd.news (from inn2 package)

I couldn't find the deletion in the maintainer scripts, so it's probably
done by something something that is run from the maintainer scripts.

As the wheezy package no longer ships this file as a conffile, this looks
like an intentional deletion, but to do this properly and record it in
dpkg's database accordingly, please use
  dpkg-maintscript-helper rm_conffile
(ideally via debian/inn2.maintscript).


Andreas


inn2_2.5.3-1.log.gz
Description: GNU Zip compressed data
---End Message---
---BeginMessage---
Source: inn2
Source-Version: 2.5.3-2

We believe that the bug you reported is fixed in the latest version of
inn2, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 690...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Marco d'Itri m...@linux.it (supplier of updated inn2 package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.8
Date: Sun, 07 Apr 2013 21:43:24 +0200
Source: inn2
Binary: inn2 inn2-lfs inn2-inews inn2-dev
Architecture: source i386
Version: 2.5.3-2
Distribution: unstable
Urgency: low
Maintainer: Marco d'Itri m...@linux.it
Changed-By: Marco d'Itri m...@linux.it
Description: 
 inn2   - 'InterNetNews' news server
 inn2-dev   - libinn.a library, headers and man pages
 inn2-inews - NNTP client news injector, from InterNetNews (INN)
 inn2-lfs   - 'InterNetNews' news server (LFS version)
Closes: 685007 690128
Changes: 
 inn2 (2.5.3-2) unstable; urgency=low
 .
   * Fixed the fix for #652733, which totally broke pgpverify.
 (Closes: #685007)
   * Handle upstream renaming of our conffile /etc/news/motd.news to
 non-conffile /etc/news/motd.nnrpd. If it has not been modified by
 the admin then just remove it. Patch courtesy of Nick Leverton.
 (Closes: #690128)
Checksums-Sha1: 
 c85bc9e34d658d817e8cec218560c805486914de 1221 inn2_2.5.3-2.dsc
 61a88b3bd49fc63a39f23af916522cf0250226e2 27284 inn2_2.5.3-2.debian.tar.xz
 00ff422c8eed96db0a1cc065b529a3330397fd67 4261090 inn2_2.5.3-2_i386.deb
 597e84fde1708f81cf13eed34609ec420cfcc632 4356934 inn2-lfs_2.5.3-2_i386.deb
 0d9768d1991f714f77f656b682fdf36140f521e0 158184 inn2-inews_2.5.3-2_i386.deb
 5da223ee47fc6e6cb65d9abaef304789528d2739 323824 inn2-dev_2.5.3-2_i386.deb
Checksums-Sha256: 
 e3c0b601f66469709c0dc67fed38c9b2a43283a4a5e958db69ceac476662193a 1221 
inn2_2.5.3-2.dsc
 09d8e04392f5e40142d7beb5f41182ec403fafd893d714499a5793bf7a2a0344 27284 
inn2_2.5.3-2.debian.tar.xz
 585c971582a08a8228a454e808c63b01989c6044b048430db344f0be7e1ec56a 4261090 
inn2_2.5.3-2_i386.deb
 434b719b9107fa2ec7f9e7ec2158b762d9fe2be2d2d3cf5b53826defbf069157 4356934 
inn2-lfs_2.5.3-2_i386.deb
 0afc234c446ba757ec6f048af734fee0779e0a4e22e3bcb22fafec617a142747 158184 
inn2-inews_2.5.3-2_i386.deb
 a12de8c4f527b2ab896bd9991c6c5abc5a542d224d59528112b28e1b22ff4fc4 323824 
inn2-dev_2.5.3-2_i386.deb
Files: 
 fc5d8d8233d8b3b80e028927676d7818 1221 news extra inn2_2.5.3-2.dsc
 a4d7c87d787c83b747751cfc98380679 27284 news extra inn2_2.5.3-2.debian.tar.xz
 00b261fd9ba9081bed9c507f79c8dc9a 4261090 news extra inn2_2.5.3-2_i386.deb
 9573855382d0728631a54ab99dc7dcec 4356934 news extra inn2-lfs_2.5.3-2_i386.deb
 80a3ac56a459ad7e4551bbe86a94ce59 158184 news extra inn2-inews_2.5.3-2_i386.deb
 143195b8bc657aa823816d06fc7d 323824 devel extra inn2-dev_2.5.3-2_i386.deb

-BEGIN PGP 

Bug#704573: marked as done (libwebp: cve-2012-5127)

2013-04-07 Thread Debian Bug Tracking System
Your message dated Mon, 08 Apr 2013 04:03:08 +
with message-id e1up3is-00049k...@franck.debian.org
and subject line Bug#704573: fixed in libwebp 0.1.3-3+nmu1
has caused the Debian Bug report #704573,
regarding libwebp: cve-2012-5127
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
704573: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=704573
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Package: libwebp
Severity: serious
Version: 0.1.3-3
Tags: security

Hi,
the following vulnerability was published for libwebp.

CVE-2012-5127[0]:
| Integer overflow in Google Chrome before 23.0.1271.64 allows remote
| attackers to cause a denial of service (out-of-bounds read) or
| possibly have unspecified other impact via a crafted WebP image.

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities  Exposures) id in your changelog entry.

For further information see:

[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5127
http://security-tracker.debian.org/tracker/CVE-2012-5127
---End Message---
---BeginMessage---
Source: libwebp
Source-Version: 0.1.3-3+nmu1

We believe that the bug you reported is fixed in the latest version of
libwebp, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 704...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Michael Gilbert mgilb...@debian.org (supplier of updated libwebp package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Wed, 03 Apr 2013 02:54:20 +
Source: libwebp
Binary: libwebp-dev libwebp2 webp
Architecture: source amd64
Version: 0.1.3-3+nmu1
Distribution: unstable
Urgency: high
Maintainer: Jeff Breidenbach j...@debian.org
Changed-By: Michael Gilbert mgilb...@debian.org
Description: 
 libwebp-dev - Lossy compression of digital photographic images.
 libwebp2   - Lossy compression of digital photographic images.
 webp   - Lossy compression of digital photographic images.
Closes: 704573
Changes: 
 libwebp (0.1.3-3+nmu1) unstable; urgency=high
 .
   * Non-maintainer upload by the Security Team.
   * Fix cve-2012-5127: integer overflows in src/dec/webp.c (closes: #704573).
Checksums-Sha1: 
 ed83641241d320bc3dfc0afac39f63d810955549 2547 libwebp_0.1.3-3+nmu1.dsc
 ed3e209c51c5954f52a509077a322c32a34cc7cd 3552 
libwebp_0.1.3-3+nmu1.debian.tar.gz
 c9772f9085c62cce09e9249bfe63ecd3698cf66b 149714 
libwebp-dev_0.1.3-3+nmu1_amd64.deb
 cc650d4f837223cad69c8d634829f408f0281d91 113976 libwebp2_0.1.3-3+nmu1_amd64.deb
 d738053b39511633cce3329900c800e815043532 28498 webp_0.1.3-3+nmu1_amd64.deb
Checksums-Sha256: 
 ad0d61554cfd51903ead08a4708d26a717dfbb798b726cf9cd5977b01c643d58 2547 
libwebp_0.1.3-3+nmu1.dsc
 992fafcfd1eff4c71922e0e59707a7cc1d24f493ac73cb0a25b140562b3e4b57 3552 
libwebp_0.1.3-3+nmu1.debian.tar.gz
 9c837512864884f5afbb2ea36e7eb21758ffecf0763b8996c0264671a79704af 149714 
libwebp-dev_0.1.3-3+nmu1_amd64.deb
 f9467c3fa89086ed9f79e412ad54d407ac6bb941b5475775bf1bb16b68a1ac16 113976 
libwebp2_0.1.3-3+nmu1_amd64.deb
 9951fe6508ea3f18f03da37f81ba2634317f2d5ab80cf508d043e571d27e58dd 28498 
webp_0.1.3-3+nmu1_amd64.deb
Files: 
 31bd74268e6d7d8159142ec8e65ab5ac 2547 libs extra libwebp_0.1.3-3+nmu1.dsc
 bcf0e4990bc0af04d9f3282fd6e7a557 3552 libs extra 
libwebp_0.1.3-3+nmu1.debian.tar.gz
 0e7498b0b1ece7c8e7cc2f3ef11bc491 149714 libdevel extra 
libwebp-dev_0.1.3-3+nmu1_amd64.deb
 7c17b7c7310ae9b6989983cd90bbf417 113976 libs extra 
libwebp2_0.1.3-3+nmu1_amd64.deb
 e93fdd32bc9c6b0c219a46de09411e48 28498 graphics extra 
webp_0.1.3-3+nmu1_amd64.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.12 (GNU/Linux)
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Bug#690128: inn2: conffile disappearing during squeeze-wheezy upgrade: /etc/news/motd.news

2013-04-07 Thread Adam D. Barratt
Hi,

I was looking at the inn2 upload for an unblock, but...

On Wed, 2012-11-28 at 10:08 +, Nick Leverton wrote:
 Herewith the debdiff in the hope it makes reviewing easier - meant to
 append it previously, sorry.

+dpkg-maintscript-helper rm_conffile /etc/news/motd.news 2.5.3-1~ package -- 
$@

That (and the other similar calls) is wrong. From
dpkg-maintscript-helper(1):

_package_ is the package name. If empty or omitted, the
DPKG_MAINTSCRIPT_PACKAGE environment variable (as set by dpkg) will be
used.


Regards,

Adam


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#704940: marked as done (subversion: cve-2013-1845 cve-2013-1846 cve-2013-1847 cve-2013-1849 cve-2013-1884)

2013-04-07 Thread Debian Bug Tracking System
Your message dated Mon, 8 Apr 2013 07:30:31 +0200
with message-id 20130408053031.GA25253@elende
and subject line Re: Bug#704940: subversion: cve-2013-1845 cve-2013-1846 
cve-2013-1847 cve-2013-1849 cve-2013-1884
has caused the Debian Bug report #704940,
regarding subversion: cve-2013-1845 cve-2013-1846 cve-2013-1847 cve-2013-1849 
cve-2013-1884
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
704940: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=704940
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
package: src:subversion
severity: serious
version: 1.6.12dfsg-1
tag: security

The following security advisories were published for subversion.  I've
checked, and all versions of subversion in debian are affected.

http://subversion.apache.org/security/CVE-2013-1845-advisory.txt
http://subversion.apache.org/security/CVE-2013-1846-advisory.txt
http://subversion.apache.org/security/CVE-2013-1847-advisory.txt
http://subversion.apache.org/security/CVE-2013-1849-advisory.txt
http://subversion.apache.org/security/CVE-2013-1884-advisory.txt

Best wishes,
Mike
---End Message---
---BeginMessage---
Source: subversion
Source-Version: 1.7.9-1

Hi Mike, hi Peter

On Sun, Apr 07, 2013 at 08:22:26PM -0400, Michael Gilbert wrote:
 The following security advisories were published for subversion.  I've
 checked, and all versions of subversion in debian are affected.
 
 http://subversion.apache.org/security/CVE-2013-1845-advisory.txt
 http://subversion.apache.org/security/CVE-2013-1846-advisory.txt
 http://subversion.apache.org/security/CVE-2013-1847-advisory.txt
 http://subversion.apache.org/security/CVE-2013-1849-advisory.txt
 http://subversion.apache.org/security/CVE-2013-1884-advisory.txt

Adding closing and version information to the bug, as these where
fixed in subversion/1.7.9-1 upload.

Peter are you working already also on the updates for Wheezy and
Squeeze?

Regards,
Salvatore---End Message---