Processed: pending python upload

2008-11-12 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]: tag 504619 + pending Bug#504619: python2.5: CVE-2008-4864 multiple integer overflows in imageop module Tags were: patch security Tags added: pending tag 504620 + pending Bug#504620: python2.4: CVE-2008-4864 multiple integer overflows in imageop

Bug#504977: ffmpeg-debian: Several security issues

2008-11-12 Thread Reinhard Tartler
Reinhard Tartler [EMAIL PROTECTED] writes: CVE-2008-4869[0]: | FFmpeg 0.4.9, as used by MPlayer, allows context-dependent attackers | to cause a denial of service (memory consumption) via unknown vectors, | aka a Tcp/udp memory leak. you asked me later to ignore this. ok. I'm sorry but I

Bug#504167: Still Present in 2.6.26-10 (Re: Bug: #504167 linux-2.6 - regression: fails to unblank on resume)

2008-11-12 Thread Mark Purcell
Package: linux-image-2.6.26-1-686 Version: 2.6.26-10 Followup-For: Bug #504167 Reporting this issue is also confirmed with 2.6.26-10. Mark -- Package-specific info: -- System Information: Debian Release: lenny/sid APT prefers unstable APT policy: (500, 'unstable'), (500, 'testing'), (1,

Bug#501809: marked as done ([libg3d0] fails to load ieee floats on big endian systems)

2008-11-12 Thread Debian Bug Tracking System
Your message dated Wed, 12 Nov 2008 12:53:04 +0100 with message-id [EMAIL PROTECTED] and subject line Done: [libg3d0] fails to load ieee floats on big endian systems has caused the Debian Bug report #501809, regarding [libg3d0] fails to load ieee floats on big endian systems to be marked as done.

Processed: Re: Bug#505325: typo3-src-4.2: Cross-Site Scripting (XSS) in sysext felogin

2008-11-12 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]: found 505325 4.2.1-3 Bug#505325: typo3-src-4.2: Cross-Site Scripting (XSS) in sysext felogin Bug marked as found in version 4.2.1-3. found 505325 4.2.2-1 Bug#505325: typo3-src-4.2: Cross-Site Scripting (XSS) in sysext felogin Bug marked as found in

Bug#505279: libgnutls26: segfault in _gnutls_x509_crt_get_raw_dn2

2008-11-12 Thread Nikos Mavrogiannopoulos
On Wed, Nov 12, 2008 at 12:15 PM, Simon Josefsson [EMAIL PROTECTED] wrote: You mean just removing this code snippet instead of moving it? /* Check if the last certificate in the path is self signed. * In that case ignore it (a certificate is trusted only if it * leads to a trusted

Bug#463030: upgrading #463030

2008-11-12 Thread Eugene V. Lyubimkin
package apt severity 463030 serious tags 463030 +pending thanks This bug qualifies as RC one. -- Eugene V. Lyubimkin aka JackYF, JID: jackyf.devel(maildog)gmail.com Ukrainian C++ Developer, Debian APT contributor signature.asc Description: OpenPGP digital signature

Processed: upgrading #463030

2008-11-12 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]: package apt Ignoring bugs not assigned to: apt severity 463030 serious Bug#463030: apt =0.7.7 break menu update mechanism Severity set to `serious' from `important' tags 463030 +pending Bug#463030: apt =0.7.7 break menu update mechanism There were

Bug#505459: sugar-hulahop: hulahop_get_view_for_window implicitly converted to pointer

2008-11-12 Thread dann frazier
Package: sugar-hulahop Version: 0.4.7~dfsg-1 Severity: serious Tags: patch Usertags: implicit-pointer-conversion Our automated buildd log filter[1] detected a problem that is likely to cause your package to segfault on architectures where the size of a pointer is greater than the size of an

Processed: [icecc-monitor] no host or scheduler found

2008-11-12 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]: severity 504380 normal Bug#504380: [icecc-monitor] no host or scheduler found Severity set to `normal' from `grave' thanks Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator,

Bug#505325: marked as done (typo3-src-4.2: Cross-Site Scripting (XSS) in sysext felogin)

2008-11-12 Thread Debian Bug Tracking System
Your message dated Wed, 12 Nov 2008 14:02:05 + with message-id [EMAIL PROTECTED] and subject line Bug#505325: fixed in typo3-src 4.2.3-1 has caused the Debian Bug report #505325, regarding typo3-src-4.2: Cross-Site Scripting (XSS) in sysext felogin to be marked as done. This means that you

Processed: found 505399 in 0.6-1

2008-11-12 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]: found 505399 0.6-1 Bug#505399: SA32651: OptiPNG BMP Reader Buffer Overflow Vulnerability Bug marked as found in version 0.6-1. End of message, stopping processing here. Please contact me if you need assistance. Debian bug tracking system

Processed: Re: Bug#505326: typo3-src: User account passwords cannot be changed in backend

2008-11-12 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]: found 505326 4.2.1-3 Bug#505326: typo3-src: User account passwords cannot be changed in backend Bug marked as found in version 4.2.1-3. found 505326 4.2.2-1 Bug#505326: typo3-src: User account passwords cannot be changed in backend Bug marked as found

Processed: severity of 504483 is important

2008-11-12 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]: severity 504483 important Bug#504483: iceweasel hangs when restoring bookmarks Severity set to `important' from `grave' End of message, stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator

Processed: Re: Bug#505279: libgnutls26: segfault in _gnutls_x509_crt_get_raw_dn2

2008-11-12 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]: tags 505279 + patch Bug#505279: libgnutls26: segfault in _gnutls_x509_crt_get_raw_dn2 There were no tags set. Tags added: patch tags 424763 - patch Bug#424763: need for an easy/quick print dialog not hidden in the image editor Tags were: patch wontfix

Bug#503713: Investigating Lenny release blocker bug: #503713

2008-11-12 Thread Sebastiaan Couwenberg
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Christian Perrier wrote: Quoting José Luis Tallón ([EMAIL PROTECTED]): José Luis, any plans to prepare an upload? I'd be happy to sponsor it if needed as fixing two RC bugs during this week-end would continue my one RC bug per week-end series...

Bug#494936: possible solution

2008-11-12 Thread Bjoern Metzdorf
Hi, I've encountered the exact same bug, but I could circumvent the issue by removing the need to load bnx2 in the initrd: remove bnx2 from /etc/initramfs-tools/modules update-initramfs -u Now it works, but loading bnx2 in the initrd still fails. Regards, Bjoern -- To UNSUBSCRIBE, email

Bug#503713: Investigating Lenny release blocker bug: #503713

2008-11-12 Thread José Luis Tallón
Sebastiaan Couwenberg wrote: Christian Perrier wrote: Quoting José Luis Tallón ([EMAIL PROTECTED]): José Luis, any plans to prepare an upload? I'd be happy to sponsor it if needed as fixing two RC bugs during this week-end would continue my one RC bug per week-end series...

Bug#470882: /dev/gpmctl freezes acknowledge

2008-11-12 Thread Gerfried Fuchs
* Samuel Thibault [EMAIL PROTECTED] [2008-11-11 22:24:53 CET]: The problem is that you both want a mouse on the text console and a mouse in X. The correct way is to use a repeater: gpm reads /dev/input/mice, and repeats to X. Now, gpm tries to play nice with X servers that would read

Bug#504726: pre-approving universalindentgui/0.8.1-1.1

2008-11-12 Thread Thomas Schweitzer
2008/11/11 Eddy Petrișor [EMAIL PROTECTED] wrote: 2008/11/10 Thomas Schweitzer [EMAIL PROTECTED]: Concerning bug#504726 I am not sure what's the problem with that? Why is there a risk to create a static (where static only means that the name will never change) subdir for temporary data? When

Bug#505445: cpio core dumps

2008-11-12 Thread Nigel Horne
Package: cpio Version: 2.9-14 Severity: grave Justification: renders package unusable [EMAIL PROTECTED]:~/gateway$ find src/clamav-devel/trunk | cpio -pdu $HOME Segmentation fault [EMAIL PROTECTED]:~/gateway$ -- System Information: Debian Release: lenny/sid APT prefers unstable APT policy:

Bug#502760: claims of £1,350.000

2008-11-12 Thread SARAH
E-mail([EMAIL PROTECTED]) for the claims of £1,350.000 pounds in the Irish-Promo claims Requirement: Name, Occupation, Address, Tel: -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]

Bug#503330: please allow websvn updates into stable and testing

2008-11-12 Thread Pierre Chifflier
Hi, These two updates occurs after a discussion with websvn upstream, to validate the corrections. Security problem is described at: http://www.gulftech.org/?node=researcharticle_id=00132-10202008 (I haven't found any related CVE, but a Secunia advisory: http://secunia.com/advisories/32338/ )

Bug#504380: [icecc-monitor] no host or scheduler found

2008-11-12 Thread Fathi BOUDRA
severity 504380 normal thanks Hi, Until a proper fix is found, use: $ USE_SCHEDULER=host icemon Cheers, Fathi -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]

Bug#505279: libgnutls26: segfault in _gnutls_x509_crt_get_raw_dn2

2008-11-12 Thread Simon Josefsson
Nikos Mavrogiannopoulos [EMAIL PROTECTED] writes: 1) Remove the code. Fixes both crash and vulnerability. My suggestion is to remove the offending code. Thanks. I'll prepare a 2.6.2 release. /Simon -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble?

Bug#505439: kqemu-source: Fails to build under amd64

2008-11-12 Thread Chris Mortimore
Package: kqemu-source Version: 1.3.0~pre9-12 Severity: grave Tags: patch Justification: renders package unusable When running the following: $ m-a -t build kqemu SNIP # Build the module ./configure --kernel-path=/lib/modules/2.6.24-etchnhalf.1-amd64/build Source path

Bug#503330: marked as done (Multiple Vulnerabilities (xss, insecure file handling and code execution))

2008-11-12 Thread Debian Bug Tracking System
Your message dated Wed, 12 Nov 2008 12:32:05 + with message-id [EMAIL PROTECTED] and subject line Bug#503330: fixed in websvn 2.0-4 has caused the Debian Bug report #503330, regarding Multiple Vulnerabilities (xss, insecure file handling and code execution) to be marked as done. This means

Bug#505279: libgnutls26: segfault in _gnutls_x509_crt_get_raw_dn2

2008-11-12 Thread Michael Meskes
On Tue, Nov 11, 2008 at 04:55:57PM +0100, Simon Josefsson wrote: I think we have identified the problem, see: http://thread.gmane.org/gmane.comp.encryption.gpg.gnutls.devel/3216/focus=3230 That patch at least solves the vulnerability and the crash, so possibly it could be uploaded to

Bug#463030: marked as done (apt =0.7.7 break menu update mechanism)

2008-11-12 Thread Debian Bug Tracking System
Your message dated Wed, 12 Nov 2008 17:17:03 + with message-id [EMAIL PROTECTED] and subject line Bug#463030: fixed in apt 0.7.19~exp1 has caused the Debian Bug report #463030, regarding apt =0.7.7 break menu update mechanism to be marked as done. This means that you claim that the problem

Bug#505446: mlocate always creates empty database

2008-11-12 Thread Adeodato Simó
* Nigel Horne [Wed, 12 Nov 2008 13:18:56 +]: Hello, Package: mlocate Version: 0.21.1-1 Severity: grave Justification: renders package unusable /usr/bin/updatedb.mlocate always creates an empty database: -rw-r- 1 root mlocate 235 2008-11-12 13:09 mlocate.db It returns no error

Bug#505446: mlocate always creates empty database

2008-11-12 Thread Nigel Horne
Package: mlocate Version: 0.21.1-1 Severity: grave Justification: renders package unusable /usr/bin/updatedb.mlocate always creates an empty database: -rw-r- 1 root mlocate 235 2008-11-12 13:09 mlocate.db It returns no error status, prints no error message and immediately returns with no

Bug#505360: libgnutls26: CVE-2008-4989 security flaw in certificate chain verification

2008-11-12 Thread Andreas Metzler
# On 2008-11-11 Michael Gilbert [EMAIL PROTECTED] wrote: # Package: libgnutls26 # Version: 2.4.2-2 # Severity: grave # Tags: security # Justification: user security hole # # redhat has just released an update that fixes a security flaw in gnutls [1]. # the CVE page [2] indicates that the

Bug#470882: /dev/gpmctl freezes acknowledge

2008-11-12 Thread Samuel Thibault
Gerfried Fuchs, le Wed 12 Nov 2008 14:43:19 +0100, a écrit : The unfortunate effect here is that it waits without handling clients. The attached patch fixes that: when not in text mode, the mouse is closed, but the select() loop continues. I had to change the timeout of select, I have

Processed: Re: Bug#505439: kqemu-source: Fails to build under amd64

2008-11-12 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]: severity 505439 important Bug#505439: kqemu-source: Fails to build under amd64 Severity set to `important' from `grave' thanks Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator

Processed: template toolkit

2008-11-12 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]: clone 504373 -1 Bug#504373: libtemplate-perl: Upgrade from etch breaks code using DBI plugins Bug 504373 cloned as bug 505471. reassign -1 ftp.debian.org Bug#505471: libtemplate-perl: Upgrade from etch breaks code using DBI plugins Bug reassigned from

Bug#504373: template toolkit

2008-11-12 Thread Dominic Hargreaves
clone 504373 -1 reassign -1 ftp.debian.org retitle -1 Please process libtemplate-plugin-dbi-perl from NEW thanks -- Dominic Hargreaves | http://www.larted.org.uk/~dom/ PGP key 5178E2A5 from the.earth.li (keyserver,web,email) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of

Bug#505279: marked as done (libgnutls26: segfault in _gnutls_x509_crt_get_raw_dn2)

2008-11-12 Thread Debian Bug Tracking System
Your message dated Wed, 12 Nov 2008 18:47:05 + with message-id [EMAIL PROTECTED] and subject line Bug#505279: fixed in gnutls26 2.4.2-3 has caused the Debian Bug report #505279, regarding libgnutls26: segfault in _gnutls_x509_crt_get_raw_dn2 to be marked as done. This means that you claim

Bug#505459: [Debian-olpc-devel] Bug#505459: sugar-hulahop: hulahop_get_view_for_window implicitly converted to pointer

2008-11-12 Thread Morgan Collett
Logged upstream as http://dev.sugarlabs.org/ticket/20 -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]

Processed: Re: rancid-core: subprocess post-installation script returned error exit status 1

2008-11-12 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]: tags 493988 patch Bug#493988: rancid-core: subprocess post-installation script returned error exit status 1 There were no tags set. Tags added: patch thanks Stopping processing here. Please contact me if you need assistance. Debian bug tracking

Bug#493988: rancid-core: subprocess post-installation script returned error exit status 1

2008-11-12 Thread Evgeni Golov
tags 493988 patch thanks Hi, attached you find a simple patch which will modify rancid-core.postinst to call adduser only when the rancid user does not exist (that won't change the UID/GID to a system-one, but should still work fine). regards Evgeni diff -u rancid-2.3.2~a8/debian/changelog

Bug#505473: crashes when viewing www.eroski.es

2008-11-12 Thread Santiago Garcia Mantinan
Package: mozilla-plugin-gnash Version: 0.8.3-6 Severity: grave Hi! I've been testing gnash for some time and found that the version in testing crashes when entering www.eroski.es (machine using testing with linux kernel from testing, arch i386) I had gnash set to pause on load. I have upgraded

Processed: Re: Bug#505242: subversion: segfault when fetching external reference

2008-11-12 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]: reassign 505242 libgnutls26 Bug#505242: subversion: segfault when fetching external reference Bug reassigned from package `subversion' to `libgnutls26'. forcemerge 505279 505242 Bug#505279: libgnutls26: segfault in _gnutls_x509_crt_get_raw_dn2

Bug#505096: Acknowledgement (ndiswrapper-source: system freezes shortly after loading module)

2008-11-12 Thread alex
On Tue, Nov 11, 2008 at 07:37:50AM +0100, Julian Andres Klode wrote: On Tue, Nov 11, 2008 at 12:40:52AM +, alex wrote: After some fiddling it seems that if i disable USB2.0 (a bios option - as a result the ehci_hcd driver is not loaded) the freezing problem disappears. This is a 5yr

Processed: tagging 493988

2008-11-12 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]: # Automatically generated email from bts, devscripts version 2.10.35 tags 493988 + pending Bug#493988: rancid-core: subprocess post-installation script returned error exit status 1 Tags were: patch Tags added: pending End of message, stopping

Bug#505478: CVE-2008-5030: Buffer overflow

2008-11-12 Thread Moritz Muehlenhoff
Package: libcdaudio Severity: grave Tags: security Justification: user security hole Hi Daniel, please see http://www.openwall.com/lists/oss-security/2008/11/05/1 http://www.openwall.com/lists/oss-security/2008/11/07/1 I'm attaching the dpatch I'm using for stable-security for your convenience.

Bug#505279: libgnutls26: segfault in _gnutls_x509_crt_get_raw_dn2

2008-11-12 Thread Simon Josefsson
Michael Meskes [EMAIL PROTECTED] writes: On Tue, Nov 11, 2008 at 04:55:57PM +0100, Simon Josefsson wrote: I think we have identified the problem, see: http://thread.gmane.org/gmane.comp.encryption.gpg.gnutls.devel/3216/focus=3230 That patch at least solves the vulnerability and the crash,

Bug#505478: CVE-2008-5030: Buffer overflow

2008-11-12 Thread Daniel Baumann
Moritz Muehlenhoff wrote: Package: libcdaudio Severity: grave Tags: security Justification: user security hole Hi Daniel, please see http://www.openwall.com/lists/oss-security/2008/11/05/1 http://www.openwall.com/lists/oss-security/2008/11/07/1 I'm attaching the dpatch I'm using for

Bug#505478: marked as done (CVE-2008-5030: Buffer overflow)

2008-11-12 Thread Debian Bug Tracking System
Your message dated Wed, 12 Nov 2008 21:47:04 + with message-id [EMAIL PROTECTED] and subject line Bug#505478: fixed in libcdaudio 0.99.12p2-7 has caused the Debian Bug report #505478, regarding CVE-2008-5030: Buffer overflow to be marked as done. This means that you claim that the problem

Bug#505478: CVE-2008-5030: Buffer overflow

2008-11-12 Thread Luk Claes
Daniel Baumann wrote: Moritz Muehlenhoff wrote: Package: libcdaudio Severity: grave Tags: security Justification: user security hole Hi Daniel, please see http://www.openwall.com/lists/oss-security/2008/11/05/1 http://www.openwall.com/lists/oss-security/2008/11/07/1 I'm attaching the

Bug#503878: [Pkg-fglrx-devel] Bug#503878: fglrx-atieventsd: authatieventsd.sh uses finger without depending on it and is unreliable

2008-11-12 Thread Adeodato Simó
* Mark Purcell [Sun, 09 Nov 2008 19:44:05 +1100]: Hello, In this context Romain suggested that he only upload the fixed package to lenny and upload a new package to sid: ! fix the package in lenny, as well as uploading a new package for sid I was suggesting that he upload the fixed

Bug#505399: marked as done (SA32651: OptiPNG BMP Reader Buffer Overflow Vulnerability)

2008-11-12 Thread Debian Bug Tracking System
Your message dated Wed, 12 Nov 2008 21:47:06 + with message-id [EMAIL PROTECTED] and subject line Bug#505399: fixed in optipng 0.6.1.1-1 has caused the Debian Bug report #505399, regarding SA32651: OptiPNG BMP Reader Buffer Overflow Vulnerability to be marked as done. This means that you

Bug#503878: [Pkg-fglrx-devel] Bug#503878: fglrx-atieventsd: authatieventsd.sh uses finger without depending on it and is unreliable

2008-11-12 Thread Adeodato Simó
* Romain Beauxis [Sat, 08 Nov 2008 18:44:33 +0100]: Le Saturday 08 November 2008 11:51:25 Adeodato Simó, vous avez écrit : I don't think a new upstream version is going to be appropriate, but we can talk about it later when this bug is fixed in Lenny. I don't like the idea of uploading the

Bug#505473: crashes when viewing www.eroski.es

2008-11-12 Thread Miriam Ruiz
--- El mié, 12/11/08, Santiago Garcia Mantinan [EMAIL PROTECTED] escribió: I've been testing gnash for some time and found that the version in testing crashes when entering www.eroski.es (machine using testing with linux kernel from testing, arch i386) I had gnash set to pause on load. I

Bug#504726: pre-approving universalindentgui/0.8.1-1.1

2008-11-12 Thread Adeodato Simó
* Thomas Schweitzer [Wed, 12 Nov 2008 11:47:53 +0100]: Oh, I see. There are such evil people out there? ;-) Ok I never had such a way of abuse on my mind, so I didn't care about that. The next version 1.0.3 will have that fixed and I will send the package to Marcela Tiznado so she can

Bug#505279: libgnutls26: segfault in _gnutls_x509_crt_get_raw_dn2

2008-11-12 Thread Fathi BOUDRA
tags 424763 + patch thanks Hi, Thanks to Simon for the pointer. Please find attached a debdiff for the bug. cheers, Fathi diff -u gnutls26-2.4.2/debian/changelog gnutls26-2.4.2/debian/changelog --- gnutls26-2.4.2/debian/changelog +++ gnutls26-2.4.2/debian/changelog @@ -1,3 +1,11 @@

Bug#504619: marked as done (python2.5: CVE-2008-4864 multiple integer overflows in imageop module)

2008-11-12 Thread Debian Bug Tracking System
Your message dated Wed, 12 Nov 2008 22:17:12 + with message-id [EMAIL PROTECTED] and subject line Bug#504619: fixed in python2.5 2.5.2-12 has caused the Debian Bug report #504619, regarding python2.5: CVE-2008-4864 multiple integer overflows in imageop module to be marked as done. This means

Bug#505324: marked as done (typo3-src: Cross-Site Scripting (XSS) in BE module fileadmin)

2008-11-12 Thread Debian Bug Tracking System
Your message dated Wed, 12 Nov 2008 14:02:05 + with message-id [EMAIL PROTECTED] and subject line Bug#505324: fixed in typo3-src 4.2.3-1 has caused the Debian Bug report #505324, regarding typo3-src: Cross-Site Scripting (XSS) in BE module fileadmin to be marked as done. This means that you

Bug#505326: marked as done (typo3-src: User account passwords cannot be changed in backend)

2008-11-12 Thread Debian Bug Tracking System
Your message dated Wed, 12 Nov 2008 14:02:05 + with message-id [EMAIL PROTECTED] and subject line Bug#505326: fixed in typo3-src 4.2.3-1 has caused the Debian Bug report #505326, regarding typo3-src: User account passwords cannot be changed in backend to be marked as done. This means that

Processed: Re: Bug#505360: libgnutls26: CVE-2008-4989 security flaw in certificate chain verification

2008-11-12 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]: # On 2008-11-11 Michael Gilbert [EMAIL PROTECTED] wrote: # Package: libgnutls26 # Version: 2.4.2-2 # Severity: grave # Tags: security # Justification: user security hole # # redhat has just released an update that fixes a security flaw in

Bug#505279: libgnutls26: segfault in _gnutls_x509_crt_get_raw_dn2

2008-11-12 Thread Simon Josefsson
Michael Meskes [EMAIL PROTECTED] writes: On Tue, Nov 11, 2008 at 04:55:57PM +0100, Simon Josefsson wrote: I think we have identified the problem, see: http://thread.gmane.org/gmane.comp.encryption.gpg.gnutls.devel/3216/focus=3230 That patch at least solves the vulnerability and the crash,

Bug#493768: intent to NMU

2008-11-12 Thread dann frazier
hey, As these bugs have been open with a patch for over a month and without a rejection from the maintainer, I intend to NMU the associated package in a week's time (or sooner, if requested by the maintainer). If you do not wish for this NMU to occur, please send a follow-up in the bug report

Bug#505490: ocaml-batteries_0.20081112+gitBB342A7-1(hppa/experimental): FTBFS: Failure: Cannot find ocamlbuildlib.cmxa

2008-11-12 Thread Frank Lichtenheld
Package: ocaml-batteries Version: 0.20081112+gitBB342A7-1 Severity: serious Hi, your package failed to build from source. | Automatic build of ocaml-batteries_0.20081112+gitBB342A7-1 on meitner by sbuild/hppa 98-farm | Build started at 20081112-1342

Bug#503632: Python scripts load modules from current directory

2008-11-12 Thread Alex Romosan
as intended, i guess, this patch breaks loading modules from the current directory but i have scripts that need to load extra modules from the current directory. how does one do it now? i've modified my scripts to do import sys sys.path.append(.) import Module but this seems silly. shouldn't

Processed: notfound 504167 in 2.6.26-8

2008-11-12 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]: notfound 504167 2.6.26-8 Bug#504167: linux-2.6 - regression: fails to unblank on resume Bug no longer marked as found in version 2.6.26-8. End of message, stopping processing here. Please contact me if you need assistance. Debian bug tracking system

Processed: found 504167 in 2.6.26-8

2008-11-12 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]: found 504167 2.6.26-8 Bug#504167: linux-2.6 - regression: fails to unblank on resume Bug marked as found in version 2.6.26-8. End of message, stopping processing here. Please contact me if you need assistance. Debian bug tracking system

Bug#470882: /dev/gpmctl freezes acknowledge

2008-11-12 Thread Samuel Thibault
clone 470882 retitle -1 pdmenu should check the value returned by Gpm_GetEvent() reassign -1 pdmenu thanks Reading the documentation of Gpm_GetEvent: « It returns 1 on success, -1 on failure, and 0 after closing the connection. » pdmenu doesn't properly check that. It should. Patch attached.

Processed: unmerging 470882, cloning 470882 ..., reassign -1 to pdmenu, merging 470882 476431

2008-11-12 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]: # Automatically generated email from bts, devscripts version 2.10.35 unmerge 470882 Bug#470882: gpm freezes and makes other applications freeze/segfault Bug#476431: gpm makes apps hang if running; they run normally if stopped Disconnected #470882 from

Bug#505473: crashes when viewing www.eroski.es

2008-11-12 Thread John Talbut
Interestin. I just checked this out of curiosity and the site worked fine for me. I am using Testing with a 2.6.26 kernal that I have compiled. John -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]

Processed: tagging as pending bugs that are closed by packages in NEW

2008-11-12 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]: # Thu Nov 13 07:03:23 UTC 2008 # Tagging as pending bugs that are closed by packages in NEW # http://ftp-master.debian.org/new.html # # Source package in NEW: arpack tags 491794 + pending Bug#491794: arpack: DFSG-incompatible license There were no