Bug#606591: dtc-xen tries to create symlinks in /usr/lib/xen and /usr/lib/python2.5/site-packages/xen and fails

2010-12-10 Thread Thomas Goirand
Package: dtc-xen Version: 0.5.13-2 Severity: serious Tags: squeeze As per the subject, the symlinks creation breaks the upgrade from Lenny. This should be removed completely. Cheers, Thomas Goirand (zigo) -- System Information: Debian Release: squeeze/sid APT prefers testing APT policy:

Bug#606592: xen-qemu-dm-4.0 tries to create a symlink in /usr/lib/xen

2010-12-10 Thread Thomas Goirand
Package: xen-qemu-dm-4.0 Version: 4.0.1-1 Severity: serious Tags: squeeze The symlink creation should be removed completely, because it's preventing upgrades from Lenny. -- System Information: Debian Release: squeeze/sid APT prefers testing APT policy: (500, 'testing') Architecture: amd64

Bug#606534: Subject: install fail asterisk 1:1.6.2.0~dfsg~beta3-1 Debian unstable. insserv: Service zaptel has to be enabled to start service asterisk

2010-12-10 Thread Tzafrir Cohen
forcemerge 552604 60653 thanks Hi, the issue has already been fixed. On Fri, Dec 10, 2010 at 12:49:16AM +, techy techtech wrote: Package: asterisk Version: 1:1.6.2.0~dfsg~beta3-1 and: 1.6.2.0~dfsg~rc1-1 Those versions are quite old. Justification: renders package unusable

Bug#606371: severity

2010-12-10 Thread Andreas Jacob
Hi Modestas You are right. Grave might be a little bit to excessive. You can feel free to downgrad the severity. But for me the package is actually not usable. Because I can not configure/add any instant messaging account. An an instant messenger, where you can not add your accounts is some kind

Bug#606586: Bug#606563: mumble-server: affected by privilege escalation vulnerability in logrotate

2010-12-10 Thread Patrick Matthäi
Am 10.12.2010 03:10, schrieb Florian Zumbiehl: Package: mumble-server Version: 1.1.8-2 Severity: grave Justification: privilege escalation vulnerability Tags: security There was a privilege escalation vulnerability in logrotate that I reported about four years ago and which finally got fixed in

Bug#606595: bacula-common: affected by privilege escalation vulnerability in logrotate

2010-12-10 Thread Florian Zumbiehl
Package: bacula-common Version: 2.4.4-1 Severity: grave Justification: privilege escalation vulnerability Tags: security There was a privilege escalation vulnerability in logrotate that I reported about four years ago and which finally got fixed in testing rouhgly one year ago (see bug #388608).

Bug#606543: clamav-freshclam: affected by privilege escalation vulnerability in logrotate

2010-12-10 Thread Michael Tautschnig
(CC'ed debian-devel as this was a not-so-well coordinated MBF without announcement to debian-devel, dd-list, usertags; so maybe at least further discussion can happen there) Hi Florian, [...] These lines from this package's maintainer scripts suggest that it likely is affected by the

Bug#606596: binkd: affected by privilege escalation vulnerability in logrotate

2010-12-10 Thread Florian Zumbiehl
Package: binkd Version: 0.9.9+rel-2 Severity: grave Justification: privilege escalation vulnerability Tags: security There was a privilege escalation vulnerability in logrotate that I reported about four years ago and which finally got fixed in testing rouhgly one year ago (see bug #388608). In

Bug#606599: mrtg: affected by privilege escalation vulnerability in logrotate

2010-12-10 Thread Florian Zumbiehl
Package: mrtg Version: 2.16.2-4 Severity: grave Justification: privilege escalation vulnerability Tags: security There was a privilege escalation vulnerability in logrotate that I reported about four years ago and which finally got fixed in testing rouhgly one year ago (see bug #388608). In lenny

Bug#606600: pyicqt: affected by privilege escalation vulnerability in logrotate

2010-12-10 Thread Florian Zumbiehl
Package: pyicqt Version: 0.8.1.3-2 Severity: grave Justification: privilege escalation vulnerability Tags: security There was a privilege escalation vulnerability in logrotate that I reported about four years ago and which finally got fixed in testing rouhgly one year ago (see bug #388608). In

Bug#606598: net-acct: affected by privilege escalation vulnerability in logrotate

2010-12-10 Thread Florian Zumbiehl
Package: net-acct Version: 0.71-8 Severity: grave Justification: privilege escalation vulnerability Tags: security There was a privilege escalation vulnerability in logrotate that I reported about four years ago and which finally got fixed in testing rouhgly one year ago (see bug #388608). In

Bug#606601: mysql-server-5.0: affected by privilege escalation vulnerability in logrotate

2010-12-10 Thread Florian Zumbiehl
Package: mysql-server-5.0 Version: 5.0.51a-24+lenny1 Severity: grave Justification: privilege escalation vulnerability Tags: security There was a privilege escalation vulnerability in logrotate that I reported about four years ago and which finally got fixed in testing rouhgly one year ago (see

Bug#606602: lighttpd: affected by privilege escalation vulnerability in logrotate

2010-12-10 Thread Florian Zumbiehl
Package: lighttpd Version: 1.4.23-3 Severity: grave Justification: privilege escalation vulnerability Tags: security There was a privilege escalation vulnerability in logrotate that I reported about four years ago and which finally got fixed in testing rouhgly one year ago (see bug #388608). In

Bug#606597: tinyhoneypot: affected by privilege escalation vulnerability in logrotate

2010-12-10 Thread Florian Zumbiehl
Package: tinyhoneypot Version: 0.4.6-8 Severity: grave Justification: privilege escalation vulnerability Tags: security There was a privilege escalation vulnerability in logrotate that I reported about four years ago and which finally got fixed in testing rouhgly one year ago (see bug #388608).

Bug#606554: aolserver4: affected by privilege escalation vulnerability in logrotate

2010-12-10 Thread Francesco P. Lovergine
On Fri, Dec 10, 2010 at 03:10:19AM +0100, Florian Zumbiehl wrote: Package: aolserver4 Version: 4.5.0-16.1 Severity: grave Justification: privilege escalation vulnerability Tags: security --- chown -R www-data:www-data

Bug#606590: [Pkg-xen-devel] Bug#606590: Upgrading from Lenny leaves xen-hypervisor-3.2-1-amd64 in and doesn't install 4.0

2010-12-10 Thread Bastian Blank
severity 606590 important thanks On Fri, Dec 10, 2010 at 03:55:09PM +0800, Thomas Goirand wrote: Upgrading from Lenny to Squeeze left my box with xen-hypervisor-3.2-1-amd64 installed, and I had to apt-get install xen-hypervisor-4.0-amd64 manually to have it installed after a dist-upgrade. This

Processed: Re: [Pkg-xen-devel] Bug#606590: Upgrading from Lenny leaves xen-hypervisor-3.2-1-amd64 in and doesn't install 4.0

2010-12-10 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: severity 606590 important Bug #606590 [xen-hypervisor-4.0-amd64] Upgrading from Lenny leaves xen-hypervisor-3.2-1-amd64 in and doesn't install 4.0 Severity set to 'important' from 'serious' thanks Stopping processing here. Please contact me if

Processed: found 606537 in 2010.07.24-1

2010-12-10 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: found 606537 2010.07.24-1 Bug #606537 [youtube-dl] youtube-dl: new upstream version Bug Marked as found in versions youtube-dl/2010.07.24-1. thanks Stopping processing here. Please contact me if you need assistance. -- 606537:

Bug#606543: clamav-freshclam: affected by privilege escalation vulnerability in logrotate

2010-12-10 Thread Olaf van der Spek
On Fri, Dec 10, 2010 at 9:43 AM, Michael Tautschnig m...@debian.org wrote: These lines from this package's maintainer scripts suggest that it likely is affected by the vulnerability: --- chmod 640 $FRESHCLAMLOGFILE chown

Bug#606603: sbox-dtc: postinst failure (wrong file in /etc/logrotate.d/)

2010-12-10 Thread Laurent Bonnaud
Package: sbox-dtc Version: 1.11.2-3 Severity: grave Hi, here is the problem: Setting up sbox-dtc (1.11.2-3) ... Group dtcgrp already exists: skiping creation! User dtc already exists: skiping creation! sed: can't read /etc/logrotate.d/sbox: No such file or directory dpkg: error processing

Processed: speech-dispatcher

2010-12-10 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: tag 606572 lenny Bug #606572 [speech-dispatcher] speech-dispatcher: affected by privilege escalation vulnerability in logrotate Added tag(s) lenny. End of message, stopping processing here. Please contact me if you need assistance. -- 606572:

Bug#606591: marked as done (dtc-xen tries to create symlinks in /usr/lib/xen and /usr/lib/python2.5/site-packages/xen and fails)

2010-12-10 Thread Debian Bug Tracking System
Your message dated Fri, 10 Dec 2010 09:17:15 + with message-id e1pqz6j-0007hz...@franck.debian.org and subject line Bug#606591: fixed in dtc-xen 0.5.13-3 has caused the Debian Bug report #606591, regarding dtc-xen tries to create symlinks in /usr/lib/xen and

Bug#606608: squid: affected by privilege escalation vulnerability in logrotate

2010-12-10 Thread Florian Zumbiehl
Package: squid Version: 2.7.STABLE6-2 Severity: grave Justification: privilege escalation vulnerability Tags: security There was a privilege escalation vulnerability in logrotate that I reported about four years ago and which finally got fixed in testing rouhgly one year ago (see bug #388608). In

Bug#606609: icecast2: affected by privilege escalation vulnerability in logrotate

2010-12-10 Thread Florian Zumbiehl
Package: icecast2 Version: 2.3.2-3 Severity: grave Justification: privilege escalation vulnerability Tags: security There was a privilege escalation vulnerability in logrotate that I reported about four years ago and which finally got fixed in testing rouhgly one year ago (see bug #388608). In

Bug#606481: python-peak.util: missing pointer to upstream sources

2010-12-10 Thread Stefano Zacchiroli
tags 606481 + patch thanks On Thu, Dec 09, 2010 at 05:06:55PM +0100, Jakub Wilk wrote: Source: python-peak.util Version: 20090610-2 Severity: serious Justification: Debian Policy 12.5; Squeeze RC Policy 1 debian/copyright doesn't say say where the upstream sources were obtained. Argh!

Processed: Re: Bug#606527: root upgrade vulnerability in exim4

2010-12-10 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: severity #606527 grave Bug #606527 [exim4] root upgrade vulnerability in exim4 Severity set to 'grave' from 'normal' tags #606527 confirmed security lenny squeeze Bug #606527 [exim4] root upgrade vulnerability in exim4 Added tag(s) squeeze,

Processed: Re: Bug#606481: python-peak.util: missing pointer to upstream sources

2010-12-10 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: tags 606481 + patch Bug #606481 [src:python-peak.util] python-peak.util: missing pointer to upstream sources Added tag(s) patch. thanks Stopping processing here. Please contact me if you need assistance. -- 606481:

Bug#606527: root upgrade vulnerability in exim4

2010-12-10 Thread Marc Haber
severity #606527 grave tags #606527 confirmed security lenny squeeze thanks -- - Marc Haber | I don't trust Computers. They | Mailadresse im Header Mannheim, Germany | lose things.Winona Ryder | Fon: *49

Bug#606541: garbage cleanup

2010-12-10 Thread Holger Levsen
forcemerge #388608 #606541 #606543 #606544 #606545 #606547 #606548 #606549 #606551 #606552 #606553 #606554 #606555 #606560 #606561 #606562 #606563 #606566 #606567 #606568 #606569 #606570 #606571 #606572 #606573 #606580 #606581 #606582 #606583 #606584 #606585 #606586 #606587 reassign #388608

Processed: non installable is serious

2010-12-10 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: severity 606558 serious Bug #606558 [sugar-calculate-activity] sugar-calculate-activity: needs to be updated for sugar/sucrose-0.88 Severity set to 'serious' from 'normal' # non installable is serious thanks Stopping processing here. Please

Bug#606541: garbage cleanup, waste of time, 2nd try

2010-12-10 Thread Holger Levsen
reassign #388608 logrotate reassign #606541 logrotate reassign #606543 logrotate reassign #606544 logrotate reassign #606545 logrotate reassign #606547 logrotate reassign #606548 logrotate reassign #606549 logrotate reassign #606551 logrotate reassign #606552 logrotate reassign #606553

Processed (with 5 errors): garbage cleanup, waste of time, 2nd try

2010-12-10 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: reassign #388608 logrotate Bug #388608 {Done: Paul Martin p...@debian.org} [logrotate] logrotate: Creation of files has race condition that could allow unintended file access Ignoring request to reassign bug #388608 to the same package reassign

Bug#606612: exim4: Exploitable memory corruption vulnerability

2010-12-10 Thread Dominic Hargreaves
Package: exim4 Version: 4.69-9 Severity: critical Tags: security Justification: root security hole There is a discussion on exim-dev[0] relating to an incident of root-level compromise owing to a couple of bugs. The first (the remote attack) appears[1] to be related to a bug already fixed in

Processed: reassign 606600 to logrotate, forcibly merging 388608 606600

2010-12-10 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: reassign 606600 logrotate Bug #606600 [pyicqt] pyicqt: affected by privilege escalation vulnerability in logrotate Bug reassigned from package 'pyicqt' to 'logrotate'. Bug No longer marked as found in versions pyicqt/0.8.1.3-2. forcemerge 388608

Processed: fixed 606612 in 4.70-1

2010-12-10 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: # Automatically generated email from bts, devscripts version 2.10.35lenny7 fixed 606612 4.70-1 Bug #606612 [exim4] exim4: Exploitable memory corruption vulnerability Bug Marked as fixed in versions exim4/4.70-1. End of message, stopping

Processed: plus all the maintainers wasting their time looking at their package

2010-12-10 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: forcemerge #388608 #606541 #606543 #606544 #606545 #606547 #606548 #606549 Bug#388608: logrotate: Creation of files has race condition that could allow unintended file access Bug#606541: zabbix-server-mysql: affected by privilege escalation

Processed: forcibly merging 606527 606612

2010-12-10 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: forcemerge 606527 606612 Bug#606527: root upgrade vulnerability in exim4 Bug#606612: exim4: Exploitable memory corruption vulnerability Forcibly Merged 606527 606612. thanks Stopping processing here. Please contact me if you need assistance. --

Processed: forcibly merging 606527 606612

2010-12-10 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: forcemerge 606527 606612 Bug#606527: root upgrade vulnerability in exim4 Bug#606612: exim4: Exploitable memory corruption vulnerability Forcibly Merged 606527 606612. thanks Stopping processing here. Please contact me if you need assistance. --

Bug#606527: Bug#606612: Acknowledgement (exim4: Exploitable memory corruption vulnerability)

2010-12-10 Thread Dominic Hargreaves
Julien, I just wanted to point out that there are two separate issues here, and only one of them has been fixed in newer versions. #606527 relating to the root upgrade is AFAIK still an issue. Dominic. -- Dominic Hargreaves | http://www.larted.org.uk/~dom/ PGP key 5178E2A5 from the.earth.li

Processed: limit package to exim4, unmerging 606612, notfixed 606527 in 4.70-1 ...

2010-12-10 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: # undoing my mess. sorry for the noise limit package exim4 Limiting to bugs with field 'package' containing at least one of 'exim4' Limit currently set to 'package':'exim4' unmerge 606612 Bug#606612: exim4: Exploitable memory corruption

Processed: Re: [Debian-olpc-devel] Processed: non installable is serious

2010-12-10 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: severity 606558 normal Bug #606558 [sugar-calculate-activity] sugar-calculate-activity: needs to be updated for sugar/sucrose-0.88 Severity set to 'normal' from 'serious' thanks Stopping processing here. Please contact me if you need

Bug#606527: Bug#606612: Acknowledgement (exim4: Exploitable memory corruption vulnerability)

2010-12-10 Thread Julien Cristau
On Fri, Dec 10, 2010 at 11:19:24 +, Dominic Hargreaves wrote: Julien, I just wanted to point out that there are two separate issues here, and only one of them has been fixed in newer versions. #606527 relating to the root upgrade is AFAIK still an issue. Yeah sorry about that. I think

Processed: tagging 606612

2010-12-10 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: tags 606612 - squeeze Bug #606612 [exim4] exim4: Exploitable memory corruption vulnerability (CVE-2010-4344) Removed tag(s) squeeze. thanks Stopping processing here. Please contact me if you need assistance. -- 606612:

Processed: Bug#605536 marked as pending

2010-12-10 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: tag 605536 pending Bug #605536 [dpkg] dpkg: ^C during package install results in broken symlinks Added tag(s) pending. thanks Stopping processing here. Please contact me if you need assistance. -- 605536:

Processed: Re: [Python-apps-team] Bug#606410: ocrfeeder: does not start after fresh install

2010-12-10 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: reassign 606410 python-minimal Bug #606410 [ocrfeeder] ocrfeeder: does not start after fresh install Bug reassigned from package 'ocrfeeder' to 'python-minimal'. Bug No longer marked as found in versions ocrfeeder/0.6.6+dfsg1-1. forcemerge 589349

Bug#605536: marked as pending

2010-12-10 Thread Guillem Jover
tag 605536 pending thanks Hello, Bug #605536 reported by you has been fixed in the Git repository. You can see the changelog below, and you can check the diff of the fix at: http://git.debian.org/?p=dpkg/dpkg.git;a=commitdiff;h=a766f50 --- commit a766f501f6da46aca070c315e6429e163d188202

Processed (with 5 errors): yawn, not funny

2010-12-10 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: reassign #606595 logrotate Bug #606595 [bacula-common] bacula-common: affected by privilege escalation vulnerability in logrotate Bug reassigned from package 'bacula-common' to 'logrotate'. Bug No longer marked as found in versions

Processed: tagging 604983, tagging 606537, tagging 605311

2010-12-10 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: tags 604983 + pending Bug #604983 [youtube-dl] youtube-dl: Manpage needs updating for new options Added tag(s) pending. tags 606537 + pending Bug #606537 [youtube-dl] youtube-dl: new upstream version Added tag(s) pending. tags 605311 + pending

Processed: merging the logrotate bugs

2010-12-10 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: package logrotate Limiting to bugs with field 'package' containing at least one of 'logrotate' Limit currently set to 'package':'logrotate' forcemerge 388608 606595 606596 606597 606598 606599 606601 606602 606608 606609 Bug#388608: logrotate:

Bug#601989: Bug is still marked as affecting libvanessa-adt-dev

2010-12-10 Thread Alexander Reichle-Schmehl
reassign vanessa-logger 0.0.10-1 thanks As the bug was filled against libvanessa-adt-dev (src:src:vanessa-adt) but fixed with an upload src:vanessa-logger, the bts thinks it sill affects libvanessa-adt-dev. Reassinging it to vanessa-logger should solve that issue. Best Regards, Alexander

Bug#606520: linux-tools-2.6.36: /usr/bin/perf_2.6.36 links against openssl but copyright lists only GPLv2 without exceptions

2010-12-10 Thread Ben Hutchings
On Fri, 2010-12-10 at 09:08 +0200, Timo Juhani Lindfors wrote: Ben Hutchings b...@decadent.org.uk writes: I have no idea what the upstream developers intended, they seem a bit clueless about distribution. I only just realised that they try to use libbfd (GPLv3, incompatible) even though

Processed: Bug is still marked as affecting libvanessa-adt-dev

2010-12-10 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: reassign 601989 vanessa-logger 0.0.10-1 Bug #601989 {Done: Luca Falavigna dktrkr...@debian.org} [libvanessa-adt-dev] libvanessa-adt-dev: file conflict when upgrading from lenny Bug reassigned from package 'libvanessa-adt-dev' to 'vanessa-logger'.

Processed: fixed 601989 in 0.0.10-1.1

2010-12-10 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: fixed 601989 0.0.10-1.1 Bug #601989 {Done: Luca Falavigna dktrkr...@debian.org} [vanessa-logger] libvanessa-adt-dev: file conflict when upgrading from lenny There is no source info for the package 'vanessa-logger' at version '0.0.10-1.1' with

Bug#606527: root upgrade vulnerability in exim4

2010-12-10 Thread Dominic Hargreaves
On Thu, Dec 09, 2010 at 11:23:19PM +0100, Konrad Rosenbaum wrote: The /usr/sbin/exim4 executable can be abused to upgrade from Debian-exim to root in case of another vulnerability in exim that creates a shell (there currently seems to be one). The exim config allows constructs like

Processed: Restore original severity for remote compromise

2010-12-10 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: # This was changed in the merge which was then reversed severity 606612 critical Bug #606612 [exim4] exim4: Exploitable memory corruption vulnerability (CVE-2010-4344) Severity set to 'critical' from 'grave' thanks Stopping processing here.

Bug#606640: src:atlas: FTBFS on alpha, armel, ia64, mips, powerpc, s390

2010-12-10 Thread Alexander Reichle-Schmehl
Package: src:atlas Version: 3.8.3-29 Severity: serious Justification: no longer builds from source Hi! Your package fails to build from source on the architecures alpha, armel, ia64, mips, powerpc and s390: https://buildd.debian.org/fetch.cgi?pkg=atlas;ver=3.8.3-29;arch=alpha;stamp=1290598328

Bug#545414: Bug#545414: sudo-ldap: sudo fails with sudo: setreuid(ROOT_UID, user_uid): Operation not permitted for ldap users

2010-12-10 Thread Arthur de Jong
On Fri, 2010-12-10 at 11:42 +0800, David Adam wrote: libnss-ldapd should be used to replace libnss-ldap on squeeze upgrades. I am still a touch wary of libnss-ldapd, only in that adding the daemon introduces an additional point of failure, but have been running it on our Ubuntu and squeeze

Bug#603429: hylafax-server: prompting due to modified conffiles which where not modified by the user

2010-12-10 Thread Giuseppe Sacco
Hi Gregor, the patch seems good to me. Please, only correct a small typo in changelog, where you wrote where instead of were. Bye, Giuseppe P.S. Thanks for working on hylafax package -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble?

Processed: notfound 599303 in 0.8.1-4.1

2010-12-10 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: notfound 599303 0.8.1-4.1 Bug #599303 {Done: Didier 'OdyX' Raboud did...@raboud.com} [ktoon] ktoon: KToon crashes with Signal 11 Bug No longer marked as found in versions ktoon/0.8.1-4.1. End of message, stopping processing here. Please contact

Processed: merge

2010-12-10 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: reassign 605370 src:atlas 3.8.3-29 Bug #605370 [atlas] atlas: FTBFS on alpha, armel, ia64, mips, powerpc and s390 Bug reassigned from package 'atlas' to 'src:atlas'. Bug No longer marked as found in versions 3.8.3-29. Bug #605370 [src:atlas]

Bug#606645: binutils-multiarch: uninstallable - ld.bfd conflict with binutils

2010-12-10 Thread Piotr Engelking
Package: binutils-multiarch Version: 2.21-1 Severity: grave Justification: renders package unusable Attempting to install binutils-multiarch 2.21-1 results in the following error: dpkg: error processing /var/cache/apt/archives/binutils-multiarch_2.21-1_i386.deb (--unpack): trying to overwrite

Bug#604457: marked as done (linux-image-2.6.26-2-xen-686: Raid10 exporting LV to xen results in error can't convert block across chunks or bigger than 64k)

2010-12-10 Thread Debian Bug Tracking System
Your message dated Fri, 10 Dec 2010 14:49:19 + with message-id e1pr4hf-000773...@franck.debian.org and subject line Bug#604457: fixed in linux-2.6 2.6.32-29 has caused the Debian Bug report #604457, regarding linux-image-2.6.26-2-xen-686: Raid10 exporting LV to xen results in error can't

Bug#461644: marked as done (linux-image-2.6.18-5-xen-686: Exporting an lvm-on-md LV to Xen as a disk results in kernel errors and corrupt filesystems)

2010-12-10 Thread Debian Bug Tracking System
Your message dated Fri, 10 Dec 2010 14:49:19 + with message-id e1pr4hf-000773...@franck.debian.org and subject line Bug#604457: fixed in linux-2.6 2.6.32-29 has caused the Debian Bug report #604457, regarding linux-image-2.6.18-5-xen-686: Exporting an lvm-on-md LV to Xen as a disk results in

Bug#606050: marked as done (perf (GPLv2-only) linked with libbfd (GPLv3-only), so undistributable)

2010-12-10 Thread Debian Bug Tracking System
Your message dated Fri, 10 Dec 2010 14:49:20 + with message-id e1pr4hg-00077y...@franck.debian.org and subject line Bug#606050: fixed in linux-2.6 2.6.32-29 has caused the Debian Bug report #606050, regarding perf (GPLv2-only) linked with libbfd (GPLv3-only), so undistributable to be marked as

Bug#603429: hylafax-server: prompting due to modified conffiles which where not modified by the user

2010-12-10 Thread gregor herrmann
On Fri, 10 Dec 2010 15:13:19 +0100, Giuseppe Sacco wrote: the patch seems good to me. Please, only correct a small typo in changelog, where you wrote where instead of were. He, nice catch (that was directly from the BTS). Fixed locally. P.S. Thanks for working on hylafax package Your

Bug#606645: marked as done (binutils-multiarch: uninstallable - ld.bfd conflict with binutils)

2010-12-10 Thread Debian Bug Tracking System
Your message dated Fri, 10 Dec 2010 15:56:04 +0100 with message-id 4d023f84.4070...@debian.org and subject line Re: Bug#606645: binutils-multiarch: uninstallable - ld.bfd conflict with binutils has caused the Debian Bug report #606645, regarding binutils-multiarch: uninstallable - ld.bfd conflict

Bug#606498: okular: Broken dep with LibQTSvg.so

2010-12-10 Thread Jonathan Thomas
Hello, This error is most likely being caused by the prescence of a third-party copy of the Qt library. (Most likely installed by the Nessus security scanner) Alteratively, it could also perhaps be a local copy without the qt-copy patches installed to /usr/share/local or somesuch. The output

Bug#606640: src:atlas: FTBFS on alpha, armel, ia64, mips, powerpc, s390

2010-12-10 Thread Sylvestre Ledru
Le vendredi 10 décembre 2010 à 15:31 +0100, Alexander Reichle-Schmehl a écrit : Package: src:atlas Version: 3.8.3-29 Severity: serious Justification: no longer builds from source I'm not really sure, if it is the same bug for all archs, but from what I've seen, something is wrong in the CPU

Bug#606603: sbox-dtc: postinst failure (wrong file in /etc/logrotate.d/)

2010-12-10 Thread Thomas Goirand
On 12/10/2010 05:13 PM, Laurent Bonnaud wrote: Package: sbox-dtc Version: 1.11.2-3 Severity: grave Hi, here is the problem: Setting up sbox-dtc (1.11.2-3) ... Group dtcgrp already exists: skiping creation! User dtc already exists: skiping creation! sed: can't read

Bug#605504: release team advice: chocolate-doom lock-up / OOD libsdl-mixer

2010-12-10 Thread Alexander Reichle-Schmehl
Hi! * Jon Dowland j...@debian.org [101208 23:36]: I uploaded an updated sdl-mixer1.2 package to experimental earlier on. I will re-upload to unstable in 1 or 2 days, if nobody shouts. When you've done so, please also reassign this bug to the sdl-mixer1.2 package (probalby the version

Bug#606612: marked as done (exim4: Exploitable memory corruption vulnerability (CVE-2010-4344))

2010-12-10 Thread Debian Bug Tracking System
Your message dated Fri, 10 Dec 2010 16:31:11 +0100 with message-id 20101210153111.gi2...@patate.is-a-geek.org and subject line Re: Bug#606612: exim4: Exploitable memory corruption vulnerability has caused the Debian Bug report #606612, regarding exim4: Exploitable memory corruption vulnerability

Bug#606603: marked as done (sbox-dtc: postinst failure (wrong file in /etc/logrotate.d/))

2010-12-10 Thread Debian Bug Tracking System
Your message dated Fri, 10 Dec 2010 15:32:17 + with message-id e1pr4xf-0007il...@franck.debian.org and subject line Bug#606603: fixed in sbox-dtc 1.11.2-4 has caused the Debian Bug report #606603, regarding sbox-dtc: postinst failure (wrong file in /etc/logrotate.d/) to be marked as done.

Bug#606589: xen-linux-system-2.6.32-5-xen-amd64 doesn't upgrade from xen-linux-system-2.6.26-2-xen-amd64

2010-12-10 Thread Ian Campbell
severity 606589 important reassign 606589 xen-hypervisor-4.0-amd64 merge 606590 606589 thanks At the core this is the same issue as 606590. I think a single report is enough to allow this to be fixed in the relevant place, if the kernel ends up being the place to fix then the bug can be

Processed: Re: Bug#606589: xen-linux-system-2.6.32-5-xen-amd64 doesn't upgrade from xen-linux-system-2.6.26-2-xen-amd64

2010-12-10 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: severity 606589 important Bug #606589 [xen-linux-system-2.6.32-5-xen-amd64] xen-linux-system-2.6.32-5-xen-amd64 doesn't upgrade from xen-linux-system-2.6.26-2-xen-amd64 Severity set to 'important' from 'serious' reassign 606589

Bug#606657: wordpress: Privilege escalation in posting rights fixed in 3.0.3

2010-12-10 Thread Dominic Hargreaves
Package: wordpress Version: 3.0.2-1 Severity: grave Tags: security Justification: user security hole Another week, another security fix in wordpress. From http://codex.wordpress.org/Version_3.0.3: Fixes issues in the XML-RPC remote publishing interface which under certain circumstances allowed

Bug#545625: closed by Peter Van Eynde pvane...@debian.org (Bug#545625: fixed in ecl 9.8.4-2)

2010-12-10 Thread Alexander Reichle-Schmehl
Hi Peter co! * Debian Bug Tracking System ow...@bugs.debian.org [090925 01:00]: Source-Version: 9.8.4-2 [..] * Force the configure script to use ginstall-info, (Closes: #545625) Are you aware, that this rc bug is still open in testing? It was fixed in 9.8.4-2, but testing still has

Bug#606658: Depends on gdm which is not present on kfreebsd-*

2010-12-10 Thread Mehdi Dogguy
Package: fast-user-switch-applet Version: 2.24.0-4 Severity: serious Hi, fast-user-switch-applet depends on gdm which is no longer availables on kfreebsd-* architectures. Please adjust your Architecture field to not build the package on kfreebsd-* anymore by using: Architecture:

Bug#444770: Bug#604215: libpam-rsa: installation fails

2010-12-10 Thread Agustin Martin
On Thu, Dec 09, 2010 at 09:14:02PM +0100, Julien Cristau wrote: On Thu, Dec 9, 2010 at 19:37:07 +0100, Agustin Martin wrote: Finally had time to put into this NMU. I am attaching yet another diff with my last version. pam_rsa.conf file is not touched if exists in normal upgrades, and I

Bug#605866: marked as done (php-http-request needs a Pre-Depends: php-pear (= 5.3) to upgrade to Squeeze)

2010-12-10 Thread Debian Bug Tracking System
Your message dated Fri, 10 Dec 2010 16:17:06 + with message-id e1pr5ec-00089p...@franck.debian.org and subject line Bug#605866: fixed in php-http-request 1.4.4-3 has caused the Debian Bug report #605866, regarding php-http-request needs a Pre-Depends: php-pear (= 5.3) to upgrade to Squeeze to

Bug#605784: nagios-statd-server: test with python2.5 sucessful

2010-12-10 Thread Vladislav Kurz
Package: nagios-statd-server Version: 3.12-1 Followup-For: Bug #605784 Hello, i have tested nagios-statd witch python2.4 and python2.5. With both of them it works fine, for couple of days without problem. When running with python2.6, problems arise cca 1 hour after start. Suggested fix:

Bug#604221: hylafax: diff for NMU version 2:6.0.5-4.1

2010-12-10 Thread gregor herrmann
tags 603429 + pending tags 604221 + pending thanks Dear maintainer, I've prepared an NMU for hylafax (versioned as 2:6.0.5-4.1) and uploaded it to DELAYED/2. Please feel free to tell me if I should delay it longer. Regards. -- .''`. http://info.comodo.priv.at/ -- GPG key IDs: 0x8649AA06,

Processed: hylafax: diff for NMU version 2:6.0.5-4.1

2010-12-10 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: tags 603429 + pending Bug #603429 [hylafax-server] hylafax-server: prompting due to modified conffiles which where not modified by the user Added tag(s) pending. tags 604221 + pending Bug #604221 [hylafax-server] hylafax-server: installation

Bug#606238: OBJECTION

2010-12-10 Thread Peter Hombach
I object to the just upgrade to squeeze and be silent approach. Squeeze is not the stable distribution yet, and one should not be forced to go to testing. If k3b version 2 is sufficiently stable, why isn't it part of the backports? I kindly ask to take bug reports more seriously. Peter

Bug#606527: Use the source

2010-12-10 Thread Robert de Bath
And in particular there is a candidate patch at http://lists.exim.org/lurker/message/20101209.172233.abcba158.en.html#e xim-dev (although sadly I can't see how to get it to render in a fixed-width font). Check the source to that page; remove a few br tags and replace some amp;

Bug#606238: [Pkg-kde-extras] Bug#606238: OBJECTION

2010-12-10 Thread Modestas Vainius
Hello, On penktadienis 10 Gruodis 2010 19:07:32 Peter Hombach wrote: I object to the just upgrade to squeeze and be silent approach. Squeeze is not the stable distribution yet, and one should not be forced to go to testing. If k3b version 2 is sufficiently stable, why isn't it part of the

Bug#606527: root upgrade vulnerability in exim4

2010-12-10 Thread David Woodhouse
(although sadly I can't see how to get it to render in a fixed-width font). http://bugs.exim.org/show_bug.cgi?id=1044 -- David WoodhouseOpen Source Technology Centre david.woodho...@intel.com Intel Corporation -- To UNSUBSCRIBE,

Processed: tagging 606527

2010-12-10 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: tags 606527 + sid Bug #606527 [exim4] root upgrade vulnerability in exim4 (CVE-2010-4345) Added tag(s) sid. thanks Stopping processing here. Please contact me if you need assistance. -- 606527:

Processed: bug 606527 is forwarded to http://bugs.exim.org/show_bug.cgi?id=1044

2010-12-10 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: forwarded 606527 http://bugs.exim.org/show_bug.cgi?id=1044 Bug #606527 [exim4] root upgrade vulnerability in exim4 (CVE-2010-4345) Set Bug forwarded-to-address to 'http://bugs.exim.org/show_bug.cgi?id=1044'. thanks Stopping processing here.

Processed: notfixed 596842 in 0.3.3-1+b4

2010-12-10 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: notfixed 596842 0.3.3-1+b4 Bug #596842 {Done: Ralf Treinen ralf.trei...@pps.jussieu.fr} [libgettext-ocaml-dev] libgettext-ocaml-dev not installable in sid Bug No longer marked as fixed in versions 0.3.3-1+b4. thanks Stopping processing here.

Processed: notfixed 586838 in 1.5.4.cvs.20090603-1+b1

2010-12-10 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: notfixed 586838 1.5.4.cvs.20090603-1+b1 Bug #586838 {Done: Tim Retout dioc...@debian.org} [mgltools-geomutils] mgltools-geomutils: depends on python ( 2.6) Bug No longer marked as fixed in versions 1.5.4.cvs.20090603-1+b1. thanks Stopping

Processed: fixed 586838 in mgltools-geomutils/1.5.4.cvs.20090603-1

2010-12-10 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: fixed 586838 mgltools-geomutils/1.5.4.cvs.20090603-1 Bug #586838 {Done: Tim Retout dioc...@debian.org} [mgltools-geomutils] mgltools-geomutils: depends on python ( 2.6) Bug Marked as fixed in versions mgltools-geomutils/1.5.4.cvs.20090603-1.

Bug#584653: CVE-2010-2055

2010-12-10 Thread Moritz Muehlenhoff
On Thu, Dec 09, 2010 at 10:48:46PM -0500, Michael Gilbert wrote: I've isolated and applied the patches needed to fix CVE-2010-2055 in ghostscript. See attached debdiff. Would anyone be so kind to sponsor this? The package is at: http://mentors.debian.net/debian/pool/main/g/ghostscript/ I

Bug#584653: CVE-2010-2055

2010-12-10 Thread Michael Gilbert
On Fri, 10 Dec 2010 19:45:18 +0100, Moritz Muehlenhoff wrote: On Thu, Dec 09, 2010 at 10:48:46PM -0500, Michael Gilbert wrote: I've isolated and applied the patches needed to fix CVE-2010-2055 in ghostscript. See attached debdiff. Would anyone be so kind to sponsor this? The package is

Processed: notfixed 596842 in ocaml-gettext/0.3.3-1

2010-12-10 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: notfixed 596842 ocaml-gettext/0.3.3-1 Bug #596842 {Done: Ralf Treinen ralf.trei...@pps.jussieu.fr} [libgettext-ocaml-dev] libgettext-ocaml-dev not installable in sid Bug No longer marked as fixed in versions ocaml-gettext/0.3.3-1. thanks

Processed: notfixed 586838 in mgltools-geomutils/1.5.4.cvs.20090603-1

2010-12-10 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: notfixed 586838 mgltools-geomutils/1.5.4.cvs.20090603-1 Bug #586838 {Done: Tim Retout dioc...@debian.org} [mgltools-geomutils] mgltools-geomutils: depends on python ( 2.6) Bug No longer marked as fixed in versions

Processed: notfixed 596842 in 0.3.3-1

2010-12-10 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: # actually this is the proper approach. same found and fixed version will be seen as affecting. binNMU versions aren't seen by BTS, only source versions are. thus claiming it's a non-bug by no fixed version is the only sensible approach

Bug#605157: calendarserver: Use of PYTHONPATH env var in an insecure way

2010-12-10 Thread Jakub Wilk
* Dmitrijs Ledkovs dmitrij.led...@ubuntu.com, 2010-12-10, 01:25: I have tested this by running calendarserver with without new patch and I can add/retrieve calendar events over the network using thunderbird-lightning. The new patch looks good. I'll upload Dmitrijs' NMU shortly (with

Bug#605157: marked as done (calendarserver: Use of PYTHONPATH env var in an insecure way)

2010-12-10 Thread Debian Bug Tracking System
Your message dated Fri, 10 Dec 2010 19:47:08 + with message-id e1pr8vs-0001dw...@franck.debian.org and subject line Bug#605157: fixed in calendarserver 2.4.dfsg-2.1 has caused the Debian Bug report #605157, regarding calendarserver: Use of PYTHONPATH env var in an insecure way to be marked as

Bug#605166: marked as done (calendarserver: Use of PYTHONPATH env var in an insecure way)

2010-12-10 Thread Debian Bug Tracking System
Your message dated Fri, 10 Dec 2010 19:47:08 + with message-id e1pr8vs-0001dw...@franck.debian.org and subject line Bug#605157: fixed in calendarserver 2.4.dfsg-2.1 has caused the Debian Bug report #605157, regarding calendarserver: Use of PYTHONPATH env var in an insecure way to be marked as

Bug#605166: marked as done (calendarserver: Use of PYTHONPATH env var in an insecure way)

2010-12-10 Thread Debian Bug Tracking System
Your message dated Fri, 10 Dec 2010 19:47:08 + with message-id e1pr8vs-0001dj...@franck.debian.org and subject line Bug#605166: fixed in calendarserver 2.4.dfsg-2.1 has caused the Debian Bug report #605166, regarding calendarserver: Use of PYTHONPATH env var in an insecure way to be marked as

  1   2   >