Bug#322525: umfpack depends on packages, beeing removed from unstable

2005-08-11 Thread Matthias Klose
Package: umfpack
Severity: serious

depends on blas atlas2-base, see #317245


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#322529: lvm10: vg_check_consistency_with_pv_and_lv not called correctly

2005-08-11 Thread Karl Chen
Package: lvm10
Severity: grave
Tags: patch
Justification: causes non-serious data loss


Function vg_create_dir_and_group_and_nodes() in
tools/lib/vg_create_dir_and_group_and_nodes.c has
"vg_check_consistency_with_pv_and_lv < 0", which compares
the address of the function instead of the return value of
invoking it.  Failing to properly invoke this check lead to
data loss.

This is invalid C, though gcc 3.x and 4.x accept it.  The
bug was detected using Elsa
.


diff -ub 1.0.8/tools/lib/vg_create_dir_and_group_and_nodes.c.orig 
1.0.8/tools/lib/vg_create_dir_and_group_and_nodes.c
--- 1.0.8/tools/lib/vg_create_dir_and_group_and_nodes.c.orig2005-08-11 
01:35:30.0 -0700
+++ 1.0.8/tools/lib/vg_create_dir_and_group_and_nodes.c 2005-08-11 
01:35:42.0 -0700
@@ -46,7 +46,7 @@
 
debug_enter ( "vg_create_dir_and_group_and_nodes -- CALLED\n");
 
-   if ( vg == NULL || vg_check_consistency_with_pv_and_lv < 0 ||
+   if ( vg == NULL || vg_check_consistency_with_pv_and_lv() < 0 ||
 opt_v < 0) {
   ret = -LVM_EPARAM;
   goto vg_create_dir_and_group_and_nodes_end;


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#322089: openldap2: Please switch to libgnutls12

2005-08-11 Thread Steve Langasek
On Thu, Aug 11, 2005 at 01:11:42AM +0200, Matthias Urlichs wrote:
> Torsten Landschoff:
> > On Wed, Aug 10, 2005 at 08:44:42AM +0200, Matthias Urlichs wrote:
> > > Sigh. This is not supposed to happen...

> > > Do you have a build log?

> > Attached.

> OK, I have looked at the sources. The problem is that the X509 data
> structures and functions have been moved to gnutls' openssl
> compatibility layer. Presumably, it makes more sense for them to be
> there, as it's not a native data structure and only used for openssl
> compatibility. Any 'normal' program would thus include+link that code
> anyway, but since when was openldap2 normal. ;-)

> => Discuss with Upstream.

> If necessary, additional hackery can probably be introduced to
> openldap2's include/ldap_pvt_gnutls.h (#include ,
> #ifdef any conflicts away, link with -lgnutls-openssl) without too much
> headache.

Ok.  Couple of questions:

- What is the current license of libgnutls-openssl?  I've heard some
comments that it's now LGPL instead of GPL, but I haven't confirmed this
myself.  Anything we link with must be LGPL-only, because of the wide range
of packages that will use libldap in turn; this was a major factor in the
amount of reimplementation I did to keep libldap linked to libgnutls only.

- Why would the x509 interfaces be "compatibility-only"?  X509 is surely not
specific to OpenSSL.  Or is this simply a matter of the *particular*
interfaces that OpenLDAP is using to get at the X509 data?

- In light of this incompatibility, do you still plan to Provide:
libgnutls11-dev?

Thanks,
-- 
Steve Langasek   Give me a lever long enough and a Free OS
Debian Developer  to set it on, and I will move the world.
[EMAIL PROTECTED]   http://www.debian.org/


signature.asc
Description: Digital signature


Bug#321621: gcc biarch builds fails on i386

2005-08-11 Thread Andreas Jochens
On 05-Aug-09 14:14, Daniel Jacobowitz wrote:
> On Tue, Aug 09, 2005 at 07:50:38PM +0200, Andreas Jochens wrote:
> > I could provide a patch to make 'glibc' build the necessary
> > 'libc6-i386' and 'libc6-dev-i386' packages if this approach
> > is welcome.

I meant 'libc6-amd64' and 'libc6-dev-amd64', i.e. 64-bit amd64 
libraries for the i386 architecture. The 'libc6-i386' and 'libc6-dev-i386' 
packages would be 32-bit i386 libraries for amd64.
Sorry for this confusion.

> If you have one handy, I won't complain...

The attached patch to glibc-2.3.5-3 works for me. 

Some bootstrapping will be necessary, because the 64-bit build pass 
needs a Build-Depends on the resulting new 'libc6-dev-amd64' binary 
package itself because the 'configure' process tries to compile
64-bit programs.

Additionally, the linux-kernel-headers package needs to be changed to
support /usr/include/asm wrappers for an i386/amd64 biarch setup.

To build a first version of glibc with the patch, the following can be
done:

1. Create a clean i386/unstable chroot environment with debootstrap

2. apt-get build-dep glibc; apt-get source glibc

3. Apply the attached patch to the glibc source package

4. Ignore the new Build-Depends on 'libc6-dev-amd64 [i386]' and
   'apt-get install lib64gcc1' instead

5. Do _not_ install 'amd64-libs-dev'

6. Install a linux-kernel-headers package with the patch from BTS #321969 
   which adds /usr/include/asm wrappers for i386/amd64.

7. Manually copy amd64 64-bit versions of the following libc6-dev files 
   to /usr/lib64: libc.so, libpthread.so, *crt*.o, libc_nonshared.a   

8. Run dpkg-buildpackage to build the patched glibc. This will create
   the new libc6-amd64 and libc6-dev-amd64 packages which can then be
   used for a regular build with the Build-Depends on 'libc6-dev-amd64'
   installed.

When this is done, the Build-Depends of gcc-4.0 on 'amd64-libs-dev [i386]'
can be replaced by 'libc6-dev-amd64 [i386]' and gcc-4.0 can be recompiled.

With this change, the i386 toolchain would no longer depend on packages
from the amd64 port.

Regards
Andreas Jochens

diff -urN ../tmp-orig/glibc-2.3.5/debian/control ./debian/control
--- ../tmp-orig/glibc-2.3.5/debian/control  2005-08-09 18:01:25.0 
+
+++ ./debian/control2005-08-09 15:57:20.0 +
@@ -1,7 +1,7 @@
 Source: glibc
 Section: libs
 Priority: required
-Build-Depends: gettext (>= 0.10.37-1), make (>= 3.80-1), dpkg-dev (>= 1.13.5), 
debianutils (>= 1.13.1), tar (>= 1.13.11), bzip2, texinfo (>= 4.0), 
linux-kernel-headers (>= 2.5.999-test7-bk-9) [!hurd-i386], mig (>= 1.3-2) 
[hurd-i386], hurd-dev (>= 20020608-1) [hurd-i386], gnumach-dev [hurd-i386], 
texi2html, file, gcc-4.0 [!powerpc !m68k] | gcc-3.4 (>= 3.4.4-6) [powerpc] | 
gcc-3.4 [m68k], autoconf, binutils (>= 2.14.90.0.7-5), sed (>= 4.0.5-4), gawk, 
debhelper (>= 4.1.76)
+Build-Depends: gettext (>= 0.10.37-1), make (>= 3.80-1), dpkg-dev (>= 1.13.5), 
debianutils (>= 1.13.1), tar (>= 1.13.11), bzip2, texinfo (>= 4.0), 
linux-kernel-headers (>= 2.5.999-test7-bk-9) [!hurd-i386], mig (>= 1.3-2) 
[hurd-i386], hurd-dev (>= 20020608-1) [hurd-i386], gnumach-dev [hurd-i386], 
texi2html, file, gcc-4.0 [!powerpc !ppc64 !m68k], gcc-3.4 (>= 3.4.4-6) 
[powerpc], gcc-3.4 [m68k ppc64], autoconf, binutils (>= 2.14.90.0.7-5), sed (>= 
4.0.5-4), gawk, debhelper (>= 4.1.76), libc6-dev-amd64 [i386]
 Build-Depends-Indep: perl, po-debconf
 Maintainer: GNU Libc Maintainers 
 Uploaders: Ben Collins <[EMAIL PROTECTED]>, GOTO Masanori <[EMAIL PROTECTED]>, 
Philip Blundell <[EMAIL PROTECTED]>, Jeff Bailey <[EMAIL PROTECTED]>, Daniel 
Jacobowitz <[EMAIL PROTECTED]>
diff -urN ../tmp-orig/glibc-2.3.5/debian/control.in/amd64 
./debian/control.in/amd64
--- ../tmp-orig/glibc-2.3.5/debian/control.in/amd64 1970-01-01 
00:00:00.0 +
+++ ./debian/control.in/amd64   2005-08-09 15:38:42.0 +
@@ -0,0 +1,22 @@
+Package: libc6-amd64
+Architecture: i386
+Section: base
+Priority: required
+Depends: libc6 (= ${Source-Version}), lib64gcc1
+Replaces: amd64-libs
+Description: GNU C Library: 64bit Shared libraries for AMD64
+ This package includes shared versions of the standard C library and the
+ standard math library, as well as many others. This is the 64bit version
+ of the library, meant for AMD64 systems.
+
+Package: libc6-dev-amd64
+Architecture: i386
+Section: libdevel
+Priority: standard
+Depends: libc6-amd64 (= ${Source-Version}), libc6-dev (= ${Source-Version})
+Replaces: amd64-libs-dev
+Description: GNU C Library: 64bit Development Libraries for AMD64
+ Contains the symlinks and object files needed to compile and link programs
+ which use the standard C library. This is the 64bit version of the
+ library, meant for AMD64 systems.
+
diff -urN ../tmp-orig/glibc-2.3.5/debian/control.in/main 
./debian/control.in/main
--- ../tmp-orig/glibc-2.3.5/debian/control.in/main  2005-08-09 
18:01:25.0 +
+++ ./debian/control.in/main2005-08-09 15:38:42.0 +
@@ -1,7 +

Bug#322089: openldap2: Please switch to libgnutls12

2005-08-11 Thread Matthias Urlichs
Hi,

Steve Langasek:
> > If necessary, additional hackery can probably be introduced to
> > openldap2's include/ldap_pvt_gnutls.h (#include ,
> > #ifdef any conflicts away, link with -lgnutls-openssl) without too much
> > headache.
> 
> Ok.  Couple of questions:
> 
> - What is the current license of libgnutls-openssl?

*Sigh*, s/ out too much/major/.  :-(

Thanks -- I wasn't checking that closely enough. I hate when people
switch licenses around. In gnutls11, this stuff was actually LGPL'd.
(It was also included twice...)

> - Why would the x509 interfaces be "compatibility-only"?  X509 is surely not
> specific to OpenSSL.  Or is this simply a matter of the *particular*
> interfaces that OpenLDAP is using to get at the X509 data?
> 
The latter.

> - In light of this incompatibility, do you still plan to Provide:
> libgnutls11-dev?

I'll ask gnutls's Upstream if they'd consider reverting that.

-- 
Matthias Urlichs   |   {M:U} IT Design @ m-u-it.de   |  [EMAIL PROTECTED]
Disclaimer: The quote was selected randomly. Really. | http://smurf.noris.de
 - -
Few things are harder to put up with than the annoyance of a good example.
-- "Mark Twain, Pudd'nhead Wilson's Calendar"


signature.asc
Description: Digital signature


Bug#322467: [CAN-2005-2097] Loca Table Verification Remote Denial of Service Vulnerability

2005-08-11 Thread Hilmar Preusse
tags 322467 + experimental
stop

On 10.08.05 Hilmar Preusse ([EMAIL PROTECTED]) wrote:

> Package: tetex-bin
> Version: 2.0.2-31
> Severity: grave
> Tags: patch
> 
> Just a reminder,
> 
> http://www.securityfocus.com/bid/14529/info
> 
Martin Pitt gave me the hint, that teTeX from stable is not
vulnerable as it has another xpdf version. However teTeX 3.0 uses
xpdf 3.0.

H.
-- 
sigmentation fault


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Processed: Re: Bug#322467: [CAN-2005-2097] Loca Table Verification Remote Denial of Service Vulnerability

2005-08-11 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> tags 322467 + experimental
Bug#322467: [CAN-2005-2097] Loca Table Verification Remote Denial of Service 
Vulnerability
Tags were: security patch
Tags added: experimental

> stop
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Processed: Re: no longer RC

2005-08-11 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> severity 321435 serious
Bug#321435: Unrecoverable error: typecheck in .getdeviceparams on s390
Severity set to `serious'.

> quit
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#321554: marked as done (plucker-desktop: uninstallable due to dependency on libwxgtk2.4-contrib)

2005-08-11 Thread Debian Bug Tracking System
Your message dated Thu, 11 Aug 2005 01:32:08 -0700
with message-id <[EMAIL PROTECTED]>
and subject line Bug#321554: fixed in plucker 1.8-6
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--
Received: (at submit) by bugs.debian.org; 6 Aug 2005 05:00:22 +
>From [EMAIL PROTECTED] Fri Aug 05 22:00:22 2005
Return-path: <[EMAIL PROTECTED]>
Received: from rozz.csail.mit.edu [128.30.2.16] (mail)
by spohr.debian.org with esmtp (Exim 3.36 1 (Debian))
id 1E1GnG-00023K-00; Fri, 05 Aug 2005 22:00:22 -0700
Received: from c-24-147-127-19.hsd1.ma.comcast.net ([24.147.127.19] 
helo=kleph.csail.mit.edu)
by rozz.csail.mit.edu with esmtpsa (TLSv1:AES256-SHA:256)
(Exim 4.50)
id 1E1GnF-Q4-LH
for [EMAIL PROTECTED]; Sat, 06 Aug 2005 01:00:21 -0400
Received: from cph by kleph.csail.mit.edu with local (Exim 4.52)
id 1E1GnF-0003Tt-7Z
for [EMAIL PROTECTED]; Sat, 06 Aug 2005 01:00:21 -0400
From: Chris Hanson <[EMAIL PROTECTED]>
To: Debian Bug Tracking System <[EMAIL PROTECTED]>
Subject: plucker-desktop: uninstallable due to dependency on libwxgtk2.4-contrib
X-Debbugs-CC: Chris Hanson <[EMAIL PROTECTED]>
Message-Id: <[EMAIL PROTECTED]>
Date: Sat, 06 Aug 2005 01:00:21 -0400
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-11.0 required=4.0 tests=BAYES_00,HAS_PACKAGE,
X_DEBBUGS_CC autolearn=ham version=2.60-bugs.debian.org_2005_01_02

Package: plucker-desktop
Severity: grave
Tags: sid

Please recompile to update dependency.

-- System Information:
Debian Release: testing/unstable
  APT prefers unstable
  APT policy: (990, 'unstable')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.12.3-cph1
Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968)

---
Received: (at 321554-close) by bugs.debian.org; 11 Aug 2005 08:38:54 +
>From [EMAIL PROTECTED] Thu Aug 11 01:38:54 2005
Return-path: <[EMAIL PROTECTED]>
Received: from katie by spohr.debian.org with local (Exim 3.36 1 (Debian))
id 1E38Tw-0005Bu-00; Thu, 11 Aug 2005 01:32:08 -0700
From: Amaya Rodrigo Sastre <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
X-Katie: $Revision: 1.56 $
Subject: Bug#321554: fixed in plucker 1.8-6
Message-Id: <[EMAIL PROTECTED]>
Sender: Archive Administrator <[EMAIL PROTECTED]>
Date: Thu, 11 Aug 2005 01:32:08 -0700
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
autolearn=no version=2.60-bugs.debian.org_2005_01_02

Source: plucker
Source-Version: 1.8-6

We believe that the bug you reported is fixed in the latest version of
plucker, which is due to be installed in the Debian FTP archive:

plucker-desktop_1.8-6_i386.deb
  to pool/main/p/plucker/plucker-desktop_1.8-6_i386.deb
plucker_1.8-6.diff.gz
  to pool/main/p/plucker/plucker_1.8-6.diff.gz
plucker_1.8-6.dsc
  to pool/main/p/plucker/plucker_1.8-6.dsc
plucker_1.8-6_i386.deb
  to pool/main/p/plucker/plucker_1.8-6_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Amaya Rodrigo Sastre <[EMAIL PROTECTED]> (supplier of updated plucker package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Thu, 11 Aug 2005 10:09:50 +0200
Source: plucker
Binary: plucker plucker-desktop
Architecture: source i386
Version: 1.8-6
Distribution: unstable
Urgency: low
Maintainer: Amaya Rodrigo Sastre <[EMAIL PROTECTED]>
Changed-By: Amaya Rodrigo Sastre <[EMAIL PROTECTED]>
Description: 
 plucker- Pluck stuff from the web and read it on your PalmOS device
 plucker-desktop - Plucker Desktop is a GUI for Plucker
Closes: 321554
Changes: 
 plucker (1.8-6) unstable; urgency=low
 .
   * Corrected Dependencies on libwxgtk2.4-1 (Closes: #321554).
   * "Jens, you will be very dearly missed".
Files: 
 35151cb

Processed: your mail

2005-08-11 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> package revelation
Ignoring bugs not assigned to: revelation

> reassign 318012 python-crypto
Bug#318012: revelation: Can't be installed because of libgmp3 dependency
Bug reassigned from package `revelation' to `python-crypto'.

> thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Processed: Re: Bug#322467: [CAN-2005-2097] Loca Table Verification Remote Denial of Service Vulnerability

2005-08-11 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> found 322467 3.0-5
Bug#322467: [CAN-2005-2097] Loca Table Verification Remote Denial of Service 
Vulnerability
Bug marked as found in version 3.0-5.

> thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Processed: tagging 322525

2005-08-11 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> # Automatically generated email from bts, devscripts version 2.8.14
> tags 322525 sid
Bug#322525: umfpack depends on packages, beeing removed from unstable
There were no tags set.
Tags added: sid

>
End of message, stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#318012: revelation is still uninstallable

2005-08-11 Thread Stefan Völkel
On Wed, 2005-08-10 at 14:48 -0700, Steve Langasek wrote:
> On Wed, Aug 10, 2005 at 12:00:23PM -0400, John McCutchan wrote:
> > Package: revelation
> > Followup-For: Bug #318012
> 
> > Please mark this bug as unfixed. Indeed, a correction is in order, 
> > Revelation can't
> > be installed because python2.3-crypto can't be installed. This is using
> > sid.
> 
> And that is not a bug in revelation, it's a bug in python2.3-crypto.  Having
> a second open bug against revelation would be pointless.

After rebuilding python-crypto from source and installing the so created
deb revelation is installable. Thus pyhton crypto needs to be re-build
(because of the gcc transition).

I am re-asigning this bug to python-crypto.

regards
Stefan
-- 
Stefan Völkel[EMAIL PROTECTED]
Millenux GmbH  mobile: +49.170.79177.17
Lilienthalstraße 2  phone: +49.711.88770.300
70825 Stuttgart-Korntal   fax: +49.711.88770.349
 -= linux without limits -=- http://linux.zSeries.org/ =-


signature.asc
Description: This is a digitally signed message part


Bug#322531: sound-juicer: Missing dependency

2005-08-11 Thread Peter Karlsson
Package: sound-juicer
Version: 0.6.1-2
Severity: serious
Justification: Library dependencies missing

$ sound-juicer 
sound-juicer: error while loading shared libraries:
libgnome-media-profiles.so.0: cannot open shared object file: No such file or 
directory

-- System Information:
Debian Release: 3.1
Architecture: i386 (i686)
Kernel: Linux 2.4.31
Locale: LANG=sv, LC_CTYPE=sv (charmap=ISO-8859-1) (ignored: LC_ALL set to 
sv_SE.ISO8859-1)

Versions of packages sound-juicer depends on:
ii  gconf2 2.8.1-6   GNOME configuration database syste
ii  gnome-media1.2.3-4   Gnome Media Utilities (gmix, gtcd)
ii  gstreamer0.8-cdparanoi 0.8.8-2   cdparanoia plugin for GStreamer
ii  gstreamer0.8-flac  0.8.8-2   FLAC plugin for GStreamer
ii  gstreamer0.8-misc  0.8.8-2   Collection of various GStreamer pl
ii  gstreamer0.8-vorbis0.8.8-2   Vorbis plugin for GStreamer
ii  libart-2.0-2   2.3.17-1  Library of functions for 2D graphi
ii  libatk1.0-01.8.0-4   The ATK accessibility toolkit
ii  libbonobo2-0   2.8.1-2   Bonobo CORBA interfaces library
ii  libbonoboui2-0 2.8.1-2   The Bonobo UI library
ii  libc6  2.3.2.ds1-22  GNU C Library: Shared libraries an
ii  libgcc11:3.4.3-13GCC support library
ii  libgconf2-42.8.1-6   GNOME configuration database syste
ii  libglade2-01:2.4.2-2 library to load .glade files at ru
ii  libglib2.0-0   2.6.4-1   The GLib library of C routines
ii  libgnome2-02.8.1-2   The GNOME 2 library - runtime file
ii  libgnomecanvas2-0  2.8.0-1   A powerful object-oriented display
ii  libgnomeui-0   2.8.1-3   The GNOME 2 libraries (User Interf
ii  libgnomevfs2-0 2.8.4-4   The GNOME virtual file-system libr
ii  libgstreamer-gconf0.8- 0.8.8-2   GConf support for GStreamer
ii  libgstreamer0.8-0  0.8.9-2   Core GStreamer libraries, plugins,
ii  libgtk2.0-02.6.4-3   The GTK+ graphical user interface 
ii  libice64.3.0.dfsg.1-14   Inter-Client Exchange library
ii  libmusicbrainz42.1.1-3   Second generation incarnation of t
ii  liborbit2  1:2.12.2-1libraries for ORBit2 - a CORBA ORB
ii  libpango1.0-0  1.8.1-1   Layout and rendering of internatio
ii  libpopt0   1.7-5 lib for parsing cmdline parameters
ii  libsm6 4.3.0.dfsg.1-14   X Window System Session Management
ii  libstdc++5 1:3.3.5-13The GNU Standard C++ Library v3
ii  libxml22.6.16-7  GNOME XML library
ii  xlibs  4.3.0.dfsg.1-14   X Keyboard Extension (XKB) configu
ii  zlib1g 1:1.2.2-4.sarge.2 compression library - runtime

-- no debconf information


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#322535: evolution: Multiple format string vulnerabilities in Evolution

2005-08-11 Thread Moritz Muehlenhoff
Package: evolution
Severity: grave
Tags: security

Multiple exploitable format string vulnerabilities have been found in
Evolution. Please see 
http://www.securityfocus.com/archive/1/407789/30/0/threaded
for details. 2.3.7 fixes all these issues.

Cheers,
Moritz

-- System Information:
Debian Release: testing/unstable
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.12-rc5
Locale: LANG=C, [EMAIL PROTECTED] (charmap=ISO-8859-15)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#322467: [CAN-2005-2097] Loca Table Verification Remote Denial of Service Vulnerability

2005-08-11 Thread Frank Küster
found 322467 3.0-5
thanks

Hilmar Preusse <[EMAIL PROTECTED]> wrote:

> Package: tetex-bin
> Version: 2.0.2-31
> Severity: grave
> Tags: patch
> Justification: can result in disk consumption and ultimately lead to a denial 
> of service condition.
>
> Just a reminder,
>
> http://www.securityfocus.com/bid/14529/info
>
> Ubuntu^1 already fixed the xpdf packages. I guess we're affected too,
> as pdftex processes pdf files using the code from xpdf. I did not
> file a bug against xpdf yet. I'm attaching a patch taken from
> ftp://ftp.kde.org/pub/kde/security_patches/ and the sig. According to
> Martin Pitt the original patch was posted to vendor-sec but I'm not
> subscribed to it.

tetex-bin_2.0.2 in sarge, etch, sid, as well as tetex-bin_1.0.7... in
oldstable do not have the files the patch changes.  Moreover, the
strings "loca table" or "codetogid" do not appear in
tetex-bin-{1.0.7...,2.0.2}/libs/, checked with a case-insensitive grep.

However, "truetype" appears lots of times.  Therefore it probably needs
a careful inspection of the code to check whether these are indeed
vulnerable.  It would be best if someone with a decent understanding of
C++ would do that, not me.

tetex-bin_3.0 in experimental is vulnerable.

Regards, Frank
-- 
Frank Küster
Inst. f. Biochemie der Univ. Zürich
Debian Developer




Bug#309308: [Secure-testing-team] Re: Bug#309308: kernel-image-2.6.8-2-686-smp: VLAN Oops fix for 2.6.8

2005-08-11 Thread Paul TBBle Hampson
On Thu, Aug 11, 2005 at 11:04:17AM +0200, Moritz Muehlenhoff wrote:
> Horms wrote:
> >> below patch has been slurped into the Debian patches for 2.6.8, but the
> >> error posted looks like the same error I suffered when hitting this bug.
> >> 
> >> Patch from 
> >> http://lists.osdl.org/pipermail/bridge/2004-September/000638.html
> >> 
> >> Cut and paste from the web archive, so spacing etc. may be boned.
> >> But it's a typo-only fix anyway, so easy enough to recreate.
>> 
>> Thanks I have added this to SVN. 
>> 
>> Is this considered a security bug and if so does it have a CAN number?

> There is no public CVE assignment for this issue. If's it easily reproducable
> for non-root, it might account as a local DoS vulnerability.

mii-tool's IOCTL is only allowed by root.

The remote DoS comes from the fact that snmpd will call this IOCTL when it
gets a request for the interface statistics.

So it's exploitable via SNMP if the exploiter has access to the SNMP tree
in question. (Which is not the default, if I recall correctly?)

However, this means that cricket will bone the machine during the boot process,
or soon after.

^_^

-- 
---
Paul "TBBle" Hampson, MCSE
8th year CompSci/Asian Studies student, ANU
The Boss, Bubblesworth Pty Ltd (ABN: 51 095 284 361)
[EMAIL PROTECTED]

"No survivors? Then where do the stories come from I wonder?"
-- Capt. Jack Sparrow, "Pirates of the Caribbean"

License: http://creativecommons.org/licenses/by/2.1/au/
---


pgpMi1FkN0UbN.pgp
Description: PGP signature


Bug#314990: xdm: cannot log in

2005-08-11 Thread Nathanael Nerode

Doing a little bug work.

It looks like you're running "unstable".  If so, can you still reproduce 
this bug with the xorg-x11 packages?  There've
been more than a few changes, and it will probably be easier for the 
developers to track down the bug with

the new source package.

Thanks in advance.



--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#321435: no longer RC

2005-08-11 Thread Tore Anderson
severity 321435 serious
quit

* Peter Palfrader

> A workaround has been added to tor so that it does not build those
> images on s390, making it build again in sarge.  Therefore this bug no
> longer is RC, and I downgrade it to important.

  That won't help ScummVM from failing to build, I'm afraid.  Therefore
 I'm reinstating the RC severity this bug had originally.  I hope you
 don't mind me overruling you, Peter - if you wish I can claim ownership
 of the bug from now on.

Regards
-- 
Tore Anderson



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Processed: Re: Bug#321902: fails to rmmod usbnet

2005-08-11 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> tag 321902 +moreinfo
Bug#321902: fails to rmmod usbnet
There were no tags set.
Tags added: moreinfo

> tag 321902 +upstream
Bug#321902: fails to rmmod usbnet
Tags were: moreinfo
Tags added: upstream

> severity 321902 important
Bug#321902: fails to rmmod usbnet
Severity set to `important'.

> thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#321612: marked as done (scummvm/i386: uninstallable, depends on non-existing libflac7)

2005-08-11 Thread Debian Bug Tracking System
Your message dated Thu, 11 Aug 2005 11:52:40 +0200
with message-id <[EMAIL PROTECTED]>
and subject line Bug#321612: scummvm/i386: uninstallable, depends on 
non-existing libflac7
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--
Received: (at submit) by bugs.debian.org; 6 Aug 2005 13:05:31 +
>From [EMAIL PROTECTED] Sat Aug 06 06:05:31 2005
Return-path: <[EMAIL PROTECTED]>
Received: from 84-120-66-144.onocable.ono.com (chistera.yi.org) [84.120.66.144] 
by spohr.debian.org with esmtp (Exim 3.36 1 (Debian))
id 1E1OMl-0003GX-00; Sat, 06 Aug 2005 06:05:31 -0700
Received: from userid 1000 by chistera.yi.org with local (Exim 4.52) 
  id 1E1OMj-0003ZH-Lo
  for [EMAIL PROTECTED]; Sat, 06 Aug 2005 15:05:29 +0200
Date: Sat, 6 Aug 2005 15:05:29 +0200
From: Adeodato =?utf-8?B?U2ltw7M=?= <[EMAIL PROTECTED]>
To: Debian Bug Tracking System <[EMAIL PROTECTED]>
Subject: scummvm/i386: uninstallable, depends on non-existing libflac7
Message-ID: <[EMAIL PROTECTED]>
Mime-Version: 1.0
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
X-No-CC: Please respect my Mail-Followup-To header
User-Agent: Mutt/1.5.9i
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-6.8 required=4.0 tests=BAYES_00,FROM_ENDS_IN_NUMS,
HAS_PACKAGE autolearn=no version=2.60-bugs.debian.org_2005_01_02

Package: scummvm
Version: 0.7.1-2
Severity: serious

Hello,

  I don't know how but scummvm 0.7.1-2 in i386 depends on libflac7,
  which does not exist in the archive.

  As other architectures don't show this error, please fix this with a
  binary upload for i386 only if possible.


-- 
Adeodato Simó
EM: asp16 [ykwim] alu.ua.es | PK: DA6AE621
Listening to: Astrud - Miedo a la muerte estilo imperio (Esta alegría 
fuera de contexto)
 
Old men are fond of giving good advice to console themselves for their
inability to set a bad example.
-- La Rochefoucauld, "Maxims"


---
Received: (at 321612-done) by bugs.debian.org; 11 Aug 2005 09:52:43 +
>From [EMAIL PROTECTED] Thu Aug 11 02:52:43 2005
Return-path: <[EMAIL PROTECTED]>
Received: from head.linpro.no [80.232.36.1] 
by spohr.debian.org with esmtp (Exim 3.36 1 (Debian))
id 1E39ju-0003Nd-00; Thu, 11 Aug 2005 02:52:43 -0700
Received: from f95.linpro.no ([80.232.36.96] helo=echo.e.linpro.no)
by head.linpro.no with esmtp (Exim 4.14 #1 (Debian))
id 1E39js-0004A0-CC; Thu, 11 Aug 2005 11:52:40 +0200
Subject: Re: Bug#321612: scummvm/i386: uninstallable, depends on
non-existing libflac7
From: Tore Anderson <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
In-Reply-To: <[EMAIL PROTECTED]>
References: <[EMAIL PROTECTED]>
Content-Type: text/plain; charset=UTF-8
Date: Thu, 11 Aug 2005 11:52:40 +0200
Message-Id: <[EMAIL PROTECTED]>
Mime-Version: 1.0
X-Mailer: Evolution 2.2.2 
Content-Transfer-Encoding: quoted-printable
X-Spam-Score: 0.1 (/)
X-Scanner: exiscan for exim4 (http://duncanthrax.net/exiscan/) 
*1E39js-0004A0-CC*zTqxZW.lLds*
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
autolearn=no version=2.60-bugs.debian.org_2005_01_02

* Adeodato Sim=C3=B3

>   I don't know how but scummvm 0.7.1-2 in i386 depends on libflac7,
>   which does not exist in the archive.
>=20
>   As other architectures don't show this error, please fix this with a
>   binary upload for i386 only if possible.

  I uploaded 0.7.1-2.1 to fix this a while ago, but it seems that this
 bug wasn't closed automatically, for some strange reason.  Anyway, the
 fix was simply to recompile the package after having removed my own
 home-built packages of FLAC 1.1.2 from my workstation.

  Thanks for your report.

--=20
Tore Anderson


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#321902: fails to rmmod usbnet

2005-08-11 Thread Horms
tags 321902 +wontfix
thanks

On Wed, Aug 10, 2005 at 11:22:39AM +0800, 肖盛文 Faris Xiao wrote:
> Andres Salomon wrote:
> 
> >On Tue, Aug 09, 2005 at 06:54:46PM +0900, Horms wrote:
> >[...]
> > 
> >
> >>>rmmod usbnet
> >>>
> >>>The model usbnet can not be removed.
> >>>Also the process which execute the command can not be finished,it 
> >>>consume the CPU 99% persistent,over and over.Even I can't use
> >>>
> >>> 
> >>>
> >[...]
> >
> >If this does happen w/ 2.6.12, then a backtrace would be useful.
> >Hit ctrl-alt-sysrq-t to get a dump of all processes on the system; that
> >should include the rmmod process.
> > 
> >
> The attachment cast.txt is the out put of  ctrl-alt-sysrq-t.
> I can't execute ctrl-alt-sysrq-t under X Windows terminal,so I only get 
> the last screen of the out put.

Thanks, I assume this was from 2.6.8

I've taken another look at the problem, which the trace
seems to indicate might be do_con_write(). But the
changes to this code, and the usbnet code between
2.6.8 and 2.6.11 are quite extensive, and I have
been unable to isolate the change.

I am tagging this as wontfix, though cantfix might be
a better discription. Perhaps somone will prove me wrong,
but in the mean time, please use 2.6.12.

Thanks

-- 
Horms


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#322541: mmv is unusable bacause of constant hangs / segmentation fault

2005-08-11 Thread Max
Package: mmv
Version: 1.01b-12.1
Severity: grave
Justification: renders package unusable

Under debian-amd64 mmv 1.01b-12.1 constantly segfaults. 
Even when run without parameters or with --help:

$ mmv
Segmentation fault

Under debian-i386 mmv 1.01b-12.1 does not segfault but hangs on any input.

-- System Information:
Debian Release: testing/unstable
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: amd64 (x86_64)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.12.2.64
Locale: LANG=ru_RU.KOI8-R, LC_CTYPE=ru_RU.KOI8-R (charmap=KOI8-R)

Versions of packages mmv depends on:
ii  libc6 2.3.5-3GNU C Library: Shared libraries an

mmv recommends no packages.

-- debconf-show failed


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#322539: yaboot: FTBFS: label at end of compound statement

2005-08-11 Thread Andreas Jochens
Package: yaboot
Version: 1.3.13-4
Severity: serious
Tags: patch

When building 'yaboot' on powerpc/unstable,
I get the following error:

gcc -Os  -nostdinc -Wall -isystem `gcc -print-file-name=include` -fsigned-char 
-DVERSION=\"1.3.13\"  -DTEXTADDR=0x20 -DDEBUG=0 -DMALLOCADDR=0x30 
-DMALLOCSIZE=0x10 -DKERNELADDR=0x0140 -I ./include -DCONFIG_COLOR_TEXT 
-DCONFIG_SET_COLORMAP -DUSE_MD5_PASSWORDS -DCONFIG_FS_XFS -DCONFIG_FS_REISERFS 
-c -o lib/strstr.o lib/strstr.c
lib/strstr.c: In function 'strstr':
lib/strstr.c:79: error: label at end of compound statement
make[1]: *** [lib/strstr.o] Error 1
make[1]: Leaving directory `/yaboot-1.3.13'
make: *** [debian/stamps/build] Error 2

The attached patch fixes this.

Regards
Andreas Jochens

diff -urN ../tmp-orig/yaboot-1.3.13/lib/strstr.c ./lib/strstr.c
--- ../tmp-orig/yaboot-1.3.13/lib/strstr.c  2001-09-20 13:15:31.0 
+
+++ ./lib/strstr.c  2005-08-11 08:56:27.0 +
@@ -76,7 +76,8 @@
  a = *++haystack;
  if (a == '\0')
goto ret0;
-shloop:}
+shloop:  continue;
+   }
   while (a != b);
 
 jin: a = *++haystack;


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Processed: Fixed in NMU of mpich 1.2.5.3-6.1

2005-08-11 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> tag 253422 + fixed
Bug#253422: mpirun is inconvenient on SMP systems
There were no tags set.
Tags added: fixed

> tag 306305 + fixed
Bug#306305: mpich-bin: doesn't remove alternatives correctly
There were no tags set.
Tags added: fixed

> tag 314173 + fixed
Bug#314173: libmpich1.0-dev installs incorrect alternative for 
/usr/lib/libmpi++.so
There were no tags set.
Tags added: fixed

> tag 320891 + fixed
Bug#320891: libmpich1.0: libpmpich++.so.1.0 is not linked against the libraries 
it depends on
Tags were: pending patch
Tags added: fixed

> tag 321052 + fixed
Bug#321052: mpich: clean target does not undo all the effects of build
Tags were: pending patch
Tags added: fixed

> tag 321093 + fixed
Bug#321093: mpich: missing build-dependency on tk8.4
Tags were: pending patch
Bug#317467: FTBFS: Build-Depends missing tk8.4
Tags added: fixed

> tag 321158 + fixed
Bug#321158: libmpich-mpd1.0-dev: bogus symlink 
/usr/lib/mpich-mpd/lib/shared/libpmpich++-p4mpd.so
Tags were: pending patch
Tags added: fixed

> quit
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#309308: [Secure-testing-team] Re: Bug#309308: kernel-image-2.6.8-2-686-smp: VLAN Oops fix for 2.6.8

2005-08-11 Thread Horms
On Thu, Aug 11, 2005 at 07:46:12PM +1000, Paul TBBle Hampson wrote:
> On Thu, Aug 11, 2005 at 11:04:17AM +0200, Moritz Muehlenhoff wrote:
> > Horms wrote:
> > >> below patch has been slurped into the Debian patches for 2.6.8, but the
> > >> error posted looks like the same error I suffered when hitting this bug.
> > >> 
> > >> Patch from 
> > >> http://lists.osdl.org/pipermail/bridge/2004-September/000638.html
> > >> 
> > >> Cut and paste from the web archive, so spacing etc. may be boned.
> > >> But it's a typo-only fix anyway, so easy enough to recreate.
> >> 
> >> Thanks I have added this to SVN. 
> >> 
> >> Is this considered a security bug and if so does it have a CAN number?
> 
> > There is no public CVE assignment for this issue. If's it easily 
> > reproducable
> > for non-root, it might account as a local DoS vulnerability.
> 
> mii-tool's IOCTL is only allowed by root.
> 
> The remote DoS comes from the fact that snmpd will call this IOCTL when it
> gets a request for the interface statistics.
> 
> So it's exploitable via SNMP if the exploiter has access to the SNMP tree
> in question. (Which is not the default, if I recall correctly?)
> 
> However, this means that cricket will bone the machine during the boot 
> process,
> or soon after.

I think thats a strong enough reason to tag it as a security fix,
and thus include it in a kernel security update.

-- 
Horms


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Processed: Fixed in NMU of python-crypto 2.0+dp1-2.1

2005-08-11 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> tag 318055 + fixed
Bug#318055: python2.3-crypto is uninstallable
Tags were: sid
Tags added: fixed

> quit
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#321785: fakeroot: segfaults on [hppa]

2005-08-11 Thread Joel Soete
-- Initial header ---

>From  : "Randolph Chung" [EMAIL PROTECTED]
To  : "John David Anglin" [EMAIL PROTECTED]
CC  :
[EMAIL PROTECTED],[EMAIL PROTECTED],[EMAIL PROTECTED],[EMAIL 
PROTECTED],debian-hppa@lists.debian.org,[EMAIL PROTECTED]
Date  : Wed, 10 Aug 2005 22:53:08 +0800
Subject : Re: Bug#321785: fakeroot: segfaults on [hppa]

> >>Confirmed. We are passing a function pointer with a value of -2 into
> >>__cffc, which should not happen...
> >
> >
> > Is -2 a special signal number?
>
> I don't think so. in any case, others have observed that if they use an
> older glibc, this problem does not happen.
>
> randolph
>
Hello all,

Which kernel was it?

In fact while simply rebuilding a kernel (as root, without fakeroot), I also
observe a segfault with 2.6.8 and 2.6.10 (on c110 and d380) but panicing
2.6.12 (on the same c110 and d380) as well as 2.6.13-rc6 on d380 and b2k.

Fwiw with kernel 2.6.11.12, the rebuild runs fine on this same d380 and b2k.

That's confusing me: is there actualy a pb in libc or do we need some
constraint to install this new libc?

Thanks,
Joel

---
NOTE! My email address is changing to ... @scarlet.be
Please make the necessary changes in your address book. 






Bug#309308: kernel-image-2.6.8-2-686-smp: VLAN Oops fix for 2.6.8

2005-08-11 Thread Horms
tags +pending 309308
tags +patch 309308
thanks

On Thu, Aug 11, 2005 at 11:42:54AM +1000, Paul TBBle Hampson wrote:
> Package: kernel-image-2.6.8-2-686-smp
> Followup-For: Bug #309308
> 
> Just noticed this bug in the testing-security list. I don't know if the
> below patch has been slurped into the Debian patches for 2.6.8, but the
> error posted looks like the same error I suffered when hitting this bug.
> 
> Patch from http://lists.osdl.org/pipermail/bridge/2004-September/000638.html
> 
> The patch was taken into 2.6.9-rc2, and the bug was in code introduced
> very late in the 2.6.8 cycle. (August 2004 I believe)
> 
> diff -Nru a/net/8021q/vlan_dev.c b/net/8021q/vlan_dev.c
> --- a/net/8021q/vlan_dev.c  2004-09-10 06:12:16 -07:00
> +++ b/net/8021q/vlan_dev.c  2004-09-10 06:12:16 -07:00
> @@ -772,7 +772,7 @@   
>   
>  
> case SIOCGMIIREG:
> case SIOCSMIIREG:
> if (real_dev->do_ioctl && netif_device_present(real_dev))
> -   err = real_dev->do_ioctl(dev, &ifrr, cmd);
> +   err = real_dev->do_ioctl(real_dev, &ifrr, cmd);
> break;
> 
> case SIOCETHTOOL:
> 
> Cut and paste from the web archive, so spacing etc. may be boned.
> But it's a typo-only fix anyway, so easy enough to recreate.

Thanks I have added this to SVN. 

Is this considered a security bug and if so does it have a CAN number?

-- 
Horms


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#309308: [Secure-testing-team] Re: Bug#309308: kernel-image-2.6.8-2-686-smp: VLAN Oops fix for 2.6.8

2005-08-11 Thread Moritz Muehlenhoff
Horms wrote:
> > below patch has been slurped into the Debian patches for 2.6.8, but the
> > error posted looks like the same error I suffered when hitting this bug.
> > 
> > Patch from http://lists.osdl.org/pipermail/bridge/2004-September/000638.html
> > 
> > Cut and paste from the web archive, so spacing etc. may be boned.
> > But it's a typo-only fix anyway, so easy enough to recreate.
> 
> Thanks I have added this to SVN. 
> 
> Is this considered a security bug and if so does it have a CAN number?

There is no public CVE assignment for this issue. If's it easily reproducable
for non-root, it might account as a local DoS vulnerability.

Cheers,
Moritz


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#318019: libxine and gcc4

2005-08-11 Thread Giacomo A. Catenazzi

From: http://xinehq.de/:
 26.07.2005  new xine-lib and xine-ui For the first time ever, we
   have 3 releases at the same time!
 xine-lib 1.0.2 (release notes)
   contains mostly bugfixes and is considered the safest upgrade path
   for users of older distros (not gcc4).
 xine-lib 1.1.0 (release notes)
   has (besides all the 1.0.2 fixes) an updated ffmpeg and new
   deinterlacer methods. It should be gcc4 friendly.
 xine-ui 0.99.4
  (release notes) has several fixes and improvements, including the
   long awaited audio post plugin support.

So there is a new upstream version, and "gcc4 friendly".

ciao
cate


--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Processed: Re: Bug#322500: ifstat doesnt work with libsnmp 5.2.1.2

2005-08-11 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> reassign 322500 libsnmp5,ifstat
Bug#322500: ifstat doesnt work with libsnmp 5.2.1.2
Bug reassigned from package `ifstat' to `libsnmp5,ifstat'.

> retitle 322500 libsnmp5: ABI change without SONAME change
Bug#322500: ifstat doesnt work with libsnmp 5.2.1.2
Changed Bug title.

> severity 322500 serious
Bug#322500: libsnmp5: ABI change without SONAME change
Severity set to `serious'.

> thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#322500: ifstat doesnt work with libsnmp 5.2.1.2

2005-08-11 Thread Goswin von Brederlow
reassign 322500 libsnmp5,ifstat
retitle 322500 libsnmp5: ABI change without SONAME change
severity 322500 serious
thanks

Hi Craig,

downgrading the libsnmp5 seems to be the best fix for now. But if you
need/want the new libsnmp5 then recompiling the pckage will also fix
the problem. Details below if you are intrested.


Hi Jochen,

I'm reassigning this bug to libsnmp5 as I suspect you broke the ABI
without increasing the soname of the library. Read on.


Craig Small <[EMAIL PROTECTED]> writes:

> Package: ifstat
> Version: 1.1-3
> Severity: grave
> Justification: renders package unusable
>
> ifstat doesnt work if you have libsnmp5 5.2.1.2-1 installed.
> It does work if you have 5.1.2-6.1 installed.
>
> $ ifstat -i FastEthernet3/1 -s [EMAIL PROTECTED]
> ifstat: snmpgetnext(interfaces.ifTable.ifEntry.ifIndex...): Timeout

On amd64 I get the following:

sarge:~% ifstat -s 192.168.1.1
 K32_MAC SAR_ADSL  WLAN   
 KB/s in  KB/s out   KB/s in  KB/s out   KB/s in  KB/s out
   11.14  0.66 64.69  0.00  0.00  0.00
9.37  0.28 50.97  0.00  0.00  0.00

sid:~% ifstat -s [EMAIL PROTECTED]
Segmentation fault

The gdb backtrace is completly useless and looking like stack
corruption.

> Nothing seems to make it want to work any way with that library.
> Downgrading to libsnmp5_5.1.2-6.1_i386.deb made it work properly
> as before.

Downgrading to libsnmp5 5.1.99+5.2.pre1-1 still segfaults while
5.1.2-6.1 makes it work again.


The next thing I tried is recompiling ifstat against the new library:

[EMAIL PROTECTED]:~/ifstat/ifstat-1.1$ ./ifstat -s 192.168.1.1
 K32_MAC SAR_ADSL  WLAN   
 KB/s in  KB/s out   KB/s in  KB/s out   KB/s in  KB/s out
   10.41  0.27 68.65  0.00  0.00  0.00
9.71  0.28 46.43  0.00  0.00  0.00

Voila it works again. I also get a timeout with gkrellm-snmp with the
new libsnmp5 but not with the stable one. This makes me believe the
libsnmp5 upgrade breaks binary compatibility and is to blame.


Unless you find a flaw in my findings please upload a libsnmp6 asap
and notify all rdepends of libsnmp5 of the change.

MfG
Goswin


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#192196: marked as done (xboard: Fails to build with current flex)

2005-08-11 Thread Debian Bug Tracking System
Your message dated Thu, 11 Aug 2005 05:17:04 -0700
with message-id <[EMAIL PROTECTED]>
and subject line Bug#192196: fixed in xboard 4.2.7-1
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--
Received: (at submit) by bugs.debian.org; 6 May 2003 18:50:30 +
>From [EMAIL PROTECTED] Tue May 06 13:50:29 2003
Return-path: <[EMAIL PROTECTED]>
Received: from blount.mail.mindspring.net [207.69.200.226] 
by master.debian.org with esmtp (Exim 3.12 1 (Debian))
id 19D7WH-00043w-00; Tue, 06 May 2003 13:50:29 -0500
Received: from user-119bq03.biz.mindspring.com ([66.149.232.3] 
helo=frobnitz.ddts.net)
by blount.mail.mindspring.net with esmtp (Exim 3.33 #1)
id 19D7WG-00043M-00
for [EMAIL PROTECTED]; Tue, 06 May 2003 14:50:28 -0400
Received: from daniel by frobnitz.ddts.net with local (Exim 3.36 #1 (Debian))
id 19D7W8-0005dF-00
for <[EMAIL PROTECTED]>; Tue, 06 May 2003 11:50:20 -0700
To: Debian Bug Tracking System <[EMAIL PROTECTED]>
Subject: xboard: Fails to build with current flex
From: Daniel Schepler <[EMAIL PROTECTED]>
Date: Tue, 06 May 2003 11:50:19 -0700
Message-ID: <[EMAIL PROTECTED]>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Sender: Daniel Schepler <[EMAIL PROTECTED]>
Delivered-To: [EMAIL PROTECTED]
X-Spam-Status: No, hits=-6.0 required=4.0
tests=BAYES_01,HAS_PACKAGE
version=2.53-bugs.debian.org_2003_04_23
X-Spam-Level: 
X-Spam-Checker-Version: SpamAssassin 2.53-bugs.debian.org_2003_04_23 
(1.174.2.15-2003-03-30-exp)

Package: xboard
Version: 4.2.6-2
Severity: serious

>From my build log:

...
/usr/bin/make
make[1]: Entering directory `/tmp/buildd/xboard-4.2.6'
lex  ./parser.l
mv lex.yy.c parser.c
gcc -DHAVE_CONFIG_H -I. -I.  -I/usr/X11R6/include/X11  -I/usr/X11R6/include/X11 
-DINFODIR=\"/usr/share/info\" -c parser.c
lex.yy.c:2058: syntax error before "YY_PROTO"
lex.yy.c:2058: syntax error before "YY_PROTO"
lex.yy.c:2058: conflicting types for `yy_text'
parser.h:57: previous declaration of `yy_text'
lex.yy.c:2058: warning: data definition has no type or storage class
lex.yy.c:2058: syntax error before "return"
lex.yy.c:2058: syntax error before "YY_PROTO"
lex.yy.c:2069: syntax error before "if"
... (and many more compile errors)
./parser.l: In function `yyoffset':
./parser.l:859: `yy_current_buffer' undeclared (first use in this function)
./parser.l:859: (Each undeclared identifier is reported only once
./parser.l:859: for each function it appears in.)
./parser.l: In function `yylexstr':
./parser.l:909: warning: pointer/integer type mismatch in conditional expression
./parser.l: At top level:
lex.yy.c:2062: register name not specified for `yy_act'
make[1]: *** [parser.o] Error 1
make[1]: Leaving directory `/tmp/buildd/xboard-4.2.6'
make: *** [build] Error 2

-- System Information:
Debian Release: testing/unstable
Architecture: i386
Kernel: Linux frobnitz 2.4.21-pre5 #1 Sat Mar 1 09:01:10 PST 2003 i686
Locale: LANG=C, LC_CTYPE=C


-- 
Daniel Schepler  "Please don't disillusion me.  I
[EMAIL PROTECTED]haven't had breakfast yet."
 -- Orson Scott Card

---
Received: (at 192196-close) by bugs.debian.org; 11 Aug 2005 12:20:05 +
>From [EMAIL PROTECTED] Thu Aug 11 05:20:05 2005
Return-path: <[EMAIL PROTECTED]>
Received: from katie by spohr.debian.org with local (Exim 3.36 1 (Debian))
id 1E3Bzc-0004V9-00; Thu, 11 Aug 2005 05:17:04 -0700
From: Florian Ernst <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
X-Katie: $Revision: 1.56 $
Subject: Bug#192196: fixed in xboard 4.2.7-1
Message-Id: <[EMAIL PROTECTED]>
Sender: Archive Administrator <[EMAIL PROTECTED]>
Date: Thu, 11 Aug 2005 05:17:04 -0700
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
autolearn=no version=2.60-bugs.debian.org_2005_01_02

Source: xboard
Source-Version: 4.2.7-1

We believe that the bug you reported is fixed in the latest version of
xboard, which is due to be installed in the Debian FTP archive:

xboard_4.2.7-1.diff.gz
  to pool/main/x/xboard/xboard_4.2.7-1.diff.gz
xboard_4.2.7-1.dsc
  to pool/main/x/xboard/xboard_4.2.7-1.dsc
xboard_4.2.7-1_i386.deb
  to pool/main/x/xboard/xboard_4.2.7-1_i386.deb
xboard_4.2.7.orig.tar.gz
  to pool/main/x/xboard/xboard_4.2.7.orig.tar.gz



A summary of the 

Bug#322560: udev installation prevent the installation of other packages

2005-08-11 Thread Sam Hocevar
Package: udev
Version: 0.065-1
Severity: critical
Justification: breaks unrelated software

   When installing udev, it detects I am not running a 2.6.12 kernel
and the installation fails. This prevents the installation of all other
packages.

   Please make the 2.6.12 check a runtime check instead of an install
time check.

-- Package-specific info:
-- /etc/udev/rules.d/:
/etc/udev/rules.d/:
total 0
lrwxrwxrwx  1 root root 20 2005-04-12 18:03 020_permissions.rules -> 
../permissions.rules
lrwxr-xr-x  1 root root 19 2004-12-07 17:24 cd-aliases.rules -> 
../cd-aliases.rules
lrwxrwxrwx  1 root root 13 2004-04-25 01:01 udev.rules -> ../udev.rules
lrwxrwxrwx  1 root root 12 2005-07-06 10:48 z50_run.rules -> ../run.rules
lrwxrwxrwx  1 root root 19 2005-08-04 21:49 z60_alsa-utils.rules -> 
../alsa-utils.rules
lrwxrwxrwx  1 root root 17 2005-07-06 10:48 z70_hotplugd.rules -> 
../hotplugd.rules

-- /sys/:
/sys/block/hda/dev
/sys/block/hda/hda1/dev
/sys/block/hda/hda2/dev
/sys/block/hda/hda3/dev
/sys/block/hda/hda4/dev
/sys/block/hda/hda5/dev
/sys/block/hda/hda6/dev
/sys/block/hda/hda7/dev
/sys/block/hdc/dev
/sys/class/graphics/fb0/dev
/sys/class/input/event0/dev
/sys/class/input/event1/dev
/sys/class/input/mice/dev
/sys/class/input/mouse0/dev
/sys/class/misc/hw_random/dev
/sys/class/misc/inotify/dev
/sys/class/misc/psaux/dev
/sys/class/misc/rtc/dev
/sys/class/printer/lp0/dev
/sys/class/sound/adsp/dev
/sys/class/sound/audio/dev
/sys/class/sound/controlC0/dev
/sys/class/sound/dsp/dev
/sys/class/sound/mixer/dev
/sys/class/sound/pcmC0D0c/dev
/sys/class/sound/pcmC0D0p/dev
/sys/class/sound/pcmC0D1c/dev
/sys/class/sound/pcmC0D2c/dev
/sys/class/sound/pcmC0D3c/dev
/sys/class/sound/pcmC0D4p/dev
/sys/class/sound/timer/dev

-- Kernel configuration:
 isapnp_init not present.


-- System Information:
Debian Release: testing/unstable
  APT prefers unstable
  APT policy: (500, 'unstable'), (50, 'experimental')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.10-mm3
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)

Versions of packages udev depends on:
ii  hotplug  0.0.20040329-24 Linux Hotplug Scripts
ii  initscripts  2.86.ds1-1  Standard scripts needed for bootin
ii  libc62.3.2.ds1-22GNU C Library: Shared libraries an
ii  libselinux1  1.24-1  SELinux shared libraries
ii  lsb-base 3.0-1   Linux Standard Base 2.0 init scrip
ii  makedev  2.3.1-78creates device files in /dev
ii  sed  4.1.4-2 The GNU sed stream editor

udev recommends no packages.

-- debconf information:
  udev/devfs-warning:
* udev/reboot-warning:


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Processed: tagging 322448

2005-08-11 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> # Automatically generated email from bts, devscripts version 2.9.4
> tags 322448 + pending
Bug#322448: libapache-request-perl: Apache::Request fails with unresolved 
dynamic load
Tags were: patch
Tags added: pending

>
End of message, stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#322560: marked as done (udev installation prevent the installation of other packages)

2005-08-11 Thread Debian Bug Tracking System
Your message dated Thu, 11 Aug 2005 15:00:41 +0200
with message-id <[EMAIL PROTECTED]>
and subject line Bug#322560: udev installation prevent the installation of 
other packages
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--
Received: (at submit) by bugs.debian.org; 11 Aug 2005 12:39:31 +
>From [EMAIL PROTECTED] Thu Aug 11 05:39:31 2005
Return-path: <[EMAIL PROTECTED]>
Received: from poulet.zoy.org [80.65.228.129] (postfix)
by spohr.debian.org with esmtp (Exim 3.36 1 (Debian))
id 1E3CLL-0003ip-00; Thu, 11 Aug 2005 05:39:31 -0700
Received: from localhost (localhost.localdomain [127.0.0.1])
by poulet.zoy.org (Postfix) with ESMTP id ABDB1B2626;
Thu, 11 Aug 2005 14:39:28 +0200 (CEST)
Received: from poulet.zoy.org ([127.0.0.1])
by localhost (poulet [127.0.0.1]) (amavisd-new, port 10024)
with ESMTP id 21123-05; Thu, 11 Aug 2005 14:39:28 +0200 (CEST)
Received: from poukram (localhost.localdomain [127.0.0.1])
by poulet.zoy.org (Postfix) with ESMTP id 69A94B25C6;
Thu, 11 Aug 2005 14:39:28 +0200 (CEST)
Received: by poukram (Postfix, from userid 1000)
id ED985DD04F; Thu, 11 Aug 2005 14:39:22 +0200 (CEST)
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: Sam Hocevar <[EMAIL PROTECTED]>
To: Debian Bug Tracking System <[EMAIL PROTECTED]>
Subject: udev installation prevent the installation of other packages
X-Mailer: reportbug 3.15
Date: Thu, 11 Aug 2005 14:39:22 +0200
Message-Id: <[EMAIL PROTECTED]>
X-Virus-Scanned: by amavisd-new-20030616-p10 (Debian) at zoy.org
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE 
autolearn=no version=2.60-bugs.debian.org_2005_01_02

Package: udev
Version: 0.065-1
Severity: critical
Justification: breaks unrelated software

   When installing udev, it detects I am not running a 2.6.12 kernel
and the installation fails. This prevents the installation of all other
packages.

   Please make the 2.6.12 check a runtime check instead of an install
time check.

-- Package-specific info:
-- /etc/udev/rules.d/:
/etc/udev/rules.d/:
total 0
lrwxrwxrwx  1 root root 20 2005-04-12 18:03 020_permissions.rules -> 
../permissions.rules
lrwxr-xr-x  1 root root 19 2004-12-07 17:24 cd-aliases.rules -> 
../cd-aliases.rules
lrwxrwxrwx  1 root root 13 2004-04-25 01:01 udev.rules -> ../udev.rules
lrwxrwxrwx  1 root root 12 2005-07-06 10:48 z50_run.rules -> ../run.rules
lrwxrwxrwx  1 root root 19 2005-08-04 21:49 z60_alsa-utils.rules -> 
../alsa-utils.rules
lrwxrwxrwx  1 root root 17 2005-07-06 10:48 z70_hotplugd.rules -> 
../hotplugd.rules

-- /sys/:
/sys/block/hda/dev
/sys/block/hda/hda1/dev
/sys/block/hda/hda2/dev
/sys/block/hda/hda3/dev
/sys/block/hda/hda4/dev
/sys/block/hda/hda5/dev
/sys/block/hda/hda6/dev
/sys/block/hda/hda7/dev
/sys/block/hdc/dev
/sys/class/graphics/fb0/dev
/sys/class/input/event0/dev
/sys/class/input/event1/dev
/sys/class/input/mice/dev
/sys/class/input/mouse0/dev
/sys/class/misc/hw_random/dev
/sys/class/misc/inotify/dev
/sys/class/misc/psaux/dev
/sys/class/misc/rtc/dev
/sys/class/printer/lp0/dev
/sys/class/sound/adsp/dev
/sys/class/sound/audio/dev
/sys/class/sound/controlC0/dev
/sys/class/sound/dsp/dev
/sys/class/sound/mixer/dev
/sys/class/sound/pcmC0D0c/dev
/sys/class/sound/pcmC0D0p/dev
/sys/class/sound/pcmC0D1c/dev
/sys/class/sound/pcmC0D2c/dev
/sys/class/sound/pcmC0D3c/dev
/sys/class/sound/pcmC0D4p/dev
/sys/class/sound/timer/dev

-- Kernel configuration:
 isapnp_init not present.


-- System Information:
Debian Release: testing/unstable
  APT prefers unstable
  APT policy: (500, 'unstable'), (50, 'experimental')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.10-mm3
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)

Versions of packages udev depends on:
ii  hotplug  0.0.20040329-24 Linux Hotplug Scripts
ii  initscripts  2.86.ds1-1  Standard scripts needed for bootin
ii  libc62.3.2.ds1-22GNU C Library: Shared libraries an
ii  libselinux1  1.24-1  SELinux shared libraries
ii  lsb-base 3.0-1   Linux Standard Base 2.0 init scrip
ii  makedev  2.3.1-78creates device files in /dev
ii  sed  4.1.4-2 

Bug#322564: clamav-daemon: The clamav daemon fails to start

2005-08-11 Thread Rick Friedman
Package: clamav-daemon
Version: 0.86.2-3
Severity: grave
Justification: renders package unusable

Upon attempting to start the clamav daemon, an error occurs which causes
the start to fail. Following is the error message that is displayed when
/etc/init.d/clamav-daemon is run with the start parameter:

Starting ClamAV daemon: clamd
/sbin/start-stop-daemon:
stat --oknodo: no such file or directory
(No such file or directory)
failed!

-- System Information:
Debian Release: testing/unstable
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.12-1-k7
Locale: LANG=en_US, LC_CTYPE=en_US (charmap=ISO-8859-1)

Versions of packages clamav-daemon depends on:
ii  clamav-base   0.86.2-3   base package for clamav, an anti-v
ii  clamav-freshclam [clamav-data 0.86.2-3   downloads clamav virus databases f
ii  libbz2-1.01.0.2-8high-quality block-sorting file co
ii  libc6 2.3.5-3GNU C Library: Shared libraries an
ii  libclamav10.86.2-1   virus scanner library
ii  libcurl3  7.14.0-4   Multi-protocol file transfer libra
ii  libgmp3c2 4.1.4-9Multiprecision arithmetic library
ii  libidn11  0.5.18-1   GNU libidn library, implementation
ii  libssl0.9.7   0.9.7g-1   SSL shared libraries
ii  zlib1g1:1.2.3-3  compression library - runtime

clamav-daemon recommends no packages.

-- no debconf information


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#322448: libapache-request-perl maintenance

2005-08-11 Thread Ron
On Thu, Aug 11, 2005 at 01:31:06AM -0700, ivan wrote:
> On Thu, Aug 11, 2005 at 04:47:10AM +0930, Ron wrote:
> > are you actually working on a new upload for this now?
> > Please take a peek at #322448 in that case, if you aren't
> > aware of it already.
> 
> hi, i am subscribed to the package in the BTS and also jeffrey found me
> on chat.  if its still okay with you i plan to work on and upload 1.33
> soon and will include the patch in #322448.

Cool, thanks Ivan, I figured you would be onto it, I just wanted to be
sure that really was still the case.  I doubt that you'll need/want the
patch for 1.33 though, take a peek at:

http://marc.theaimsgroup.com/?l=apreq-dev&m=105965131008577&w=2

noting especially the date reported.  I'm not sure why amd64 has
broken out in this all of a sudden, but it seems fair to presume
it will have been fixed upstream several releases ago now.

I've tagged this (and #225111) pending then, so as not to distract
other bug watchers -- and I'll leave you holding the pumpkin to
prepare the new release as we discussed previously...

best,
Ron




-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#309257: Bug #309257: libpano12: patent problems

2005-08-11 Thread Florent Bayle
Le Samedi 6 Août 2005 06:40, Steve Langasek a écrit :
> Hi Florent,
Hi Steve,

[...]
> > Well, if the prior art exists which shows the patent is invalid, I'm
> > personally satisfied that we can ship it, but this is actually the
> > purview of the ftp team to decide.
>
> Is this bug still being held open for some reason?  There don't seem to be

What did the ftp team decide ?
If they choose to keep the package because of prior art, I will close the bug.

> any packages depending on libpano12, so I think it would be fine to remove
> the package from testing anyway if further investigation is needed.

Some will come (see #246244 and #294389).

-- 
Florent


pgpsxq5jeuic0.pgp
Description: PGP signature


Bug#322564: clamav-daemon: The clamav daemon fails to start

2005-08-11 Thread Stephen Gran
This one time, at band camp, Rick Friedman said:
> Upon attempting to start the clamav daemon, an error occurs which causes
> the start to fail. Following is the error message that is displayed when
> /etc/init.d/clamav-daemon is run with the start parameter:
> 
> Starting ClamAV daemon: clamd
> /sbin/start-stop-daemon:
> stat --oknodo: no such file or directory
> (No such file or directory)
> failed!

Well, I see exactly what _must_ be happening, but it makes no sense to
me, and it works fine here.  Do me a favor, add
set -x 

as the second line in the init script (right below #!/bin/sh)

and rerun the script, and send me the output.  It's likely to be rather
long, so you may want to use script or something to capture the output.

Thanks,
-- 
 -
|   ,''`.Stephen Gran |
|  : :' :[EMAIL PROTECTED] |
|  `. `'Debian user, admin, and developer |
|`- http://www.debian.org |
 -


signature.asc
Description: Digital signature


Bug#322560: udev installation prevent the installation of other packages

2005-08-11 Thread Sam Hocevar
On Thu, Aug 11, 2005, Marco d'Itri wrote:

> >When installing udev, it detects I am not running a 2.6.12 kernel
> > and the installation fails. This prevents the installation of all other
> > packages.
> This only happens when upgrading.

   My bad. I meant upgrading, yes.

> >Please make the 2.6.12 check a runtime check instead of an install
> > time check.
> It has to work this way.

   No it does not *have* to work this way. I read Jakob Bohm's proposal
in #317332 (also backed by Manoj) and it seems to me like the perfect
way to fix the problem.

   In fact I know of no other Debian package that fails to install
because of the running kernel.

> I am a bit tired of having to explain this over
> and over, so if you do not accept my word and do not want to read the
> other closed bug reports then feel free to ask me about it on IRC.

   I think I fully figured out the technical reasons for the thing not
to work. But you did not explain over and over why it has to break the
system. The fact that Jakob's proposal would be difficult for you to
maintain is not IMHO a valid reason. You know, it is even more difficult
for me to get a kernel more recent than 2.6.10 to work on my computer,
so excuse me for not buying your argument.

   Tag the bug wontfix if you want, bug hiding the fact that the package
breaks policy by closing the bug is really not the way to do things.

-- 
Sam.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#322579: FTBFS: documentation files not available

2005-08-11 Thread martin f krafft
Package: boost
Severity: serious
Tags: patch

Trying to build the latest boost in pbuilder, it fails:

cat debian/documentation-files \
| xargs cp --parents 
--target-directory=debian/libboost-doc/usr/share/doc/libboost-doc/HTML
cp: cannot stat `libs/regex/test/regress/index.html?D=A': No such file or 
directory
[...]
cp: cannot stat `tools/boostbook/index.html': No such file or directory

I see that HTTP and wget are used to get the listing, but that will
dump autogenerated index.html files to the index when those files
are naturally not in the orig tarball.

Here's the patch against debian/documentation-files:

912,915d911
< libs/regex/test/regress/index.html?D=A
< libs/regex/test/regress/index.html?M=A
< libs/regex/test/regress/index.html?N=D
< libs/regex/test/regress/index.html?S=A
925d920
< libs/regex/test/regress/index.html
957,960d951
< libs/regex/test/pathology/index.html?D=A
< libs/regex/test/pathology/index.html?M=A
< libs/regex/test/pathology/index.html?N=D
< libs/regex/test/pathology/index.html?S=A
962d952
< libs/regex/test/pathology/index.html
964,969d953
< libs/regex/test/index.html
< libs/regex/test/concepts/index.html?D=A
< libs/regex/test/concepts/index.html?M=A
< libs/regex/test/concepts/index.html?N=D
< libs/regex/test/concepts/index.html?S=A
< libs/regex/test/concepts/index.html
972,975d955
< libs/regex/test/captures/index.html?D=A
< libs/regex/test/captures/index.html?M=A
< libs/regex/test/captures/index.html?N=D
< libs/regex/test/captures/index.html?S=A
977d956
< libs/regex/test/captures/index.html
1589d1567
< libs/serialization/src/index.html
1725,1726d1702
< libs/iostreams/src/zlib
< libs/iostreams/src/bzip2
1728d1703
< libs/iostreams/src/bzip2.cpp
1730d1704
< libs/iostreams/src/zlib.cpp
1897,1900d1870
< libs/python/test/index.html?D=A
< libs/python/test/index.html?M=A
< libs/python/test/index.html?N=D
< libs/python/test/index.html?S=A
1956d1925
< libs/python/test/index.html
2039,2042d2007
< libs/python/build/index.html?D=A
< libs/python/build/index.html?M=A
< libs/python/build/index.html?N=D
< libs/python/build/index.html?S=A
2045,2054d2009
< libs/python/build/index.html
< libs/python/build/VisualStudio/index.html?D=A
< libs/python/build/VisualStudio/index.html?D=D
< libs/python/build/VisualStudio/index.html?M=A
< libs/python/build/VisualStudio/index.html?M=D
< libs/python/build/VisualStudio/index.html?N=A
< libs/python/build/VisualStudio/index.html?N=D
< libs/python/build/VisualStudio/index.html?S=A
< libs/python/build/VisualStudio/index.html?S=D
< libs/python/build/VisualStudio/index.html
2079,2086d2033
< libs/python/example/index.html?D=A
< libs/python/example/index.html?D=D
< libs/python/example/index.html?M=A
< libs/python/example/index.html?M=D
< libs/python/example/index.html?N=A
< libs/python/example/index.html?N=D
< libs/python/example/index.html?S=A
< libs/python/example/index.html?S=D
2092d2038
< libs/python/example/index.html
2099,2102d2044
< libs/python/example/tutorial/index.html?D=A
< libs/python/example/tutorial/index.html?M=A
< libs/python/example/tutorial/index.html?N=D
< libs/python/example/tutorial/index.html?S=A
2105d2046
< libs/python/example/tutorial/index.html
2197,2200d2137
< libs/spirit/example/index.html?D=A
< libs/spirit/example/index.html?M=A
< libs/spirit/example/index.html?N=D
< libs/spirit/example/index.html?S=A
2212d2148
< libs/spirit/example/fundamental/index.html
2230,2231d2165
< libs/spirit/example/index.html
< libs/spirit/example/intermediate/index.html
2235d2168
< libs/spirit/example/techniques/index.html
2790,2797d2722
< tools/boostbook/doc/index.html?D=A
< tools/boostbook/doc/index.html?D=D
< tools/boostbook/doc/index.html?M=A
< tools/boostbook/doc/index.html?M=D
< tools/boostbook/doc/index.html?N=A
< tools/boostbook/doc/index.html?N=D
< tools/boostbook/doc/index.html?S=A
< tools/boostbook/doc/index.html?S=D
2799d2723
< tools/boostbook/doc/index.html
2805,2813d2728
< tools/boostbook/dtd/index.html?D=A
< tools/boostbook/dtd/index.html?D=D
< tools/boostbook/dtd/index.html?M=A
< tools/boostbook/dtd/index.html?M=D
< tools/boostbook/dtd/index.html?N=A
< tools/boostbook/dtd/index.html?N=D
< tools/boostbook/dtd/index.html?S=A
< tools/boostbook/dtd/index.html?S=D
< tools/boostbook/dtd/index.html
2815,2819d2729
< tools/boostbook/xsl/dtd/index.html?D=A
< tools/boostbook/xsl/dtd/index.html?M=A
< tools/boostbook/xsl/dtd/index.html?N=D
< tools/boostbook/xsl/dtd/index.html?S=A
< tools/boostbook/xsl/dtd/index.html
2821,2828d2730
< tools/boostbook/xsl/index.html?D=A
< tools/boostbook/xsl/index.html?D=D
< tools/boostbook/xsl/index.html?M=A
< tools/boostbook/xsl/index.html?M=D
< tools/boostbook/xsl/index.html?N=A
< tools/boostbook/xsl/index.html?N=D
< tools/boostbook/xsl/index.html?S=A
< tools/boostbook/xsl/index.html?S=D
2834,2838d2735
< tools/boostbook/xsl/doxygen/index.html?D=A
< tools/boostbook/xsl/doxygen/index.html?M=A
< tools/boostbook/xsl/doxygen/index.html?N=D
< tools/boostbook/xsl/doxygen/index.html?S=A
< tools/boostbook/xsl/doxygen/index.html
28

Bug#322500: Upstream bug

2005-08-11 Thread Jochen Friedrich
forward  322500 http://net-snmp.sf.net
tag + upstream
thanks

Hi,

unfortunately, simply changing the SONAME would make us incompatible
with the rest of the world. I reported the bug back upstream and hope
they will change the SONAME
upstream.

Thanks,
Jochen


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#321815: marked as done (kazehakase: FTBFS: Missing build dependency on libssl-dev?)

2005-08-11 Thread Debian Bug Tracking System
Your message dated Thu, 11 Aug 2005 08:17:04 -0700
with message-id <[EMAIL PROTECTED]>
and subject line Bug#321815: fixed in kazehakase 0.2.9-2
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--
Received: (at submit) by bugs.debian.org; 7 Aug 2005 17:47:29 +
>From [EMAIL PROTECTED] Sun Aug 07 10:47:29 2005
Return-path: <[EMAIL PROTECTED]>
Received: from poros.telenet-ops.be [195.130.132.44] 
by spohr.debian.org with esmtp (Exim 3.36 1 (Debian))
id 1E1pFA-0002dV-00; Sun, 07 Aug 2005 10:47:29 -0700
Received: from localhost (localhost.localdomain [127.0.0.1])
by poros.telenet-ops.be (Postfix) with SMTP id 6D6FD3BC1D7
for <[EMAIL PROTECTED]>; Sun,  7 Aug 2005 19:47:27 +0200 (MEST)
Received: from Q.roeckx.be (dD5775FD9.access.telenet.be [213.119.95.217])
by poros.telenet-ops.be (Postfix) with ESMTP id 3459A3BC0DC
for <[EMAIL PROTECTED]>; Sun,  7 Aug 2005 19:47:27 +0200 (MEST)
Received: by Q.roeckx.be (Postfix, from userid 501)
id DE9C926136; Sun, 07 Aug 2005 19:47:26 +0200 (CEST)
Date: Sun, 7 Aug 2005 19:47:26 +0200
From: Kurt Roeckx <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
Subject: kazehakase: FTBFS: Missing build dependency on libssl-dev?
Message-ID: <[EMAIL PROTECTED]>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
User-Agent: Mutt/1.4.2.1i
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE 
autolearn=no version=2.60-bugs.debian.org_2005_01_02

Package: kazehakase
Version: 0.2.9-1
Severity: serious

Hi,

Your package is failing to build with the following error:
checking for SSL... configure: error: Package requirements (openssl) were not 
met.
Consider adjusting the PKG_CONFIG_PATH environment variable if you
installed software in a non-standard prefix.

Alternatively you may set the SSL_CFLAGS and SSL_LIBS environment variables
to avoid the need to call pkg-config.  See the pkg-config man page for
more details.
make: *** [config.status] Error 1

This looks like a missing build depedency on libssl-dev.


Kurt


---
Received: (at 321815-close) by bugs.debian.org; 11 Aug 2005 15:22:18 +
>From [EMAIL PROTECTED] Thu Aug 11 08:22:18 2005
Return-path: <[EMAIL PROTECTED]>
Received: from katie by spohr.debian.org with local (Exim 3.36 1 (Debian))
id 1E3Eno-iu-00; Thu, 11 Aug 2005 08:17:04 -0700
From: Hidetaka Iwai <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
X-Katie: $Revision: 1.56 $
Subject: Bug#321815: fixed in kazehakase 0.2.9-2
Message-Id: <[EMAIL PROTECTED]>
Sender: Archive Administrator <[EMAIL PROTECTED]>
Date: Thu, 11 Aug 2005 08:17:04 -0700
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
autolearn=no version=2.60-bugs.debian.org_2005_01_02

Source: kazehakase
Source-Version: 0.2.9-2

We believe that the bug you reported is fixed in the latest version of
kazehakase, which is due to be installed in the Debian FTP archive:

kazehakase_0.2.9-2.diff.gz
  to pool/main/k/kazehakase/kazehakase_0.2.9-2.diff.gz
kazehakase_0.2.9-2.dsc
  to pool/main/k/kazehakase/kazehakase_0.2.9-2.dsc
kazehakase_0.2.9-2_i386.deb
  to pool/main/k/kazehakase/kazehakase_0.2.9-2_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Hidetaka Iwai <[EMAIL PROTECTED]> (supplier of updated kazehakase package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Mon,  8 Aug 2005 11:45:01 +0900
Source: kazehakase
Binary: kazehakase
Architecture: source i386
Version: 0.2.9-2
Distribution: unstable
Urgency: low
Maintainer: Hidetaka Iwai <[EMAIL PROTECTED]>
Changed-By: Hidetaka Iwai <[EMAIL PROTECTED]>
Description: 
 kazehakase - gecko based web browser using

Bug#322564: clamav-daemon: The clamav daemon fails to start

2005-08-11 Thread Rick Friedman
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Stephen Gran wrote:
> This one time, at band camp, Rick Friedman said:
> 
>>Upon attempting to start the clamav daemon, an error occurs which causes
>>the start to fail. Following is the error message that is displayed when
>>/etc/init.d/clamav-daemon is run with the start parameter:
>>
>>Starting ClamAV daemon: clamd
>>/sbin/start-stop-daemon:
>>stat --oknodo: no such file or directory
>>(No such file or directory)
>>failed!
> 
> 
> Well, I see exactly what _must_ be happening, but it makes no sense to
> me, and it works fine here.  Do me a favor, add
> set -x 
> 
> as the second line in the init script (right below #!/bin/sh)
> 
> and rerun the script, and send me the output.  It's likely to be rather
> long, so you may want to use script or something to capture the output.

Stephen,

I did what you requested and have attached the file that was created
consisting of the output from the init script.

Thanks,
Rick
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.1 (GNU/Linux)

iD8DBQFC+3I3OlHq0MpoXLoRAqFQAJ43MRRqru7gOw0rdHSG0xMiDROkiQCeNi8x
eJFZrNU8JGhs8GZj3M2NGS8=
=67CK
-END PGP SIGNATURE-
+ PATH=/sbin:/bin:/usr/sbin:/usr/bin
+ DAEMON=/usr/sbin/clamd
+ NAME=clamd
+ DESC='ClamAV daemon'
+ CLAMAVCONF=/etc/clamav/clamd.conf
+ SUPERVISOR=/usr/bin/daemon
+ SUPERVISORNAME=daemon
+ SUPERVISORPIDFILE=/var/run/clamav/daemon-clamd.pid
+ SUPERVISORARGS='--name=clamd --respawn /usr/sbin/clamd -F 
/var/run/clamav/daemon-clamd.pid'
+ '[' -x /usr/sbin/clamd ']'
+ '[' -r /etc/default/clamav-daemon ']'
+ . /etc/default/clamav-daemon
+ . /lib/lsb/init-functions
++ TPUT=/usr/bin/tput
++ EXPR=/usr/bin/expr
++ '[' -x /usr/bin/tput ']'
++ '[' -x /usr/bin/expr ']'
++ /usr/bin/tput hpa 60
++ FANCYTTY=1
+ '[' '!' -f /etc/clamav/clamd.conf ']'
+ grep -q '^Example' /etc/clamav/clamd.conf
+ grep -q '^Foreground' /etc/clamav/clamd.conf
++ grep '^PidFile' /etc/clamav/clamd.conf
++ awk '{print $2}'
+ THEPIDFILE=
+ '[' -z '' ']'
+ '[' -e '' ']'
+ '[' '' = 1 ']'
+ case "$1" in
+ '[' -z '' ']'
+ log_begin_msg 'Starting ClamAV daemon: clamd'
+ '[' -z 'Starting ClamAV daemon: clamd' ']'
+ echo -n 'Starting ClamAV daemon: clamd'
Starting ClamAV daemon: clamd+ start_daemon -p /usr/sbin/clamd
+ local force nice pidfile exec
++ POSIXLY_CORRECT=1
++ getopt fn:p: -p /usr/sbin/clamd
+ set -- -p /usr/sbin/clamd --
+ force=0
+ nice=0
+ pidfile=/dev/null
+ for i in '$*'
+ case $i in
+ pidfile=/usr/sbin/clamd
+ shift 2
+ for i in '$*'
+ case $i in
+ for i in '$*'
+ case $i in
+ shift
+ break
+ exec=
+ shift
+ '[' 0 = 1 ']'
+ '[' /usr/sbin/clamd ']'
+ /sbin/start-stop-daemon --start --nicelevel 0 --quiet --exec --oknodo 
--pidfile /usr/sbin/clamd --
/sbin/start-stop-daemon: stat --oknodo: No such file or directory (No such file 
or directory)
+ ret=2
+ log_end_msg 2
+ '[' -z 2 ']'
+ '[' 1 -eq 1 ']'
++ /usr/bin/tput setaf 1
+ RED=''
++ /usr/bin/tput op
+ NORMAL=''
+ '[' 2 -eq 0 ']'
+ /bin/echo -e ' failed!'
 failed!
+ return 2
+ exit 0


Bug#322564: clamav-daemon: The clamav daemon fails to start

2005-08-11 Thread Stephen Gran
On Thu, Aug 11, 2005 at 11:43:51AM -0400, Rick Friedman said:
> Stephen Gran wrote:
> > This one time, at band camp, Rick Friedman said:
> >>
> >>Starting ClamAV daemon: clamd
> >>/sbin/start-stop-daemon:
> >>stat --oknodo: no such file or directory
> >>(No such file or directory)
> >>failed!
> > 
> > 
> > Well, I see exactly what _must_ be happening, but it makes no sense to
> > me, and it works fine here.
> 
> Stephen,
> 
> I did what you requested and have attached the file that was created
> consisting of the output from the init script.

[snip]

> + THEPIDFILE=

Here is the problem, resulting in the wrong arguments being passed:

> + start_daemon -p /usr/sbin/clamd

Fixing now.
-- 
 --
|  Stephen Gran  | And then there was the lawyer that  |
|  [EMAIL PROTECTED] | stepped in cow manure and thought he|
|  http://www.lobefin.net/~steve | was melting...  |
 --


signature.asc
Description: Digital signature


Processed: [Fwd: Processed: Upstream bug]

2005-08-11 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> forwarded  322500 http://net-snmp.sf.net
Bug#322500: libsnmp5: ABI change without SONAME change
Noted your statement that Bug has been forwarded to http://net-snmp.sf.net.

> tags 322500 + upstream
Bug#322500: libsnmp5: ABI change without SONAME change
There were no tags set.
Tags added: upstream

> thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#315004: raidtools2: Ignoring /etc/raidtab breaks upgrade to mdadm

2005-08-11 Thread Adam C Powell IV
Hello,

On Tue, 2005-08-09 at 20:44 +0100, Martin Michlmayr wrote:
> Hi Adam (et al.),
> 
> Sorry for not responding earlier but I've been travelling and quite
> busy and completely forgot about this issue.  As I said, I don't know
> what the ideal situation is.  The nice thing about the transition
> package is that it provides some kind of upgrade path: it depends on
> the package you need and has a NEWS entry telling you what to do.  It
> will work for most (easy) configurations.  It will not work for
> complex systems.  I assumed the sys admins of such people would either
> read the docs or could deal with breakage.  But who knows.  Maybe a
> debconf message should be added; maybe the package should be removed
> altogether.
> 
> If you think you have a good solution, please talk to the stable
> release manager and NMU this package at will.

Thanks, I'll produce a patch by next week and give this a try.

-Adam
-- 
GPG fingerprint: D54D 1AEE B11C CE9B A02B  C5DD 526F 01E8 564E E4B6

Welcome to the best software in the world today cafe!
http://www.take6.com/albums/greatesthits.html


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#322560: udev installation prevent the installation of other packages

2005-08-11 Thread Marco d'Itri
On Aug 11, Sam Hocevar <[EMAIL PROTECTED]> wrote:

>No it does not *have* to work this way. I read Jakob Bohm's proposal
> in #317332 (also backed by Manoj) and it seems to me like the perfect
> way to fix the problem.
Except for the detail that it does not work: the old version of udev
could not provide all the features of the new, breaking other packages,
and would require different configuration files.

>Tag the bug wontfix if you want, bug hiding the fact that the package
> breaks policy by closing the bug is really not the way to do things.
No, there is no policy violation and the kernel requirement has been
accepted by the release team.

-- 
ciao,
Marco


signature.asc
Description: Digital signature


Bug#308879: Patches not sufficient

2005-08-11 Thread Christoph Ulrich Scholler
The reason for the breakage is that something in the behaviour of
openssl has changed between versions 0.9.7e-3, which is part of Sarge,
and 0.9.7g-1 and newer.

This leads not only to an infinite loop at startup (which is fixed by at
least one of the submitted patches) but also to a problem dealing with
CRLs: Revoked certificates remain "valid" in the TinyCA UI, although
they are in fact revoked.

I will soon prepare a package for TinyCA 0.7.0 which thoroughly fixes
this bug.

uLI


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#322564: marked as done (clamav-daemon: The clamav daemon fails to start)

2005-08-11 Thread Debian Bug Tracking System
Your message dated Thu, 11 Aug 2005 09:17:09 -0700
with message-id <[EMAIL PROTECTED]>
and subject line Bug#322564: fixed in clamav 0.86.2-5
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--
Received: (at submit) by bugs.debian.org; 11 Aug 2005 13:11:27 +
>From [EMAIL PROTECTED] Thu Aug 11 06:11:27 2005
Return-path: <[EMAIL PROTECTED]>
Received: from pool-70-107-48-209.ny325.east.verizon.net 
(localhost.localdomain) [70.107.48.209] 
by spohr.debian.org with esmtp (Exim 3.36 1 (Debian))
id 1E3CqF-0003wn-00; Thu, 11 Aug 2005 06:11:27 -0700
Received: from rick by localhost.localdomain with local (Exim 4.52)
id 1E3Cpk-0003PH-Dm; Thu, 11 Aug 2005 09:10:56 -0400
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: Rick Friedman <[EMAIL PROTECTED]>
To: Debian Bug Tracking System <[EMAIL PROTECTED]>
Subject: clamav-daemon: The clamav daemon fails to start
X-Mailer: reportbug 3.15
Date: Thu, 11 Aug 2005 09:10:56 -0400
Message-Id: <[EMAIL PROTECTED]>
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE 
autolearn=no version=2.60-bugs.debian.org_2005_01_02

Package: clamav-daemon
Version: 0.86.2-3
Severity: grave
Justification: renders package unusable

Upon attempting to start the clamav daemon, an error occurs which causes
the start to fail. Following is the error message that is displayed when
/etc/init.d/clamav-daemon is run with the start parameter:

Starting ClamAV daemon: clamd
/sbin/start-stop-daemon:
stat --oknodo: no such file or directory
(No such file or directory)
failed!

-- System Information:
Debian Release: testing/unstable
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.12-1-k7
Locale: LANG=en_US, LC_CTYPE=en_US (charmap=ISO-8859-1)

Versions of packages clamav-daemon depends on:
ii  clamav-base   0.86.2-3   base package for clamav, an anti-v
ii  clamav-freshclam [clamav-data 0.86.2-3   downloads clamav virus databases f
ii  libbz2-1.01.0.2-8high-quality block-sorting file co
ii  libc6 2.3.5-3GNU C Library: Shared libraries an
ii  libclamav10.86.2-1   virus scanner library
ii  libcurl3  7.14.0-4   Multi-protocol file transfer libra
ii  libgmp3c2 4.1.4-9Multiprecision arithmetic library
ii  libidn11  0.5.18-1   GNU libidn library, implementation
ii  libssl0.9.7   0.9.7g-1   SSL shared libraries
ii  zlib1g1:1.2.3-3  compression library - runtime

clamav-daemon recommends no packages.

-- no debconf information

---
Received: (at 322564-close) by bugs.debian.org; 11 Aug 2005 16:21:11 +
>From [EMAIL PROTECTED] Thu Aug 11 09:21:11 2005
Return-path: <[EMAIL PROTECTED]>
Received: from katie by spohr.debian.org with local (Exim 3.36 1 (Debian))
id 1E3Fjx-0003rn-00; Thu, 11 Aug 2005 09:17:09 -0700
From: Stephen Gran <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
X-Katie: $Revision: 1.56 $
Subject: Bug#322564: fixed in clamav 0.86.2-5
Message-Id: <[EMAIL PROTECTED]>
Sender: Archive Administrator <[EMAIL PROTECTED]>
Date: Thu, 11 Aug 2005 09:17:09 -0700
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
autolearn=no version=2.60-bugs.debian.org_2005_01_02

Source: clamav
Source-Version: 0.86.2-5

We believe that the bug you reported is fixed in the latest version of
clamav, which is due to be installed in the Debian FTP archive:

clamav-base_0.86.2-5_all.deb
  to pool/main/c/clamav/clamav-base_0.86.2-5_all.deb
clamav-daemon_0.86.2-5_i386.deb
  to pool/main/c/clamav/clamav-daemon_0.86.2-5_i386.deb
clamav-docs_0.86.2-5_all.deb
  to pool/main/c/clamav/clamav-docs_0.86.2-5_all.deb
clamav-freshclam_0.86.2-5_i386.deb
  to pool/main/c/clamav/clamav-freshclam_0.86.2-5_i386.deb
clamav-milter_0.86.2-5_i386.deb
  to pool/main/c/clamav/clamav-milter_0.86.2-5_i386.deb
clamav-testfiles_0.86.2-5_all.deb
  to pool/main/c/clamav/clamav-testfiles_0.86.2-5_all.deb
cla

Processed: fixing sev

2005-08-11 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> severity 322583 grave
Bug#322583: uninstallable due to C++ transition
Severity set to `grave'.

> thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#322591: awstats: [CAN-2005-1527] arbitrary command injection

2005-08-11 Thread Martin Pitt
Package: awstats
Version: 6.4-1
Severity: grave
Tags: patch security

Hi!

awstats is vulnerable to a command injection flaw in crafted referer
URLs. Details are at:

  http://www.idefense.com/application/poi/display?id=290&type=vulnerabilities

This is CAN-2005-1527, please mention it in the changelog.

You can get the Ubuntu patch from

  http://patches.ubuntu.com/patches/awstats.CAN-2005-1527.diff

The patch is not really minimal since it replaces _all_ eval calls
with their equivalent, but faster and safer counterparts (soft
references), though. So if you prefer a minimal patch, this would be
it:

--- awstats-6.4/wwwroot/cgi-bin/awstats.pl  2005-08-11 18:20:39.0 
+0200
+++ awstats-6.4.new/wwwroot/cgi-bin/awstats.pl  2005-08-11 18:21:14.0 
+0200
@@ -4838,8 +4856,10 @@
 
# Call to plugins' function ShowInfoURL
foreach my $pluginname (keys %{$PluginsLoaded{'ShowInfoURL'}})  {
-   my $function="ShowInfoURL_$pluginname('$url')";
-   eval("$function");
+#  my $function="ShowInfoURL_$pluginname('$url')";
+#  eval("$function");
+   my $function="ShowInfoURL_$pluginname";
+   &$function($url);
}

-- 
Martin Pitthttp://www.piware.de
Ubuntu Developer   http://www.ubuntu.com
Debian Developer   http://www.debian.org


signature.asc
Description: Digital signature


Bug#318055: python2.3-crypto: please upload NOW

2005-08-11 Thread Andreas Rottmann
John McCutchan <[EMAIL PROTECTED]> writes:

> Package: python2.3-crypto
> Followup-For: Bug #318055
>
> Bastian, Please just upload this now. I have had this bug open for
> almost a month without even a response from the maintainer. That is more
> than enough time for the maintainer to express interest in fixing this
> bug.
>
Sorrt for being so extremly sluggish, but matters have been quite busy
for me the last month(s). I'll do an upload ASAP.

Rotty


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#315671: DSA claims this is fixed in a version of webcalendar that is not in the archive

2005-08-11 Thread Joey Hess
FYI, from the DSA about this security hole:

For the unstable distribution (sid) this problem has been fixed in
version 0.9.45-6.

But it seems that version was never uploaded.

-- 
see shy jo


signature.asc
Description: Digital signature


Processed: Re: Processed: Merge!

2005-08-11 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> reassign 320656  libdjvulibre1
Bug#320656: evince: libdjvulibre.so.14 has gone
Bug reassigned from package `djvulibre' to `libdjvulibre1'.

> merge 320656 320582
Bug#320582: libdjvulibre1: soname of library changed
Bug#320656: evince: libdjvulibre.so.14 has gone
Bug#320621: libdjvulibre1 3.5.14-6 changes soname without warning
Bug#320794: evince: Evince missing library libdjvulibre.so
Bug#321244: evince does not start, missing dependency on libdjvulibre1.so.14
Bug#321406: evince: libdjvulibre dependency problem
Bug#321509: evince is linked against libdjvulibre.so.14 when libdjvulibre1 
provides libdjvulibre.so.15
Bug#321652: evince: Evince shared library problem
Merged 320582 320621 320656 320794 321244 321406 321509 321652.

> thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#321052: NMU diff for several mpich bugs; please ack or nack

2005-08-11 Thread Adam C Powell IV
Greetings,

I'm afraid I'm just back from a couple of weeks out of the country and
with very limited email contact.  During this time, my packages were
(rightfully) rejected from the NEW queue, and the 0-day NMU policy took
effect, under which you NMU-ed my packages.  I had not foreseen this
change, since I figured, my old packages are fine, the new ones will go
in "when they're ready".

Unfortunately, this had the detrimental effect of assigning the -c2
label to library packages with only one binary change: the new C++ ABI.
If you read debian-beowulf, you know that I have been preparing a 1.2.7
upload with c2 which also includes removal of the slog library (by
upstream) and addition of fortran 90 libs using the new gfortran
compiler.

Since upstream has not changed its library sonames (in spite of removing
slog, on which mpe used to depend), your NMU would force me to use a new
non-standard change to the library package name to account for these
updates.

Therefore, is there any way to retract your NMU packages from the NEW
queue?  (Actually, I don't see them there, but they should be because
they involve renamed packages...)  This would make my life much easier.
I'll have new 1.2.7 packages available by tomorrow, to replace the ones
you uploaded; if simply uploading mine will make this happen then I'll
do that.

Oh well, I suppose it's my fault for not getting my updated c2 packages
uploaded within the few days between the gcc 4.0 upgrade and my travel.
Thanks for the emails and NMU, I hope we can pull back or replace
1.2.5.3-6.1, and I'll use (some version of) your patch (with attribution
of course) in my 1.2.7 packages.

Regards,

-Adam

On Thu, 2005-08-04 at 02:16 +0200, Adeodato Simó wrote:
> tag 320891 +patch
> tag 321052 +patch
> tag 321093 +patch
> tag 321158 +patch
> thanks
> 
> Hello Adam,
> 
>   I've prepared a non-maintainer upload to fix the various RC bugs
>   reported against the mpich source package. It is based on the
>   1.2.5.3-6 version you uploaded a month ago, which was recently
>   rejected from the NEW queue.
> 
>   I attach the NMU diff and, for your convenience, an diff of the result
>   of applying the new 18_link_against_needed_libs.dpatch, so it can be
>   read more easily.
> 
>   As the diff is sort of big, I will wait a bit before making the upload
>   despite being in 0-day NMU policy; I'd really like to upload (or not)
>   after having heard from you, but note that I can't wait indefinitely.
>   So please let me know if there are any problems with the proposed
>   patch I should fix before uploading, or if you'll be making an upload
>   yourself _soon_.
> 
>   Hoping being of help,

-- 
GPG fingerprint: D54D 1AEE B11C CE9B A02B  C5DD 526F 01E8 564E E4B6

Welcome to the best software in the world today cafe!
http://www.take6.com/albums/greatesthits.html



Bug#317703: CVE typo

2005-08-11 Thread Joey Hess
Sorry, I seem to have typoed the assigned CVE for this hole. It's
CAN-2005-2347, not CAN-2005-2437. I'm sorry for the confusion and it
would be good if you could update your changelog in the next upload.

-- 
see shy jo


signature.asc
Description: Digital signature


Bug#322583: uninstallable due to C++ transition

2005-08-11 Thread Brett Parker
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Decklin Foster <[EMAIL PROTECTED]> wrote:
> Package: xmms-scrobbler
> Version: 0.3.8.1-3
> Severity: normal
> 
> xmms-scrobbler needs to be recompiled against libmusicbrainz4c2.
> Currently, attempting to install it yields:
> 
> The following packages have unmet dependencies:
>   xmms-scrobbler: Depends: libmusicbrainz4 (>= 2.1.1) but it is not 
> installable
> E: Broken packages
> 
> Should just be a matter of rebuilding. I can NMU if needed.

I've got a couple of other changes to build in to potentially fix a few
other bugs, should be uploaded by monday (assuming that I find some
copious spare time between now and then).

Thanks,
- -- 
Brett Parker
web:   http://www.sommitrealweird.co.uk/
email: [EMAIL PROTECTED]
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.1 (GNU/Linux)

iD8DBQFC+45yEh8oWxevnjQRAoEsAJ9kCUOam6HE7fvGWqNIpv5XEHCirgCfUzOQ
eod/MNOmbcqyU7GvxsOFSnU=
=4719
-END PGP SIGNATURE-


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Processed: Re: Bug#319562: patch done for bug #319562

2005-08-11 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> tags 319562 - patch
Bug#319562: FTBFS: Labels at the end of compound statements
Tags were: patch
Tags removed: patch

> thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#319562: patch done for bug #319562

2005-08-11 Thread Robert Luberda
tags 319562 - patch
thanks

Hi,

>
>
> Below there's a patch that corrects these problems and
> some others which came out later.

Yeap, fenris builds with the patch fine, but refuses to work:

[135]/home/robert/Debian/fenris/fenris> ./fenris ./fenris
fenris 0.07-m2 (3245, 23496) - program execution path analysis tool
Brought to you by Michal Zalewski <[EMAIL PROTECTED]>
>> Exit condition: dynamic mode disabled

It's probably caused by the newest glibc:
[+] C library _init code: no known _init pattern!

[!] **WARNING** Your GNU C library does not seem to use known
__do_global_ctors_aux(...) function code. This means you
will be able to trace programs in -s (no prolog detection)
only and that you can't benefit from auto libc init skipping
feature. Please contact the author ([EMAIL PROTECTED])
providing him with CTORS.txt file I've created for you.
Try not to use generated code if you do not have to.

Supported libc versions: 2.0.7 2.1.92 2.2.2 2.2 2.1.3 2.2.4 2.3.2
Your libc version is:2.3.5

I have no idea how to fix the problem, and unfortunatelly the upstream
author is not responding :( I'll orphan the package.


Best Regards
robert


signature.asc
Description: Digital signature


Bug#322602: postfix: trivial-rewrite crashes with signal 11

2005-08-11 Thread Robert Luberda

Package: postfix
Version: 2.2.4-1
Severity: grave
Justification: causes non-serious data loss

Hi,

Postfix refuses to send any mail, according to its log:

Aug 11 19:34:12 vox postfix/master[3132]: warning: 
/usr/lib/postfix/trivial-rewrite: bad command start
up -- throttling
Aug 11 19:35:12 vox postfix/master[3132]: warning: process 
/usr/lib/postfix/trivial-rewrite pid 3324 k
illed by signal 11
Aug 11 19:35:12 vox postfix/master[3132]: warning: 
/usr/lib/postfix/trivial-rewrite: bad command start
up -- throttling
Aug 11 19:35:12 vox postfix/cleanup[3249]: warning: premature end-of-input on 
private/rewrite socket w
hile reading input attribute name
Aug 11 19:35:12 vox postfix/cleanup[3249]: warning: problem talking to service 
rewrite: Success
Aug 11 19:36:12 vox postfix/master[3132]: warning: process 
/usr/lib/postfix/trivial-rewrite pid 3340 k
illed by signal 11
Aug 11 19:36:12 vox postfix/master[3132]: warning: 
/usr/lib/postfix/trivial-rewrite: bad command start
up -- throttling
Aug 11 19:36:12 vox postfix/cleanup[3249]: warning: premature end-of-input on 
private/rewrite socket w
hile reading input attribute name
Aug 11 19:36:12 vox postfix/cleanup[3249]: warning: problem talking to service 
rewrite: Success
Aug 11 19:37:12 vox postfix/master[3132]: warning: process 
/usr/lib/postfix/trivial-rewrite pid 3353 k
illed by signal 11
Aug 11 19:37:12 vox postfix/master[3132]: warning: 
/usr/lib/postfix/trivial-rewrite: bad command start
up -- throttling
Aug 11 19:37:12 vox postfix/cleanup[3249]: warning: premature end-of-input on 
private/rewrite socket w
hile reading input attribute name
Aug 11 19:37:12 vox postfix/cleanup[3249]: warning: problem talking to service 
rewrite: Success


Best Regards,
robert


-- System Information:
Debian Release: testing/unstable
  APT prefers unstable
  APT policy: (100, 'unstable')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/pdksh
Kernel: Linux 2.6.12
Locale: LANG=pl_PL, LC_CTYPE=pl_PL (charmap=ISO-8859-2)

Versions of packages postfix depends on:
ii  adduser   3.66   Add and remove users and groups
ii  debconf [debconf-2.0] 1.4.56 Debian configuration management sy
ii  dpkg  1.13.10Package maintenance system for Deb
ii  libc6 2.3.5-3GNU C Library: Shared libraries an
ii  libdb4.2  4.2.52-19  Berkeley v4.2 Database Libraries [
ii  libsasl2  2.1.19-1.5 Authentication abstraction library
ii  libssl0.9.7   0.9.7g-1   SSL shared libraries
ii  netbase   4.21   Basic TCP/IP networking system

Versions of packages postfix recommends:
ii  emacs21 [mail-re 21.4a-1 The GNU Emacs editor
di  kmail [mail-read 4:3.3.2-3   KDE Email client
ii  mailutils-mh [ma 1:0.6.90-1  GNU mailutils-based MH utilities
ii  mailx [mail-read 1:8.1.2-0.20050715cvs-1 A simple mail user agent
ii  mozilla-mailnews 2:1.7.10-1  The Mozilla Internet application s
ii  mozilla-thunderb 1.0.6-3 Mozilla Thunderbird standalone mai
ii  mutt [mail-reade 1.5.9-2 Text-based mailreader supporting M
ii  resolvconf   1.33nameserver information handler
ii  xemacs21-gnome-m 21.4.17-2   highly customizable text editor --
ii  xemacs21-gnome-m 21.4.17-2   highly customizable text editor --
ii  xemacs21-gnome-n 21.4.17-2   highly customizable text editor --
ii  xemacs21-mule [m 21.4.17-2   highly customizable text editor --
ii  xemacs21-mule-ca 21.4.17-2   highly customizable text editor --
ii  xemacs21-nomule  21.4.17-2   highly customizable text editor --

-- debconf information excluded


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#321052: NMU diff for several mpich bugs; please ack or nack

2005-08-11 Thread Justin Pryzby
I would suggest emailing [EMAIL PROTECTED] or filing a
bug against ftp.debian.org, since they handle /new.
Justin

On Thu, Aug 11, 2005 at 01:37:00PM -0400, Adam C Powell IV wrote:
> Greetings,
> 
> I'm afraid I'm just back from a couple of weeks out of the country and
> with very limited email contact.  During this time, my packages were
> (rightfully) rejected from the NEW queue, and the 0-day NMU policy took
> effect, under which you NMU-ed my packages.  I had not foreseen this
> change, since I figured, my old packages are fine, the new ones will go
> in "when they're ready".
> 
> Unfortunately, this had the detrimental effect of assigning the -c2
> label to library packages with only one binary change: the new C++ ABI.
> If you read debian-beowulf, you know that I have been preparing a 1.2.7
> upload with c2 which also includes removal of the slog library (by
> upstream) and addition of fortran 90 libs using the new gfortran
> compiler.
> 
> Since upstream has not changed its library sonames (in spite of removing
> slog, on which mpe used to depend), your NMU would force me to use a new
> non-standard change to the library package name to account for these
> updates.
> 
> Therefore, is there any way to retract your NMU packages from the NEW
> queue?  (Actually, I don't see them there, but they should be because
> they involve renamed packages...)  This would make my life much easier.
> I'll have new 1.2.7 packages available by tomorrow, to replace the ones
> you uploaded; if simply uploading mine will make this happen then I'll
> do that.
> 
> Oh well, I suppose it's my fault for not getting my updated c2 packages
> uploaded within the few days between the gcc 4.0 upgrade and my travel.
> Thanks for the emails and NMU, I hope we can pull back or replace
> 1.2.5.3-6.1, and I'll use (some version of) your patch (with attribution
> of course) in my 1.2.7 packages.
> 
> Regards,
> 
> -Adam
> 
> On Thu, 2005-08-04 at 02:16 +0200, Adeodato Sim? wrote:
> > tag 320891 +patch
> > tag 321052 +patch
> > tag 321093 +patch
> > tag 321158 +patch
> > thanks
> > 
> > Hello Adam,
> > 
> >   I've prepared a non-maintainer upload to fix the various RC bugs
> >   reported against the mpich source package. It is based on the
> >   1.2.5.3-6 version you uploaded a month ago, which was recently
> >   rejected from the NEW queue.
> > 
> >   I attach the NMU diff and, for your convenience, an diff of the result
> >   of applying the new 18_link_against_needed_libs.dpatch, so it can be
> >   read more easily.
> > 
> >   As the diff is sort of big, I will wait a bit before making the upload
> >   despite being in 0-day NMU policy; I'd really like to upload (or not)
> >   after having heard from you, but note that I can't wait indefinitely.
> >   So please let me know if there are any problems with the proposed
> >   patch I should fix before uploading, or if you'll be making an upload
> >   yourself _soon_.
> > 
> >   Hoping being of help,
> 
> -- 
> GPG fingerprint: D54D 1AEE B11C CE9B A02B  C5DD 526F 01E8 564E E4B6
> 
> Welcome to the best software in the world today cafe!
> http://www.take6.com/albums/greatesthits.html
> 

-- 
Justin Pryzby
whois jgalt

References

[0] 


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Processed: Apache 1.3 also vulnerable?

2005-08-11 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> clone 316173 -1
Bug#316173: SECURITY: HTTP proxy responses with both Transfer-Encoding and 
Content-Length headers (CAN-2005-2088)
Bug 316173 cloned as bug 322607.

> clone 320048 -2
Bug#320048: SECURITY: buffer-overrun in apache2-ssl (CAN-2005-1268)
Bug is marked as being merged with others.

> reassign -1 apache
Bug#322607: SECURITY: HTTP proxy responses with both Transfer-Encoding and 
Content-Length headers (CAN-2005-2088)
Bug reassigned from package `apache2' to `apache'.

> reassign -2 apache
Bug number -2 not found.

> thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#322604: SECURITY: Vulnerable to CAN-2005-1344?

2005-08-11 Thread Christian Hammers
Package: apache2
Severity: grave
Tags: security

Hello Apache maintainers,

please check if Debian is vulnerable to CAN-2005-1344 and make sure it
enters http://www.debian.org/security/crossreferences or the not-vulnerable
lists.

http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1344
"Buffer overflow in htdigest in Apache 2.0.52 may allow attackers to execute
arbitrary code via a long realm argument. NOTE: since htdigest is normally
only locally accessible and not setuid or setgid, there are few attack
vectors which would lead to an escalation of privileges, unless htdigest is
executed from a CGI program. Therefore this may not be a vulnerability."

thanks,

-christian-


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#322541: mmv: it's not a hang, it's waiting for input

2005-08-11 Thread Arthur Korn
Package: mmv
Version: 1.01b-12.1
Followup-For: Bug #322541

The hang part the submitter reported when running on i386 is probably
because of this:

   Multiple from -- to pattern pairs may be specified by omitting
   the pat‐ tern pair on the command line, and entering them on the
   standard input, one pair per line.  (If a pattern pair is given
   on the  command  line, the standard input is not read.)

-- mmv(1)

So it's much like running "cat" without arguments and input ...

(Yes I tried, mmv -help and touch foo && mmv foo bar work perfectly.)

HTH, 2ri

-- System Information:
Debian Release: testing/unstable
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/dash
Kernel: Linux 2.6.11-1-686-smp
Locale: LANG=de_CH.UTF-8, LC_CTYPE=de_CH.UTF-8 (charmap=UTF-8)

Versions of packages mmv depends on:
ii  libc6   2.3.5-3  GNU C Library: Shared libraries an

mmv recommends no packages.

-- no debconf information



Bug#322613: Processed: Apache 1.3 also vulnerable?

2005-08-11 Thread Christian Hammers
Package: apache
Severity: critical
Tags: security
thanks

Cloning did not work, so I open a new bug report. Reason was that
RedHat/Fedora also updated their 1.3.27 packages so this version
might also be vulnerable.

> > clone 320048 -2
> Bug#320048: SECURITY: buffer-overrun in apache2-ssl (CAN-2005-1268)
> Bug is marked as being merged with others.
> 
> > reassign -2 apache
> Bug number -2 not found.

bye,

-christian-


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#300094: Enigma 0.92 builds fine with gcc 4.0

2005-08-11 Thread Régis Boudin
Hi,

I just tested it, Enigma 0.92 builds without any problem with gcc 4.0.
Maybe this bug could/should be closed now ?

Regards,
Regis
-- 
"While a monkey can be a manager, it takes a human to be an engineer"
Erik Zapletal



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#321052: NMU diff for several mpich bugs; please ack or nack

2005-08-11 Thread Adam C Powell IV
Thanks, will do.

On Thu, 2005-08-11 at 13:54 -0400, Justin Pryzby wrote:
> I would suggest emailing [EMAIL PROTECTED] or filing a
> bug against ftp.debian.org, since they handle /new.
> Justin
> 
> On Thu, Aug 11, 2005 at 01:37:00PM -0400, Adam C Powell IV wrote:
> > Greetings,
> > 
> > I'm afraid I'm just back from a couple of weeks out of the country and
> > with very limited email contact.  During this time, my packages were
> > (rightfully) rejected from the NEW queue, and the 0-day NMU policy took
> > effect, under which you NMU-ed my packages.  I had not foreseen this
> > change, since I figured, my old packages are fine, the new ones will go
> > in "when they're ready".
> > 
> > Unfortunately, this had the detrimental effect of assigning the -c2
> > label to library packages with only one binary change: the new C++ ABI.
> > If you read debian-beowulf, you know that I have been preparing a 1.2.7
> > upload with c2 which also includes removal of the slog library (by
> > upstream) and addition of fortran 90 libs using the new gfortran
> > compiler.
> > 
> > Since upstream has not changed its library sonames (in spite of removing
> > slog, on which mpe used to depend), your NMU would force me to use a new
> > non-standard change to the library package name to account for these
> > updates.
> > 
> > Therefore, is there any way to retract your NMU packages from the NEW
> > queue?  (Actually, I don't see them there, but they should be because
> > they involve renamed packages...)  This would make my life much easier.
> > I'll have new 1.2.7 packages available by tomorrow, to replace the ones
> > you uploaded; if simply uploading mine will make this happen then I'll
> > do that.
> > 
> > Oh well, I suppose it's my fault for not getting my updated c2 packages
> > uploaded within the few days between the gcc 4.0 upgrade and my travel.
> > Thanks for the emails and NMU, I hope we can pull back or replace
> > 1.2.5.3-6.1, and I'll use (some version of) your patch (with attribution
> > of course) in my 1.2.7 packages.
> > 
> > Regards,
> > 
> > -Adam
> > 
> > On Thu, 2005-08-04 at 02:16 +0200, Adeodato Sim? wrote:
> > > tag 320891 +patch
> > > tag 321052 +patch
> > > tag 321093 +patch
> > > tag 321158 +patch
> > > thanks
> > > 
> > > Hello Adam,
> > > 
> > >   I've prepared a non-maintainer upload to fix the various RC bugs
> > >   reported against the mpich source package. It is based on the
> > >   1.2.5.3-6 version you uploaded a month ago, which was recently
> > >   rejected from the NEW queue.
> > > 
> > >   I attach the NMU diff and, for your convenience, an diff of the result
> > >   of applying the new 18_link_against_needed_libs.dpatch, so it can be
> > >   read more easily.
> > > 
> > >   As the diff is sort of big, I will wait a bit before making the upload
> > >   despite being in 0-day NMU policy; I'd really like to upload (or not)
> > >   after having heard from you, but note that I can't wait indefinitely.
> > >   So please let me know if there are any problems with the proposed
> > >   patch I should fix before uploading, or if you'll be making an upload
> > >   yourself _soon_.
> > > 
> > >   Hoping being of help,

-Adam
-- 
GPG fingerprint: D54D 1AEE B11C CE9B A02B  C5DD 526F 01E8 564E E4B6

Welcome to the best software in the world today cafe!
http://www.take6.com/albums/greatesthits.html


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Processed: Re: Bug#322604: SECURITY: Vulnerable to CAN-2005-1344?

2005-08-11 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> notfound 322604 2.0.54-3
Bug#322604: SECURITY: Vulnerable to CAN-2005-1344?
Bug marked as not found in version 2.0.54-3.

> merge 307134 322604
Bug number 307134 not found.

> thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#322604: SECURITY: Vulnerable to CAN-2005-1344?

2005-08-11 Thread Joey Hess
notfound 322604 2.0.54-3
merge 307134 322604
thanks

Christian Hammers wrote:
> Hello Apache maintainers,
> 
> please check if Debian is vulnerable to CAN-2005-1344 and make sure it
> enters http://www.debian.org/security/crossreferences or the not-vulnerable
> lists.

You can find a note that this bug was fixed in the changelog for apache2
(2.0.54-3), as well as in the testing security teams's database. Bug
#307134 was previously filed for that. It might be wise to at least
check the changelog before filing grave bug reports in the future.

So this hole was not present in the stable release and thus the stable
security team will never issue a DSA for it (apache2 is not in
oldstable), and so it will never appear on the Debian website.

-- 
see shy jo


signature.asc
Description: Digital signature


Processed: tagging 318164

2005-08-11 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> # Automatically generated email from bts, devscripts version 2.9.4
> tags 318164 sid
Bug#318164: CXX 4.0 transition
Tags were: patch
Tags added: sid

>
End of message, stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#322616: zoo: FTBFS: Missing Build-Depends on 'dpatch'

2005-08-11 Thread Andreas Jochens
Package: zoo
Version: 2.10-14
Severity: serious
Tags: patch

When building 'zoo' in a clean 'unstable' chroot,
I get the following error:

 debian/rules clean
debian/rules:34: /usr/share/dpatch/dpatch.make: No such file or directory
make: *** No rule to make target `/usr/share/dpatch/dpatch.make'.  Stop.

Please add the missing Build-Depends on 'dpatch'
to debian/control.

Regards
Andreas Jochens

diff -urN ../tmp-orig/zoo-2.10/debian/control ./debian/control
--- ../tmp-orig/zoo-2.10/debian/control 2005-08-11 17:52:30.0 +
+++ ./debian/control2005-08-11 17:52:28.0 +
@@ -1,7 +1,7 @@
 Source: zoo
 Section: utils
 Priority: optional
-Build-Depends: debhelper (>= 4.0.0)
+Build-Depends: debhelper, dpatch
 Maintainer: Jose Carlos Medeiros <[EMAIL PROTECTED]>
 Standards-Version: 3.6.1.0
 


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Processed: tagging 322352

2005-08-11 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> # Automatically generated email from bts, devscripts version 2.9.4
> tags 322352 sarge
Bug#322352: pdns and pdns-doc both contain /usr/share/doc-base/pdns (sarge 
security update version)
There were no tags set.
Tags added: sarge

>
End of message, stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#322616: marked as done (zoo: FTBFS: Missing Build-Depends on 'dpatch')

2005-08-11 Thread Debian Bug Tracking System
Your message dated Thu, 11 Aug 2005 22:16:01 +0200
with message-id <[EMAIL PROTECTED]>
and subject line Bug#322616: Acknowledgement (zoo: FTBFS: Missing Build-Depends 
on 'dpatch')
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--
Received: (at submit) by bugs.debian.org; 11 Aug 2005 19:49:02 +
>From [EMAIL PROTECTED] Thu Aug 11 12:49:02 2005
Return-path: <[EMAIL PROTECTED]>
Received: from c223250.adsl.hansenet.de (localhost.localdomain) 
[213.39.223.250] 
by spohr.debian.org with esmtp (Exim 3.36 1 (Debian))
id 1E3J30-0006vy-00; Thu, 11 Aug 2005 12:49:02 -0700
Received: from aj by localhost.localdomain with local (Exim 4.52)
id 1E3J2x-0001Q5-Ri; Thu, 11 Aug 2005 21:48:59 +0200
To: Debian Bug Tracking System <[EMAIL PROTECTED]>
From: Andreas Jochens <[EMAIL PROTECTED]>
Subject: zoo: FTBFS: Missing Build-Depends on 'dpatch'
Message-Id: <[EMAIL PROTECTED]>
Date: Thu, 11 Aug 2005 21:48:59 +0200
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE 
autolearn=no version=2.60-bugs.debian.org_2005_01_02

Package: zoo
Version: 2.10-14
Severity: serious
Tags: patch

When building 'zoo' in a clean 'unstable' chroot,
I get the following error:

 debian/rules clean
debian/rules:34: /usr/share/dpatch/dpatch.make: No such file or directory
make: *** No rule to make target `/usr/share/dpatch/dpatch.make'.  Stop.

Please add the missing Build-Depends on 'dpatch'
to debian/control.

Regards
Andreas Jochens

diff -urN ../tmp-orig/zoo-2.10/debian/control ./debian/control
--- ../tmp-orig/zoo-2.10/debian/control 2005-08-11 17:52:30.0 +
+++ ./debian/control2005-08-11 17:52:28.0 +
@@ -1,7 +1,7 @@
 Source: zoo
 Section: utils
 Priority: optional
-Build-Depends: debhelper (>= 4.0.0)
+Build-Depends: debhelper, dpatch
 Maintainer: Jose Carlos Medeiros <[EMAIL PROTECTED]>
 Standards-Version: 3.6.1.0
 

---
Received: (at 322616-done) by bugs.debian.org; 11 Aug 2005 20:16:03 +
>From [EMAIL PROTECTED] Thu Aug 11 13:16:03 2005
Return-path: <[EMAIL PROTECTED]>
Received: from c223250.adsl.hansenet.de (localhost.localdomain) 
[213.39.223.250] 
by spohr.debian.org with esmtp (Exim 3.36 1 (Debian))
id 1E3JT9-0004ye-00; Thu, 11 Aug 2005 13:16:03 -0700
Received: from aj by localhost.localdomain with local (Exim 4.51)
id 1E3JT7-0003eA-W6; Thu, 11 Aug 2005 22:16:02 +0200
Date: Thu, 11 Aug 2005 22:16:01 +0200
To: [EMAIL PROTECTED]
Subject: Re: Bug#322616: Acknowledgement (zoo: FTBFS: Missing Build-Depends on 
'dpatch')
Message-ID: <[EMAIL PROTECTED]>
References: <[EMAIL PROTECTED]> <[EMAIL PROTECTED]>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <[EMAIL PROTECTED]>
User-Agent: Mutt/1.5.9i
From: Andreas Jochens <[EMAIL PROTECTED]>
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
autolearn=no version=2.60-bugs.debian.org_2005_01_02

This was a duplicate report, sorry.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#303692: marked as done (sourcenav: FTBFS (amd64/gcc-4.0): unrecognized command line option "-fwritable-strings")

2005-08-11 Thread Debian Bug Tracking System
Your message dated Thu, 11 Aug 2005 13:17:24 -0700
with message-id <[EMAIL PROTECTED]>
and subject line Bug#303692: fixed in sourcenav 5.1.4-2
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--
Received: (at submit) by bugs.debian.org; 8 Apr 2005 06:29:15 +
>From [EMAIL PROTECTED] Thu Apr 07 23:29:14 2005
Return-path: <[EMAIL PROTECTED]>
Received: from c203154.adsl.hansenet.de (localhost.localdomain) 
[213.39.203.154] 
by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
id 1DJmzS-0005J7-00; Thu, 07 Apr 2005 23:29:14 -0700
Received: from aj by localhost.localdomain with local (Exim 4.50)
id 1DJmyy-0001Aj-BG; Fri, 08 Apr 2005 08:28:44 +0200
To: Debian Bug Tracking System <[EMAIL PROTECTED]>
From: Andreas Jochens <[EMAIL PROTECTED]>
Subject: sourcenav: FTBFS (amd64/gcc-4.0): unrecognized command line option 
"-fwritable-strings"
Message-Id: <[EMAIL PROTECTED]>
Date: Fri, 08 Apr 2005 08:28:44 +0200
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE 
autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 

Package: sourcenav
Version: 5.1.4-1
Severity: normal
Tags: patch

When building 'sourcenav' on amd64/unstable with gcc-4.0,
I get the following error:

Making all in src
make[4]: Entering directory `/sourcenav-5.1.4/debian/build/libgui/src'
gcc -DHAVE_CONFIG_H -I. -I/sourcenav-5.1.4/libgui/src -I.. -fwritable-strings 
-I/sourcenav-5.1.4/tcl/generic -I/sourcenav-5.1.4/tk/generic  -DHAVE_UNISTD_H=1 
-DHAVE_LIMITS_H=1 -DHAVE_GETCWD=1 -DHAVE_OPENDIR=1 -DHAVE_STRSTR=1 
-DHAVE_STRTOL=1 -DHAVE_TMPNAM=1 -DHAVE_WAITPID=1 -DHAVE_UNISTD_H=1 
-DHAVE_SYS_PARAM_H=1 -DUSE_TERMIOS=1 -DHAVE_SYS_TIME_H=1 -DTIME_WITH_SYS_TIME=1 
-DHAVE_TM_ZONE=1 -DHAVE_TM_GMTOFF=1 -DHAVE_TIMEZONE_VAR=1 
-DHAVE_TIMEZONE_DECL=1 -DHAVE_ST_BLKSIZE=1 -DSTDC_HEADERS=1 -DNEED_MATHERR=1 
-DRETSIGTYPE=void -DHAVE_SIGNED_CHAR=1 -DHAVE_SYS_IOCTL_H=1 -DSTATIC_BUILD=1  
-DHAVE_UNISTD_H=1 -DHAVE_LIMITS_H=1 -DSTDC_HEADERS=1 -DHAVE_SYS_TIME_H=1 
-DTIME_WITH_SYS_TIME=1 -DHAVE_PW_GECOS=1 -DSTATIC_BUILD=1  
-I/sourcenav-5.1.4/tk/generic/../unix -I/sourcenav-5.1.4/tk/generic/../win 
-DTBL_VERSION=\"2.7\" -DTBL_COMMAND=\"table\" -DTBL_RUNTIME=\"tkTable.tcl\" 
-DTBL_RUNTIME_DIR=\"/usr/lib/sourcenav/share/redhat/gui\" -DSTATIC_BUILD-g 
-O2 -c /sourcenav-5.1.4/libgui/src/paths.c
cc1: error: unrecognized command line option "-fwritable-strings"
make[4]: *** [paths.o] Error 1
make[4]: Leaving directory `/sourcenav-5.1.4/debian/build/libgui/src'

With the attached patch 'sourcenav' can be compiled
on amd64 using gcc-4.0.

Regards
Andreas Jochens

diff -urN ../tmp-orig/sourcenav-5.1.4/itcl/itcl/unix/configure 
./itcl/itcl/unix/configure
--- ../tmp-orig/sourcenav-5.1.4/itcl/itcl/unix/configure2000-02-07 
01:19:46.0 +0100
+++ ./itcl/itcl/unix/configure  2005-04-07 23:48:21.091719929 +0200
@@ -1113,7 +1113,7 @@
 fi
 # CYGNUS LOCAL - use -fwritable-strings with gcc, needed for Tcl8.1
 if test "$itcl_cv_prog_gcc" = "yes" ; then
-CFLAGS="$CFLAGS -fwritable-strings -Wshadow -Wtraditional -Wall"
+CFLAGS="$CFLAGS -Wshadow -Wtraditional -Wall"
 fi
 
 echo $ac_n "checking default compiler flags""... $ac_c" 1>&6
diff -urN ../tmp-orig/sourcenav-5.1.4/itcl/itcl/unix/configure.in 
./itcl/itcl/unix/configure.in
--- ../tmp-orig/sourcenav-5.1.4/itcl/itcl/unix/configure.in 2000-02-07 
01:19:46.0 +0100
+++ ./itcl/itcl/unix/configure.in   2005-04-07 23:48:13.260188301 +0200
@@ -122,7 +122,7 @@
 fi
 # CYGNUS LOCAL - use -fwritable-strings with gcc, needed for Tcl8.1
 if test "$itcl_cv_prog_gcc" = "yes" ; then
-CFLAGS="$CFLAGS -fwritable-strings -Wshadow -Wtraditional -Wall"
+CFLAGS="$CFLAGS -Wshadow -Wtraditional -Wall"
 fi
 
 AC_MSG_CHECKING([default compiler flags])
diff -urN ../tmp-orig/sourcenav-5.1.4/itcl/itk/unix/configure 
./itcl/itk/unix/configure
--- ../tmp-orig/sourcenav-5.1.4/itcl/itk/unix/configure 2000-02-07 
01:19:46.0 +0100
+++ ./itcl/itk/unix/configure   2005-04-07 23:48:49.059476119 +0200
@@ -1173,7 +1173,7 @@
 # that they obscure everything else.
 # CYGNUS LOCAL - add -fwritable-strings to CFLAGS for gcc.  Needed 
 # with Tcl8.1
-CFLAGS="$CFLAGS -fwritable-strings -Wshadow -Wtraditional -Wall 
-Wno-implicit-int"
+CFLAGS="$CFLAGS -Wshadow -Wtraditional -Wall -Wno-implicit-int"
 fi
 
 echo $ac_n

Bug#76918: Get software cds and download under $15-$99

2005-08-11 Thread Jenny

Adobe+macromedia+OS etc all in CD under $99
http://zrbnl.mt8jpl4f1wmbjnm.acarchformdc.info




Experience without learning is better than learning without experience.
Not life, but good life, is to be chiefly valued.   





--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#320325: why should security holes be blocked from testing?

2005-08-11 Thread Joey Hess
This RC bug has the effect of blocking the security fix in the new
version in unstable from reaching testing. I think that's remote
security holes are generally considered more invonvenient than
functionlity decreases, so I suggest downgrading this bug.

-- 
see shy jo


signature.asc
Description: Digital signature


Bug#322229: marked as done (ImportError: No module named timeoutsocke)

2005-08-11 Thread Debian Bug Tracking System
Your message dated Thu, 11 Aug 2005 13:17:26 -0700
with message-id <[EMAIL PROTECTED]>
and subject line Bug#39: fixed in spkproxy 1.4.8-2
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--
Received: (at submit) by bugs.debian.org; 9 Aug 2005 21:06:03 +
>From [EMAIL PROTECTED] Tue Aug 09 14:06:03 2005
Return-path: <[EMAIL PROTECTED]>
Received: from smtp3.wanadoo.fr [193.252.22.28] 
by spohr.debian.org with esmtp (Exim 3.36 1 (Debian))
id 1E2bIR-0001q2-00; Tue, 09 Aug 2005 14:06:03 -0700
Received: from me-wanadoo.net (localhost [127.0.0.1])
by mwinf0308.wanadoo.fr (SMTP Server) with ESMTP id 485E528B
for <[EMAIL PROTECTED]>; Tue,  9 Aug 2005 23:05:32 +0200 (CEST)
Received: from localhost.localdomain (ARennes-351-1-2-59.w82-126.abo.wanadoo.fr 
[82.126.32.59])
by mwinf0308.wanadoo.fr (SMTP Server) with ESMTP id 0601028A;
Tue,  9 Aug 2005 23:05:31 +0200 (CEST)
X-ME-UUID: [EMAIL PROTECTED]
MIME-Version: 1.0
Content-Type: text/plain; charset="ISO-8859-15"
From: Sylvain <[EMAIL PROTECTED]>
To: Debian Bug Tracking System <[EMAIL PROTECTED]>
Subject: ImportError: No module named timeoutsocke
X-Mailer: reportbug 3.15
Date: Tue, 09 Aug 2005 23:05:30 +0200
Message-Id: <[EMAIL PROTECTED]>
Content-Transfer-Encoding: quoted-printable
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE 
autolearn=no version=2.60-bugs.debian.org_2005_01_02

Package: spikeproxy
Version: 1.4.8-1
Severity: grave
Justification: renders package unusable


Hi,

When I launch spikeproxy, I have this error:
n# spikeproxy=20
Traceback (most recent call last):
  File "spkproxy.py", line 49, in ?
 import spikeProxyUI=20
  File "/usr/share/spikeproxy/spikeProxyUI.py", line 39, in ?
 from requestandresponse import RequestAndResponse
  File "/usr/share/spikeproxy/requestandresponse.py", line 4, in ?
  import daveutil
  File "/usr/share/spikeproxy/daveutil.py", line 12, in ?
  import spkproxy=B2
  File "/usr/share/spikeproxy/spkproxy.py", line 54, in ?
  import timeoutsocket
  ImportError: No module named timeoutsocket

So spikeproxy can't run.

Rgds

-- System Information:
Debian Release: testing/unstable
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'testing')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.12
Locale: [EMAIL PROTECTED], [EMAIL PROTECTED] (charmap=3DISO-8859-15)

Versions of packages spikeproxy depends on:
ii  python2.3.5-3An interactive high-level ob=
ject-o
ii  python-pyopenssl  0.6-2  Python wrapper around the Op=
enSSL=20

spikeproxy recommends no packages.

-- no debconf information


---
Received: (at 39-close) by bugs.debian.org; 11 Aug 2005 20:22:03 +
>From [EMAIL PROTECTED] Thu Aug 11 13:22:03 2005
Return-path: <[EMAIL PROTECTED]>
Received: from katie by spohr.debian.org with local (Exim 3.36 1 (Debian))
id 1E3JUU-0005Q5-00; Thu, 11 Aug 2005 13:17:26 -0700
From: Javier Fernandez-Sanguino Pen~a <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
X-Katie: $Revision: 1.56 $
Subject: Bug#39: fixed in spkproxy 1.4.8-2
Message-Id: <[EMAIL PROTECTED]>
Sender: Archive Administrator <[EMAIL PROTECTED]>
Date: Thu, 11 Aug 2005 13:17:26 -0700
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
autolearn=no version=2.60-bugs.debian.org_2005_01_02

Source: spkproxy
Source-Version: 1.4.8-2

We believe that the bug you reported is fixed in the latest version of
spkproxy, which is due to be installed in the Debian FTP archive:

spikeproxy_1.4.8-2_all.deb
  to pool/main/s/spkproxy/spikeproxy_1.4.8-2_all.deb
spkproxy_1.4.8-2.diff.gz
  to pool/main/s/spkproxy/spkproxy_1.4.8-2.diff.gz
spkproxy_1.4.8-2.dsc
  to pool/main/s/spkproxy/spkproxy_1.4.8-2.dsc



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance softwa

Bug#321052: NMU diff for several mpich bugs; please ack or nack

2005-08-11 Thread Adeodato Simó
* Adam C Powell IV [Thu, 11 Aug 2005 13:37:00 -0400]:

> Greetings,

Hi,

> I'm afraid I'm just back from a couple of weeks out of the country and
> with very limited email contact.  During this time, my packages were
> (rightfully) rejected from the NEW queue, and the 0-day NMU policy took
> effect, under which you NMU-ed my packages. 

  (FWIW, it was more like a 7-day NMU. And I planned on 14 days, but I
  was asked not to because of the number of packages waiting on mpich
  fixed pacakges to undergo their own C++ ABI transition.)

> Unfortunately, this had the detrimental effect of assigning the -c2
> label to library packages with only one binary change: the new C++ ABI.
> If you read debian-beowulf,

  Sorry, I don't. I haven't NMUed mpich out of interest in the package,
  but out of interest in Debian, and in order tho have the C++ transition
  move forward globally.

> Therefore, is there any way to retract your NMU packages from the NEW
> queue?  (Actually, I don't see them there, but they should be because
> they involve renamed packages...) 

  No, it's not going to be possible. You don't see them there because
  they have been accepted already, and are in the mirrors by now.

> Oh well, I suppose it's my fault for not getting my updated c2 packages
> uploaded within the few days between the gcc 4.0 upgrade and my travel.

  Or you could have notified -private about the period you were going to
  be away. If I had read that you were coming back a day after the
  upload, I would most likely have waited.

  Cheers,

-- 
Adeodato Simó
EM: asp16 [ykwim] alu.ua.es | PK: DA6AE621
 
The Wright Brothers weren't the first to fly. They were just the first
not to crash



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Processed: Fixed in NMU of xine-lib 1.0.1-1.1

2005-08-11 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> tag 288189 + fixed
Bug#288189: xine-lib: FTBFS (amd64/gcc-4.0): invalid lvalue in increment
Tags were: patch
Tags added: fixed

> tag 315986 + fixed
Bug#315986: xine-lib: please build against libslang2
Tags were: patch
Bug#315868: libxine: please build against libslang2
Tags added: fixed

> tag 318838 + fixed
Bug#318838: libxine1: FTBFS wit gcc 4.0
Tags were: patch
Tags added: fixed

> tag 320317 + fixed
Bug#320317: xine-lib source package depends on aalib1-dev
Tags were: patch sid
Tags added: fixed

> quit
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Processed: Merge!

2005-08-11 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> severity 322600 grave
Bug#322600: evince: Application will not start
Severity set to `grave'.

> merge 322600 320582
Bug#320582: libdjvulibre1: soname of library changed
Bug#322600: evince: Application will not start
Bug#320621: libdjvulibre1 3.5.14-6 changes soname without warning
Bug#320656: evince: libdjvulibre.so.14 has gone
Bug#320794: evince: Evince missing library libdjvulibre.so
Bug#321244: evince does not start, missing dependency on libdjvulibre1.so.14
Bug#321406: evince: libdjvulibre dependency problem
Bug#321509: evince is linked against libdjvulibre.so.14 when libdjvulibre1 
provides libdjvulibre.so.15
Bug#321652: evince: Evince shared library problem
Merged 320582 320621 320656 320794 321244 321406 321509 321652 322600.

> thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#302608: marked as done (siptoolbox: FTBFS: Build stops with "!--error 241" usr/lib/scilab/man/eng/programming/whatis.htm does not exist)

2005-08-11 Thread Debian Bug Tracking System
Your message dated Thu, 11 Aug 2005 14:17:25 -0700
with message-id <[EMAIL PROTECTED]>
and subject line Bug#302608: fixed in siptoolbox 0.3.99rc2alpha3-2
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--
Received: (at submit) by bugs.debian.org; 1 Apr 2005 19:48:19 +
>From [EMAIL PROTECTED] Fri Apr 01 11:48:19 2005
Return-path: <[EMAIL PROTECTED]>
Received: from gluck.debian.org [192.25.206.10] 
by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
id 1DHS7v-I8-00; Fri, 01 Apr 2005 11:48:19 -0800
Received: from d040155.adsl.hansenet.de (localhost.localdomain) [80.171.40.155] 
by gluck.debian.org with esmtp (Exim 3.35 1 (Debian))
id 1DHS7u-00053m-00; Fri, 01 Apr 2005 12:48:18 -0700
Received: from aj by localhost.localdomain with local (Exim 4.50)
id 1DHS7w-00042U-NT; Fri, 01 Apr 2005 21:48:20 +0200
To: Debian Bug Tracking System <[EMAIL PROTECTED]>
From: Andreas Jochens <[EMAIL PROTECTED]>
Subject: siptoolbox: FTBFS: Build stops with "!--error   241" 
usr/lib/scilab/man/eng/programming/whatis.htm does not exist
Message-Id: <[EMAIL PROTECTED]>
Date: Fri, 01 Apr 2005 21:48:20 +0200
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE 
autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 

Package: siptoolbox
Version: 0.3.99rc1-2
Severity: serious
Tags: patch

When trying to build 'siptoolbox' in an i386/unstable environment,
I get the following error:

Making all in man
make[2]: Entering directory `/sdb1/x/siptoolbox-0.3.99rc1/man'
Creating html help files
/usr/lib/scilab/bin/scilab: line 31: /usr/lib/pvm3//lib/pvmgetarch: No such 
file or directory
Creating whatis.htm in /sdb1/x/siptoolbox-0.3.99rc1/man
Processing chapter /sdb1/x/siptoolbox-0.3.99rc1/man/
 !--error   241
File /usr/lib/scilab/man/eng/programming/whatis.htm does not exist or read 
access denied
at line   7 of function getlink  called by :
line19 of function find_links   called by :
line13 of function gener_links  called by :
line79 of function sip_xmltohtmlcalled by :
html(PWD,'SIP','html-sip.xsl');quit


--> 

The build stops at this point and waits for input.

The attached patch adds the missing Build-Depends on 'scilab-doc' to
debian/control.

Regards
Andreas Jochens

diff -urN ../tmp-orig/siptoolbox-0.3.99rc1/debian/control ./debian/control
--- ../tmp-orig/siptoolbox-0.3.99rc1/debian/control 2005-04-01 
21:46:27.199374957 +0200
+++ ./debian/control2005-04-01 21:45:34.841191847 +0200
@@ -1,7 +1,7 @@
 Source: siptoolbox
 Priority: optional
 Maintainer: Torsten Werner <[EMAIL PROTECTED]>
-Build-Depends: cdbs, debhelper (>> 4.1.0), animal-dev, groff, scilab (>= 2.7), 
libmagick6-dev | libmagick-dev, bsdmainutils, xsltproc | sablotron, g77
+Build-Depends: cdbs, debhelper (>> 4.1.0), animal-dev, groff, scilab (>= 2.7), 
scilab-doc, libmagick6-dev | libmagick-dev, bsdmainutils, xsltproc | sablotron, 
g77
 Standards-Version: 3.5.8
 Section: contrib/math
 

---
Received: (at 302608-close) by bugs.debian.org; 11 Aug 2005 21:21:48 +
>From [EMAIL PROTECTED] Thu Aug 11 14:21:48 2005
Return-path: <[EMAIL PROTECTED]>
Received: from katie by spohr.debian.org with local (Exim 3.36 1 (Debian))
id 1E3KQX-0001VT-00; Thu, 11 Aug 2005 14:17:25 -0700
From: Torsten Werner <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
X-Katie: $Revision: 1.56 $
Subject: Bug#302608: fixed in siptoolbox 0.3.99rc2alpha3-2
Message-Id: <[EMAIL PROTECTED]>
Sender: Archive Administrator <[EMAIL PROTECTED]>
Date: Thu, 11 Aug 2005 14:17:25 -0700
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
autolearn=no version=2.60-bugs.debian.org_2005_01_02

Source: siptoolbox
Source-Version: 0.3.99rc2alpha3-2

We believe that the bug you reported is fixed in the latest version of
siptoolbox, which is due to be installed in the Debian FTP archive:

siptoolbox_0.3.99rc2alpha3-2.diff.gz
  to pool/contrib/s/siptoolbox/siptoolbox_0.3.99rc2alpha3-2.diff.gz
siptoolbox_0.3.99rc2alpha3-2.dsc
  to pool/contrib/s/siptoolbox/siptoolbox_0.3.99rc2alpha3-2.dsc
siptoo

Processed: tagging bugs pending

2005-08-11 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> tag 153736 + pending
Bug#153736: nethack: Successfully praying while swallowed should get me out
Tags were: wontfix
Tags added: pending

> tag 297626 + pending
Bug#297626: nethack: FTBFS (amd64/gcc-4.0): non-local variable ' key_macro []' uses anonymous type
Tags were: patch
Tags added: pending

> tag 308711 + pending
Bug#308711: nethack: Dummy package still needed?
There were no tags set.
Tags added: pending

> tag 315912 + pending
Bug#315912: INTL:vi
Tags were: l10n patch
Tags added: pending

> thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#318217: marked as done (asterisk-oh323 requires rebuild for new symbol names)

2005-08-11 Thread Debian Bug Tracking System
Your message dated Thu, 11 Aug 2005 14:47:04 -0700
with message-id <[EMAIL PROTECTED]>
and subject line Bug#318217: fixed in asterisk-oh323 0.6.6pre3-4
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--
Received: (at submit) by bugs.debian.org; 13 Jul 2005 23:09:02 +
>From [EMAIL PROTECTED] Wed Jul 13 16:09:02 2005
Return-path: <[EMAIL PROTECTED]>
Received: from (mail.novamens.com) [200.73.189.61] 
by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
id 1DsqLe-0007op-00; Wed, 13 Jul 2005 16:09:02 -0700
Received: from 127.0.0.1 (disidente [127.0.0.1])
by disidente.novamens.com (Postfix) with SMTP id 4B53783B34;
Wed, 13 Jul 2005 20:08:42 -0300 (ART)
Received: from mail.novamens.com ([127.0.0.1])
by localhost (disidente [127.0.0.1]) (amavisd-new, port 10024)
with ESMTP id 07249-02; Wed, 13 Jul 2005 20:08:34 -0300 (ART)
Received: from mens.hq.novamens.com (unknown [200.73.189.82])
by mail.novamens.com (Postfix) with ESMTP id F2A7983ABF;
Wed, 13 Jul 2005 20:08:33 -0300 (ART)
Received: by mens.hq.novamens.com (Postfix, from userid 1014)
id BEBB92505F; Wed, 13 Jul 2005 20:08:33 -0300 (ART)
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: Juan Jose Comellas <[EMAIL PROTECTED]>
To: Debian Bug Tracking System <[EMAIL PROTECTED]>
Subject: asterisk-oh323: chan_oh323.so cannot find symbol and Asterisk crashes
X-Mailer: reportbug 3.15
Date: Wed, 13 Jul 2005 20:08:33 -0300
Message-Id: <[EMAIL PROTECTED]>
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE 
autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 

Package: asterisk-oh323
Version: 0.6.6pre3-3
Severity: grave
Justification: renders package unusable

The asterisk-oh323 package version 0.6.6pre3-3 was linked expecting the
ast_smoother_feed symbol to be in the /usr/sbin/asterisk executable. The
problem is that the symbol is present as __ast_smoother_feed and thus
chan_oh323.so does not find it. Because of this, when Asterisk starts
and tries to load the chan_oh323.so module it aborts because the symbol
cannot be found.

The following error message is logged to /var/log/asterisk/messages when
this happens:

Jul 13 19:37:26 WARNING[2373]: /usr/lib/asterisk/modules/chan_oh323.so:
undefined symbol: ast_smoother_feed
Jul 13 19:37:26 WARNING[2373]: Loading module chan_oh323.so failed!

The problem can be seen by running these commands:

# objdump -T /usr/sbin/asterisk | grep ast_smoother_feed
08054698 gDF .text  01bd  Base__ast_smoother_feed

~# objdump -T /usr/lib/asterisk/modules/chan_oh323.so | grep
ast_smoother_feed
  D  *UND*    ast_smoother_feed

Looking at the Asterisk headers it looks like the asterisk package is at
fault, because in line 378 of /usr/include/asterisk/frame.h the
function's prototype is:

extern int ast_smoother_feed(struct ast_smoother *s, struct ast_frame *f);

A workaround to this problem without uninstalling asterisk-oh323 is to
add the following line to /etc/asterisk/modules.conf:

noload => chan_oh323.so



-- System Information:
Debian Release: testing/unstable
  APT prefers stable
  APT policy: (990, 'stable'), (500, 'unstable'), (500, 'testing')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.11-1-k7
Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968)

Versions of packages asterisk-oh323 depends on:
ii  asterisk1:1.0.9.dfsg-1   open source Private Branch Exchang
ii  libc6   2.3.2.ds1-22 GNU C Library: Shared libraries an
ii  libexpat1   1.95.8-3 XML parsing C library - runtime li
ii  libldap22.1.30-11OpenLDAP libraries
ii  libopenh323-1.1 1.15.3-2 H.323 aka VoIP library
ii  libpt-1.8.3 1.8.4-1  Portable Windows Library
ii  libsasl22.1.19-1.5   Authentication abstraction library
ii  libsdl1.2debian 1.2.7+1.2.8cvs20041007-5 Simple DirectMedia Layer
ii  libssl0.9.7 0.9.7e-3 SSL shared libraries
ii  libstdc++5  1:3.3.5-13   The GNU Standard C++ Library v3

asterisk-oh323 recommends no packages.

-- no debconf information


---
Received: (at 318217-close) b

Bug#318189: marked as done (asterisk-oh323: chan_oh323.so cannot find symbol and Asterisk crashes)

2005-08-11 Thread Debian Bug Tracking System
Your message dated Thu, 11 Aug 2005 14:47:04 -0700
with message-id <[EMAIL PROTECTED]>
and subject line Bug#318189: fixed in asterisk-oh323 0.6.6pre3-4
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--
Received: (at submit) by bugs.debian.org; 13 Jul 2005 23:09:02 +
>From [EMAIL PROTECTED] Wed Jul 13 16:09:02 2005
Return-path: <[EMAIL PROTECTED]>
Received: from (mail.novamens.com) [200.73.189.61] 
by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
id 1DsqLe-0007op-00; Wed, 13 Jul 2005 16:09:02 -0700
Received: from 127.0.0.1 (disidente [127.0.0.1])
by disidente.novamens.com (Postfix) with SMTP id 4B53783B34;
Wed, 13 Jul 2005 20:08:42 -0300 (ART)
Received: from mail.novamens.com ([127.0.0.1])
by localhost (disidente [127.0.0.1]) (amavisd-new, port 10024)
with ESMTP id 07249-02; Wed, 13 Jul 2005 20:08:34 -0300 (ART)
Received: from mens.hq.novamens.com (unknown [200.73.189.82])
by mail.novamens.com (Postfix) with ESMTP id F2A7983ABF;
Wed, 13 Jul 2005 20:08:33 -0300 (ART)
Received: by mens.hq.novamens.com (Postfix, from userid 1014)
id BEBB92505F; Wed, 13 Jul 2005 20:08:33 -0300 (ART)
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: Juan Jose Comellas <[EMAIL PROTECTED]>
To: Debian Bug Tracking System <[EMAIL PROTECTED]>
Subject: asterisk-oh323: chan_oh323.so cannot find symbol and Asterisk crashes
X-Mailer: reportbug 3.15
Date: Wed, 13 Jul 2005 20:08:33 -0300
Message-Id: <[EMAIL PROTECTED]>
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE 
autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 

Package: asterisk-oh323
Version: 0.6.6pre3-3
Severity: grave
Justification: renders package unusable

The asterisk-oh323 package version 0.6.6pre3-3 was linked expecting the
ast_smoother_feed symbol to be in the /usr/sbin/asterisk executable. The
problem is that the symbol is present as __ast_smoother_feed and thus
chan_oh323.so does not find it. Because of this, when Asterisk starts
and tries to load the chan_oh323.so module it aborts because the symbol
cannot be found.

The following error message is logged to /var/log/asterisk/messages when
this happens:

Jul 13 19:37:26 WARNING[2373]: /usr/lib/asterisk/modules/chan_oh323.so:
undefined symbol: ast_smoother_feed
Jul 13 19:37:26 WARNING[2373]: Loading module chan_oh323.so failed!

The problem can be seen by running these commands:

# objdump -T /usr/sbin/asterisk | grep ast_smoother_feed
08054698 gDF .text  01bd  Base__ast_smoother_feed

~# objdump -T /usr/lib/asterisk/modules/chan_oh323.so | grep
ast_smoother_feed
  D  *UND*    ast_smoother_feed

Looking at the Asterisk headers it looks like the asterisk package is at
fault, because in line 378 of /usr/include/asterisk/frame.h the
function's prototype is:

extern int ast_smoother_feed(struct ast_smoother *s, struct ast_frame *f);

A workaround to this problem without uninstalling asterisk-oh323 is to
add the following line to /etc/asterisk/modules.conf:

noload => chan_oh323.so



-- System Information:
Debian Release: testing/unstable
  APT prefers stable
  APT policy: (990, 'stable'), (500, 'unstable'), (500, 'testing')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.11-1-k7
Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968)

Versions of packages asterisk-oh323 depends on:
ii  asterisk1:1.0.9.dfsg-1   open source Private Branch Exchang
ii  libc6   2.3.2.ds1-22 GNU C Library: Shared libraries an
ii  libexpat1   1.95.8-3 XML parsing C library - runtime li
ii  libldap22.1.30-11OpenLDAP libraries
ii  libopenh323-1.1 1.15.3-2 H.323 aka VoIP library
ii  libpt-1.8.3 1.8.4-1  Portable Windows Library
ii  libsasl22.1.19-1.5   Authentication abstraction library
ii  libsdl1.2debian 1.2.7+1.2.8cvs20041007-5 Simple DirectMedia Layer
ii  libssl0.9.7 0.9.7e-3 SSL shared libraries
ii  libstdc++5  1:3.3.5-13   The GNU Standard C++ Library v3

asterisk-oh323 recommends no packages.

-- no debconf information


---
Received: (at 318189-close) b

Bug#321052: NMU diff for several mpich bugs; please ack or nack

2005-08-11 Thread Adam C Powell IV
On Thu, 2005-08-11 at 22:23 +0200, Adeodato Simó wrote:
> * Adam C Powell IV [Thu, 11 Aug 2005 13:37:00 -0400]:
> 
> > Greetings,
> 
> Hi,
> 
> > I'm afraid I'm just back from a couple of weeks out of the country and
> > with very limited email contact.  During this time, my packages were
> > (rightfully) rejected from the NEW queue, and the 0-day NMU policy took
> > effect, under which you NMU-ed my packages. 
> 
>   (FWIW, it was more like a 7-day NMU. And I planned on 14 days, but I
>   was asked not to because of the number of packages waiting on mpich
>   fixed pacakges to undergo their own C++ ABI transition.)

I understand, my fault (as I mentioned), though those packages will now
need to change again because of the new upstream API and fortran.

> > Unfortunately, this had the detrimental effect of assigning the -c2
> > label to library packages with only one binary change: the new C++ ABI.
> > If you read debian-beowulf,
> 
>   Sorry, I don't. I haven't NMUed mpich out of interest in the package,
>   but out of interest in Debian, and in order tho have the C++ transition
>   move forward globally.

Though presumably the maintainers of the dependent packages read it...

> > Therefore, is there any way to retract your NMU packages from the NEW
> > queue?  (Actually, I don't see them there, but they should be because
> > they involve renamed packages...) 
> 
>   No, it's not going to be possible. You don't see them there because
>   they have been accepted already, and are in the mirrors by now.

Too bad.

> > Oh well, I suppose it's my fault for not getting my updated c2 packages
> > uploaded within the few days between the gcc 4.0 upgrade and my travel.
> 
>   Or you could have notified -private about the period you were going to
>   be away. If I had read that you were coming back a day after the
>   upload, I would most likely have waited.

Indeed, good point.  Learned my lesson the hard way. :-(

Thanks again for your help,

-Adam
-- 
GPG fingerprint: D54D 1AEE B11C CE9B A02B  C5DD 526F 01E8 564E E4B6

Welcome to the best software in the world today cafe!
http://www.take6.com/albums/greatesthits.html



Bug#320234: marked as done (rt2500: warning: libstdc++.so.5, needed by /usr/share/qt3/lib/libqt-mt.so, may conflict with libstdc++.so.6)

2005-08-11 Thread Debian Bug Tracking System
Your message dated Thu, 11 Aug 2005 15:17:05 -0700
with message-id <[EMAIL PROTECTED]>
and subject line Bug#320234: fixed in rt2500 1.1.0+cvs20050710-4
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--
Received: (at submit) by bugs.debian.org; 27 Jul 2005 18:54:30 +
>From [EMAIL PROTECTED] Wed Jul 27 11:54:30 2005
Return-path: <[EMAIL PROTECTED]>
Received: from defiant.lowpingbastards.de (mail.lowpingbastards.de) 
[213.178.77.226] (UNKNOWN)
by spohr.debian.org with esmtp (Exim 3.36 1 (Debian))
id 1Dxr30-0007bp-00; Wed, 27 Jul 2005 11:54:30 -0700
Received: from defiant.lowpingbastards.de ([EMAIL PROTECTED] [127.0.0.1])
by mail.lowpingbastards.de (8.13.4/8.13.4/Debian-3) with ESMTP id 
j6RIsDa6031686
(version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NOT);
Wed, 27 Jul 2005 20:54:13 +0200
Received: (from [EMAIL PROTECTED])
by defiant.lowpingbastards.de (8.13.4/8.13.4/Submit) id j6RIsDAF031685;
Wed, 27 Jul 2005 20:54:13 +0200
Date: Wed, 27 Jul 2005 20:54:13 +0200
From: Frederik Schueler <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
Subject: rt2500: warning: libstdc++.so.5, needed by 
/usr/share/qt3/lib/libqt-mt.so, may conflict with libstdc++.so.6
Message-ID: <[EMAIL PROTECTED]>
Mime-Version: 1.0
Content-Type: multipart/signed; micalg=pgp-sha1;
protocol="application/pgp-signature"; boundary="6e7ZaeXHKrTJCxdu"
Content-Disposition: inline
User-Agent: Mutt/1.5.9i
X-Virus-Scanned: by amavisd-new
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE 
autolearn=no version=2.60-bugs.debian.org_2005_01_02


--6e7ZaeXHKrTJCxdu
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

Package: rt2500
Version: 1.1.0+cvs20050710-1
Severity: serious
Justification: FTBFS, violates C++ ABI transition

Hello,

latest rt2500 (and rt2400 too) do violate the C++ abi transition, as
they build-depend on libqt3-mt-dev and where uploaded after the C++
transition begun. This leads to a depends line like

 Depends: rt2500-base (>=3D 1.1.0+cvs20050710-1), libc6 (>=3D 2.3.2.ds1-21)=
, libgcc1 (>=3D 1:4.0.0-9), libqt3c102-mt (>=3D 3:3.3.4), libstdc++6 (>=3D =
4.0.1), libx11-6 | xlibs (>> 4.1.0), libxext6 | xlibs (>> 4.1.0)

see for example

http://buildd.debian.org/fetch.php?&pkg=3Drt2500&ver=3D1.1.0%2Bcvs20050710-=
1&arch=3Dsparc&stamp=3D1121104806&file=3Dlog&as=3Draw

and others found on http://buildd.debian.org/build.php?arch=3D&pkg=3Drt2500

Best regards
Frederik Schueler

--=20
ENOSIG

--6e7ZaeXHKrTJCxdu
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: Digital signature
Content-Disposition: inline

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.1 (GNU/Linux)

iD8DBQFC59hV6n7So0GVSSARAiAHAKCSNQYmH8HSjNP5mKkuMR6C0U/XdACfaaF0
0uI4oBWizzkblgHaOIrDUVE=
=N3h/
-END PGP SIGNATURE-

--6e7ZaeXHKrTJCxdu--

---
Received: (at 320234-close) by bugs.debian.org; 11 Aug 2005 22:19:04 +
>From [EMAIL PROTECTED] Thu Aug 11 15:19:04 2005
Return-path: <[EMAIL PROTECTED]>
Received: from katie by spohr.debian.org with local (Exim 3.36 1 (Debian))
id 1E3LMH-0005qx-00; Thu, 11 Aug 2005 15:17:05 -0700
From: Aurelien Jarno <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
X-Katie: $Revision: 1.56 $
Subject: Bug#320234: fixed in rt2500 1.1.0+cvs20050710-4
Message-Id: <[EMAIL PROTECTED]>
Sender: Archive Administrator <[EMAIL PROTECTED]>
Date: Thu, 11 Aug 2005 15:17:05 -0700
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-4.8 required=4.0 tests=BAYES_00,FROM_ENDS_IN_NUMS,
HAS_BUG_NUMBER autolearn=no version=2.60-bugs.debian.org_2005_01_02

Source: rt2500
Source-Version: 1.1.0+cvs20050710-4

We believe that the bug you reported is fixed in the latest version of
rt2500, which is due to be installed in the Debian FTP archive:

rt2500-base_1.1.0+cvs20050710-4_all.deb
  to pool/main/r/rt2500/rt2500-base_1.1.0+cvs20050710-4_all.deb
rt2500-source_1.1.0+cvs20050710-4_all.deb
  to pool/main/r/rt2500/rt2500-source_1.1.0+cvs20050710-4_all.deb
rt2500_1.1.0+cvs20050710-4.diff.gz
  to pool/main/r/rt2500/rt2500_1.1.0+cvs20050710-4.diff.g

Bug#320507: marked as done (rt2500: warning: libstdc++.so.5, needed by /usr/share/qt3/lib/libqt-mt.so, may conflict with libstdc++.so.6)

2005-08-11 Thread Debian Bug Tracking System
Your message dated Thu, 11 Aug 2005 15:17:04 -0700
with message-id <[EMAIL PROTECTED]>
and subject line Bug#320507: fixed in rt2400 1.2.2+cvs20050730-2
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--
Received: (at submit) by bugs.debian.org; 27 Jul 2005 18:54:30 +
>From [EMAIL PROTECTED] Wed Jul 27 11:54:30 2005
Return-path: <[EMAIL PROTECTED]>
Received: from defiant.lowpingbastards.de (mail.lowpingbastards.de) 
[213.178.77.226] (UNKNOWN)
by spohr.debian.org with esmtp (Exim 3.36 1 (Debian))
id 1Dxr30-0007bp-00; Wed, 27 Jul 2005 11:54:30 -0700
Received: from defiant.lowpingbastards.de ([EMAIL PROTECTED] [127.0.0.1])
by mail.lowpingbastards.de (8.13.4/8.13.4/Debian-3) with ESMTP id 
j6RIsDa6031686
(version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NOT);
Wed, 27 Jul 2005 20:54:13 +0200
Received: (from [EMAIL PROTECTED])
by defiant.lowpingbastards.de (8.13.4/8.13.4/Submit) id j6RIsDAF031685;
Wed, 27 Jul 2005 20:54:13 +0200
Date: Wed, 27 Jul 2005 20:54:13 +0200
From: Frederik Schueler <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
Subject: rt2500: warning: libstdc++.so.5, needed by 
/usr/share/qt3/lib/libqt-mt.so, may conflict with libstdc++.so.6
Message-ID: <[EMAIL PROTECTED]>
Mime-Version: 1.0
Content-Type: multipart/signed; micalg=pgp-sha1;
protocol="application/pgp-signature"; boundary="6e7ZaeXHKrTJCxdu"
Content-Disposition: inline
User-Agent: Mutt/1.5.9i
X-Virus-Scanned: by amavisd-new
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE 
autolearn=no version=2.60-bugs.debian.org_2005_01_02


--6e7ZaeXHKrTJCxdu
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

Package: rt2500
Version: 1.1.0+cvs20050710-1
Severity: serious
Justification: FTBFS, violates C++ ABI transition

Hello,

latest rt2500 (and rt2400 too) do violate the C++ abi transition, as
they build-depend on libqt3-mt-dev and where uploaded after the C++
transition begun. This leads to a depends line like

 Depends: rt2500-base (>=3D 1.1.0+cvs20050710-1), libc6 (>=3D 2.3.2.ds1-21)=
, libgcc1 (>=3D 1:4.0.0-9), libqt3c102-mt (>=3D 3:3.3.4), libstdc++6 (>=3D =
4.0.1), libx11-6 | xlibs (>> 4.1.0), libxext6 | xlibs (>> 4.1.0)

see for example

http://buildd.debian.org/fetch.php?&pkg=3Drt2500&ver=3D1.1.0%2Bcvs20050710-=
1&arch=3Dsparc&stamp=3D1121104806&file=3Dlog&as=3Draw

and others found on http://buildd.debian.org/build.php?arch=3D&pkg=3Drt2500

Best regards
Frederik Schueler

--=20
ENOSIG

--6e7ZaeXHKrTJCxdu
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: Digital signature
Content-Disposition: inline

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.1 (GNU/Linux)

iD8DBQFC59hV6n7So0GVSSARAiAHAKCSNQYmH8HSjNP5mKkuMR6C0U/XdACfaaF0
0uI4oBWizzkblgHaOIrDUVE=
=N3h/
-END PGP SIGNATURE-

--6e7ZaeXHKrTJCxdu--

---
Received: (at 320507-close) by bugs.debian.org; 11 Aug 2005 22:19:11 +
>From [EMAIL PROTECTED] Thu Aug 11 15:19:11 2005
Return-path: <[EMAIL PROTECTED]>
Received: from katie by spohr.debian.org with local (Exim 3.36 1 (Debian))
id 1E3LMG-0005qU-00; Thu, 11 Aug 2005 15:17:04 -0700
From: Aurelien Jarno <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
X-Katie: $Revision: 1.56 $
Subject: Bug#320507: fixed in rt2400 1.2.2+cvs20050730-2
Message-Id: <[EMAIL PROTECTED]>
Sender: Archive Administrator <[EMAIL PROTECTED]>
Date: Thu, 11 Aug 2005 15:17:04 -0700
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-4.8 required=4.0 tests=BAYES_00,FROM_ENDS_IN_NUMS,
HAS_BUG_NUMBER autolearn=no version=2.60-bugs.debian.org_2005_01_02

Source: rt2400
Source-Version: 1.2.2+cvs20050730-2

We believe that the bug you reported is fixed in the latest version of
rt2400, which is due to be installed in the Debian FTP archive:

rt2400-base_1.2.2+cvs20050730-2_all.deb
  to pool/main/r/rt2400/rt2400-base_1.2.2+cvs20050730-2_all.deb
rt2400-source_1.2.2+cvs20050730-2_all.deb
  to pool/main/r/rt2400/rt2400-source_1.2.2+cvs20050730-2_all.deb
rt2400_1.2.2+cvs20050730-2.diff.gz
  to pool/main/r/rt2400/rt2400_1.2.2+cvs20050730-2.diff.g

Bug#318791: patch

2005-08-11 Thread Peter 'p2' De Schrijver
Hi,

Please find attached a patch which should solve the problem. It's
untested on a 64bit machine however. Feel free to test and report the
result.

Thanks,

Peter (p2).
diff -ruN orig/opencv-0.9.6/tests/cv/src/apyramids.cpp 
opencv-0.9.6/tests/cv/src/apyramids.cpp
--- orig/opencv-0.9.6/tests/cv/src/apyramids.cpp2005-08-11 
00:27:36.0 +0100
+++ opencv-0.9.6/tests/cv/src/apyramids.cpp 2005-08-10 23:54:45.0 
+0100
@@ -186,7 +186,7 @@
 const int   r = 2;
 int code = TRS_OK;
 
-int param = (int)arg;
+int param = ((int *)arg)[0];
 int depth = param/2 != 0 ? IPL_DEPTH_32F : IPL_DEPTH_8U;
 int channels = param % 2 == 1 ? 3 : 1;
 
@@ -318,7 +318,7 @@
 const int   r = 2;
 int code = TRS_OK;
 
-int param = (int)arg;
+int param = ((int *)arg)[0];
 int depth = param/2 != 0 ? IPL_DEPTH_32F : IPL_DEPTH_8U;
 int channels = param % 2 == 1 ? 3 : 1;
 
@@ -448,10 +448,10 @@
 }
 }
 
-#define _8U_C10
-#define _8U_C31
-#define _32F_C1   2
-#define _32F_C3   3
+#define _8U_C1(int []) { 0 }
+#define _8U_C3(int []) { 1 }
+#define _32F_C1   (int []) { 2 }
+#define _32F_C3   (int []) { 3 }
 
 void InitAPyramids( void )
 {


signature.asc
Description: Digital signature


Bug#279030: mldonkey-server: debconf configuration is entirely ignored

2005-08-11 Thread Sylvain LE GALL
Hi,

On Fri, Aug 05, 2005 at 10:51:10PM +0200, Peter Eisentraut wrote:
> Sylvain LE GALL wrote:
> > You should have contact me before working on this. I am preparing a
> > release of 2.5.28.1 which should close this bug.
> 
> Well, you had been talking about a new release for quite some time, so I 
> wanted to give you a little push.  If you can fix the RC bugs in the 
> next week or two, I can live with that, but please no further delays.
> 
> 
> 

I am just back from holiday. Well, since you seems to be in a hurry to
have a new release, "could you be my sponsor". I will contact you
tomorrow for the upload of mldonkey (if all dependency are installable).
If you can check and upload the package, i will be in time ;-)

Regard
Sylvain Le Gall


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Processed: closing 322604

2005-08-11 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> # Automatically generated email from bts, devscripts version 2.9.4
> close 322604 2.0.54-3
Bug#322604: SECURITY: Vulnerable to CAN-2005-1344?
'close' is deprecated; see http://www.debian.org/Bugs/Developer#closing.
Bug marked as fixed in version 2.0.54-3, send any further explanations to 
Christian Hammers <[EMAIL PROTECTED]>

>
End of message, stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Processed: Re: testing bug triage

2005-08-11 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> # Trying again now that use of closes/notfound has been clarified to me.
> close 274225 4:2.6.2-3
Bug#274225: Security patch in latest version affects woody?
'close' is deprecated; see http://www.debian.org/Bugs/Developer#closing.
Bug marked as fixed in version 4:2.6.2-3, send any further explanations to 
Christian Hammers <[EMAIL PROTECTED]>

> close 278942 2:3.26-3
Bug#278942: Daemon Hijacking vuln. CAN-2003-0740 not fixed in woody
'close' is deprecated; see http://www.debian.org/Bugs/Developer#closing.
Bug marked as fixed in version 2:3.26-3, send any further explanations to 
Stefan Fritsch <[EMAIL PROTECTED]>

> close 288047 2:1.7.8-1
Bug#288047: mozilla-mailnews: NNTP Security Flaw in Mozilla 1.7.3 and below
'close' is deprecated; see http://www.debian.org/Bugs/Developer#closing.
Bug marked as fixed in version 2:1.7.8-1, send any further explanations to Rene 
Engelhard <[EMAIL PROTECTED]>

> close 318946 2.4.1-2
Bug#318946: shorewall: A client accepted by MAC address filtering to bypass any 
other rule
'close' is deprecated; see http://www.debian.org/Bugs/Developer#closing.
Bug marked as fixed in version 2.4.1-2, send any further explanations to 
Lorenzo Martignoni <[EMAIL PROTECTED]>

> close 196590 2.6.4-1.8
Bug#196590: stable is missing several security updates
'close' is deprecated; see http://www.debian.org/Bugs/Developer#closing.
Bug marked as fixed in version 2.6.4-1.8, send any further explanations to 
Jamie Heilman <[EMAIL PROTECTED]>

> close 199351 1.1.33-2
Bug#199351: mgetty (<1.1.29) buffer overflow was fixed?
'close' is deprecated; see http://www.debian.org/Bugs/Developer#closing.
Bug marked as fixed in version 1.1.33-2, send any further explanations to 
Hideki Yamane <[EMAIL PROTECTED]>

> close 223456 1.14.6+0.20040803-1
Bug#223456: semi: mime-store-message/partial-piece handles temporary file 
insecurely
'close' is deprecated; see http://www.debian.org/Bugs/Developer#closing.
Bug marked as fixed in version 1.14.6+0.20040803-1, send any further 
explanations to Tatsuya Kinoshita <[EMAIL PROTECTED]>

> close 244810 1:2.6.4-6.2
Bug#244810: CAN-2003-0066 Arbitrary command execution a.o. via escape sequencies
'close' is deprecated; see http://www.debian.org/Bugs/Developer#closing.
Bug marked as fixed in version 1:2.6.4-6.2, send any further explanations to 
Jan Minar <[EMAIL PROTECTED]>

> close 250106 1.0.8-1
Bug#250106: new upstream version fixes security issues
'close' is deprecated; see http://www.debian.org/Bugs/Developer#closing.
Bug marked as fixed in version 1.0.8-1, send any further explanations to Adrian 
Bunk <[EMAIL PROTECTED]>

> close 260838 3.0.14a-3
Bug#260838: [CAN-2004-0600, CAN-2004-0686] buffer overruns
'close' is deprecated; see http://www.debian.org/Bugs/Developer#closing.
Bug#260839: [CAN-2004-0686] Buffer overrun in `mangling method = hash' handling
Bug marked as fixed in version 3.0.14a-3, send any further explanations to 
"J.H.M. Dassen (Ray)" <[EMAIL PROTECTED]>

> close 287043 0.59r-20
Bug#287043: CAN-2004-1284 Buffer overflow in the find_next_file function
'close' is deprecated; see http://www.debian.org/Bugs/Developer#closing.
Bug marked as fixed in version 0.59r-20, send any further explanations to Joey 
Hess <[EMAIL PROTECTED]>

> close 298114 1.79-22
Bug#298114: Nvi: Improved init.d recover file that fixes security bugs
'close' is deprecated; see http://www.debian.org/Bugs/Developer#closing.
Bug marked as fixed in version 1.79-22, send any further explanations to Javier 
Fernández-Sanguino Peña <[EMAIL PROTECTED]>

> close 302421 0.99+1.00pre12-1
Bug#302421: links-ssl: handles line breaks in link URLs incorrectly
'close' is deprecated; see http://www.debian.org/Bugs/Developer#closing.
Bug marked as fixed in version 0.99+1.00pre12-1, send any further explanations 
to Florian Zumbiehl <[EMAIL PROTECTED]>

> close 306003 4:4.3.10-15
Bug#306003: php4: CAN-2005-1042 and CAN-2005-1043
'close' is deprecated; see http://www.debian.org/Bugs/Developer#closing.
Bug marked as fixed in version 4:4.3.10-15, send any further explanations to 
Helge Kreutzmann <[EMAIL PROTECTED]>

> close 306141 1.2.2-11.2
Bug#306141: CAN-2005-0468/CAN-2005-0469: Buffer overflows in slc_add_reply() 
and env_opt_add()
'close' is deprecated; see http://www.debian.org/Bugs/Developer#closing.
Bug marked as fixed in version 1.2.2-11.2, send any further explanations to 
Moritz Muehlenhoff <[EMAIL PROTECTED]>

> close 309143 4.3.0.dfsg.1-14
Bug#309143: xlibs: libxpm4's new s_popen() function is insecure garbage
'close' is deprecated; see http://www.debian.org/Bugs/Developer#closing.
Bug marked as fixed in version 4.3.0.dfsg.1-14, send any further explanations 
to Matej Vela <[EMAIL PROTECTED]>

> close 312292 1.0.30-1
Bug#312292: maradns: Maradns 1.0.28 works around a serious Linux kernel 2.6 bug 
that causes MaraDNS to hang
'close' is deprecated; see http://www.debian.org/Bugs/Developer#closing.
Bug marked as fixed in version 1.0.30-1, send any furt

Processed: Re: Bug#322300: openhackware: should not try to build on !powerpc environments

2005-08-11 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> package openhackware
Ignoring bugs not assigned to: openhackware

> severity 322300 normal
Bug#322300: FTBFS: as: unrecognized option `-mregnames'
Severity set to `normal'.

> retitle 322300 openhackware: should not try to build on !powerpc environments
Bug#322300: FTBFS: as: unrecognized option `-mregnames'
Changed Bug title.

> thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#297626: marked as done (nethack: FTBFS (amd64/gcc-4.0): non-local variable ' key_macro []' uses anonymous type)

2005-08-11 Thread Debian Bug Tracking System
Your message dated Thu, 11 Aug 2005 15:47:04 -0700
with message-id <[EMAIL PROTECTED]>
and subject line Bug#297626: fixed in nethack 3.4.3-8
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--
Received: (at submit) by bugs.debian.org; 1 Mar 2005 21:12:36 +
>From [EMAIL PROTECTED] Tue Mar 01 13:12:36 2005
Return-path: <[EMAIL PROTECTED]>
Received: from d155011.adsl.hansenet.de (localhost.localdomain) [80.171.155.11] 
by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
id 1D6EfT-0001RK-00; Tue, 01 Mar 2005 13:12:36 -0800
Received: from aj by localhost.localdomain with local (Exim 4.44)
id 1D6Fbn-0001Eu-T8; Tue, 01 Mar 2005 23:12:52 +0100
To: Debian Bug Tracking System <[EMAIL PROTECTED]>
From: Andreas Jochens <[EMAIL PROTECTED]>
Subject: nethack: FTBFS (amd64/gcc-4.0): non-local variable ' 
key_macro []' uses anonymous type
Message-Id: <[EMAIL PROTECTED]>
Date: Tue, 01 Mar 2005 23:12:52 +0100
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE 
autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 

Package: nethack
Severity: normal
Tags: patch

When building 'nethack' on amd64 with gcc-4.0,
I get the following error:

cc -O2 -I../include -g -Wall -DGCC_WARN -DQT_GRAPHICS -c ../win/tty/wintty.c
/usr/bin/moc -o qt_win.moc ../include/qt_win.h
/usr/bin/moc -o qt_kde0.moc ../include/qt_kde0.h
/usr/bin/moc -o qttableview.moc ../include/qttableview.h
g++ -O2 -I../include -g -Wall -DGCC_WARN -DQT_GRAPHICS -I. -I/usr/include/qt3 
-c ../win/Qt/qt_win.cpp
../win/Qt/qt_win.cpp:: error: non-local variable ' 
key_macro []' uses anonymous type
make[2]: *** [qt_win.o] Error 1
make[2]: Leaving directory `/nethack-3.4.3/src'

With the attached patch 'nethack' can be compiled
on amd64 using gcc-4.0.

Regards
Andreas Jochens

diff -urN ../tmp-orig/nethack-3.4.3/win/Qt/qt_win.cpp ./win/Qt/qt_win.cpp
--- ../tmp-orig/nethack-3.4.3/win/Qt/qt_win.cpp 2003-12-08 00:39:13.0 
+0100
+++ ./win/Qt/qt_win.cpp 2005-03-01 22:01:06.206733243 +0100
@@ -4436,7 +4436,7 @@
 // XXX   define "-" to do "E-\r", but would still need "-" for
 // XXX   other purposes.  Maybe just too bad.
 //
-struct {
+static struct {
 int key;
 int state;
 const char* macro;

---
Received: (at 297626-close) by bugs.debian.org; 11 Aug 2005 22:49:23 +
>From [EMAIL PROTECTED] Thu Aug 11 15:49:23 2005
Return-path: <[EMAIL PROTECTED]>
Received: from katie by spohr.debian.org with local (Exim 3.36 1 (Debian))
id 1E3LpI-0001Xt-00; Thu, 11 Aug 2005 15:47:04 -0700
From: Joshua Kwan <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
X-Katie: $Revision: 1.56 $
Subject: Bug#297626: fixed in nethack 3.4.3-8
Message-Id: <[EMAIL PROTECTED]>
Sender: Archive Administrator <[EMAIL PROTECTED]>
Date: Thu, 11 Aug 2005 15:47:04 -0700
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-CrossAssassin-Score: 2

Source: nethack
Source-Version: 3.4.3-8

We believe that the bug you reported is fixed in the latest version of
nethack, which is due to be installed in the Debian FTP archive:

nethack-common_3.4.3-8_i386.deb
  to pool/main/n/nethack/nethack-common_3.4.3-8_i386.deb
nethack-console_3.4.3-8_i386.deb
  to pool/main/n/nethack/nethack-console_3.4.3-8_i386.deb
nethack-gnome_3.4.3-8_i386.deb
  to pool/main/n/nethack/nethack-gnome_3.4.3-8_i386.deb
nethack-lisp_3.4.3-8_i386.deb
  to pool/main/n/nethack/nethack-lisp_3.4.3-8_i386.deb
nethack-qt_3.4.3-8_i386.deb
  to pool/main/n/nethack/nethack-qt_3.4.3-8_i386.deb
nethack-x11_3.4.3-8_i386.deb
  to pool/main/n/nethack/nethack-x11_3.4.3-8_i386.deb
nethack_3.4.3-8.diff.gz
  to pool/main/n/nethack/nethack_3.4.3-8.diff.gz
nethack_3.4.3-8.dsc
  to pool/main/n/nethack/nethack_3.4.3-8.dsc



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Joshua Kwan <[EMAIL 

Bug#288586: marked as done (sword: FTBFS (amd64/gcc-4.0): cast from 'sword::SWMgr*' to 'int' loses precision)

2005-08-11 Thread Debian Bug Tracking System
Your message dated Thu, 11 Aug 2005 15:50:28 -0700
with message-id <[EMAIL PROTECTED]>
and subject line Bug#288586: fixed in sword 1.5.8-1
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--
Received: (at submit) by bugs.debian.org; 4 Jan 2005 14:40:06 +
>From [EMAIL PROTECTED] Tue Jan 04 06:40:06 2005
Return-path: <[EMAIL PROTECTED]>
Received: from c158101.adsl.hansenet.de (localhost.localdomain) 
[213.39.158.101] 
by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
id 1Clpqv-0003oG-00; Tue, 04 Jan 2005 06:40:05 -0800
Received: from aj by localhost.localdomain with local (Exim 4.34)
id 1ClpwU-0003oL-Oy; Tue, 04 Jan 2005 15:45:50 +0100
To: Debian Bug Tracking System <[EMAIL PROTECTED]>
From: Andreas Jochens <[EMAIL PROTECTED]>
Subject: sword: FTBFS (amd64/gcc-4.0): cast from 'sword::SWMgr*' to 'int' loses 
precision
Message-Id: <[EMAIL PROTECTED]>
Date: Tue, 04 Jan 2005 15:45:50 +0100
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE 
autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 

Package: sword
Severity: normal
Tags: patch

When building 'sword' on amd64 with gcc-4.0,
I get the following error:

../bindings/flatapi.cpp:46: error: cast from 'sword::SWMgr*' to 'int' loses 
precision
../bindings/flatapi.cpp: In function 'int SWMgr_getConfig(int)':
../bindings/flatapi.cpp:59: error: cast from 'sword::SWConfig*' to 'int' loses 
precision
../bindings/flatapi.cpp: In function 'int SWMgr_getModulesIterator(int)':
../bindings/flatapi.cpp:71: error: cast from 'ModItType*' to 'int' loses 
precision
../bindings/flatapi.cpp: In function 'int SWMgr_getModuleByName(int, const 
char*)':
../bindings/flatapi.cpp:77: error: cast from 'sword::SWModule*' to 'int' loses 
precision
../bindings/flatapi.cpp: In function 'int SWMgr_getGlobalOptionsIterator(int)':
../bindings/flatapi.cpp:119: error: cast from 
'std::_List_iterator*' to 'int' loses precision
../bindings/flatapi.cpp: In function 'int 
SWMgr_getGlobalOptionValuesIterator(int, const char*)':
../bindings/flatapi.cpp:130: error: cast from 
'std::_List_iterator*' to 'int' loses precision
../bindings/flatapi.cpp: In function 'int ModList_iterator_val(int)':
../bindings/flatapi.cpp:268: error: cast from 'sword::SWModule*' to 'int' loses 
precision
make[3]: *** [flatapi.lo] Error 1
make[3]: Leaving directory `/sword-1.5.7/lib'

With the attached patch 'sword' can be compiled
on amd64 using gcc-4.0.

Regards
Andreas Jochens

diff -urN ../tmp-orig/sword-1.5.7/include/flatapi.h ./include/flatapi.h
--- ../tmp-orig/sword-1.5.7/include/flatapi.h   2002-10-18 03:57:47.0 
+0200
+++ ./include/flatapi.h 2005-01-04 15:02:32.358506056 +0100
@@ -11,7 +11,7 @@
 
 extern "C" {
 
-#define SWHANDLE int
+#define SWHANDLE long
 
 //using namespace sword;
 

---
Received: (at 288586-close) by bugs.debian.org; 11 Aug 2005 22:53:50 +
>From [EMAIL PROTECTED] Thu Aug 11 15:53:50 2005
Return-path: <[EMAIL PROTECTED]>
Received: from joerg by spohr.debian.org with local (Exim 3.36 1 (Debian))
id 1E3Lsa-00026l-00; Thu, 11 Aug 2005 15:50:28 -0700
From: Daniel Glassey <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
X-Katie: lisa $Revision: 1.30 $
Subject: Bug#288586: fixed in sword 1.5.8-1
Message-Id: <[EMAIL PROTECTED]>
Sender: Joerg Jaspert <[EMAIL PROTECTED]>
Date: Thu, 11 Aug 2005 15:50:28 -0700
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
autolearn=no version=2.60-bugs.debian.org_2005_01_02

Source: sword
Source-Version: 1.5.8-1

We believe that the bug you reported is fixed in the latest version of
sword, which is due to be installed in the Debian FTP archive:

diatheke_1.5.8-1_i386.deb
  to pool/main/s/sword/diatheke_1.5.8-1_i386.deb
libsword-dev_1.5.8-1_i386.deb
  to pool/main/s/sword/libsword-dev_1.5.8-1_i386.deb
libsword5_1.5.8-1_i386.deb
  to pool/main/s/sword/libsword5_1.5.8-1_i386.deb
sword_1.5.8-1.diff.gz
  to pool/main/s/sword/sword_1.5.8-1.diff.gz
sword_1.5.8-1.dsc
  to pool/main/s/sword/sword_1.5.8-1.dsc
sword_1.5.8.orig.tar.gz
  to pool/main/s/sword/sword_1.5.8.orig.tar.gz



A summary of the changes between this version an

Bug#322300: openhackware: should not try to build on !powerpc environments

2005-08-11 Thread Guillem Jover
package openhackware
severity 322300 normal
retitle 322300 openhackware: should not try to build on !powerpc environments
thanks

On Wed, Aug 10, 2005 at 09:22:17AM +0200, Reinhard Tartler wrote:
> Package: openhackware
> Version: 0.4.1-1
> Severity: Serious

> I tried to build openhackware on i386 (well, actually on amd64 inside a
> chroot), but did not succeed. I attached the build log.

Yes, it does not build because as Peter explained it's ppc specific
code, and needs a ppc build environment.

On Wed, Aug 10, 2005, Peter 'p2' De Schrijver wrote:
> This package only works on ppc as it contains ppc assembler code. The
> architecture field in debian/control should therefor be
>
> Architecture: powerpc

No, it's code that can be used by emulators like qemu, that's why
it's an all package, there's existing practice for this, and the
problem comes from a deficiency in the source format, that does
not allow to specify that an all package needs a specific building
environment (or arch).

The only thing I can do is fail gracefully with a message if the
environment, be it native or a cross toolchain, is not the
apropropriate.

regards,
guillem


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#317389: marked as done (libsigcx: FTBFS with g++-4.0: no matching function for call to 'pack...')

2005-08-11 Thread Debian Bug Tracking System
Your message dated Thu, 11 Aug 2005 15:53:00 -0700
with message-id <[EMAIL PROTECTED]>
and subject line Bug#317389: fixed in libsigcx 0.6.5-1
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--
Received: (at submit) by bugs.debian.org; 8 Jul 2005 05:27:38 +
>From [EMAIL PROTECTED] Thu Jul 07 22:27:38 2005
Return-path: <[EMAIL PROTECTED]>
Received: from pop04.mail.atl.earthlink.net [207.69.200.28] 
by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
id 1DqlOk-0001lQ-00; Thu, 07 Jul 2005 22:27:38 -0700
Received: from user-119bq03.biz.mindspring.com ([66.149.232.3] 
helo=frobnitz.homelinux.net)
by pop04.mail.atl.earthlink.net with esmtp (Exim 3.36 #10)
id 1DqlOj-0005Og-00
for [EMAIL PROTECTED]; Fri, 08 Jul 2005 01:27:37 -0400
Received: from daniel by frobnitz.homelinux.net with local (Exim 4.52)
id 1DqlOg-0004t3-Pi
for [EMAIL PROTECTED]; Thu, 07 Jul 2005 22:27:34 -0700
To: Debian Bug Tracking System <[EMAIL PROTECTED]>
Subject: libsigcx: FTBFS with g++-4.0: no matching function for call to 
'pack...'
From: Daniel Schepler <[EMAIL PROTECTED]>
Date: Thu, 07 Jul 2005 22:27:34 -0700
Message-ID: <[EMAIL PROTECTED]>
MIME-Version: 1.0
Content-Type: multipart/mixed; boundary="=-=-="
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE 
autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 

--=-=-=

Package: libsigcx
Severity: normal
Version: 0.6.4-4
Tags: patch

>From my build log:

...
if g++ -DHAVE_CONFIG_H -I. -I. -I..  -I.. -I/usr/lib/sigc++-1.2/include 
-I/usr/include/sigc++-1.2   -D_REENTRANT   -g -Wall -O2 -MT x_thread_test.o -MD 
-MP -MF ".deps/x_thread_test.Tpo" -c -o x_thread_test.o x_thread_test.cc; \
then mv -f ".deps/x_thread_test.Tpo" ".deps/x_thread_test.Po"; else rm -f 
".deps/x_thread_test.Tpo"; exit 1; fi
../sigcx/tunnel.h: In static member function 'static R 
SigCX::TunnelCallback1::pack_n_tunnel(P1, SigC::Slot1, 
SigCX::Tunnel*, bool) [with R = bool, P1 = const std::string&]':
../sigcx/tunnel.h:288:   instantiated from 'R SigCX::tunnel(SigC::Slot1, 
P1, SigCX::Tunnel*, bool) [with R = bool, P1 = const std::string&]'
x_thread_test.cc:107:   instantiated from here
../sigcx/tunnel.h:223: error: no matching function for call to 
'pack(SigC::Slot1&, const std::basic_string, std::allocator >&)'
make[3]: *** [x_thread_test.o] Error 1
make[3]: Leaving directory `/tmp/buildd/libsigcx-0.6.4/tests'
make[2]: *** [all-recursive] Error 1
make[2]: Leaving directory `/tmp/buildd/libsigcx-0.6.4'
make[1]: *** [all] Error 2
make[1]: Leaving directory `/tmp/buildd/libsigcx-0.6.4'
make: *** [debian/stamp-makefile-build] Error 2

I've attached a patch which makes the package compile with g++-4.0.
(Although I didn't check that header thoroughly for other occurrences
of a template function being used before it's defined.)

-- System Information:
Debian Release: testing/unstable
Architecture: amd64 (x86_64)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.11-9-amd64-k8
Locale: LANG=en, LC_CTYPE=en (charmap=UTF-8) (ignored: LC_ALL set to 
en_US.UTF-8)

-- 
Daniel Schepler  "Please don't disillusion me.  I
[EMAIL PROTECTED]haven't had breakfast yet."
 -- Orson Scott Card

--=-=-=
Content-Type: text/x-patch
Content-Disposition: attachment; filename=libsigcx.diff

diff -ur libsigcx-0.6.4.old/sigcx/tunnel.h libsigcx-0.6.4/sigcx/tunnel.h
--- libsigcx-0.6.4.old/sigcx/tunnel.h   2003-04-27 18:54:06.0 +
+++ libsigcx-0.6.4/sigcx/tunnel.h   2005-07-08 05:20:46.0 +
@@ -188,6 +188,9 @@
 *  Tunnel 1
 /
 
+template  class TunnelCallback1;
+template 
+  TunnelCallback1 *pack(const SigC::Slot1& s,P1 p1);
 
 /** Tunnel callback for 1 arguments. */
 template 

--=-=-=--

---
Received: (at 317389-close) by bugs.debian.org; 11 Aug 2005 22:53:01 +
>From [EMAIL PROTECTED] Thu Aug 11 15:53:01 2005
Return-path: <[EMAIL PROTECTED]>
Received: from joerg by spohr.debian.org with local (Exim 3.36 1 (Debian))
id 1E3Lv2-0002W4-00; Thu, 11 Aug 2005 15:53:00 -0700
From: Andreas Rottmann <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
X-Katie: lisa $Revision: 1.30 $
Subject: Bug#317389: fixed in libsigcx 0.6.5-1
Message-Id: <[EMAIL P

Bug#308711: marked as done (nethack: Dummy package still needed?)

2005-08-11 Thread Debian Bug Tracking System
Your message dated Thu, 11 Aug 2005 15:47:04 -0700
with message-id <[EMAIL PROTECTED]>
and subject line Bug#308711: fixed in nethack 3.4.3-8
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--
Received: (at submit) by bugs.debian.org; 11 May 2005 23:52:57 +
>From [EMAIL PROTECTED] Wed May 11 16:52:57 2005
Return-path: <[EMAIL PROTECTED]>
Received: from tornado.dat.etsit.upm.es (dat.etsit.upm.es) [138.100.17.73] 
by spohr.debian.org with smtp (Exim 3.35 1 (Debian))
id 1DW10b-0001TS-00; Wed, 11 May 2005 16:52:57 -0700
Received: (qmail 10109 invoked by uid 1013); 11 May 2005 23:52:55 -
Date: Thu, 12 May 2005 01:52:55 +0200
From: Javier =?iso-8859-1?Q?Fern=E1ndez-Sanguino_Pe=F1a?= <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
Subject: nethack: Dummy package still needed?
Message-ID: <[EMAIL PROTECTED]>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
User-Agent: Mutt/1.5.6+20040907i
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE 
autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 

Package: nethack

This dummy package is present in sarge/sid and was also present in woody.
As this was a dummy transition-only package (for potato?), is there
any reason this package should still exist in the distribution? If not,
please remove it from the debian/control file of the source package.

Regards

Javier

---
Received: (at 308711-close) by bugs.debian.org; 11 Aug 2005 22:50:08 +
>From [EMAIL PROTECTED] Thu Aug 11 15:50:08 2005
Return-path: <[EMAIL PROTECTED]>
Received: from katie by spohr.debian.org with local (Exim 3.36 1 (Debian))
id 1E3LpI-0001Xv-00; Thu, 11 Aug 2005 15:47:04 -0700
From: Joshua Kwan <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
X-Katie: $Revision: 1.56 $
Subject: Bug#308711: fixed in nethack 3.4.3-8
Message-Id: <[EMAIL PROTECTED]>
Sender: Archive Administrator <[EMAIL PROTECTED]>
Date: Thu, 11 Aug 2005 15:47:04 -0700
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-CrossAssassin-Score: 3

Source: nethack
Source-Version: 3.4.3-8

We believe that the bug you reported is fixed in the latest version of
nethack, which is due to be installed in the Debian FTP archive:

nethack-common_3.4.3-8_i386.deb
  to pool/main/n/nethack/nethack-common_3.4.3-8_i386.deb
nethack-console_3.4.3-8_i386.deb
  to pool/main/n/nethack/nethack-console_3.4.3-8_i386.deb
nethack-gnome_3.4.3-8_i386.deb
  to pool/main/n/nethack/nethack-gnome_3.4.3-8_i386.deb
nethack-lisp_3.4.3-8_i386.deb
  to pool/main/n/nethack/nethack-lisp_3.4.3-8_i386.deb
nethack-qt_3.4.3-8_i386.deb
  to pool/main/n/nethack/nethack-qt_3.4.3-8_i386.deb
nethack-x11_3.4.3-8_i386.deb
  to pool/main/n/nethack/nethack-x11_3.4.3-8_i386.deb
nethack_3.4.3-8.diff.gz
  to pool/main/n/nethack/nethack_3.4.3-8.diff.gz
nethack_3.4.3-8.dsc
  to pool/main/n/nethack/nethack_3.4.3-8.dsc



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Joshua Kwan <[EMAIL PROTECTED]> (supplier of updated nethack package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Thu, 11 Aug 2005 15:11:19 -0700
Source: nethack
Binary: nethack-common nethack-x11 nethack-console nethack-qt nethack-lisp 
nethack-gnome
Architecture: source i386
Version: 3.4.3-8
Distribution: unstable
Urgency: low
Maintainer: Joshua Kwan <[EMAIL PROTECTED]>
Changed-By: Joshua Kwan <[EMAIL PROTECTED]>
Description: 
 nethack-common - Common files for Nethack dungeon crawl game
 nethack-console - Text-based overhead view D&D-style adventure game
 nethack-gnome - Text-based/Gnome overhead view D&D-style adventure game
 nethack-lisp - Text-ba

  1   2   >