Bug#449348: le: please rebuild against libncursesw5

2007-11-05 Thread Alexander E. Patrakov

Package: le
Version: 1.13.4-1
Severity: normal
Tags: l10n

The upstream package description and freshmeat.net article mention that
le is able to edit text in multibyte encodings. This is important,
because Debian defaults to UTF-8 based locales now. However, the Debian
"le" package cannot do this, because it is built against libncurses5,
not libncursesw5. If the libncursesw5-dev package is installed, the
package is built correctly with UTF-8 support, so this is just a simple
matter of changing libncurses5-dev to libncursesw5-dev in Build-Depends.

-- System Information:
Debian Release: lenny/sid
 APT prefers testing
 APT policy: (500, 'testing')
Architecture: i386 (i686)

Kernel: Linux 2.6.22-2-686 (SMP w/2 CPU cores)
Locale: LANG=ru_RU.UTF-8, LC_CTYPE=ru_RU.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash

Versions of packages le depends on:
ii  libc6 2.6.1-1+b1 GNU C Library: Shared libraries
ii  libgcc1   1:4.2.2-3  GCC support library
ii  libncurses5   5.6+20071013-1 Shared libraries for 
terminal hand


le recommends no packages.

-- no debconf information

--
Alexander E. Patrakov



--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#448587: xmp new version available

2007-11-05 Thread Gürkan Sengün

I'd like to pick this...

http://gnu.ethz.ch/debian/xmp/xmp_2.4.1-1.dsc
http://gnu.ethz.ch/debian/xmp/xmp_2.4.1.orig.tar.gz
http://gnu.ethz.ch/debian/xmp/xmp_2.4.1-1.diff.gz

Cheers,
Guerkan



--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#449368: axel: segmentation fault when FTP CWD fails

2007-11-05 Thread Y Giridhar Appaji Nag
Package: axel
Version: 1.0b-3
Severity: normal

$ axel -n 4 
http://www.mirrorservice.org/sites/releases.ubuntu.com/edgy/ubuntu-6.10-alternate-i386.iso
Initializing download: 
http://www.mirrorservice.org/sites/releases.ubuntu.com/edgy/ubuntu-6.10-alternate-i386.iso
[1]13980 segmentation fault (core dumped)  axel -n 4 

Running a debug build ...

[snip...]
230 Logged in for anonymous FTP
fd(3)<--TYPE I
fd(3)-->200 Type set to I
fd(3)<--CWD /sites/releases.ubuntu.com/edgy/
fd(3)-->550 Can't access /sites/releases.ubuntu.com/edgy: No such file or 
directory
fd(-1)<--RETR ubuntu-6.10-alternate-i386.iso
[1]14433 segmentation fault (core dumped)  ./axel -n 4 

-- System Information:
Debian Release: lenny/sid
  APT prefers testing
  APT policy: (900, 'testing'), (800, 'unstable'), (700, 'experimental')
Architecture: i386 (i686)

Kernel: Linux 2.6.22-2-686 (SMP w/1 CPU core)
Locale: LANG=en_IN, LC_CTYPE=en_IN (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash

Versions of packages axel depends on:
ii  libc6 2.6.1-1+b1 GNU C Library: Shared libraries

axel recommends no packages.

-- no debconf information



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#449368: axel: segmentation fault when FTP CWD fails

2007-11-05 Thread Y Giridhar Appaji Nag
tags 449368 +patch
thanks

On 07/11/05 17:56 +0530, Y Giridhar Appaji Nag said ...
> fd(3)-->200 Type set to I
> fd(3)<--CWD /sites/releases.ubuntu.com/edgy/
> fd(3)-->550 Can't access /sites/releases.ubuntu.com/edgy: No such file or 
> directory
> fd(-1)<--RETR ubuntu-6.10-alternate-i386.iso
> [1]14433 segmentation fault (core dumped)  ./axel -n 4 

Patch attached to fix this.

Giridhar

-- 
Y Giridhar Appaji Nag | http://www.appaji.net/
diff -Nur original/axel-1.0b/conn.c axel-1.0b/conn.c
--- original/axel-1.0b/conn.c	2005-04-06 23:48:28.0 +0530
+++ axel-1.0b/conn.c	2007-11-05 18:05:14.870237000 +0530
@@ -313,7 +313,8 @@
 		do
 		{
 			conn->currentbyte = 1;
-			conn_setup( conn );
+			if( !conn_setup( conn ) )
+return( 0 );
 			conn_exec( conn );
 			conn_disconnect( conn );
 			/* Code 3xx == redirect*/
diff -Nur original/axel-1.0b/ftp.c axel-1.0b/ftp.c
--- original/axel-1.0b/ftp.c	2001-12-15 23:29:03.0 +0530
+++ axel-1.0b/ftp.c	2007-11-05 18:00:26.236616000 +0530
@@ -87,7 +87,10 @@
 	
 	ftp_command( conn, "CWD %s", cwd );
 	if( ftp_wait( conn ) / 100 != 2 )
+	{
+	  fprintf( stderr, _("Can't change directory to %s\n"), cwd );
 		return( 0 );
+	}
 	
 	strncpy( conn->cwd, cwd, MAX_STRING );
 	


signature.asc
Description: Digital signature


Processed: Re: Bug#449368: axel: segmentation fault when FTP CWD fails

2007-11-05 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> tags 449368 +patch
Bug#449368: axel: segmentation fault when FTP CWD fails
There were no tags set.
Tags added: patch

> thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#401855: marked as done (scheme48: FTBFS on kfreebsd-i386: kfreebsd-i386 not in the architecture list)

2007-11-05 Thread Debian Bug Tracking System
Your message dated Mon, 5 Nov 2007 14:36:05 +0100 (CET)
with message-id <[EMAIL PROTECTED]>
and subject line scheme48: FTBFS on kfreebsd-i386
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--- Begin Message ---

Package: scheme48
Severity: important
Version: 1.3-4


The current version fails to build on GNU/kFreeBSD,
because kfreebsd-i386 is not listed in the Architecture: field.

Could you please add kfreebsd-i386 to the list of the supported
architectures?

Thanks in advance

Petr

--- End Message ---
--- Begin Message ---

Version: 1.3-8

--- End Message ---


Bug#449507: axel: should use strncpy

2007-11-05 Thread Y Giridhar Appaji Nag
Package: axel
Version: 1.0b-3
Severity: normal
Tags: patch

axel copies filenames, URLs etc. into fixed size (MAX_STRING in axel.h)
buffers.  It should use strncpy instead of strcpy.  This will avoid some
problems like those reported in #196431

Giridhar

--
Y Giridhar Appaji Nag | http://www.appaji.net/

-- System Information:
Debian Release: lenny/sid
  APT prefers testing
  APT policy: (900, 'testing'), (800, 'unstable'), (700, 'experimental')
Architecture: i386 (i686)

Kernel: Linux 2.6.22-2-686 (SMP w/1 CPU core)
Locale: LANG=en_IN, LC_CTYPE=en_IN (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash

Versions of packages axel depends on:
ii  libc6 2.6.1-1+b1 GNU C Library: Shared libraries

axel recommends no packages.

-- no debconf information
diff -Nur original/axel-1.0b/axel.c axel-1.0b/axel.c
--- original/axel-1.0b/axel.c	2002-05-03 18:15:11.0 +0530
+++ axel-1.0b/axel.c	2007-11-06 12:23:14.596683000 +0530
@@ -64,7 +64,7 @@
 	{
 		axel->url = malloc( sizeof( url_t ) );
 		axel->url->next = axel->url;
-		strcpy( axel->url->text, (char *) url );
+		strncpy( axel->url->text, (char *) url, MAX_STRING );
 	}
 	else
 	{
@@ -72,7 +72,7 @@
 		u = axel->url = malloc( sizeof( url_t ) );
 		for( i = 0; i < count; i ++ )
 		{
-			strcpy( u->text, res[i].url );
+			strncpy( u->text, res[i].url, MAX_STRING );
 			if( i < count - 1 )
 			{
 u->next = malloc( sizeof( url_t ) );
@@ -96,10 +96,10 @@
 	axel->conn[0].local_if = axel->conf->interfaces->text;
 	axel->conf->interfaces = axel->conf->interfaces->next;
 	
-	strcpy( axel->filename, axel->conn[0].file );
+	strncpy( axel->filename, axel->conn[0].file, MAX_STRING );
 	http_decode( axel->filename );
 	if( *axel->filename == 0 )	/* Index page == no fn		*/
-		strcpy( axel->filename, axel->conf->default_filename );
+		strncpy( axel->filename, axel->conf->default_filename, MAX_STRING );
 	if( ( s = strchr( axel->filename, '?' ) ) != NULL && axel->conf->strip_cgi_parameters )
 		*s = 0;		/* Get rid of CGI parameters		*/
 	
@@ -119,7 +119,7 @@
 		return( axel );
 	}
 	s = conn_url( axel->conn );
-	strcpy( axel->url->text, s );
+	strncpy( axel->url->text, s, MAX_STRING );
 	if( ( axel->size = axel->conn[0].size ) != INT_MAX )
 	{
 		if( axel->conf->verbose > 0 )
@@ -128,7 +128,7 @@
 	
 	/* Wildcards in URL --> Get complete filename			*/
 	if( strchr( axel->filename, '*' ) || strchr( axel->filename, '?' ) )
-		strcpy( axel->filename, axel->conn[0].file );
+		strncpy( axel->filename, axel->conn[0].file, MAX_STRING );
 	
 	return( axel );
 }
diff -Nur original/axel-1.0b/conn.c axel-1.0b/conn.c
--- original/axel-1.0b/conn.c	2005-04-06 23:48:28.0 +0530
+++ axel-1.0b/conn.c	2007-11-06 12:16:05.675314000 +0530
@@ -74,12 +74,12 @@
 		*j = '?';
 	if( i == NULL )
 	{
-		strcpy( conn->file, conn->dir );
+		strncpy( conn->file, conn->dir, MAX_STRING );
 		strcpy( conn->dir, "/" );
 	}
 	else
 	{
-		strcpy( conn->file, i + 1 );
+		strncpy( conn->file, i + 1, MAX_STRING );
 		strcat( conn->dir, "/" );
 	}
 	
@@ -89,7 +89,7 @@
 		strncpy( conn->user, conn->host, MAX_STRING );
 		i = strrchr( conn->user, '@' );
 		*i = 0;
-		strcpy( conn->host, i + 1 );
+		strncpy( conn->host, i + 1, MAX_STRING );
 		*conn->pass = 0;
 	}
 	/* If not: Fill in defaults	*/
@@ -112,7 +112,7 @@
 	if( ( i = strchr( conn->user, ':' ) ) != NULL )
 	{
 		*i = 0;
-		strcpy( conn->pass, i + 1 );
+		strncpy( conn->pass, i + 1, MAX_STRING );
 	}
 	/* Port number?			*/
 	if( ( i = strchr( conn->host, ':' ) ) != NULL )


Bug#196431: axel crashes on long urls

2007-11-05 Thread Y Giridhar Appaji Nag
tags 196431 +patch
thanks

On 07/09/14 15:55 +0530, Y Giridhar Appaji Nag said ...
> Axel currently cannot handle strings of length over 256 (MAX_STRING in
> axel.h) and should exit gracefully.  Fix forthcoming.

Attached patch ...

1. Exits if the URL is over MAX_STRING in length
2. Increases MAX_STRING to 1024 from 256 to be more useful :)

Giridhar

-- 
Y Giridhar Appaji Nag | http://www.appaji.net/
diff -Nur original/axel-1.0b/axel.h axel-1.0b/axel.h
--- original/axel-1.0b/axel.h	2002-05-03 18:15:18.0 +0530
+++ axel-1.0b/axel.h	2007-11-06 12:46:50.600754000 +0530
@@ -64,7 +64,7 @@
 #endif
 
 /* Compiled-in settings			*/
-#define MAX_STRING		256
+#define MAX_STRING		1024
 #define MAX_REDIR		5
 #define AXEL_VERSION_STRING	"1.0b"
 #define USER_AGENT		"Axel " AXEL_VERSION_STRING " (" ARCH ")"
diff -Nur original/axel-1.0b/text.c axel-1.0b/text.c
--- original/axel-1.0b/text.c	2002-02-20 01:15:55.0 +0530
+++ axel-1.0b/text.c	2007-11-06 12:52:54.054674000 +0530
@@ -164,11 +164,16 @@
 	else if( strcmp( argv[optind], "-" ) == 0 )
 	{
 		s = malloc( MAX_STRING );
-		scanf( "%127[^\n]s", s );
+		scanf( "%1024[^\n]s", s );
 	}
 	else
 	{
 		s = argv[optind];
+		if( strlen( s ) > MAX_STRING )
+		{
+			fprintf( stderr, _("Can't handle URLs of length over %d\n" ), MAX_STRING );
+			return( 1 );
+		}
 	}
 	
 	printf( _("Initializing download: %s\n"), s );


signature.asc
Description: Digital signature


Processed: Re: Bug#196431: axel crashes on long urls

2007-11-05 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> tags 196431 +patch
Bug#196431: axel crashes on long urls
Tags were: confirmed upstream
Tags added: patch

> thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]