Processed: tagging 479499, tagging 445379

2008-06-04 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]: > # Automatically generated email from bts, devscripts version 2.10.28 > tags 479499 - pending Bug#479499: jppy: maintainer address rejects mail Tags were: pending Tags removed: pending > tags 445379 - pending Bug#445379: python-jppy: module is linked to

Bug#483094: marked as done (tightvnc_1.3.9-3(ia64/unstable): FTBFS: os detection failed?)

2008-06-04 Thread Debian Bug Tracking System
Your message dated Wed, 04 Jun 2008 07:02:05 + with message-id <[EMAIL PROTECTED]> and subject line Bug#483094: fixed in tightvnc 1.3.9-4 has caused the Debian Bug report #483094, regarding tightvnc_1.3.9-3(ia64/unstable): FTBFS: os detection failed? to be marked as done. This means that you

Bug#483673: avant-window-navigator requires compiz but doesn't depend on it

2008-06-04 Thread Gerfried Fuchs
* Julien Lavergne <[EMAIL PROTECTED]> [2008-06-03 22:43:44 CEST]: > Hi, > > > The package only losely suggests compiz, and even there not as its > > primary preference: > > > > Suggests: metacity (>= 2.21.5) | xcompmgr | compiz | xfwm4 (>= 4.2) > > > > Though, trying to start avant-window-navi

Bug#429923: marked as done (libapache-mod-suphp: Inserting suphp in modules.conf causes memory errors)

2008-06-04 Thread Debian Bug Tracking System
Your message dated Wed, 4 Jun 2008 09:26:58 +0200 with message-id <[EMAIL PROTECTED]> and subject line Re: Bug#429923: Reassigning bugs from libapache-mod-suphp to libapache2-mod-suphp has caused the Debian Bug report #429923, regarding libapache-mod-suphp: Inserting suphp in modules.conf causes

Bug#415254: marked as done (SuPHP security issue: Replace AddHandler by AddType)

2008-06-04 Thread Debian Bug Tracking System
Your message dated Wed, 4 Jun 2008 09:32:55 +0200 with message-id <[EMAIL PROTECTED]> and subject line Closing duplicate of already closed bug has caused the Debian Bug report #415254, regarding SuPHP security issue: Replace AddHandler by AddType to be marked as done. This means that you claim th

Bug#482159:

2008-06-04 Thread Stijn van Drongelen
Marc Haber wrote: > The relevant code should have constructs like > ${COMMONOPTIONS:+"${COMMONOPTIONS}"} instead of the simply quoted stuff. Why? It seems that exactly thát causes arguments and options (-oX 465:25 = option -oX, argument 465:25) to be concatenated, which is then interpreted as a si

Bug#484463: .pc files indirectly adds --export-dynamic to the linker flags

2008-06-04 Thread Sjoerd Simons
Package: libenchant-dev Version: 1.3.0-5+b1 Severity: serious enchant.pc requires gmodule-2.0. Which adds --export-dynamic, which breaks libraries that use version scripts for linking (as in it forces all symbols to be exported not only the one in defined as global in the version scripts). For exa

Bug#474951: marked as done (lighttpd: Extremely high load with HTTPS sites after update)

2008-06-04 Thread Debian Bug Tracking System
Your message dated Wed, 04 Jun 2008 10:07:25 +0200 with message-id <[EMAIL PROTECTED]> and subject line Re: [pkg-lighttpd] Bug#474951: Is this fixed in 1.4.13-4etch8? has caused the Debian Bug report #474951, regarding lighttpd: Extremely high load with HTTPS sites after update to be marked as don

Bug#482159:

2008-06-04 Thread Stijn van Drongelen
Applying the attached patch works for me. Without it, COMMONOPTIONS, QUEUERUNNEROPTIONS and SMTPLISTENEROPTIONS are passed in a malformed manner (i.e. quoted) when they contain spaces. --- /etc/init.d/exim4 2008-06-04 09:58:21.0 +0200 +++ /etc/init.d/exim4.new 2008-06-04 09:46:55.0

Bug#476597: marked as done (openoffice.org-gcj: dependency problem with libgcj-bc in lenny)

2008-06-04 Thread Debian Bug Tracking System
Your message dated Wed, 4 Jun 2008 10:21:42 +0200 with message-id <[EMAIL PROTECTED]> and subject line fixed has caused the Debian Bug report #476597, regarding openoffice.org-gcj: dependency problem with libgcj-bc in lenny to be marked as done. This means that you claim that the problem has been

Bug#484467: [linux-image-2.6.25-2-amd64] system shuts down right after the boot process

2008-06-04 Thread LÉVAI Dániel
Package: linux-image-2.6.25-2-amd64 Version: 2.6.25-4 Severity: serious --- Please enter the report below this line. --- I have a Lenovo Thinkpad R61i laptop. When using this kernel (2.6.25-2-amd64) then right after the last daemon started from init.d during the boot process, I get the message:

Bug#484469: debconf: it seems to segfaults configuring every package

2008-06-04 Thread Giovanni Lovato
Package: debconf Version: 1.5.22 Severity: grave Justification: renders package unusable -- System Information: Debian Release: lenny/sid APT prefers testing APT policy: (500, 'testing') Architecture: i386 (i686) Kernel: Linux 2.6.24-1-686 (SMP w/1 CPU core) Locale: LANG=en_US.UTF-8, LC_CTY

Bug#466663: Still no fix for stable?

2008-06-04 Thread root
Still no fix for stable? -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Bug#484467: [linux-image-2.6.25-2-amd64] system shuts down right after the boot process

2008-06-04 Thread maximilian attems
On Wed, Jun 04, 2008 at 10:42:48AM +0200, LÉVAI Dániel wrote: > Package: linux-image-2.6.25-2-amd64 > Version: 2.6.25-4 > Severity: serious overflated severity. > --- Please enter the report below this line. --- > I have a Lenovo Thinkpad R61i laptop. When using this kernel > (2.6.25-2-amd64) t

Processed: severity of 484467 is normal

2008-06-04 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]: > # Automatically generated email from bts, devscripts version 2.10.28 > severity 484467 normal Bug#484467: [linux-image-2.6.25-2-amd64] system shuts down right after the boot process Severity set to `normal' from `serious' > End of message, stopping pr

Processed: Cannot reproduce

2008-06-04 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]: > severity 484222 important Bug#484222: gforth: FTBFS: Cannot allocate memory Severity set to `important' from `serious' > tag 484222 moreinfo Bug#484222: gforth: FTBFS: Cannot allocate memory There were no tags set. Tags added: moreinfo > tag 484222 un

Bug#484474: [reportbug-ng] code execution by preparing module files in os.curdir

2008-06-04 Thread Nico Golde
Package: reportbug-ng Version: 0.2008.03.28 Severity: grave Tags: security Hiho, reportbug-ng is vulnerable of arbitrary code execution because it adds os.curdir to sys.path before checking for modules files in the shared directory: 24 sys.path = sys.path + [os.curdir, '/usr/share/reportbu

Bug#484222: Cannot reproduce

2008-06-04 Thread Michael Meskes
severity 484222 important tag 484222 moreinfo tag 484222 unreproducible thanks I just checked with an up-to-date sid amd64 chroot without a problem. Could you please try compiling outside pbuilder? Could it be that your system is really short of memory? Michael -- Michael Meskes Email: Michael

Bug#483548: marked as done (libavcodec-dev: file conflict with libavutil-dev, needs Replaces)

2008-06-04 Thread Debian Bug Tracking System
Your message dated Wed, 04 Jun 2008 09:02:08 + with message-id <[EMAIL PROTECTED]> and subject line Bug#483548: fixed in ffmpeg-free 0.svn20080206-8 has caused the Debian Bug report #483548, regarding libavcodec-dev: file conflict with libavutil-dev, needs Replaces to be marked as done. This

Bug#482717: marked as done (crashes on non-altivec machines)

2008-06-04 Thread Debian Bug Tracking System
Your message dated Wed, 04 Jun 2008 09:02:08 + with message-id <[EMAIL PROTECTED]> and subject line Bug#482717: fixed in ffmpeg-free 0.svn20080206-8 has caused the Debian Bug report #482717, regarding crashes on non-altivec machines to be marked as done. This means that you claim that the pro

Bug#484479: Fails to start vservers (capget(): Invalid argument)

2008-06-04 Thread Michal Čihař
Package: util-vserver Version: 0.30.215-3 Severity: grave Hi some upgrade of util-vserver made all attempts to start vserver fail with: # vserver pmademo start capget(): Invalid argument capabilities are not enabled in kernel-setup Failed to start vserver 'pmademo' Downgrading

Bug#483123: iceweasel: Iceweasel does not work

2008-06-04 Thread Sergiy Yegorov
I`ve got the same result with iceweasel-l10n-uk-ua. Starting iceweasel with LANG=C resolves problem. Excuse me my bad English. -- With best regards Sergiy Yegorov -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Bug#483163: marked as done (xmms2_0.4DrKosmos-4+b2(ia64/unstable): FTBFS: cannot find -ldts)

2008-06-04 Thread Debian Bug Tracking System
Your message dated Wed, 04 Jun 2008 12:22:57 +0200 with message-id <[EMAIL PROTECTED]> and subject line Fixed in earlier version has caused the Debian Bug report #482210, regarding xmms2_0.4DrKosmos-4+b2(ia64/unstable): FTBFS: cannot find -ldts to be marked as done. This means that you claim that

Bug#482214: marked as done (screenkast: FTBFS: ld: cannot find -ldts)

2008-06-04 Thread Debian Bug Tracking System
Your message dated Wed, 04 Jun 2008 12:22:57 +0200 with message-id <[EMAIL PROTECTED]> and subject line Fixed in earlier version has caused the Debian Bug report #482210, regarding screenkast: FTBFS: ld: cannot find -ldts to be marked as done. This means that you claim that the problem has been d

Processed: raising priority of 481928

2008-06-04 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]: > severity 481928 serious Bug#481928: fenix configure needs adjustment for armel port Severity set to `serious' from `minor' > stop Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administra

Bug#482231: marked as done (motion: FTBFS: checking size of short int... configure: error: cannot compute sizeof (short int))

2008-06-04 Thread Debian Bug Tracking System
Your message dated Wed, 04 Jun 2008 12:22:57 +0200 with message-id <[EMAIL PROTECTED]> and subject line Fixed in earlier version has caused the Debian Bug report #482210, regarding motion: FTBFS: checking size of short int... configure: error: cannot compute sizeof (short int) to be marked as don

Bug#483091: marked as done (libavg_0.7.0-6+b1(ia64/unstable): FTBFS: missing lib?)

2008-06-04 Thread Debian Bug Tracking System
Your message dated Wed, 04 Jun 2008 12:22:57 +0200 with message-id <[EMAIL PROTECTED]> and subject line Fixed in earlier version has caused the Debian Bug report #482210, regarding libavg_0.7.0-6+b1(ia64/unstable): FTBFS: missing lib? to be marked as done. This means that you claim that the probl

Bug#482213: marked as done (libavg: FTBFS: ld: cannot find -ldts)

2008-06-04 Thread Debian Bug Tracking System
Your message dated Wed, 04 Jun 2008 12:22:57 +0200 with message-id <[EMAIL PROTECTED]> and subject line Fixed in earlier version has caused the Debian Bug report #482210, regarding libavg: FTBFS: ld: cannot find -ldts to be marked as done. This means that you claim that the problem has been dealt

Bug#482210: marked as done (xmms2: FTBFS: ld: cannot find -ldts)

2008-06-04 Thread Debian Bug Tracking System
Your message dated Wed, 04 Jun 2008 12:22:57 +0200 with message-id <[EMAIL PROTECTED]> and subject line Fixed in earlier version has caused the Debian Bug report #482210, regarding xmms2: FTBFS: ld: cannot find -ldts to be marked as done. This means that you claim that the problem has been dealt

Processed: Re: Bug#481928: raising priority of 481928

2008-06-04 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]: > severity 481928 important Bug#481928: fenix configure needs adjustment for armel port Severity set to `important' from `serious' > thanks Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (ad

Bug#484311: reportbug adds os.curdir to sys.path

2008-06-04 Thread Nico Golde
Hi Thomas, * Thomas Arendsen Hein <[EMAIL PROTECTED]> [2008-06-03 18:51]: [...] > sys.path = [os.curdir, '/usr/share/reportbug'] + sys.path > > To "exploit": [...] Please use CVE-2008-2230 if you fix this bug and reference this CVE id in the changelog when closing the bug. Cheers Nico -- Nico

Bug#481928: raising priority of 481928

2008-06-04 Thread Cyril Brulebois
severity 481928 important thanks On 04/06/2008, Colin Tuckley wrote: > armel is now an official Debian arch which makes this ftbfs bug RC. This is incorrect. There's no regression since it never built on that architecture, so the appropriate severity is important, be the architecture an official

Bug#484311: reportbug adds os.curdir to sys.path

2008-06-04 Thread Thijs Kinkhorst
Hi, On Tue, June 3, 2008 18:26, Thomas Arendsen Hein wrote: > Package: reportbug > Version: 3.31 > Severity: grave > Tags: security > Justification: user security hole > > > sys.path = [os.curdir, '/usr/share/reportbug'] + sys.path > > To "exploit": > $ echo 'raise "FOO"' > token.py > $ reportbug

Bug#484311: reportbug adds os.curdir to sys.path

2008-06-04 Thread Nico Golde
Hi Thijs, * Thijs Kinkhorst <[EMAIL PROTECTED]> [2008-06-04 12:52]: > On Tue, June 3, 2008 18:26, Thomas Arendsen Hein wrote: > > Package: reportbug > > Version: 3.31 > > Severity: grave > > Tags: security > > Justification: user security hole > > > > > > sys.path = [os.curdir, '/usr/share/reportbu

Bug#484311: reportbug adds os.curdir to sys.path

2008-06-04 Thread Y Giridhar Appaji Nag
On 08/06/03 18:26 +0200, Thomas Arendsen Hein said ... > sys.path = [os.curdir, '/usr/share/reportbug'] + sys.path It looks like os.curdir has been added to sys.path only for temporary debugging purposes (code modified in local directory and wanting to test it without installing reportbug). Chris

Bug#484311: reportbug adds os.curdir to sys.path

2008-06-04 Thread Sandro Tosi
Hi all, >> > sys.path = [os.curdir, '/usr/share/reportbug'] + sys.path >> > >> > To "exploit": >> > $ echo 'raise "FOO"' > token.py >> > $ reportbug >> >> Can you explain how this is a practical user security hole? Your exploit >> shows how to "exploit yourself", but it seems very unlikely to me t

Bug#484491: CVE-2008-2098: buffer overflow allows arbitrary code execution

2008-06-04 Thread Steffen Joeris
Package: vmware-package Severity: grave Tags: security Justification: user security hole Hi The following CVE[0] has been issued against vmware products. CVE-2008-2098: Heap-based buffer overflow in the VMware Host Guest File System (HGFS) in VMware Workstation 6 before 6.0.4 build 93057, VMwar

Bug#484492: unsatisfiable versioned dep

2008-06-04 Thread Rene Engelhard
Package: gcj, gij, libgcj-bc Version: 4:4.3.0-7 Severity: serious $ apt-cache show gcj | grep Depends Depends: cpp (>= 4:4.3.0-8), gij (>= 4:4.3.0-8), gcj-4.3 (>= 4.3.0-5) gcj-4.3 |4.3.0-3 | testing | source, amd64, armel, i386, ia64, mips, mipsel, powerpc, s390, sparc gcj-4.3 |

Bug#477454: RFS: quodlibet (1.0.ds1-1)

2008-06-04 Thread Tristan Seligmann
* Joey Hess <[EMAIL PROTECTED]> [2008-06-03 22:51:16 -0400]: > Tristan Seligmann wrote: > > Well, fair enough; I suppose the README.Debian note should not be quite > > as explicit as I made it. I'm just not very happy with the gratuitous > > (in my view) change to the upstream tarball, so I wanted

Bug#476489: ucspi: should conflict with courier-mta

2008-06-04 Thread Stefan Hornburg
Gerrit Pape wrote: Hi Stefan, are you around? Thanks, Gerrit. On Mon, May 05, 2008 at 08:16:12AM +, Gerrit Pape wrote: On Thu, Apr 17, 2008 at 01:45:38AM +0200, Ralf Treinen wrote: ucspi-tcp should conflict with courier-mta as it shares a file with that package: Unpacking courier-mta (f

Bug#484270: iceweasel 3.0~b5-4 seg fault

2008-06-04 Thread Geoff Reidy
Package: iceweasel Version: 3.0~rc1-1 Followup-For: Bug #484270 Hi, I just tried 3.0~rc1-1 but it has the same problem :( Let me know what I can do to help. Thanks, Geoff -- System Information: Debian Release: lenny/sid APT prefers unstable APT policy: (500, 'unstable'), (1, 'experiment

Bug#484311: reportbug adds os.curdir to sys.path

2008-06-04 Thread Y Giridhar Appaji Nag
# Bcc: control tags 484311 + patch thanks On 08/06/04 16:51 +0530, Y Giridhar Appaji Nag said ... > Chris, can you confirm that this is case? We can remove os.curdir or add it > as the last entry in sys.path. > > As an aside, I noticed that /usr/share/reportbug is added to sys.path once > again

Processed: Re: Bug#484311: reportbug adds os.curdir to sys.path

2008-06-04 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]: > # Bcc: control > tags 484311 + patch Bug#484311: reportbug adds os.curdir to sys.path Tags were: security Tags added: patch > thanks Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (adminis

Bug#484311: reportbug adds os.curdir to sys.path

2008-06-04 Thread Thijs Kinkhorst
On Wed, June 4, 2008 13:14, Nico Golde wrote: > I agree that it is of a low impact but I disagree that this > is not a security issue, people are using reportbug in /tmp and I don't see > a reason to assume people are not doing that. The chance of succesful exploitation still seems very small, and

Bug#476489: ucspi: should conflict with courier-mta

2008-06-04 Thread Stefan Hornburg
Gerrit Pape wrote: Hi Stefan, are you around? Thanks, Gerrit. On Mon, May 05, 2008 at 08:16:12AM +, Gerrit Pape wrote: On Thu, Apr 17, 2008 at 01:45:38AM +0200, Ralf Treinen wrote: ucspi-tcp should conflict with courier-mta as it shares a file with that package: Unpacking courier-mta (f

Bug#482048: marked as done (Source package contains non-free IETF RFC/I-D)

2008-06-04 Thread Debian Bug Tracking System
Your message dated Wed, 04 Jun 2008 12:17:07 + with message-id <[EMAIL PROTECTED]> and subject line Bug#482048: fixed in courier 0.59.0-3 has caused the Debian Bug report #482048, regarding Source package contains non-free IETF RFC/I-D to be marked as done. This means that you claim that the

Bug#484311: reportbug adds os.curdir to sys.path

2008-06-04 Thread Thomas Arendsen Hein
* Thijs Kinkhorst <[EMAIL PROTECTED]> [20080604 14:13]: > On Wed, June 4, 2008 13:14, Nico Golde wrote: > > I agree that it is of a low impact but I disagree that this > > is not a security issue, people are using reportbug in /tmp and I don't see > > a reason to

Bug#484311: reportbug adds os.curdir to sys.path

2008-06-04 Thread Thijs Kinkhorst
On Wed, June 4, 2008 14:27, Thomas Arendsen Hein wrote: > I encountered this bug in the real world: I extracted a tarball > which contained a file named token.py, then I wanted to report a problem > and therefore started reportbug. > > This tarball did not contain harmful code, but as I did not ver

Bug#484499: slash: possible SQL injection vulnerability

2008-06-04 Thread Steffen Joeris
Package: slash Severity: grave Tags: security Justification: user security hole Hi A possible SQL injection vulnerability was discovered in slash. The vulnerability was an SQL injection. Its effect was to allow a user with no special authorization to read any information from any table the Slash

Bug#477454: a few of the many occurences of "fuck" in Debian changelogs (and more)

2008-06-04 Thread Jeremy Cantrell
why are we policing profanity? can we all just take a deep breath and lighten the hell up? On Tue, Jun 3, 2008 at 6:22 PM, Joey Hess <[EMAIL PROTECTED]> wrote: > Now that this bug has been brought to my attention, I cannot help > myself. I have to grep Debian changelogs for profanity, filter for >

Bug#476489: ucspi: should conflict with courier-mta

2008-06-04 Thread Gerrit Pape
On Wed, Jun 04, 2008 at 02:21:20PM +0200, Stefan Hornburg wrote: > Can you supply the corresponding code for preinst/postrm ? Yes, in preinst on 'install' or 'upgrade' (from a version that did not yet add the diversion): add_diversion() { dpkg-divert --package courier-mta --add --rename \ -

Bug#476606: marked as done (python-crack fails to install together with python-codespeak-lib)

2008-06-04 Thread Debian Bug Tracking System
Your message dated Wed, 04 Jun 2008 12:47:04 + with message-id <[EMAIL PROTECTED]> and subject line Bug#476606: fixed in codespeak-lib 0.9.1-2 has caused the Debian Bug report #476606, regarding python-crack fails to install together with python-codespeak-lib to be marked as done. This means

Bug#484503: tightvncserver: could not open default font 'fixed'

2008-06-04 Thread Georg Hoermann
Package: tightvncserver Version: 1.3.9-4 Severity: grave Justification: renders package unusable The system does not start up, this bug exists for months now and I did *not* find a solution. I am no X guru, my other machine has exactly the same problem. I did not change x configuration etc., XWi

Bug#484499: slash: possible SQL injection vulnerability

2008-06-04 Thread Axel Beckert
tag 484499 + confirmed pending patch etch thanks Hi, the bug is well known to me, there are fixed packages available for Etch and Sarge (since at that time Sarge still had security support). Security Team has been informed about the bug on the day of the initial disclosure, but I'm still waiting

Processed: Re: Bug#484499: slash: possible SQL injection vulnerability

2008-06-04 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]: > tag 484499 + confirmed pending patch etch Bug#484499: slash: possible SQL injection vulnerability Tags were: security Tags added: confirmed, pending, patch, etch > thanks Stopping processing here. Please contact me if you need assistance. Debian bug

Bug#484504: vnc4server: could not open default font "fixed"

2008-06-04 Thread Georg Hoermann
Package: vnc4server Version: 4.1.1+X4.3.0-26 Severity: grave Justification: renders package unusable The system does not start up, this bug exists for months now and I did *not* find a solution. I am no X guru, my other machine has exactly the same problem. I did not change x configuration etc.,

Bug#484499: slash: possible SQL injection vulnerability

2008-06-04 Thread Steffen Joeris
Hi Alex > the bug is well known to me, there are fixed packages available for > Etch and Sarge (since at that time Sarge still had security support). > > Security Team has been informed about the bug on the day of the > initial disclosure, but I'm still waiting for them to publish an DSA > and pub

Bug#484507: grub-pc postinst fails silently

2008-06-04 Thread Pierre Habouzit
Package: grub-pc Version: 1.96+20080601-2 Severity: serious Excerpt from today's update: Setting up grub-pc (1.96+20080601-2) ... Installing new version of config file /etc/grub.d/10_linux ... *** glibc detected *** /usr/sbin/grub-probe: realloc(): invalid next size: 0x01bf83

Bug#484504: vnc4server: could not open default font "fixed"

2008-06-04 Thread Ola Lundqvist
severity 484504 important thanks Hi Georg I'm lowering the severity because I know that it works for many users. It works perfectly for me for example. It must be something related to the configuration. On Wed, Jun 04, 2008 at 03:01:01PM +0200, Georg Hoermann wrote: > Package: vnc4server > Versi

Processed: Re: Bug#484504: vnc4server: could not open default font "fixed"

2008-06-04 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]: > severity 484504 important Bug#484504: vnc4server: could not open default font "fixed" Severity set to `important' from `grave' > thanks Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (admi

Bug#484313: marked as done (compizconfig-backend-gconf: FTBFS without libxslt1-dev installed)

2008-06-04 Thread Debian Bug Tracking System
Your message dated Wed, 4 Jun 2008 15:36:58 +0200 with message-id <[EMAIL PROTECTED]> and subject line Re: Bug#484313: compizconfig-backend-gconf: FTBFS without libxslt1-dev installed has caused the Debian Bug report #484313, regarding compizconfig-backend-gconf: FTBFS without libxslt1-dev instal

Processed: Re: Bug#484503: tightvncserver: could not open default font 'fixed'

2008-06-04 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]: > severity 484503 important Bug#484503: tightvncserver: could not open default font 'fixed' Severity set to `important' from `grave' > thanks Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (

Bug#484503: tightvncserver: could not open default font 'fixed'

2008-06-04 Thread Ola Lundqvist
severity 484503 important thanks Lowering this one as well. For comments see the other bug you just submitted. Best regards, // Ola On Wed, Jun 04, 2008 at 02:52:31PM +0200, Georg Hoermann wrote: > Package: tightvncserver > Version: 1.3.9-4 > Severity: grave > Justification: renders package unu

Bug#484469: [Debconf-devel] Bug#484469: debconf: it seems to segfaults configuring every package

2008-06-04 Thread Joey Hess
Giovanni Lovato wrote: > Package: debconf > Version: 1.5.22 > Severity: grave > Justification: renders package unusable > > apt-get segfaults on every action using debconf, aptitute too. > Look at for an example. /var/lib/dpkg/info/perl.postinst: line 19: 10810 Seg

Processed: reassign 484469 to dpkg

2008-06-04 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]: > # Automatically generated email from bts, devscripts version 2.10.28 > reassign 484469 dpkg Bug#484469: debconf: it seems to segfaults configuring every package Bug reassigned from package `debconf' to `dpkg'. > End of message, stopping processing here

Bug#484499: slash: possible SQL injection vulnerability

2008-06-04 Thread Axel Beckert
Hi, Steffen Joeris schrieb am Wed, Jun 04, 2008 at 11:24:06PM +1000: > Yes, I am aware that the stable team knows about it. Oh, ok. > The issue, however, is unembargoed (and thus public and known) Of course it is. > and nothing stops you from uploading fixed packages to unstable. That's not r

Bug#476359: marked as done (Regression FTBFS with 2.6.25)

2008-06-04 Thread Debian Bug Tracking System
Your message dated Wed, 04 Jun 2008 14:32:08 + with message-id <[EMAIL PROTECTED]> and subject line Bug#475705: fixed in r6040 0.17-3 has caused the Debian Bug report #475705, regarding Regression FTBFS with 2.6.25 to be marked as done. This means that you claim that the problem has been deal

Bug#475705: marked as done (linux-modules-extra-2.6: FTBFS: scripts/Makefile.build:46: *** CFLAGS was changed)

2008-06-04 Thread Debian Bug Tracking System
Your message dated Wed, 04 Jun 2008 14:32:08 + with message-id <[EMAIL PROTECTED]> and subject line Bug#475705: fixed in r6040 0.17-3 has caused the Debian Bug report #475705, regarding linux-modules-extra-2.6: FTBFS: scripts/Makefile.build:46: *** CFLAGS was changed to be marked as done. Th

Bug#476359: marked as done (Regression FTBFS with 2.6.25)

2008-06-04 Thread Debian Bug Tracking System
Your message dated Wed, 04 Jun 2008 14:32:08 + with message-id <[EMAIL PROTECTED]> and subject line Bug#476359: fixed in r6040 0.17-3 has caused the Debian Bug report #476359, regarding Regression FTBFS with 2.6.25 to be marked as done. This means that you claim that the problem has been deal

Bug#475705: marked as done (linux-modules-extra-2.6: FTBFS: scripts/Makefile.build:46: *** CFLAGS was changed)

2008-06-04 Thread Debian Bug Tracking System
Your message dated Wed, 04 Jun 2008 14:32:08 + with message-id <[EMAIL PROTECTED]> and subject line Bug#476359: fixed in r6040 0.17-3 has caused the Debian Bug report #476359, regarding linux-modules-extra-2.6: FTBFS: scripts/Makefile.build:46: *** CFLAGS was changed to be marked as done. Th

Bug#483400: python-mapscript module crashes when importing

2008-06-04 Thread Dolf Andringa
I am experiencing the same problem with Debian Unstable. The following thread seems to discuss this problem: http://www.mail-archive.com/[EMAIL PROTECTED]/msg14117.html Some of my installed packages are the following (all standard debian packages): ii libagg-dev2.5+dfsg1-

Bug#484311: reportbug adds os.curdir to sys.path

2008-06-04 Thread Chris Lawrence
Per my vac message if you guys can put together a quick release in the next day or so that would be great. It will otherwise be Tuesday at the earliest. Chris. On 6/4/08, Thijs Kinkhorst <[EMAIL PROTECTED]> wrote: > On Wed, June 4, 2008 14:27, Thomas Arendsen Hein wrote: >> I encountered this bug

Bug#481860: openssh-server upgrade didn't remove all compromised keys from /etc/ssh

2008-06-04 Thread Raphael Hertzog
On Mon, 19 May 2008, Vincent Lefevre wrote: > On another Debian machihe, I can see that ssh-vulnkey outputs > "Unknown (no blacklist information)" for the RSA key, probably > because openssh-blacklist-extra isn't installed on this machine. > > The description field of openssh-blacklist-extra says:

Processed: Re: reassign 484469 to dpkg

2008-06-04 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]: > reassign 484469 perl Bug#484469: debconf: it seems to segfaults configuring every package Bug reassigned from package `dpkg' to `perl'. > thanks Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administra

Bug#484469: reassign 484469 to dpkg

2008-06-04 Thread Raphael Hertzog
reassign 484469 perl thanks Hi, Neither is this dpkg that's faulty: /bin/sh: line 1: 10805 Segmentation fault /usr/sbin/dpkg-preconfigure --apt It simply looks like that perl segfaults whenever it has something to do. Giovanni, you simply show the final problem but I suppose it didn't app

Processed: Re: Bug#484491: CVE-2008-2098: buffer overflow allows arbitrary code execution

2008-06-04 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]: > severity 484491 normal Bug#484491: CVE-2008-2098: buffer overflow allows arbitrary code execution Severity set to `normal' from `grave' > thanks Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administra

Bug#484491: CVE-2008-2098: buffer overflow allows arbitrary code execution

2008-06-04 Thread Robert Edmonds
severity 484491 normal thanks Steffen Joeris wrote: > Package: vmware-package > Severity: grave > Tags: security > Justification: user security hole > > Hi > > The following CVE[0] has been issued against vmware products. hi, vmware-package is a script which builds .debs from vmware tarballs;

Bug#484311: reportbug adds os.curdir to sys.path

2008-06-04 Thread Nico Golde
Hi Thijs, * Thijs Kinkhorst <[EMAIL PROTECTED]> [2008-06-04 14:14]: > On Wed, June 4, 2008 13:14, Nico Golde wrote: > > I agree that it is of a low impact but I disagree that this > > is not a security issue, people are using reportbug in /tmp and I don't see > > a reason to assume people are not d

Bug#484474: this is a no-dsa

2008-06-04 Thread Thijs Kinkhorst
Hi, Just to let you know that we won't be treating this as an issue for which we'll issue a stable DSA. See for reasoning the similar issue in reportbug, which is here even stronger because as a GUI application, it is often ran from the menu rather than the commandline. However, you can provide a

Bug#484517: missing copyright information in debian/copyright

2008-06-04 Thread Thomas Viehmann
Package: c-ares Severity: serious Version: 1.5.1-0 Hi, the debian/copyright fails to list copyright notices, e.g. those for copyrights owned by the Massachusetts Institute of Technology. Kind regards T. -- Thomas Viehmann, http://thomas.viehmann.net/ -- To UNSUBSCRIBE, email to [EMAIL PRO

Bug#480589: marked as done (libc-ares1 contains libcares.2.so)

2008-06-04 Thread Debian Bug Tracking System
Your message dated Wed, 04 Jun 2008 15:50:22 + with message-id <[EMAIL PROTECTED]> and subject line Bug#480589: fixed in c-ares 1.5.2-0 has caused the Debian Bug report #480589, regarding libc-ares1 contains libcares.2.so to be marked as done. This means that you claim that the problem has be

Bug#484311: reportbug adds os.curdir to sys.path

2008-06-04 Thread Nico Golde
Hi, please also fix: diff -Nru reportbug-3.40/checks/compare_pseudo-pkgs_lists.py reportbug-3.40+nmu1/checks/compare_pseudo-pkgs_lists.py --- reportbug-3.40/checks/compare_pseudo-pkgs_lists.py 2008-05-22 03:21:42.0 +0200 +++ reportbug-3.40+nmu1/checks/compare_pseudo-pkgs_lists.py 20

Bug#484479: Fails to start vservers (capget(): Invalid argument)

2008-06-04 Thread Micah Anderson
Hi, Thanks for your bug report. > some upgrade of util-vserver made all attempts to start vserver fail > with: > > # vserver pmademo start > capget(): Invalid argument > capabilities are not enabled in kernel-setup > > Downgrading backt to 0.30.214-6 the problem is gone (this is lat

Processed: found 461219 in 4.2-1

2008-06-04 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]: > # Automatically generated email from bts, devscripts version 2.10.28 > found 461219 4.2-1 Bug#461219: spamassassin should not expire database by default, timeouts on very low load Bug marked as found in version 4.2-1. > End of message, stopping proces

Bug#481737: [php-maint] Bug#481737: FTBFS on arm

2008-06-04 Thread Stefan Fritsch
I did another test build, this time without the suhosin patch (and no other changes). This build succeeded. BTW, for both builds I had gcc-4.3 4.3.0-4 installed, which is not current anymore but it's the same version that was used by the arm buildd. Cheers, Stefan -- To UNSUBSCRIBE, email

Bug#484311: reportbug adds os.curdir to sys.path

2008-06-04 Thread Sandro Tosi
> please also fix: > > diff -Nru reportbug-3.40/checks/compare_pseudo-pkgs_lists.py > reportbug-3.40+nmu1/checks/compare_pseudo-pkgs_lists.py > --- reportbug-3.40/checks/compare_pseudo-pkgs_lists.py 2008-05-22 > 03:21:42.0 +0200 > +++ reportbug-3.40+nmu1/checks/compare_pseudo-pkgs_lists.

Bug#42158: Is your stomach a "bottom-less" pit?

2008-06-04 Thread Dianne Hinton
We carry many different Wohtelgsis ptudocrs aballiave ... You will lose the whegit you've always wanted whoiutt furiale! http://withequa.com -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Bug#484499: slash: possible SQL injection vulnerability

2008-06-04 Thread Steffen Joeris
Hi Please use CVE-2008-2231 as a reference for this issue. It should be included in every changelog entry that deals with this issue. Thanks in advance. Cheers Steffen signature.asc Description: This is a digitally signed message part.

Bug#484311: marked as done (reportbug adds os.curdir to sys.path)

2008-06-04 Thread Debian Bug Tracking System
Your message dated Wed, 04 Jun 2008 16:32:06 + with message-id <[EMAIL PROTECTED]> and subject line Bug#484311: fixed in reportbug 3.41 has caused the Debian Bug report #484311, regarding reportbug adds os.curdir to sys.path to be marked as done. This means that you claim that the problem has

Bug#483828: gtk-qt-engine-kde4: evolution crash backtrace

2008-06-04 Thread Cassiano Leal
Package: gtk-qt-engine-kde4 Version: 1.1-1 Followup-For: Bug #483828 I can confirm this happening in evolution and GIMP. Iceweasel works fine, though. Follows the moment of the crash from within gdb: $ gdb evolution GNU gdb 6.7.1-debian

Bug#484479: Fails to start vservers (capget(): Invalid argument)

2008-06-04 Thread Micah Anderson
* Micah Anderson <[EMAIL PROTECTED]> [2008-06-04 13:08-0400]: > The util-vserver trunk can build against the newer headers, so maybe we > can pull from there to resolve this. Hi, I've applied a patch from upstream that I hope will solve this. Can you try this on your machine and let me know the

Bug#484479: Fails to start vservers (capget(): Invalid argument)

2008-06-04 Thread Michal Čihař
Hi Dne Wed, 4 Jun 2008 13:39:25 -0400 Micah Anderson <[EMAIL PROTECTED]> napsal(a): > I've applied a patch from upstream that I hope will solve this. Can > you try this on your machine and let me know the results? > > You can pull the deb from: > > http://people.debian.org/~micah/util-vserver >

Bug#484533: vym corrupts files when saving.

2008-06-04 Thread Benjamin Redelings
Package: vym Version: 1.10.0-1.1 Severity: grave Justification: causes non-serious data loss Hi, I tried loading a *.vym file, and I got this error: Fatal parsing error: error occurred while parsing content in line 37, column 3 File is: /tmp/vym-s8rrUj/new_research.xml DOCTYPE HTML PUBLIC "-//W

Bug#484535: piespy crashes with a gtk error

2008-06-04 Thread Noah Slater
Package: piespy Version: 0.4.0-2 Severity: grave Justification: renders package unusable When running piespy I get the following error shortly before a crash: (.:14152): Gtk-WARNING **: cannot open display: This happens each time. FWIW, I am running this on a remote server with no X. >From h

Bug#484221: marked as done (haproxy: FTBFS: field 'in' has incomplete type)

2008-06-04 Thread Debian Bug Tracking System
Your message dated Wed, 04 Jun 2008 18:17:02 + with message-id <[EMAIL PROTECTED]> and subject line Bug#484221: fixed in haproxy 1.3.14.5-1 has caused the Debian Bug report #484221, regarding haproxy: FTBFS: field 'in' has incomplete type to be marked as done. This means that you claim that t

Bug#479300: marked as done (as31_2.3.1-1(sparc/unstable): FTBFS, ./configure: Permission denied)

2008-06-04 Thread Debian Bug Tracking System
Your message dated Wed, 04 Jun 2008 18:32:03 + with message-id <[EMAIL PROTECTED]> and subject line Bug#479300: fixed in as31 2.3.1-1.1 has caused the Debian Bug report #479300, regarding as31_2.3.1-1(sparc/unstable): FTBFS, ./configure: Permission denied to be marked as done. This means that

Bug#484517: marked as done (missing copyright information in debian/copyright)

2008-06-04 Thread Debian Bug Tracking System
Your message dated Wed, 04 Jun 2008 18:47:02 + with message-id <[EMAIL PROTECTED]> and subject line Bug#484517: fixed in c-ares 1.5.2-1 has caused the Debian Bug report #484517, regarding missing copyright information in debian/copyright to be marked as done. This means that you claim that th

Bug#42158: Lose weight by suppressing your appetite

2008-06-04 Thread Terri Elmore
Your appetite may be the cause for your weight http://scourink.com -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Bug#484469: reassign 484469 to dpkg

2008-06-04 Thread Giovanni Lovato
Raphael Hertzog wrote: > reassign 484469 perl > thanks > > Hi, > > Neither is this dpkg that's faulty: > /bin/sh: line 1: 10805 Segmentation fault /usr/sbin/dpkg-preconfigure > --apt > > It simply looks like that perl segfaults whenever it has something to do. > > > Giovanni, you simply

Bug#484469: reassign 484469 to dpkg

2008-06-04 Thread Raphael Hertzog
On Wed, 04 Jun 2008, Giovanni Lovato wrote: > # perl -e 'print "hello\n"' > Segmentation fault Ouch. Something is very messed on your system. Try manually unpacking the various perl packages with "dpkg --unpack <.deb file>" or maybe try "apt-get reinstall perl perl-base perl-modules" But we can't

  1   2   >