Package: apt-listchanges
Version: 2.85.7
Severity: wishlist
I have received a report of some newbie user not knowing how to
continue when apt-listchanges displayed the NEWS file of a security
update. Therefore I thought it may be nice if apt-listchanges included
a line at the end like "press q to
On Wed, 23 Mar 2011, Brian P Kroth wrote:
In the default configuration mod_authnz_ldap.load is symlinked from
mods-available to mods-enabled but that orders it (lexicographically)
after the symlink to load mod_authnz_default. This causes a number of
ldap specific arguments to the Require definit
On Monday 21 March 2011, Peter Samuelson wrote:
> Since only a single libdb*-dev can be installed at a time, and
> since libaprutil1-dev Depends on one of them, any apr-util reverse
> dep is forced to use the same bdb version. Even though, in
> Subversion's case, we don't use the apr-util frontend
Hi Cyril,
On Saturday 19 March 2011, Cyril Brulebois wrote:
> Cyril Brulebois (15/03/2011):
> > that doesn't appear to be sufficient. Even with that version
> > available, I'm getting auto-give-backs.
>
> shall I expect a fix on the build-dep side at some point? Or shall
> I just mark php5 as fa
On Sunday 20 March 2011, Raphael Geissert wrote:
> On Sunday 20 March 2011 11:15:54 Kurt Roeckx wrote:
> > Your build-depends are uninstallable because you build-depend on
> > libdb-dev, which depends on libdb5.1-dev, and apache2-prefork-dev
> > which depends on libaprutil1-dev, which depends on li
On Monday 07 March 2011, Russ Allbery wrote:
> > fsvs
> > libapache2-mod-perl2
> > php5
> > php-svn
> > rapidsvn
> > subversion
> >
> > Does this make sense together with my explanations above?
>
> Yes, but note that _FILE_OFFSET_BITS could be set in config.h, in
> which case the grep won't find
On Monday 07 March 2011, you wrote:
> Setting GREP_OPTIONS="" seems to have fixed the problem. The grep
> manual warns that '--perl-regexp' is experimental, so this might
> not be a problem with apt-file after all.
apt-file should unset GREP_OPTIONS before calling grep, then. That's
still a bug.
On Monday 07 March 2011, you wrote:
> Running `apt-file search 'pattern'` simply prints
> grep: conflicting matchers specified
> grep: conflicting matchers specified
> grep: conflicting matchers specified
> grep: conflicting matchers specified
> grep: conflicting matchers specified
>
> with every
On Monday 07 March 2011, Russ Allbery wrote:
> Stefan Fritsch writes:
> > I fear this affects more packages: I have looked at all packages
> > that depend on libapr1 or have libapache2 in their name. From
> > those, I have grepped for FILE_OFFSET_BITS in their newest
> &g
title 616590 nmu various libapr1 rdeps on kfreebsd-*
thanks
I fear this affects more packages: I have looked at all packages that
depend on libapr1 or have libapache2 in their name. From those, I have
grepped for FILE_OFFSET_BITS in their newest kfreebsd build log. If I
didn't do something wron
This should have a dep-wait on libapr1-dev_1.4.2-8, obviously.
--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: binnmu
Hi,
there is a problem with apr changing ABI on kfreebsd-* depending on
-D_FILE_OFFSET_BITS=64 being used by a libapr user or not. This causes segfaults
for mod_php. See bug #616323
This sh
On Sunday 27 February 2011, Tim Stoop wrote:
> I might be missing something, but I would really appreciate some
> way of overriding ulimit limits, preferably from
> /etc/default/apache2 or something. We running into open file limit
> problems and to fix those, I see no other solution than changing
On Monday 21 February 2011, David Christensen wrote:
> I'm designing a Linux/ Apache/ MySQL/ Perl content management
> system that I'd like to work in shared hosting environments (among
> other configurations). Apache typically runs as an unpriviledged
> user (www-data on Debian, suexec, others?)
On Monday 14 February 2011, Andreas B wrote:
> i have upgrade to squeeze. After upgrade i can not write to WebDAV
> share. In error log you can see:
>
> [Mon Feb 14 21:31:40 2011] [error] [client 192.168.x.xx] Unable to
> PUT new contents for /kalender/bal.txt. [403, #0] [Mon Feb 14
> 21:31:40 20
On Saturday 12 February 2011, Rene Engelhard wrote:
> On Sat, Feb 12, 2011 at 07:21:41PM +0100, Stefan Fritsch wrote:
> > If you know that this is the complete list, including 15 lines of
> > "rm -f" and 31 lines of "rmdir ... 2> /dev/null || true" in
>
On Saturday 12 February 2011, Rene Engelhard wrote:
> > if dpkg --compare-versions "$2" lt "1:3.3.0-3"; then
BTW, it would be good if you limited the cleanup to the cases where
the problematic version was actually installed, i.e. don't clean
On Saturday 12 February 2011, Rene Engelhard wrote:
> On Sat, Feb 12, 2011 at 06:54:22PM +0100, Stefan Fritsch wrote:
> > On Saturday 12 February 2011, you wrote:
> > > And what do people store in /share and /user?
> >
> > /share is a common name for additional fil
On Saturday 12 February 2011, you wrote:
> And what do people store in /share and /user?
/share is a common name for additional file systems (e.g. remote NFS
shares). You cannot assume that just because a dir is not in the FHS,
people don't use it.
> And you hopefully suggest an alternative wa
Package: libreoffice-common
Version: 1:3a3.3.1~rc1-1
Severity: critical
Justification: causes serious data loss
from preinst:
if dpkg --compare-versions "$2" lt "1:3.3.0-3"; then
rm -rf /share
rm -rf /user
fi
Are you mad? You must nod delete arb
reassign 610424 libapache2-mod-python
found 610424 3.3.1-9
affects 610424 apache2
thanks
Looks like a mod_python or python bug to me:
#0 sem_wait () at ../nptl/sysdeps/unix/sysv/linux/x86_64/sem_wait.S:45
No locals.
#1 0x7f1381bbc5f8 in PyThread_acquire_lock (lock=0x0, waitflag=1) at
../Py
On Sunday 30 January 2011, Stefan Fritsch wrote:
> Actually, the fix is probably this:
>
> http://git.exim.org/exim.git/commitdiff/33191679e1a86ba6d9c38a74d07
> 95d00c300f2c5
>
> I will try if it helps
Looks good, I will release another DSA. Please fix this in
sid/squee
On Sunday 30 January 2011, Stefan Fritsch wrote:
> It seems to me that either -bf should set the 'checking' var to
> true or this if block
>
> if (!unprivileged && /* originally had root
> AND */ !removed_privilege &&a
It seems to me that either -bf should set the 'checking' var to true or
this if block
if (!unprivileged && /* originally had root AND */
!removed_privilege && /* still got root AND */
!daemon_listen && /* not starting the daemon
FTR, sid/squeeze is also affected. I have verified that it still
worked in 4.69-9+lenny1
--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Package: exim4
Version: 4.69-9+lenny3
Severity: important
As Florian Weimer discovered (unfortunately only after its release) the
latest updates broke testing of user filters as normal user:
$ /usr/sbin/exim4 -bf .forward
exim: changing group failed: Operation not permitted
$
--
To UNSUBSCRI
On Saturday 29 January 2011, Christoph Anton Mitterer wrote:
> It seems that iceweasel still is vulnerable to the SSL
> renegotiation attack, as simply is configured per default to allow
> the vulnerable renegotiation:
This has to be balanced between compatibility and security. Currently
less tha
:33:36 +0100 (CET)
From: Stefan Fritsch
To: Walter Franzini
Cc: aegis-develop...@lists.sourceforge.net
Subject: Re: [Aegis-developers] aegis gets confused when renaming files
Hi Walter,
thanks for your help and sorry for the late response.
On Fri, 14 Jan 2011, Walter Franzini wrote:
The aecp -ind
5 Jan 2011 11:49:09 +0100
From: Walter Franzini
To: Stefan Fritsch
Cc: aegis-develop...@lists.sourceforge.net, aegis-us...@auug.org.au
Subject: Re: [Aegis-developers] aegis gets confused when renaming files
[cc-ing aegis-users since it may be helpful for others]
Stefan Fritsch writes:
Hi,
Hi
On Monday 10 January 2011, Philipp Kern wrote:
> On Mon, Jan 10, 2011 at 10:50:37PM +0100, Arno Töll wrote:
> > While this is likely no security issue I write to the security
> > team as well, as you probably want to take care, because
> > DSA-2141 caused that problem. The patch is rather simple an
On Friday 07 January 2011, Matej Susta wrote:
> Yesterday, my automatic update script on one of my servers
> installed latest security update to apache, version
> 2.2.9-10+lenny9. This somehow caused automatic uninstallation of
> libapache2-mod-php5. At that moment I just downgraded to
> 2.2.9-10+l
). Thanks.
apache2 (2.2.16-6) unstable; urgency=low
* Also add $named to the secondary-init-script example.
-- Stefan Fritsch Sat, 01 Jan 2011 22:55:15 +0100
apache2 (2.2.16-5) unstable; urgency=medium
* Add $named to the init script dependency header, since apache depends on
DNS in
Sorry for the late response
On Monday 13 December 2010, Daniel Bareiro wrote:
> > Yes, that is described in the htpasswd man page. The recommended
> > algorithm is apr_md5 (the SHA algorithm does not use a salt and
> > is less secure). The default will be changed in Apache 2.4.
>
> When you say "
On Tuesday 21 December 2010, John Goerzen wrote:
> I reported bug #605484 regarding a security hole in lenny. I
> believe the security team was CC'd.
>
> Prior to my report,
> http://security-tracker.debian.org/tracker/CVE-2010-3872 said that
> Debian/stable was not vulnerable. I also notified t
tags 607755 wontfix
thanks
On Tuesday 21 December 2010, Daniel Hahler wrote:
> I want to use suexec-custom for a setup using mod_chroot, and
> therefore want/have to use a DocumentRoot of "/" (which is the
> root of the chroot).
>
> Unfortunately there appears to be a bug in
> debian/patches/202_
On Monday 13 December 2010, Daniel Bareiro wrote:
> Apparently, crypt() is the algorithm used by default, which would
> limit passwords to 8 characters. This does not happen with SHA-1.
Yes, that is described in the htpasswd man page. The recommended
algorithm is apr_md5 (the SHA algorithm does n
* Add Danish translation, thanks to Joe Hansen. Closes: #606736
-- Stefan Fritsch Sun, 12 Dec 2010 14:35:29 +0100
ssl-cert (1.0.27) unstable; urgency=low
* Make default key length 2048 bits. Closes: #598732
-- Stefan Fritsch Sat, 02 Oct 2010 14:46:52 +0200
unblock ssl-cert/1.0.28
-- S
On Tuesday 23 November 2010, Martin Burman wrote:
> After apply the latest patches my openvpn tunnel broke down.
> Downgrading to cipher 0.9.8g-15+lenny6 (my previous version)
> brought the tunnel up again. Openvpn did start ok, interface went
> up, logs stated "connected to peer" but the tunnel wa
reassign 603463 apt-cacher-ng
thanks
On Wednesday 17 November 2010, Bas Wijnen wrote:
> Op 16-11-10 23:50, Stefan Fritsch schreef:
> >> The problem seems to be in packet 19. It contains 3 HTTP parts,
> >> the second of which does not seem to have data in it (according
> &
On Friday 22 October 2010, Andrew Pimlott wrote:
> It gets weirder: if I change text/plain to text/html, the encoding
> is not added. It seems that AddOutputFilterByType catches proxied
> requests if text/plain appears in its list of mime types, as if
> all proxied requests were considered text/pl
On Sunday 14 November 2010, Bas Wijnen wrote:
> Everything normally works fine. However, in some cases (I don't
> know when exactly), I get an invalid reply from my local archive.
> I've captured the traffic with wireshark and attached it.
Do you have mod_cache enabled in apache? If yes, this is p
On Friday 12 November 2010, G.P. wrote:
> When the machine is booting, apache does not bind to the IPv6
> address: postmortem:~# netstat -pan | grep LISTEN|grep apache
> tcp0 0 0.0.0.0:80 0.0.0.0:*LISTEN
Do you have network-manager installed?
If yes and this is a
On Monday 15 November 2010, Christoph Anton Mitterer wrote:
> The documentation in
> /usr/share/doc/apache2.2-common/README.Debian.gz must be wrong, as
> it claims /etc/apache2/magic would be empty, which is not the
> case.
True. It has been an empty file before 2.2.12-1. Thanks for reporting
thi
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: freeze-exception
Please unblock package apache2
It adjusts mod_reqtimeout's default configuration because the
previously used default values could cause difficult to diagnose
problems with MSIE. It
On Wednesday 10 November 2010, you wrote:
> > On Tuesday 09 November 2010, Petr Vyhnal wrote:
> >> I have SSL virtual host using mod_gnutls and there is configured
> >> proxy connection using mod_proxy& mod_proxy_http to HTTP site.
> >> Configuration worked fine on Lenny with patched mod_gnutls. N
reassign 602957 libapache2-mod-gnutls
thanks
On Tuesday 09 November 2010, Petr Vyhnal wrote:
> I have SSL virtual host using mod_gnutls and there is configured
> proxy connection using mod_proxy & mod_proxy_http to HTTP site.
> Configuration worked fine on Lenny with patched mod_gnutls. Now
> afte
Which architecture are you using?
--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Some more info: XSecurity allows to mark some xclients as untrusted so
that they cannot grab the keyboard, send events to other clients, read
the clipboard, etc. This can be useful if executing X programs as
different user (using sux --untrusted) or on a different host (with
ssh's -X and Forwar
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
Please unblock package apache2. It fixes a security issue and a minor
documentation issue:
* CVE-2010-1623: mod_reqtimeout: Fix potential DoS by high memory usage.
* Fix "Could not reliably
Package: xserver-xorg-core
Version: 2:1.7.7-7
Severity: important
The XSecurity extension is no longer available in squeeze. It seems
upstream disabled building it by default. According to jcristeau it
could be re-enabled with a configure option.
XSecurity is available in lenny. Not having it in
on success.
-- Stefan Fritsch Fri, 01 Oct 2010 22:05:54 +0200
apr-util (1.3.9+dfsg-4) unstable; urgency=high
* CVE-2010-1623: Fix denial of service vulnerability through memory
consumption in apr_brigade_split_line()
-- Stefan Fritsch Fri, 01 Oct 2010 18:19:38 +0200
--
To
Package: r-base-core
Version: 2.11.1-6
Severity: important
Tags: security
r-base-core contains an embedded version of liblzma, which makes
security updates a headache.
It seems to already contain code for linking dynamically but
it lacks the build-dependency on the lzma-dev package. I have not
te
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: binnmu
nmu dar_2.3.10-1 . ALL . -m "Rebuild dar-static with fix for bzip2 issue
CVE-2010-0405"
This is the same for sid/squeeze as #597770 was for lenny.
Please also unblock the resulting package
On Friday 01 October 2010, Daniel Kahn Gillmor wrote:
> It would be a shame if squeeze shipped with this default set below
> some common expectations of a key to last at least the lifetime of
> a debian release.
1024 bits are more than enough to satisfy the security expectations of
an auto-genera
On Thursday 23 September 2010, Adam D. Barratt wrote:
> On Wed, September 22, 2010 21:51, Stefan Fritsch wrote:
> > please binNMU dar in stable in order to link dar-static
> > with libbz2-dev 1.0.5-1+lenny1 for DSA-2112-1/CVE-2010-0405
>
> Is there a particular reason this
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: pu
please binNMU dar in stable in order to link dar-static
with libbz2-dev 1.0.5-1+lenny1 for DSA-2112-1/CVE-2010-0405
Thanks.
--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.
On Saturday 18 September 2010, Michael Tokarev wrote:
> If you want to run it in background, use -daemonize instead.
> Alternatively you can use setsid. Overwise it still has the
> controlling terminal open.
-daemonize does not exist in older versions of kvm. But setsid may be
a usable alternati
Package: qemu-kvm
Version: 0.12.5+dfsg-3
Severity: important
If kvm is started with nohup in the background, it still dies when the shell
from which it was started is closed. This is a regression from Lenny. It would
be very nice if you could fix this in squeeze.
The problem is that it registers
On Monday 30 August 2010, you wrote:
> When apt-file is doing its thing, the network becomes totally
> unusable.
This, like many other wishlist features in the BTS, would depend on a
more reasonable interface between apt-file and the download helpers.
The current interface is too limited.
But t
On Monday 30 August 2010, you wrote:
> I notice if an update is interrupted, it needs to be started all
> over from scratch.
>
> Compared that with aptitude full-upgrade, partial files resume from
> the /var/cache/apt/archives/partial directory.
>
> So apt-file should/could use more of the apt ar
On Wednesday 15 September 2010, you wrote:
> apt-file is not able to find files provided by the alternative
> system. I understand that those files are not exactly "a file in
> the package" but the package is reponsible for the file being
> there and therefore apt-file should find it.
apt-get depe
On Monday 06 April 2009, Ian Zimmerman wrote:
> For me, it happens with 127.0.0.1 .
> I really, really don't want to explicitly say in /e/n/i that lo is
> 127.0.0.1 .
>
> This is intermittent; I'd say it happens about 25% of the
> time. And, when I manually start apache (with invoke-rc.d apache2
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: freeze-exception
Please unblock package mp3gain, it fixes serveral crash bugs.
The changelog is:
* Fix various potential segfaults found by cppcheck.
* Backport a format string error fix from
Hi Brian,
On Friday 03 September 2010, Brian White wrote:
> I'm being petitioned quite strongly to re-add types for gzipped
> files to the /etc/mime.types file. I originally removed those
> types from that file because they caused Apache to work
> incorrectly, namely that Apache would then send a
severity 594711 wishlist
retitle 594711 document how to do db format upgrade manually
thanks
On Friday 03 September 2010, Steve Langasek wrote:
> On Fri, Sep 03, 2010 at 03:25:13PM +0200, Julien Cristau wrote:
> > Then I don't think this should be RC. Downgrading to important,
> > leaving it to t
to source format 3.0.
* Bump Standards-Version (no changes).
* Remove Adam Conrad from Uploaders. Thanks for your work in the past.
-- Stefan Fritsch Sun, 08 Aug 2010 23:15:53 +0200
apr (1.4.2-6) unstable; urgency=low
* Also disable robust pthread mutexes on alpha, to fix hang in the
On Sunday 18 July 2010, you wrote:
> I don't think this should be addressed on php5's side. The bug,
> IMO, is somewhere in apache (at whatever level you may want to
> address it: the init script, apache2ctl, or apache2) as it appears
> that it attempts to deliver a signal when the signal handler
On Friday 20 August 2010, Drew Eckhardt wrote:
> This hangs 100% of the time on my quad-core i720M (8 hardware
> threads) running Lenny. In a couple cases it unhang and completed
> after several minutes passed and I attached and detached GDB
> although I couldn't say the GDB was causal.
How long
Package: slapd
Version: 2.4.23-4
Severity: grave
When upgrading from 2.4.23-2 to 2.4.23-4, I get a debconf message that
tells me that slapcat failed during upgrade. dpkg then aborts with a
failure.
Also, contrary to the debconf message, the database files are not moved
into /var/backup.
I am gue
On Tuesday 17 August 2010, Daniel Franganillo wrote:
> yesterday i was trying to upgrade our server to squeeze in wich wer
> have an SSL+TRAC+APACHE2 service and i noticed that with the
> upgrade the service was unavaliable.
> There are other services running under apache as well in the same
> serv
reassign 592257 apache2.2-common
forcemerge 307298 592257
thanks
On Sunday 08 August 2010, Dmitry Katsubo wrote:
> If it is possible, please include patch [1] into v2.2 of Apache
> Debian build. It looks it has been accepted into mainstream for
> v2.4, so it is just a matter of applying it for v2.
On Sunday 01 August 2010, Adrian Bridgett wrote:
> i386 (but it's a KVM guest, sorry - I should have said).
I found out why posixsem does not work: A bug in pbuilder/cowbuilder
causes posix shared mem/posix semaphores to not work in the build
chroot and this causes apr's configure to disable it.
Package: pbuilder
Version: 0.199
Severity: normal
Pbuilder should mount a tmpfs at /dev/shm to allow posix shared memory and
semaphores to work in the build chroot.
Apr's configure currently disables posix semaphores when built with
cowbuilder or pbuilder (bug #591286).
-- System Information:
On Sunday 01 August 2010, Adrian Bridgett wrote:
> However, if I downgrade _just_ libapr1 to 1.2.12-5+lenny1 then
> posixsem (and sem) work just fine.
Which architecture are you using?
--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Troubl
reassign 589386 apache2.2-common
thanks
Hi Raphael,
On Sun, 18 Jul 2010, Raphael Geissert wrote:
I don't think this should be addressed on php5's side. The bug, IMO, is
somewhere in apache (at whatever level you may want to address it: the init
script, apache2ctl, or apache2) as it appears that
I suspect that the patch would break suexec for mod_include's exec
subrequests, but haven't tested it yet. Maybe the note needs to be set
both on the main and the sub request.
--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Conta
tags 528062 +patch
thanks
On Monday 19 July 2010, Michal Kovac wrote:
> He described the bug, submitted a patch.
Sorry, this has somehow fallen through the cracks. I will try to get
it fixed before squeeze is released.
--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
wi
/changelog 2010-07-17 21:49:33.0 +0200
@@ -1,3 +1,11 @@
+rpcbind (0.2.0-4.1) unstable; urgency=high
+
+ * Non-maintainer upload by the security team.
+ * CVE-2010-2061: Store state files in /var/run/rpcbind instead of /tmp.
+Closes: #583435
+
+ -- Stefan Fritsch Sat, 17 Jul 2010 21:47:56
Package: libapache2-mod-php5
Version: 5.3.2-1
Severity: normal
On a new install when apache2 is not yet installed, libapache2-mod-php5 will
pull in apache2. In this case it can happen that apache2 is not yet fully
started, causing it to ignore the graceful reload command issued by
libapache2-mod-
Package: libapache2-mod-php5
Version: 5.2.11.dfsg.1-2
Severity: normal
Even with the new
SetHandler application/x-httpd-php
config, Files named blah.php.blubb are still executed as php scripts because
they are assigned the type application/x-httpd-php in /etc/mime.types and
mo
Use "apache2ctl -t" instead. This is documented in README.Debian and
the apache2 man page (though maybe it could be in a more prominent
place in README.Debian).
--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@l
On Tuesday 06 July 2010, Edward Welbourne wrote:
> The web-server succeeded
> in displaying the contents *usually*, but one of my colleagues
> noticed that, on reload, he got 403'd.
>
> The fact that this (mostly) worked at all suggests that apache is
> sometimes accessing content as root, instead
On Wednesday 30 June 2010, John Bazik wrote:
> Package: apache2
> Version: 2.2.9-10+lenny8
> Severity: normal
>
> With the update from lenny7 to lenny8 a few days ago, my apache
> server began choosing the wrong DirectoryIndex files to serve. I
> have a config snippet in /etc/apache2/conf.d/mod_d
On Thursday 24 June 2010, Jon Daley wrote:
> Hi, http://security-tracker.debian.org/tracker/CVE-2009-3555, says
> this has been fixed in my version of apache, and I am not using
> SSLVerifyClient at all, and there is one default SSLCipherSuite
> line in ssl.conf. Firefox reports (in the javascript
On Saturday 19 June 2010, you wrote:
> However, if I use the fish protocol [1] included in midnight
> commander, I can see the full filesystem hierarchy, and even
> transfer files from the etc folder, etc...
> Subsystem sftp internal-sftp
> Match group sftponly
> ChrootDirectory /home/%u
On Saturday 05 June 2010, Adam D. Barratt wrote:
> On Tue, 2010-06-01 at 23:41 +0200, Stefan Fritsch wrote:
> > Please review apr/1.2.12-5+lenny2 for inclusion in lenny:
> This was accepted a couple of days ago, as you no doubt noticed.
>
> It's now built almost everywh
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: pu
Please review apr/1.2.12-5+lenny2 for inclusion in lenny:
apr (1.2.12-5+lenny2) stable; urgency=low
.
* Set FD_CLOEXEC flag on file descriptors. Not doing so caused Apache httpd
module
Hi,
I can reproduce this. I have attached a stacktrace and part of the
update log which shows that the segfaults start while configuring
locales (though probably that this is just the first package with a
postinstall after configuring libc6-i686).
If you have ideas how I could help further, ju
On Tuesday 25 May 2010, Iain Buclaw wrote:
> On 24 May 2010 19:21, Stefan Fritsch wrote:
> > On Monday 24 May 2010, Matthias Klose wrote:
> > > On 24.05.2010 12:35, Stefan Fritsch wrote:
> > > > Package: gdc-4.3
> > > > Version: 1:1.046-4.3.4-5
> &
On Monday 24 May 2010, Matthias Klose wrote:
> On 24.05.2010 12:35, Stefan Fritsch wrote:
> > Package: gdc-4.3
> > Version: 1:1.046-4.3.4-5
> > Severity: serious
> >
> > gdc 4.3.4 does not work with gcc-4.3-base 4.3.5:
I think you forgot to give an explanation
Package: gdc-4.3
Version: 1:1.046-4.3.4-5
Severity: serious
gdc 4.3.4 does not work with gcc-4.3-base 4.3.5:
$ gdc -c test_md5.d
gdc: error trying to exec 'cc1d': execvp: No such file or directory
The problem is that it looks for cc1d in /usr/lib/gcc/i486-linux-gnu/4.3.4/
but gcc-4.3-base 4.3.5
On Wednesday 19 May 2010, you wrote:
> apt-file doesn't like https sources even though apt-transport-https
> is installed (and works fine with "aptitude update"):
apt-file does not use apt-transport. But it uses curl and that should
in principle support https. Please try if the problem goes away
Package: apache2-dbg
Version: 2.2.15-5
Something with the symlink/objcopy magic is still broken. gdb does not
find /usr/sbin/apache2's debug info without help.
--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@li
On Saturday 24 April 2010, you wrote:
> # LANG=C apt-file update
> Put CDROM labeled
> [Debian_GNU/Linux_testing__Squeeze__-_Official_Snapshot_i386_NETIN
> ST_Binary-1_20100217-22:18] in the cdrom device read: 1: arg count
> mount: no medium found on /dev/sr0
> cp: cannot stat `/cdrom/dists/squeeze
On Thursday 29 April 2010, Svyatoslav Lempert wrote:
> By the information from httpd.apache.org error not operations
> RemoveHandler and RemoveType have been corrected in Apache version
> 2.2.15
> It is necessary to make backport this correction in Apache 2.2.9
> which in Debian Lenny repos, or (i
Package: ftp.debian.org
Severity: normal
The protection offered by mod_antiloris can easily be circumvented. Apache2
2.2.15 contains mod_reqtimeout, which is generally considered to be the better
solution against slowloris-type DoS attacks.
--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...
Package: ftp.debian.org
Severity: normal
Apache2 has contained mod_substitute for some time, offering the same
functionality.
--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
On Tuesday 20 April 2010, Kevin Göser wrote:
> We are using Apache and basic auth against a Fedora Directory
> Server (v1.1.3, running on a different machine). The setup worked
> fine on etch. After upgrading to lenny today, the LDAP
> authentication seems to be broken: Directly after reloading
Package: release.debian.org
User: release.debian@packages.debian.org
Usertags: pu
Severity: normal
Please review apache2/2.2.9-10+lenny8 for inclusion in 5.0.5. Here
is the changelog:
apache2 (2.2.9-10+lenny8) stable-security; urgency=low
* Add missing psmisc dependency for killall used in
Package: libao4
Version: 1.0.0-2
Severity: serious
dpkg: error processing /var/cache/apt/archives/libao4_1.0.0-2_i386.deb
(--unpack):
trying to overwrite '/etc/libao.conf', which is also in package libao2
0:0.8.8-5.1
Errors were encountered while processing:
501 - 600 of 1445 matches
Mail list logo