Package: openssl
Severity: serious
Tags: security patch
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi,
the following CVE (Common Vulnerabilities Exposures) ids were
published for openssl.
CVE-2009-1377[0]:
| The dtls1_buffer_record function in ssl/d1_pkt.c in OpenSSL 0.9.8k and
| earlier
Package: ctorrent
Severity: serious
Tags: security patch
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi,
the following CVE (Common Vulnerabilities Exposures) id was
published for ctorrent.
CVE-2009-1759[0]:
| Stack-based buffer overflow in the btFiles::BuildFromMI function
|
Package: ipplan
Severity: serious
Tags: security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi,
the following CVE (Common Vulnerabilities Exposures) ids were
published for ipplan.
CVE-2009-1732[0]:
| Cross-site scripting (XSS) vulnerability in admin/usermanager in IPlan
| 4.91a allows
Package: ajaxterm
Version: 0.10-4
Severity: serious
Tags: security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi,
the following CVE (Common Vulnerabilities Exposures) id was
published for ajaxterm.
CVE-2009-1629[0]:
| ajaxterm.js in AjaxTerm 0.10 and earlier generates session IDs with
|
Package: xpdf-reader
Version: 3.02-1.4
Severity: serious
Justification: no longer builds from source
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi,
xpdf failed to build on i386:
dpkg-source: info: building xpdf in xpdf_3.02-1.4.dsc
debian/rules build
dpatch apply-all
applying patch
Package: samba
Version: 3.0.24-6etch10
Severity: serious
Tags: security etch
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi,
the following CVE (Common Vulnerabilities Exposures) id was
published for samba.
CVE-2008-6800[0]:
| Race condition in the winbind daemon (aka winbindd) in Samba
tags 527597 +pending
thanks
Hello,
The following change has been committed for this bug by
Giuseppe Iuculano giuse...@iuculano.it on Sat, 9 May 2009 16:14:37 +0200.
The fix will be in the next upload.
=
debian
Hi Arthur,
Arthur Furlan ha scritto:
I fixed these issues adding a new method in the Auth class (see
Auth.php.patch) that destroys the any session for an user, both in php
*and* database. To fix the issue [1] I added a call of this new method
Thank you for your bug report, I've committed
Package: jetty
Severity: serious
Tags: security
Hi,
the following CVE (Common Vulnerabilities Exposures) id was
published for jetty.
CVE-2009-1524[0]:
| Cross-site scripting (XSS) vulnerability in Mort Bay Jetty before
| 6.1.17 allows remote attackers to inject arbitrary web script or HTML
|
+1,11 @@
+libwmf (0.2.8.4-2+etch1) oldstable-security; urgency=high
+
+ * Non-maintainer upload.
+ * Fixed Use-after-free vulnerability in the embedded GD library
+(Closes: #526434) (CVE-2009-1364)
+
+ -- Giuseppe Iuculano giuse...@iuculano.it Wed, 06 May 2009 09:33:49 +0200
+
libwmf (0.2.8.4
-0.7/debian/changelog
+++ libmodplug-0.7/debian/changelog
@@ -1,3 +1,11 @@
+libmodplug (1:0.7-5.3) oldstable-security; urgency=high
+
+ * Non-maintainer upload.
+ * Fixed CSoundFile::ReadMed() Integer Overflow in src/load_med.cp
+(Closes: #526657) (CVE-2009-1438)
+
+ -- Giuseppe Iuculano giuse
Zed Pobre ha scritto:
On Wed, May 06, 2009 at 10:50:00AM +0200, Giuseppe Iuculano wrote:
Hi,
I've prepared a NMU to fix CVE-2009-1438 and SA34927 in stable and oldstable.
My plan was to fix this by packaging the new upstream version this
weekend that fixes this officially, but if you don't
Giuseppe Iuculano ha scritto:
Proposed debdiffs in attachment.
Updated oldstable debdiff (do not backport changes in src/libmodplug/stdafx.h,
instead include stdint.h)
Cheers,
Giuseppe.
diff -u libmodplug-0.7/debian/changelog libmodplug-0.7/debian/changelog
--- libmodplug-0.7/debian/changelog
Hi,
Scott Kitterman wrote:
There is a clamav bug that was fixed in 0.95 or 0.95.1 in which unofficial
signatures caused a crash, so I believe your diagnosis is likely correct.
I can confirm this. I was experiencing the same crash with 0.94.dfsg.2-1lenny2
and clamav-unofficial-sigs. Upgrading
-1183: The JBIG2 MMR decoder in Xpdf 3.02pl2 and earlier, CUPS
+ 1.3.9 and earlier, Poppler before 0.10.6, and other products allows
remote
+ attackers to cause a denial of service (infinite loop and hang) via a
+ crafted PDF file.
+
+ -- Giuseppe Iuculano giuse...@iuculano.it Sat, 02
Package: libmodplug
Version: 1:0.8.4-5
Severity: grave
Tags: security patch
Hi,
the following CVE (Common Vulnerabilities Exposures) id was
published for libmodplug:
CVE-2009-1438[1]
Integer overflow in the CSoundFile::ReadMed function (src/load_med.cpp) in
libmodplug before 0.8.6, as used in
Package: libwmf
Version: 0.2.8.4-6
Severity: serious
Tags: security patch
Hi,
redhat recently patched libwmf.
CVE-2009-1364 is still reserved, but is disclosed in RHSA-2009:0457-1[0]
A pointer use-after-free flaw was found in the GD graphics library embedded
in libwmf. An attacker could create
Package: libmodplug
Version: 1:0.8.4-5
Severity: serious
Tags: security patch
Hi,
The following SA (Secunia Advisory) id was published for
libmodplug:
SA34927[1]
DESCRIPTION:
A vulnerability has been reported in libmodplug, which can be
exploited by malicious people to cause a DoS
writer module in
+ Ghostscript 8.62, and possibly other versions, allows remote attackers to
+ cause a denial of service (ps2pdf crash) and possibly execute arbitrary
+ code via a crafted Postscript file.
+ (Closes: #524803, #524915)
+
+ -- Giuseppe Iuculano giuse...@iuculano.it
Giuseppe Iuculano ha scritto:
Hi,
I've prepared a NMU to fix CVE-2009-0792 CVE-2009-0196 CVE-2007-6725
CVE-2008-6679 in lenny.
Proposed debdiff in attachment.
Forgot to add 36_CVE-2008-6679.dpatch, resend correct debdiff.
Cheers,
Giuseppe.
diffstat for ghostscript_8.62.dfsg.1-3.2lenny1
Package: mbrola
Severity: serious
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi,
it seems that mbrola is available only in amd64, why?
https://buildd.debian.org/~luk/status/package.php?p=mbrola
Cheers,
Giuseppe
- -- System Information:
Debian Release: squeeze/sid
APT prefers
Samuel Thibault ha scritto:
It's written there and I didn't know that indeed: Non-Free (not
autobuilt). I'll manage to get other archs built, thanks for the
notice.
Samuel
Hi,
you should read this:
http://lists.debian.org/debian-devel-announce/2006/11/msg00012.html
Cheers,
Giuseppe.
-buildpackage: set CXXFLAGS to default value: -g -O2
dpkg-buildpackage: source package apf-firewall
dpkg-buildpackage: source version 9.7+rev1-1
dpkg-buildpackage: source changed by Giuseppe Iuculano giuse...@iuculano.it
fakeroot debian/rules clean
QUILT_PATCHES=debian/patches quilt --quiltrc /dev/null
gregor herrmann ha scritto:
Did you try what this error message says?
I have the same problem.
--update --no-cowdancer-update works for the update.
But after that I can neither build packages nor login into the
chroot, the errors stays the same:
The same for me.
Giuseppe.
Package: network-manager-applet
Version: 0.6.6-4
Severity: serious
Tags: security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi,
the following CVE (Common Vulnerabilities Exposures) id was
published for network-manager-applet:
CVE-2009-0365[1]:
The dbus request handler in (1)
,
+pngrtans.c, pngset.c and example.c (CVE-2009-0040) (Closes: #516256)
+
+ -- Giuseppe Iuculano giuse...@iuculano.it Sat, 14 Mar 2009 21:31:31 +0100
+
libpng (1.2.27-2) unstable; urgency=medium
* Fix CVE-2008-3964: off-by-one error in pngtest.c; closes: #501109
diff -u libpng-1.2.27/debian/patches
Package: lvm2
Version: 2.02.44-2
Severity: serious
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi,
you merged devmapper source, but it had an epoch:
# dpkg --compare-versions 2.02.44-2 gt 2:1.02.30-2; echo $?
1
# rmadison -s unstable dmsetup
dmsetup | 2:1.02.27-4 | unstable | arm
Bastian Blank ha scritto:
On Fri, Mar 06, 2009 at 02:58:44PM +0100, Giuseppe Iuculano wrote:
you merged devmapper source, but it had an epoch:
Please explain. Which version have a bad epoch.
When comparing two version numbers, first the epoch of each are compared, so
2.02.44-2 2:1.02.30-2
Package: zabbix-frontend-php
Severity: serious
Tags: security patch
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi,
The following SA (Secunia Advisory) id was published for
zabbix-frontend-php:
SA34091[1]:
DESCRIPTION:
Some vulnerabilities have been reported in the ZABBIX PHP frontend,
Package: mldonkey-server
Version: 2.9.5-2
Severity: grave
Tags: security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi,
MLdonkey (up to 2.9.7) has a vulnerability that allows remote user to
access any
file with rights of running Mldonkey daemon by supplying a
special-crafted
Package: libpng
Version: 1.2.33-2
Severity: serious
Tags: security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi,
The following SA (Secunia Advisory) id was published for libpng:
SA33970[1]
DESCRIPTION:
A vulnerability has been reported in libpng, which can be exploited
by malicious
Package: dmraid
Version: 1.0.0.rc14-6
Severity: grave
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
(Originally reported against dkms on ubuntu, LP #320200)
dmraid must not call udevadm trigger --action=add in postinst.
This will have utterly dire consequences for the installed machine.
Major
Package: tor
Severity: serious
Tags: security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi,
The following SA (Secunia Advisory) id was published for Tor:
SA33635[1]
DESCRIPTION:
A vulnerability with an unknown impact has been reported in Tor.
The vulnerability is caused due to an
Package: typo3-src
Severity: grave
Tags: security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi,
The following SA (Secunia Advisory) id was published for Typo3:
SA33617[1]
DESCRIPTION:
Some vulnerabilities have been reported in Typo3, which can be
exploited by malicious people to bypass
extension, not from the data. This reduces the XSS attack surface.
- Blacklist redirects via Special:Filepath. Such redirects exacerbate any
XSS vulnerabilities involving uploads of files containing scripts.
Closes: #508869, #508870
-- Giuseppe Iuculano giuse...@iuculano.it Sun, 18 Jan
Hi,
Neil McGovern ha scritto:
Can this patch be backported against the version in testing, and a TPU
upload done?
phppgadmin/4.2.2-1 was unblocked by luk.
Cheers,
Giuseppe.
signature.asc
Description: OpenPGP digital signature
-3.2) stable-security; urgency=high
+
+ * Non-maintainer upload.
+ * Fix local file inclusion vulnerability: (CVE-2008-5587)
+Unset language variable before determine file includes (Closes: #508026)
+
+ -- Giuseppe Iuculano giuse...@iuculano.it Tue, 23 Dec 2008 11:20:56 +0100
+
phppgadmin
: #508026)
+
+ -- Giuseppe Iuculano giuse...@iuculano.it Tue, 23 Dec 2008 11:20:56 +0100
+
phppgadmin (4.0.1-3.1) unstable; urgency=low
* Non-maintainer upload to fix pending l10n issues.
only in patch2:
unchanged:
--- phppgadmin-4.0.1.orig/libraries/lib.inc.php
+++ phppgadmin-4.0.1/libraries
Hi,
Giuseppe Iuculano ha scritto:
Hi,
Nico Golde ha scritto:
I take care of sponsoring the upload for unstable. For
stable security the version looks wrong to me, please use
4.0.1-3.1etch1.
Right, attached the new debdiff.
Giuseppe.
Attached a new proposed debdiff to fix also
Subject: SA33136: MPlayer TwinVQ Processing Buffer Overflow Vulnerability
Package: mplayer
Version: 1.0~rc1-12etch5
Severity: grave
Tags: security patch
Hi,
The following SA (Secunia Advisory) id was published for mplayer:
SA33136[1]
Description:
Tobias Klein has reported a vulnerability in
Hi Thijs,
Thijs Kinkhorst ha scritto:
As it seems, upstream does already support running in register_globals=0 mode
for a long time (according to their changelog since 2002...). Therefore I
Where did you read that? In TODO file I read * register_globals off support.
Cheers,
Giuseppe.
(4.2.1-1.1) unstable; urgency=high
+
+ * Non-maintainer upload.
+ * Fix Local File Inclusion Vulnerability (Closes: #508026)
+
+ -- Giuseppe Iuculano giuse...@iuculano.it Fri, 12 Dec 2008 17:55:03 +0100
+
phppgadmin (4.2.1-1) unstable; urgency=low
* New upstream release
diff -u phppgadmin
@@
+phppgadmin (4.2-1.1) testing-proposed-updates; urgency=low
+
+ * Non-maintainer upload.
+ * Fix Local File Inclusion Vulnerability (Closes: #508026)
+
+ -- Giuseppe Iuculano giuse...@iuculano.it Fri, 12 Dec 2008 18:50:16 +0100
+
phppgadmin (4.2-1) unstable; urgency=low
* New upstream release
Package: verlihub
Severity: grave
Tags: security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi,
An exploit[0] has been published for verlihub:
Verlihub does not sanitize user input passed to the shell via its
trigger
mechanism. Furthermore, the Verlihub daemon can optionally be
Package: iceweasel
Version: 3.0.3-3
Severity: critical
Tags: security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi,
The following SA (Secunia Advisory) id was published for Firefox 3.
SA32713[1]
Description:
Some vulnerabilities have been reported in Mozilla Firefox, which can be
Package: iceweasel
Version: 2.0.0.17-0etch1
Severity: critical
Tags: security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi,
The following SA (Secunia Advisory) id was published for Firefox 2:
SA32693[1]
Description:
Some vulnerabilities have been reported in Mozilla Firefox, which can be
Package: icedove
Severity: critical
Tags: security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi,
The following SA (Secunia Advisory) id was published for Thunderbird:
SA32715[1]
Description:
Some vulnerabilities have been reported in Mozilla Thunderbird, which
can be exploited by
Package: iceape
Severity: critical
Tags: security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi,
The following SA (Secunia Advisory) id was published for SeaMonkey:
SA32714[1]
Description:
Some vulnerabilities have been reported in Mozilla SeaMonkey, which can
be exploited by malicious
Hi,
[EMAIL PROTECTED] ha scritto:
i think this is the changeset
http://trac.edgewall.org/changeset/7658/branches/0.11-stable
i'll get into this to upload a new package.
2) An unspecified error when processing wiki markup can be exploited
to cause a DoS.
See also
Package: trac
Severity: serious
Tags: security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi,
The following SA (Secunia Advisory) id was published for trac.
SA32652[1]
Description:
Some vulnerabilities have been reported in Trac, which can be
exploited by malicious people to cause a
copy shipped with
+dokuwiki (SA32559) (Closes: #504682)
+
+ -- Giuseppe Iuculano [EMAIL PROTECTED] Sat, 08 Nov 2008 09:48:34 +0100
+
dokuwiki (0.0.20080505-3) unstable; urgency=high
* High-urgency upload for RC bug fixing.
diff -u dokuwiki-0.0.20080505/debian/patches/series dokuwiki
Hi Dominique,
Dominique Brazziel ha scritto:
I just saw this update and put it on and, while there is no segfault,
the IRQ totals are way off, 0 is reported many times when it shouldn't
be:
Please open a new bug and report it.
Giuseppe.
signature.asc
Description: OpenPGP digital
Len Sorensen ha scritto:
Well if it isn't being accepted into Lenny, then that doesn't help and
most likely Lenny will end up with no procinfo at all.
Wouldn't it be better to make a procinfo 18-3 with the simple fix which
is much more likely to be accepted into Lenny and then get the new
Len Sorensen ha scritto:
I do not consider this closed. You are wrong. Please reopen until it
is fixed. I was actually considering marking it RC for Lenny.
Hi,
I understand your point of view, but this bug is marked as Fixed in version
procinfo/1:2.0.208-1. This is correct and this remain
tags 500883 moreinfo
thanks
Peter Leipold ha scritto:
After the upgrade the boot stops at waiting for the root filesystem. I get a
busybox prompt. I figured out what to type to continue booting up:
$ modprobe dm-mirror
$ dmraid -ay
$ exit
I need some debug logs.
Extract the attached
Hi Peter,
Peter ha scritto:
I now suspect the ENV{ID_FS_USAGE}==raid option in udev rules file. How
should udev supposed to know if a disk is raid? Maybe I should rename
something to this raid? See below my raid settings:
udevadm info --query=all --name=sda
udevadm info --query=all
Peter ha scritto:
This 2nd partition is one of my raid1 volume, containing the root filesystem.
I see ID_FS_USAGE is not raid as it should. Do I have a screwed raid
setup? :) Do you know how could I change that ID_FS_USAGE?
ID_FS_USAGE on sdaX isn't important. The real problem is that
Peter ha scritto:
Ok, thanks! This is then an udev issue, so I should search there (already
Can you elaborate please? Why this is an udev issue and not a bug in your
controller/bios ?
found some bug-reports where udev incorrectly read device metadata for raid
devices),
Can you link them
severity 500883 normal
thanks
Peter ha scritto:
Well, it can of course be a controller bug. I'm not that familiar with these
issues.
I was only thinking it to be an udev bug because as I've read these fakeraid
cards are hard to support under linux because of their proprietary bios
Chris ha scritto:
I have Intel raid 10, it worked fine up until now, and after this
removal of patch
07_isw-raid10-nested.dpatch
my system fails to boot. dmraid -l does not show intel raid 10
support. I tracked it down to this.
Sorry, but that patch was removed because it breaks some
Frans Pop ha scritto:
I've not tested os-prober functionality for dmraid.
Tested, unfortunately root is empty:
# This entry automatically added by the Debian installer for an existing
# linux installation on /dev/mapper/sil_aiahbgbgaaaj1.
title Debian GNU/Linux, kernel 2.6.26-1-686
Giuseppe Iuculano ha scritto:
Tested, unfortunately root is empty:
Hi,
attached debdiff fixes the root detection, can you review it please?
Giuseppe
diff -Nru grub-installer-1.34/debian/changelog
grub-installer-1.35/debian/changelog
--- grub-installer-1.34/debian/changelog2008-09-22
tags 499060 moreinfo
thanks
Asier ha scritto:
The problem... remains, attached /etc/udev/rules.d/85_dmraid.rules and the
boot loog :-(
I need some debug logs.
Extract the attached .tar.gz, and you have a dmraid-debug directory
cd dmraid-debug
cp -a sbin/* /sbin/
cp -a 85_dmraid.rules
Asier ha scritto:
Here they go.
Looks like there's a problem with /usr/bin/basename not present before a full
mount of the filesystem?
Right, another deb for testing:
http://sd6.iuculano.it/dmraid-testing/dmraid_1.0.0.rc14-4~unreleased3_amd64.deb
Make sure that after .deb installation
tags 499060 = pending
thanks
Asier ha scritto:
Magic words: fixed!
RAID array now is detected and the /dev/mapper/ entry is created.
Thanks for your support
Greets
Great! :)
Giuseppe
signature.asc
Description: OpenPGP digital signature
Asier ha scritto:
El Viernes, 19 de Septiembre de 2008, escribió:
As you know, from dmraid 1.0.0.rc14-3 we use an udev rule to allow dmraid
arrays to be brought up in the event that the member disks of an array
are present. This udev rule runs /sbin/dmraid-activate to activate only
arrays
Giuseppe Iuculano ha scritto:
Asier ha scritto:
Thu Sep 18 23:09:34 2008: A maintenance shell will now be started. CONTROL-D
will terminate this shell and resume system boot. (warning).
Thu Sep 18 23:09:34 2008: Give root password for maintenance
Thu Sep 18 23:09:34 2008: (or type Control
severity 499060 normal
tags 499060 wontfix
retitle 499060 udev rule doesn't work without initramfs
thanks
Asier ha scritto:
The same problem. The RAID array isn't detected :(
As you know, from dmraid 1.0.0.rc14-3 we use an udev rule to allow dmraid arrays
to be brought up in the event that
Asier ha scritto:
Thu Sep 18 23:09:34 2008: A maintenance shell will now be started. CONTROL-D
will terminate this shell and resume system boot. (warning).
Thu Sep 18 23:09:34 2008: Give root password for maintenance
Thu Sep 18 23:09:34 2008: (or type Control-D to continue):
Please, at this
unblock 497110 by 498838
thanks
Hi,
Bastian Blank ha scritto:
Please explain. I'm currently not able to oversee the consequences.
Bastian
# blkid
/dev/mapper/sil_aiahbgbgaaaj5: TYPE=swap
/dev/mapper/sil_aiahbgbgaaaj1: UUID=4f4ac281-bb5d-4c34-9437-65df0c203bbb
TYPE=ext3
/dev/hda1:
Frans Pop ha scritto:
changes merged for Lenny. This means the following actions are needed:
- get an OK for the change in devicemapper from maintainer and RT
- get an OK for the change in parted from RT (and maybe check that the
patch will also get accepted upstream?)
- get updated
Frans Pop ha scritto:
On Sunday 07 September 2008, Frans Pop wrote:
I've done some testing using Giuseppe's businesscard image in
VirtualBox ...
I was very surprised that you don't actually need BIOS support for dmraid.
Apparently it really only scans the harddisks for some specific
Giuseppe Iuculano ha scritto:
I'm working on this, but it is not very simple for me.
Approximately dmraid -rD generates three files, from this we can extrapolate
metadata, and with a hex editor we can add the fake signature to the
qemu/virtualbox drive
Ok,this procedure seems to work for me
, which use device mapper. Libparted was
+naming new partition nodes incorrectly, and not setting the UUIDs for
+dmraid device nodes. (Closes: #497110)
+ * debian/patches/parted-dmraid.dpatch: Make sure that partition nodes for
+dmraid devices are probed
+
+ -- Giuseppe Iuculano [EMAIL
Otavio Salvador ha scritto:
Yes. That is a great news. Sad that Ubuntu hasn't communicated with us
to get this fixed on Debian. I'll take a look and prepare a parted
upload with it.
I merged all relative dmraid Ubuntu changes in:
devmapper
os-prober
parted
partman-auto
partman-base
Frans Pop ha scritto:
On Saturday 06 September 2008, Frans Pop wrote:
At first glance the patch also needs some cleanup. The .gitignore
changes look like they are just noise and the actual changes are not
really consistent regarding whitespace for example.
Here's a cleaned-up version.
+++ partman-base-125+nmu1/debian/changelog 2008-09-06 16:56:57.0
+0200
@@ -1,3 +1,10 @@
+partman-base (125+nmu1) unstable; urgency=low
+
+ * Non-maintainer upload.
+ * init.d/parted: Set the sataraid flag for dmraid arrays.
+
+ -- Giuseppe Iuculano [EMAIL PROTECTED] Sat, 06 Sep 2008
.
+ * Merge from Ubuntu: debian/patches/parted-dmraid.dpatch: Patch to educate
+libparted about dmraid arrays, which use device mapper. Libparted was
+naming new partition nodes incorrectly, and not setting the UUIDs for
+dmraid device nodes. (Closes: #497110)
+
+ -- Giuseppe Iuculano [EMAIL
Ubuntu: debian/patches/parted-dmraid.dpatch: Patch to educate
+libparted about dmraid arrays, which use device mapper. Libparted was
+naming new partition nodes incorrectly, and not setting the UUIDs for
+dmraid device nodes. (Closes: #497110)
+
+ -- Giuseppe Iuculano [EMAIL PROTECTED
.
+
+ -- Giuseppe Iuculano [EMAIL PROTECTED] Sat, 06 Sep 2008 18:23:55 +0200
+
partman-auto (81) unstable; urgency=low
[ Jérémy Bobbio ]
diff -Nru partman-auto-81/lib/auto-shared.sh
partman-auto-81+nmu1/lib/auto-shared.sh
--- partman-auto-81/lib/auto-shared.sh 2008-08-25 21:01:13.0 +0200
Frans Pop ha scritto:
Giuseppe: if you want to work around this bug to test dmraid support, you
can do so by changing /lib/partman/active_partition/25divider/choices
before you start partman: just make that script 'exit 0'.
This would allow you to provide further details on the p in created
block 497723 by 491794
thanks
Hi,
Thomas Viehmann wrote:
license is not DFSG-free (see bug #491794).
new freemat package is ready, but I prefer to wait #491794 resolution.
Giuseppe.
signature.asc
Description: OpenPGP digital signature
Frans Pop ha scritto:
Unfortunately these don't help very much. What I think we need here is a
full debug log for partman to see what was running at the time of the
OOM. I suspect you somehow get into a loop.
Please make sure you have started your ssh sessions _before_ starting
partman
11:27 sil_aiahbgbgaaaj
brw---1 root root 254, 1 Aug 30 11:27 sil_aiahbgbgaaaj1
brw---1 root root 254, 2 Aug 30 11:27 sil_aiahbgbgaaaj5
Giuseppe Iuculano
signature.asc
Description: OpenPGP digital signature
Frans Pop ha scritto:
But another possibility is that you are just not following the correct
procedure. Support for dmraid is far from perfect and things will *only*
work if you follow the documented procedure.
How did you do the partitioning? Did you *exactly* follow the instructions
that
Package: dokuwiki
Version: 0.0.20060309-5
Severity: grave
Justification: user security hole
From: http://secunia.com/advisories/21819/
Description:
rgod has discovered a vulnerability in DokuWiki, which can be exploited by
malicious people to compromise a vulnerable system.
Input passed to
Package: rkhunter
Version: 1.2.8-4
Severity: grave
# rkhunter --update
Running updater...
/usr/bin/rkhunter: line 4994: /rkhunter/scripts/check_update.sh: No such
file or directory
Ready.
-- System Information:
Debian Release: 3.1
APT prefers unstable
APT policy: (500, 'unstable'), (500,
Package: horde3
Version: 3.1-1
Severity: grave
After last upgrade, when user logged in, in the left columns:
A fatal error has occurred
Horde_Block_turba_tree_menu non trovato.
[line 232 of /usr/share/horde3/services/portal/sidebar.php]
Details (also in Horde's logfile):
object(pear_error)(8) {
301 - 388 of 388 matches
Mail list logo