Bug#530400: CVE-2009-137{7,8,9}

2009-05-24 Thread Giuseppe Iuculano
Package: openssl Severity: serious Tags: security patch -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, the following CVE (Common Vulnerabilities Exposures) ids were published for openssl. CVE-2009-1377[0]: | The dtls1_buffer_record function in ssl/d1_pkt.c in OpenSSL 0.9.8k and | earlier

Bug#530255: CVE-2009-1759: Stack-based buffer overflow in the btFiles::BuildFromMI function

2009-05-23 Thread Giuseppe Iuculano
Package: ctorrent Severity: serious Tags: security patch -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, the following CVE (Common Vulnerabilities Exposures) id was published for ctorrent. CVE-2009-1759[0]: | Stack-based buffer overflow in the btFiles::BuildFromMI function |

Bug#530271: CVE-2009-1732, CVE-2009-1733

2009-05-23 Thread Giuseppe Iuculano
Package: ipplan Severity: serious Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, the following CVE (Common Vulnerabilities Exposures) ids were published for ipplan. CVE-2009-1732[0]: | Cross-site scripting (XSS) vulnerability in admin/usermanager in IPlan | 4.91a allows

Bug#528938: CVE-2009-1629: generates session IDs with predictable random numbers

2009-05-16 Thread Giuseppe Iuculano
Package: ajaxterm Version: 0.10-4 Severity: serious Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, the following CVE (Common Vulnerabilities Exposures) id was published for ajaxterm. CVE-2009-1629[0]: | ajaxterm.js in AjaxTerm 0.10 and earlier generates session IDs with |

Bug#528807: FTBFS: applying patch 41_lesstif_cpp to ./ ... failed.

2009-05-15 Thread Giuseppe Iuculano
Package: xpdf-reader Version: 3.02-1.4 Severity: serious Justification: no longer builds from source -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, xpdf failed to build on i386: dpkg-source: info: building xpdf in xpdf_3.02-1.4.dsc debian/rules build dpatch apply-all applying patch

Bug#527894: CVE-2008-6800: Race condition in the winbind daemon (aka winbindd) in Samba before 3.0.32

2009-05-09 Thread Giuseppe Iuculano
Package: samba Version: 3.0.24-6etch10 Severity: serious Tags: security etch -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, the following CVE (Common Vulnerabilities Exposures) id was published for samba. CVE-2008-6800[0]: | Race condition in the winbind daemon (aka winbindd) in Samba

Bug#527597: [ca83c1e] Fix for Bug#527597 committed to git

2009-05-09 Thread Giuseppe Iuculano
tags 527597 +pending thanks Hello, The following change has been committed for this bug by Giuseppe Iuculano giuse...@iuculano.it on Sat, 9 May 2009 16:14:37 +0200. The fix will be in the next upload. = debian

Bug#527597: Atmail doesn't flush some user session from the database

2009-05-09 Thread Giuseppe Iuculano
Hi Arthur, Arthur Furlan ha scritto: I fixed these issues adding a new method in the Auth class (see Auth.php.patch) that destroys the any session for an user, both in php *and* database. To fix the issue [1] I added a call of this new method Thank you for your bug report, I've committed

Bug#527571: CVE-2009-1524: Cross-site scripting (XSS) vulnerability in Mort Bay Jetty

2009-05-08 Thread Giuseppe Iuculano
Package: jetty Severity: serious Tags: security Hi, the following CVE (Common Vulnerabilities Exposures) id was published for jetty. CVE-2009-1524[0]: | Cross-site scripting (XSS) vulnerability in Mort Bay Jetty before | 6.1.17 allows remote attackers to inject arbitrary web script or HTML |

Bug#526434: libwmf: proposed debdiff to fix CVE-2009-1364

2009-05-06 Thread Giuseppe Iuculano
+1,11 @@ +libwmf (0.2.8.4-2+etch1) oldstable-security; urgency=high + + * Non-maintainer upload. + * Fixed Use-after-free vulnerability in the embedded GD library +(Closes: #526434) (CVE-2009-1364) + + -- Giuseppe Iuculano giuse...@iuculano.it Wed, 06 May 2009 09:33:49 +0200 + libwmf (0.2.8.4

Bug#526657: libmodplug: proposed debdiff to fix CVE-2009-1438 and PATinst() Buffer Overflow Vulnerability

2009-05-06 Thread Giuseppe Iuculano
-0.7/debian/changelog +++ libmodplug-0.7/debian/changelog @@ -1,3 +1,11 @@ +libmodplug (1:0.7-5.3) oldstable-security; urgency=high + + * Non-maintainer upload. + * Fixed CSoundFile::ReadMed() Integer Overflow in src/load_med.cp +(Closes: #526657) (CVE-2009-1438) + + -- Giuseppe Iuculano giuse

Bug#526657: libmodplug: proposed debdiff to fix CVE-2009-1438 and PATinst() Buffer Overflow Vulnerability

2009-05-06 Thread Giuseppe Iuculano
Zed Pobre ha scritto: On Wed, May 06, 2009 at 10:50:00AM +0200, Giuseppe Iuculano wrote: Hi, I've prepared a NMU to fix CVE-2009-1438 and SA34927 in stable and oldstable. My plan was to fix this by packaging the new upstream version this weekend that fixes this officially, but if you don't

Bug#526084: libmodplug: proposed debdiff to fix CVE-2009-1438 and PATinst() Buffer Overflow Vulnerability

2009-05-06 Thread Giuseppe Iuculano
Giuseppe Iuculano ha scritto: Proposed debdiffs in attachment. Updated oldstable debdiff (do not backport changes in src/libmodplug/stdafx.h, instead include stdint.h) Cheers, Giuseppe. diff -u libmodplug-0.7/debian/changelog libmodplug-0.7/debian/changelog --- libmodplug-0.7/debian/changelog

Bug#525483: libclamav5: clamd segfault libclamav.so.5.0.4

2009-05-02 Thread Giuseppe Iuculano
Hi, Scott Kitterman wrote: There is a clamav bug that was fixed in 0.95 or 0.95.1 in which unofficial signatures caused a crash, so I believe your diagnosis is likely correct. I can confirm this. I was experiencing the same crash with 0.94.dfsg.2-1lenny2 and clamav-unofficial-sigs. Upgrading

Bug#524809: xpdf: Proposed NMU to fix CVE-2009-0146,0147,0165,0166,0799,0800,1179-1183

2009-05-02 Thread Giuseppe Iuculano
-1183: The JBIG2 MMR decoder in Xpdf 3.02pl2 and earlier, CUPS + 1.3.9 and earlier, Poppler before 0.10.6, and other products allows remote + attackers to cause a denial of service (infinite loop and hang) via a + crafted PDF file. + + -- Giuseppe Iuculano giuse...@iuculano.it Sat, 02

Bug#526657: CVE-2009-1438: libmodplug CSoundFile::ReadMed() Integer Overflow Vulnerability

2009-05-02 Thread Giuseppe Iuculano
Package: libmodplug Version: 1:0.8.4-5 Severity: grave Tags: security patch Hi, the following CVE (Common Vulnerabilities Exposures) id was published for libmodplug: CVE-2009-1438[1] Integer overflow in the CSoundFile::ReadMed function (src/load_med.cpp) in libmodplug before 0.8.6, as used in

Bug#526434: CVE-2009-1364 libwmf: embedded gd use-after-free error

2009-05-01 Thread Giuseppe Iuculano
Package: libwmf Version: 0.2.8.4-6 Severity: serious Tags: security patch Hi, redhat recently patched libwmf. CVE-2009-1364 is still reserved, but is disclosed in RHSA-2009:0457-1[0] A pointer use-after-free flaw was found in the GD graphics library embedded in libwmf. An attacker could create

Bug#526084: [SA34927] libmodplug PATinst() Buffer Overflow Vulnerability

2009-04-29 Thread Giuseppe Iuculano
Package: libmodplug Version: 1:0.8.4-5 Severity: serious Tags: security patch Hi, The following SA (Secunia Advisory) id was published for libmodplug: SA34927[1] DESCRIPTION: A vulnerability has been reported in libmodplug, which can be exploited by malicious people to cause a DoS

Bug#524803: ghostscript: proposed NMU to fix CVE-2009-0792 CVE-2009-0196 CVE-2007-6725 CVE-2008-6679

2009-04-22 Thread Giuseppe Iuculano
writer module in + Ghostscript 8.62, and possibly other versions, allows remote attackers to + cause a denial of service (ps2pdf crash) and possibly execute arbitrary + code via a crafted Postscript file. + (Closes: #524803, #524915) + + -- Giuseppe Iuculano giuse...@iuculano.it

Bug#524803: ghostscript: proposed NMU to fix CVE-2009-0792 CVE-2009-0196 CVE-2007-6725 CVE-2008-6679

2009-04-22 Thread Giuseppe Iuculano
Giuseppe Iuculano ha scritto: Hi, I've prepared a NMU to fix CVE-2009-0792 CVE-2009-0196 CVE-2007-6725 CVE-2008-6679 in lenny. Proposed debdiff in attachment. Forgot to add 36_CVE-2008-6679.dpatch, resend correct debdiff. Cheers, Giuseppe. diffstat for ghostscript_8.62.dfsg.1-3.2lenny1

Bug#523426: Only available in amd64

2009-04-10 Thread Giuseppe Iuculano
Package: mbrola Severity: serious -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, it seems that mbrola is available only in amd64, why? https://buildd.debian.org/~luk/status/package.php?p=mbrola Cheers, Giuseppe - -- System Information: Debian Release: squeeze/sid APT prefers

Bug#523426: Only available in amd64

2009-04-10 Thread Giuseppe Iuculano
Samuel Thibault ha scritto: It's written there and I didn't know that indeed: Non-Free (not autobuilt). I'll manage to get other archs built, thanks for the notice. Samuel Hi, you should read this: http://lists.debian.org/debian-devel-announce/2006/11/msg00012.html Cheers, Giuseppe.

Bug#520994: cowdancer: .ilist size unexpected

2009-03-24 Thread Giuseppe Iuculano
-buildpackage: set CXXFLAGS to default value: -g -O2 dpkg-buildpackage: source package apf-firewall dpkg-buildpackage: source version 9.7+rev1-1 dpkg-buildpackage: source changed by Giuseppe Iuculano giuse...@iuculano.it fakeroot debian/rules clean QUILT_PATCHES=debian/patches quilt --quiltrc /dev/null

Bug#520994: cowdancer: .ilist size unexpected

2009-03-24 Thread Giuseppe Iuculano
gregor herrmann ha scritto: Did you try what this error message says? I have the same problem. --update --no-cowdancer-update works for the update. But after that I can neither build packages nor login into the chroot, the errors stays the same: The same for me. Giuseppe.

Bug#519801: CVE-2009-0365, CVE-2009-0578

2009-03-15 Thread Giuseppe Iuculano
Package: network-manager-applet Version: 0.6.6-4 Severity: serious Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, the following CVE (Common Vulnerabilities Exposures) id was published for network-manager-applet: CVE-2009-0365[1]: The dbus request handler in (1)

Bug#516256: libpng: proposed NMU to fix CVE-2008-5907 and CVE-2009-0040 in lenny

2009-03-14 Thread Giuseppe Iuculano
, +pngrtans.c, pngset.c and example.c (CVE-2009-0040) (Closes: #516256) + + -- Giuseppe Iuculano giuse...@iuculano.it Sat, 14 Mar 2009 21:31:31 +0100 + libpng (1.2.27-2) unstable; urgency=medium * Fix CVE-2008-3964: off-by-one error in pngtest.c; closes: #501109 diff -u libpng-1.2.27/debian/patches

Bug#518481: Missing epoch after devmapper merge

2009-03-06 Thread Giuseppe Iuculano
Package: lvm2 Version: 2.02.44-2 Severity: serious -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, you merged devmapper source, but it had an epoch: # dpkg --compare-versions 2.02.44-2 gt 2:1.02.30-2; echo $? 1 # rmadison -s unstable dmsetup dmsetup | 2:1.02.27-4 | unstable | arm

Bug#518481: Missing epoch after devmapper merge

2009-03-06 Thread Giuseppe Iuculano
Bastian Blank ha scritto: On Fri, Mar 06, 2009 at 02:58:44PM +0100, Giuseppe Iuculano wrote: you merged devmapper source, but it had an epoch: Please explain. Which version have a bad epoch. When comparing two version numbers, first the epoch of each are compared, so 2.02.44-2 2:1.02.30-2

Bug#518193: [SA34091] ZABBIX PHP Frontend Multiple Vulnerabilities

2009-03-04 Thread Giuseppe Iuculano
Package: zabbix-frontend-php Severity: serious Tags: security patch -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, The following SA (Secunia Advisory) id was published for zabbix-frontend-php: SA34091[1]: DESCRIPTION: Some vulnerabilities have been reported in the ZABBIX PHP frontend,

Bug#516829: Http double slash request arbitrary file access vulnerability

2009-02-23 Thread Giuseppe Iuculano
Package: mldonkey-server Version: 2.9.5-2 Severity: grave Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, MLdonkey (up to 2.9.7) has a vulnerability that allows remote user to access any file with rights of running Mldonkey daemon by supplying a special-crafted

Bug#516256: [SA33970] libpng Uninitialised Pointer Arrays Vulnerability

2009-02-19 Thread Giuseppe Iuculano
Package: libpng Version: 1.2.33-2 Severity: serious Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, The following SA (Secunia Advisory) id was published for libpng: SA33970[1] DESCRIPTION: A vulnerability has been reported in libpng, which can be exploited by malicious

Bug#512771: dmraid must not call udevadm trigger --action=add

2009-01-23 Thread Giuseppe Iuculano
Package: dmraid Version: 1.0.0.rc14-6 Severity: grave -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 (Originally reported against dkms on ubuntu, LP #320200) dmraid must not call udevadm trigger --action=add in postinst. This will have utterly dire consequences for the installed machine. Major

Bug#512728: [SA33635] Tor Unspecified Memory Corruption Vulnerability

2009-01-22 Thread Giuseppe Iuculano
Package: tor Severity: serious Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, The following SA (Secunia Advisory) id was published for Tor: SA33635[1] DESCRIPTION: A vulnerability with an unknown impact has been reported in Tor. The vulnerability is caused due to an

Bug#512608: [SA33617] Typo3 Multiple Vulnerabilities

2009-01-21 Thread Giuseppe Iuculano
Package: typo3-src Severity: grave Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, The following SA (Secunia Advisory) id was published for Typo3: SA33617[1] DESCRIPTION: Some vulnerabilities have been reported in Typo3, which can be exploited by malicious people to bypass

Bug#508870: mediawiki: NMU to fix CVE-2008-5249, CVE-2008-5250, CVE-2008-5252

2009-01-18 Thread Giuseppe Iuculano
extension, not from the data. This reduces the XSS attack surface. - Blacklist redirects via Special:Filepath. Such redirects exacerbate any XSS vulnerabilities involving uploads of files containing scripts. Closes: #508869, #508870 -- Giuseppe Iuculano giuse...@iuculano.it Sun, 18 Jan

Bug#508026: TPU upload

2009-01-07 Thread Giuseppe Iuculano
Hi, Neil McGovern ha scritto: Can this patch be backported against the version in testing, and a TPU upload done? phppgadmin/4.2.2-1 was unblocked by luk. Cheers, Giuseppe. signature.asc Description: OpenPGP digital signature

Bug#508026: register_globals on is not supported

2008-12-23 Thread Giuseppe Iuculano
-3.2) stable-security; urgency=high + + * Non-maintainer upload. + * Fix local file inclusion vulnerability: (CVE-2008-5587) +Unset language variable before determine file includes (Closes: #508026) + + -- Giuseppe Iuculano giuse...@iuculano.it Tue, 23 Dec 2008 11:20:56 +0100 + phppgadmin

Bug#508026: register_globals on is not supported

2008-12-23 Thread Giuseppe Iuculano
: #508026) + + -- Giuseppe Iuculano giuse...@iuculano.it Tue, 23 Dec 2008 11:20:56 +0100 + phppgadmin (4.0.1-3.1) unstable; urgency=low * Non-maintainer upload to fix pending l10n issues. only in patch2: unchanged: --- phppgadmin-4.0.1.orig/libraries/lib.inc.php +++ phppgadmin-4.0.1/libraries

Bug#508026: register_globals on is not supported

2008-12-23 Thread Giuseppe Iuculano
Hi, Giuseppe Iuculano ha scritto: Hi, Nico Golde ha scritto: I take care of sponsoring the upload for unstable. For stable security the version looks wrong to me, please use 4.0.1-3.1etch1. Right, attached the new debdiff. Giuseppe. Attached a new proposed debdiff to fix also

Bug#508803: SA33136: MPlayer TwinVQ Processing Buffer Overflow Vulnerability

2008-12-15 Thread Giuseppe Iuculano
Subject: SA33136: MPlayer TwinVQ Processing Buffer Overflow Vulnerability Package: mplayer Version: 1.0~rc1-12etch5 Severity: grave Tags: security patch Hi, The following SA (Secunia Advisory) id was published for mplayer: SA33136[1] Description: Tobias Klein has reported a vulnerability in

Bug#508026: register_globals on is not supported

2008-12-14 Thread Giuseppe Iuculano
Hi Thijs, Thijs Kinkhorst ha scritto: As it seems, upstream does already support running in register_globals=0 mode for a long time (according to their changelog since 2002...). Therefore I Where did you read that? In TODO file I read * register_globals off support. Cheers, Giuseppe.

Bug#508026: phppgadmin: diff for NMU version 4.2.1-1.1

2008-12-12 Thread Giuseppe Iuculano
(4.2.1-1.1) unstable; urgency=high + + * Non-maintainer upload. + * Fix Local File Inclusion Vulnerability (Closes: #508026) + + -- Giuseppe Iuculano giuse...@iuculano.it Fri, 12 Dec 2008 17:55:03 +0100 + phppgadmin (4.2.1-1) unstable; urgency=low * New upstream release diff -u phppgadmin

Bug#508026: phppgadmin: diff for NMU version 4.2-1.1 (tpu)

2008-12-12 Thread Giuseppe Iuculano
@@ +phppgadmin (4.2-1.1) testing-proposed-updates; urgency=low + + * Non-maintainer upload. + * Fix Local File Inclusion Vulnerability (Closes: #508026) + + -- Giuseppe Iuculano giuse...@iuculano.it Fri, 12 Dec 2008 18:50:16 +0100 + phppgadmin (4.2-1) unstable; urgency=low * New upstream release

Bug#506530: Remote command execution and the possibility of attack with the help of symlinks

2008-11-22 Thread Giuseppe Iuculano
Package: verlihub Severity: grave Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, An exploit[0] has been published for verlihub: Verlihub does not sanitize user input passed to the shell via its trigger mechanism. Furthermore, the Verlihub daemon can optionally be

Bug#505557: Mozilla Firefox 3 Multiple Vulnerabilities

2008-11-13 Thread Giuseppe Iuculano
Package: iceweasel Version: 3.0.3-3 Severity: critical Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, The following SA (Secunia Advisory) id was published for Firefox 3. SA32713[1] Description: Some vulnerabilities have been reported in Mozilla Firefox, which can be

Bug#505558: Mozilla Firefox 2 Multiple Vulnerabilities

2008-11-13 Thread Giuseppe Iuculano
Package: iceweasel Version: 2.0.0.17-0etch1 Severity: critical Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, The following SA (Secunia Advisory) id was published for Firefox 2: SA32693[1] Description: Some vulnerabilities have been reported in Mozilla Firefox, which can be

Bug#505563: Mozilla Thunderbird Multiple Vulnerabilities

2008-11-13 Thread Giuseppe Iuculano
Package: icedove Severity: critical Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, The following SA (Secunia Advisory) id was published for Thunderbird: SA32715[1] Description: Some vulnerabilities have been reported in Mozilla Thunderbird, which can be exploited by

Bug#505565: Mozilla SeaMonkey Multiple Vulnerabilities

2008-11-13 Thread Giuseppe Iuculano
Package: iceape Severity: critical Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, The following SA (Secunia Advisory) id was published for SeaMonkey: SA32714[1] Description: Some vulnerabilities have been reported in Mozilla SeaMonkey, which can be exploited by malicious

Bug#505197: [Pkg-trac-devel] Bug#505197: SA32652: Trac Multiple Vulnerabilities

2008-11-11 Thread Giuseppe Iuculano
Hi, [EMAIL PROTECTED] ha scritto: i think this is the changeset http://trac.edgewall.org/changeset/7658/branches/0.11-stable i'll get into this to upload a new package. 2) An unspecified error when processing wiki markup can be exploited to cause a DoS. See also

Bug#505197: SA32652: Trac Multiple Vulnerabilities

2008-11-10 Thread Giuseppe Iuculano
Package: trac Severity: serious Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, The following SA (Secunia Advisory) id was published for trac. SA32652[1] Description: Some vulnerabilities have been reported in Trac, which can be exploited by malicious people to cause a

Bug#504682: NMU patch

2008-11-08 Thread Giuseppe Iuculano
copy shipped with +dokuwiki (SA32559) (Closes: #504682) + + -- Giuseppe Iuculano [EMAIL PROTECTED] Sat, 08 Nov 2008 09:48:34 +0100 + dokuwiki (0.0.20080505-3) unstable; urgency=high * High-urgency upload for RC bug fixing. diff -u dokuwiki-0.0.20080505/debian/patches/series dokuwiki

Bug#502219: IRQ totals are very wrong

2008-10-21 Thread Giuseppe Iuculano
Hi Dominique, Dominique Brazziel ha scritto: I just saw this update and put it on and, while there is no segfault, the IRQ totals are way off, 0 is reported many times when it shouldn't be: Please open a new bug and report it. Giuseppe. signature.asc Description: OpenPGP digital

Bug#502219: closed by Giuseppe Iuculano [EMAIL PROTECTED] (Re: Bug#502219: procinfo: Segfaults with large number of interrupts.)

2008-10-15 Thread Giuseppe Iuculano
Len Sorensen ha scritto: Well if it isn't being accepted into Lenny, then that doesn't help and most likely Lenny will end up with no procinfo at all. Wouldn't it be better to make a procinfo 18-3 with the simple fix which is much more likely to be accepted into Lenny and then get the new

Bug#502219: closed by Giuseppe Iuculano [EMAIL PROTECTED] (Re: Bug#502219: procinfo: Segfaults with large number of interrupts.)

2008-10-14 Thread Giuseppe Iuculano
Len Sorensen ha scritto: I do not consider this closed. You are wrong. Please reopen until it is fixed. I was actually considering marking it RC for Lenny. Hi, I understand your point of view, but this bug is marked as Fixed in version procinfo/1:2.0.208-1. This is correct and this remain

Bug#500883: dmraid: boot fails after upgrading to 1.0.0.rc14-4

2008-10-02 Thread Giuseppe Iuculano
tags 500883 moreinfo thanks Peter Leipold ha scritto: After the upgrade the boot stops at waiting for the root filesystem. I get a busybox prompt. I figured out what to type to continue booting up: $ modprobe dm-mirror $ dmraid -ay $ exit I need some debug logs. Extract the attached

Bug#500883: dmraid: boot fails after upgrading to 1.0.0.rc14-4

2008-10-02 Thread Giuseppe Iuculano
Hi Peter, Peter ha scritto: I now suspect the ENV{ID_FS_USAGE}==raid option in udev rules file. How should udev supposed to know if a disk is raid? Maybe I should rename something to this raid? See below my raid settings: udevadm info --query=all --name=sda udevadm info --query=all

Bug#500883: dmraid: boot fails after upgrading to 1.0.0.rc14-4

2008-10-02 Thread Giuseppe Iuculano
Peter ha scritto: This 2nd partition is one of my raid1 volume, containing the root filesystem. I see ID_FS_USAGE is not raid as it should. Do I have a screwed raid setup? :) Do you know how could I change that ID_FS_USAGE? ID_FS_USAGE on sdaX isn't important. The real problem is that

Bug#500883: dmraid: boot fails after upgrading to 1.0.0.rc14-4

2008-10-02 Thread Giuseppe Iuculano
Peter ha scritto: Ok, thanks! This is then an udev issue, so I should search there (already Can you elaborate please? Why this is an udev issue and not a bug in your controller/bios ? found some bug-reports where udev incorrectly read device metadata for raid devices), Can you link them

Bug#500883: dmraid: boot fails after upgrading to 1.0.0.rc14-4

2008-10-02 Thread Giuseppe Iuculano
severity 500883 normal thanks Peter ha scritto: Well, it can of course be a controller bug. I'm not that familiar with these issues. I was only thinking it to be an udev bug because as I've read these fakeraid cards are hard to support under linux because of their proprietary bios

Bug#494278: dmraid Intel RAID10 patch breaks some Intel raid1 system

2008-09-29 Thread Giuseppe Iuculano
Chris ha scritto: I have Intel raid 10, it worked fine up until now, and after this removal of patch 07_isw-raid10-nested.dpatch my system fails to boot. dmraid -l does not show intel raid 10 support. I tracked it down to this. Sorry, but that patch was removed because it breaks some

Bug#497110: improved dmraid support in D-I

2008-09-23 Thread Giuseppe Iuculano
Frans Pop ha scritto: I've not tested os-prober functionality for dmraid. Tested, unfortunately root is empty: # This entry automatically added by the Debian installer for an existing # linux installation on /dev/mapper/sil_aiahbgbgaaaj1. title Debian GNU/Linux, kernel 2.6.26-1-686

Bug#497110: improved dmraid support in D-I

2008-09-23 Thread Giuseppe Iuculano
Giuseppe Iuculano ha scritto: Tested, unfortunately root is empty: Hi, attached debdiff fixes the root detection, can you review it please? Giuseppe diff -Nru grub-installer-1.34/debian/changelog grub-installer-1.35/debian/changelog --- grub-installer-1.34/debian/changelog2008-09-22

Bug#499060: dmraid: RAID not detected after upgrading to 1.0.0.rc14-3

2008-09-21 Thread Giuseppe Iuculano
tags 499060 moreinfo thanks Asier ha scritto: The problem... remains, attached /etc/udev/rules.d/85_dmraid.rules and the boot loog :-( I need some debug logs. Extract the attached .tar.gz, and you have a dmraid-debug directory cd dmraid-debug cp -a sbin/* /sbin/ cp -a 85_dmraid.rules

Bug#499060: dmraid: RAID not detected after upgrading to 1.0.0.rc14-3

2008-09-21 Thread Giuseppe Iuculano
Asier ha scritto: Here they go. Looks like there's a problem with /usr/bin/basename not present before a full mount of the filesystem? Right, another deb for testing: http://sd6.iuculano.it/dmraid-testing/dmraid_1.0.0.rc14-4~unreleased3_amd64.deb Make sure that after .deb installation

Bug#499060: dmraid: RAID not detected after upgrading to 1.0.0.rc14-3

2008-09-21 Thread Giuseppe Iuculano
tags 499060 = pending thanks Asier ha scritto: Magic words: fixed! RAID array now is detected and the /dev/mapper/ entry is created. Thanks for your support Greets Great! :) Giuseppe signature.asc Description: OpenPGP digital signature

Bug#499060: dmraid: RAID not detected after upgrading to 1.0.0.rc14-3

2008-09-20 Thread Giuseppe Iuculano
Asier ha scritto: El Viernes, 19 de Septiembre de 2008, escribió: As you know, from dmraid 1.0.0.rc14-3 we use an udev rule to allow dmraid arrays to be brought up in the event that the member disks of an array are present. This udev rule runs /sbin/dmraid-activate to activate only arrays

Bug#499060: dmraid: RAID not detected after upgrading to 1.0.0.rc14-3

2008-09-19 Thread Giuseppe Iuculano
Giuseppe Iuculano ha scritto: Asier ha scritto: Thu Sep 18 23:09:34 2008: A maintenance shell will now be started. CONTROL-D will terminate this shell and resume system boot. (warning). Thu Sep 18 23:09:34 2008: Give root password for maintenance Thu Sep 18 23:09:34 2008: (or type Control

Bug#499060: dmraid: RAID not detected after upgrading to 1.0.0.rc14-3

2008-09-19 Thread Giuseppe Iuculano
severity 499060 normal tags 499060 wontfix retitle 499060 udev rule doesn't work without initramfs thanks Asier ha scritto: The same problem. The RAID array isn't detected :( As you know, from dmraid 1.0.0.rc14-3 we use an udev rule to allow dmraid arrays to be brought up in the event that

Bug#499060: dmraid: RAID not detected after upgrading to 1.0.0.rc14-3

2008-09-18 Thread Giuseppe Iuculano
Asier ha scritto: Thu Sep 18 23:09:34 2008: A maintenance shell will now be started. CONTROL-D will terminate this shell and resume system boot. (warning). Thu Sep 18 23:09:34 2008: Give root password for maintenance Thu Sep 18 23:09:34 2008: (or type Control-D to continue): Please, at this

Bug#497110: Bug#498838: Please set link priority to 100 for dmraid devmapper devices

2008-09-13 Thread Giuseppe Iuculano
unblock 497110 by 498838 thanks Hi, Bastian Blank ha scritto: Please explain. I'm currently not able to oversee the consequences. Bastian # blkid /dev/mapper/sil_aiahbgbgaaaj5: TYPE=swap /dev/mapper/sil_aiahbgbgaaaj1: UUID=4f4ac281-bb5d-4c34-9437-65df0c203bbb TYPE=ext3 /dev/hda1:

Bug#497110: improved dmraid support in D-I

2008-09-07 Thread Giuseppe Iuculano
Frans Pop ha scritto: changes merged for Lenny. This means the following actions are needed: - get an OK for the change in devicemapper from maintainer and RT - get an OK for the change in parted from RT (and maybe check that the patch will also get accepted upstream?) - get updated

Bug#497110: improved dmraid support in D-I

2008-09-07 Thread Giuseppe Iuculano
Frans Pop ha scritto: On Sunday 07 September 2008, Frans Pop wrote: I've done some testing using Giuseppe's businesscard image in VirtualBox ... I was very surprised that you don't actually need BIOS support for dmraid. Apparently it really only scans the harddisks for some specific

Bug#497110: improved dmraid support in D-I

2008-09-07 Thread Giuseppe Iuculano
Giuseppe Iuculano ha scritto: I'm working on this, but it is not very simple for me. Approximately dmraid -rD generates three files, from this we can extrapolate metadata, and with a hex editor we can add the fake signature to the qemu/virtualbox drive Ok,this procedure seems to work for me

Bug#497110: boot loader installation failed when dmraid=true

2008-09-06 Thread Giuseppe Iuculano
, which use device mapper. Libparted was +naming new partition nodes incorrectly, and not setting the UUIDs for +dmraid device nodes. (Closes: #497110) + * debian/patches/parted-dmraid.dpatch: Make sure that partition nodes for +dmraid devices are probed + + -- Giuseppe Iuculano [EMAIL

Bug#497110: boot loader installation failed when dmraid=true

2008-09-06 Thread Giuseppe Iuculano
Otavio Salvador ha scritto: Yes. That is a great news. Sad that Ubuntu hasn't communicated with us to get this fixed on Debian. I'll take a look and prepare a parted upload with it. I merged all relative dmraid Ubuntu changes in: devmapper os-prober parted partman-auto partman-base

Bug#497110: boot loader installation failed when dmraid=true

2008-09-06 Thread Giuseppe Iuculano
Frans Pop ha scritto: On Saturday 06 September 2008, Frans Pop wrote: At first glance the patch also needs some cleanup. The .gitignore changes look like they are just noise and the actual changes are not really consistent regarding whitespace for example. Here's a cleaned-up version.

Bug#497110: boot loader installation failed when dmraid=true

2008-09-06 Thread Giuseppe Iuculano
+++ partman-base-125+nmu1/debian/changelog 2008-09-06 16:56:57.0 +0200 @@ -1,3 +1,10 @@ +partman-base (125+nmu1) unstable; urgency=low + + * Non-maintainer upload. + * init.d/parted: Set the sataraid flag for dmraid arrays. + + -- Giuseppe Iuculano [EMAIL PROTECTED] Sat, 06 Sep 2008

Bug#497110: boot loader installation failed when dmraid=true

2008-09-06 Thread Giuseppe Iuculano
. + * Merge from Ubuntu: debian/patches/parted-dmraid.dpatch: Patch to educate +libparted about dmraid arrays, which use device mapper. Libparted was +naming new partition nodes incorrectly, and not setting the UUIDs for +dmraid device nodes. (Closes: #497110) + + -- Giuseppe Iuculano [EMAIL

Bug#497110: boot loader installation failed when dmraid=true

2008-09-06 Thread Giuseppe Iuculano
Ubuntu: debian/patches/parted-dmraid.dpatch: Patch to educate +libparted about dmraid arrays, which use device mapper. Libparted was +naming new partition nodes incorrectly, and not setting the UUIDs for +dmraid device nodes. (Closes: #497110) + + -- Giuseppe Iuculano [EMAIL PROTECTED

Bug#497110: boot loader installation failed when dmraid=true

2008-09-06 Thread Giuseppe Iuculano
. + + -- Giuseppe Iuculano [EMAIL PROTECTED] Sat, 06 Sep 2008 18:23:55 +0200 + partman-auto (81) unstable; urgency=low [ Jérémy Bobbio ] diff -Nru partman-auto-81/lib/auto-shared.sh partman-auto-81+nmu1/lib/auto-shared.sh --- partman-auto-81/lib/auto-shared.sh 2008-08-25 21:01:13.0 +0200

Bug#497110: boot loader installation failed when dmraid=true

2008-09-05 Thread Giuseppe Iuculano
Frans Pop ha scritto: Giuseppe: if you want to work around this bug to test dmraid support, you can do so by changing /lib/partman/active_partition/25divider/choices before you start partman: just make that script 'exit 0'. This would allow you to provide further details on the p in created

Bug#497723: arpack to be removed

2008-09-04 Thread Giuseppe Iuculano
block 497723 by 491794 thanks Hi, Thomas Viehmann wrote: license is not DFSG-free (see bug #491794). new freemat package is ready, but I prefer to wait #491794 resolution. Giuseppe. signature.asc Description: OpenPGP digital signature

Bug#497110: boot loader installation failed when dmraid=true

2008-09-02 Thread Giuseppe Iuculano
Frans Pop ha scritto: Unfortunately these don't help very much. What I think we need here is a full debug log for partman to see what was running at the time of the OOM. I suspect you somehow get into a loop. Please make sure you have started your ssh sessions _before_ starting partman

Bug#497110: boot loader installation failed when dmraid=true

2008-08-30 Thread Giuseppe Iuculano
11:27 sil_aiahbgbgaaaj brw---1 root root 254, 1 Aug 30 11:27 sil_aiahbgbgaaaj1 brw---1 root root 254, 2 Aug 30 11:27 sil_aiahbgbgaaaj5 Giuseppe Iuculano signature.asc Description: OpenPGP digital signature

Bug#497110: boot loader installation failed when dmraid=true

2008-08-30 Thread Giuseppe Iuculano
Frans Pop ha scritto: But another possibility is that you are just not following the correct procedure. Support for dmraid is far from perfect and things will *only* work if you follow the documented procedure. How did you do the partitioning? Did you *exactly* follow the instructions that

Bug#386604: DokuWiki: TARGET_FN Directory Traversal Vulnerability

2006-09-08 Thread Giuseppe Iuculano
Package: dokuwiki Version: 0.0.20060309-5 Severity: grave Justification: user security hole From: http://secunia.com/advisories/21819/ Description: rgod has discovered a vulnerability in DokuWiki, which can be exploited by malicious people to compromise a vulnerable system. Input passed to

Bug#368929: rkhunter --update doesn't work

2006-05-25 Thread Giuseppe Iuculano
Package: rkhunter Version: 1.2.8-4 Severity: grave # rkhunter --update Running updater... /usr/bin/rkhunter: line 4994: /rkhunter/scripts/check_update.sh: No such file or directory Ready. -- System Information: Debian Release: 3.1 APT prefers unstable APT policy: (500, 'unstable'), (500,

Bug#360231: Horde_Block_turba_tree_menu error (sid)

2006-03-31 Thread Giuseppe Iuculano
Package: horde3 Version: 3.1-1 Severity: grave After last upgrade, when user logged in, in the left columns: A fatal error has occurred Horde_Block_turba_tree_menu non trovato. [line 232 of /usr/share/horde3/services/portal/sidebar.php] Details (also in Horde's logfile): object(pear_error)(8) {

<    1   2   3   4