Hi everyone,
I can reproduce the failure and confirmed that tests succeed with the
new upstream release, which I'll upload shortly.
Thanks,
Max
--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact
On Mon, Jan 04, 2010 at 07:10:12AM -0500, Daniel Dickinson wrote:
Package: aespipe
Version: 2.3d-2
Severity: serious
Justification: required dependences must be listed
aespipe with a Standard system emits warnings that uuencode is missing (line
84)
sharutils supplies uuencode.
I'm
severity 542695 important
thanks
Hello,
On Thu, Aug 20, 2009 at 10:14:46PM +0200, J.M.Roth wrote:
# aptitude install loop-aes-modules-2.6.26-2-686
# modprobe loop-aes
# lsmod | grep loop
loop 55372 0
# dmesg | tail -3
[ 4457.015307] loop: module loaded
[ 4521.947610]
On Tue, Aug 11, 2009 at 09:56:43PM +0200, Frans Pop wrote:
It looks like busybox also causes a failure on i386.
If I boot a daily mini.iso, the boot hangs when executing the last line
from /sbin/init:
exec /usr/sbin/chroot . /bin/busybox init /dev/console /dev/console 21
I'm seeing this
severity 539228 important
thanks
Hello,
On Thu, Jul 30, 2009 at 12:43:04AM +0200, da jedall wrote:
When i try to install debian squeeze on usb key (netinstall)
and when i try to create installation over encrypted fs in partman,partman
reload and freeze at 52% of loading.
The installation is
severity 515249 normal
clone 515249 -1
retitle -1 manual: Mention console=hvc0 for ppc?
reassign -1 installation-guide
thanks
On Sun, Feb 15, 2009 at 10:49:36AM +, Paul McEnery wrote:
Comments/Problems:
Initial boot: Maybe not soe much an error, I had to specify the
console
unarchive 517231
reassign 520285 debian-installer
forcemerge 517231 520285
archive 517231
thanks
This bug was another instance of the problem described
in #517231 and should no longer occur in current images.
Thanks for your bug report.
Max
--
To UNSUBSCRIBE, email to
reassign linux-2.6 2.6.29-1
merge 521472 521672
thanks
Hi Dmitry,
On Sun, Mar 29, 2009 at 02:45:05PM +0400, Dmitry E. Oboukhov wrote:
Usually I use the command like as
module-assistant -l 2.6.29-1-686 a-i loop-aes-source
but with 2.6.29 (sid) kernel build has failed.
This is caused by
Hi Dmitry,
On Sun, Mar 29, 2009 at 01:41:47PM +0200, Max Vozeler wrote:
On Sun, Mar 29, 2009 at 02:45:05PM +0400, Dmitry E. Oboukhov wrote:
Usually I use the command like as
module-assistant -l 2.6.29-1-686 a-i loop-aes-source
but with 2.6.29 (sid) kernel build has failed
Hi Cyril,
On Tue, Aug 19, 2008 at 06:32:54PM +0200, Cyril Brulebois wrote:
diverting losetup without implementing losetup -f looks quite a serious
bug to me.
I won't disagree. -f is rather recent and hasn't been
picked up by the loop-AES fork so far. Let me check how it
can be enabled, and
Hi Jari,
some of our users [in Debian] are starting to expect new
options that have been added to losetup in util-linux-ng to
work with the loop-AES version of losetup as well.
This is starting to cause other packages and scripts to
break when users use loop-AES patched losetup. In particular,
tags 470941 + unreproducible
thanks
Hello Marc,
On Fri, Mar 14, 2008 at 06:27:02PM +0100, Marc Lehmann wrote:
after installing loop-aes-utils, automount failed to be able to mount nfs
volumes, and indeed, mount no longer is able to do nfs mounts:
# mount 10.0.0.5:/ /mnt
mount: wrong
tags 470941 - unreproducible
tags 470941 + confirmed pending
thanks
On Fri, Mar 14, 2008 at 11:41:11PM +0100, Marc Lehmann wrote:
Just guessing as to what the problem could be -
If the mount package is an old version that predates
the switch to using mount.nfs, it could be that the new
Package: loop-aes
Version: 3.2b-4
Severity: serious
The loop-aes-modules-* binary module packages are no longer
built from loop-aes = 3.2b-4.
They have been taken over by linux-modules-extra-2.6
starting from version 2.6.24-1.
This is a dummy RC bug to make sure the newer loop-aes
doesn't
tags 400055 + confirmed pending
thanks
On Thu, Nov 23, 2006 at 06:09:24PM +0100, Lucas Nussbaum wrote:
During a rebuild of all packages in etch, I discovered that your
package failed to build on i386.
Your package depends on loop-aes-source (= 3.1d-3), but this package
was removed from
Hi Rafał,
On Sat, Oct 21, 2006 at 06:01:07AM +0200, [EMAIL PROTECTED] wrote:
Also, right after doing apt-get upgrade which upgraded the
loop-aes-utils probably (among other tools), the systeam was left
without ANY mount at all! there was no file /bin/mount, only file
/bin/moun.orig which I
Hi Rafał,
On Sat, Oct 21, 2006 at 05:13:44PM +0200, [EMAIL PROTECTED] wrote:
Max Vozeler wrote:
Can you please send /var/log/dpkg.log (ideally as bzip2) and tell me
roughly at which date you did this upgrade? Perhaps you can determine
the relevant entries from dpkg.log
tags 390554 + pending
thanks
On Sun, Oct 01, 2006 at 09:21:13PM +0200, Bastian Blank wrote:
/usr/bin/make -C /usr/src/linux-headers-2.6.17-2-s390-tape
M=/build/buildd/loop-aes-3.1d/debian/build/build_s390_none_s390-tape
make: Entering an unknown directory
make: ***
Hey again,
On Tue, Sep 26, 2006 at 06:37:59PM +0200, David Härdeman wrote:
This leaves libpopt0 and cdebconf-newt-entropy
I've committed a preliminary test for the presence of those two libs to
crypto_check_required_tools.
case $1 in
dm-crypt)
-
Hey David,
Thanks for adding the checks.
On Tue, Sep 26, 2006 at 06:37:59PM +0200, David Härdeman wrote:
This leaves libpopt0 and cdebconf-newt-entropy
cdebconf-newt-entropy is already taken care of through db_capb;
blockdev-keygen will return an error dialog if it needs but cannot
find the
On Mon, Sep 25, 2006 at 09:53:31PM +0200, Frans Pop wrote:
/var/log/syslog shows:
kernel: device-mapper: crypt: Error allocating crypto tfm
kernel: device-mapper: error adding target to table
kernel: device-mapper: device doesn't appear to be in the dev hash table.
partman-crypto: Command
tags 354204 + confirmed pending
thanks
On Fri, Feb 24, 2006 at 10:25:12AM +0100, Daniel Schepler wrote:
Package: loop-aes-source
Version: 3.1c-2
Severity: serious
From my pbuilder build log:
...
dh_installdocs
dh_install
cp: cannot stat `./debian/patches': No such file or directory
This is CVE-2005-4532.
BTW, did you have a chance to look at this bug yet? I'm considering
to do an NMU for unstable, but I'd prefer if someone who actively uses
scponly and who could test the changes would do the upload.
cheers,
Max
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a
The chroot-fix in 4.2 had a bug that refused to chroot although
directory permissions were OK. This bug was also present in the
previously attached patch. Attached is a fixed version.
cheers,
Max
diff -ur scponly-4.0/scponly.c scponly-4.0-chrootfix/scponly.c
--- scponly-4.0/scponly.c
Package: scponly
Version: 4.1-1
Severity: critical
Hey Thomas,
scponly 4.2 has been released with a fix for the privilege
escalation we've mailed about.
http://lists.ccs.neu.edu/pipermail/scponly/2005-December/001027.html:
...
Problem Description: If ALL the following conditions are true,
found 344418 4.0-1
tags 344418 + patch
thanks
The attached patch is extracted from 4.2 and should apply to 4.0-1 in
stable. I've verified that it builds and fixes the bug.
Note that there is a small change in behaviour that could break existing
(but unsafe) setups. If the home directory is not
On Thu, Dec 22, 2005 at 04:56:55PM +0100, Max Vozeler wrote:
http://lists.ccs.neu.edu/pipermail/scponly/2005-December/001027.html
This should read http_s_
https://lists.ccs.neu.edu/pipermail/scponly/2005-December/001027.html
cheers,
Max
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED
today!
Important Security Notice:
Max Vozeler has reported a problem whereby rssh can allow users who
have shell access to systems where rssh is installed (and
rssh_chroot_helper is installed SUID) to gain root access to the
system, due to the ability to chroot to arbitrary locations
On Tue, Dec 13, 2005 at 10:54:34AM +1030, Arthur Marsh wrote:
Package: linux-image-2.6.14-2-686
Version: 2.6.14-5
Followup-For: Bug #343048
Same thing happens here. I also had problems trying to install
loop-aes at the same time as upgrading from 2.6.14-4 to 2.6.14-5. The
installation went
This bug has been assigned CAN-2005-2876
cheers,
Max
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
MESSAGE-
Hash: SHA1
Format: 1.7
Date: Fri, 16 Sep 2005 15:12:02 +0200
Source: loop-aes-utils
Binary: loop-aes-utils
Architecture: source i386
Version: 2.12p-4sarge1
Distribution: stable-security
Urgency: high
Maintainer: [EMAIL PROTECTED]
Changed-By: Max Vozeler [EMAIL PROTECTED]
Description
tags 328141 +patch
thanks
On Wed, Sep 14, 2005 at 06:22:00AM +1000, Paul Szabo wrote:
[ .. umount -r drops flags ]
http://www.securityfocus.com/archive/1/410333
The attached patch is extracted from 2.12r-pre1, it simply
disallows user r/o remounts.
cheers,
Max
---
Package: maildrop
Version: 1.5.3-1.1
Severity: critical
Justification: local privilege escalation
Tags: security sarge sid patch
Hi Josip,
I've already tried to contact you about this, but have not heard
from you. I'm filing it now to keep track. Please refer to message
[EMAIL PROTECTED] for
Package: pstotext
Version: 1.9-1
Severity: grave
Justification: remote code execution
Tags: security woody sarge etch sid patch
Hi Ray,
we've already talked about this, I'm just filing it to keep track.
Please refer to message [EMAIL PROTECTED]
(sent to maintainer and security team) for all
34 matches
Mail list logo