Bug#759939: makepp: FTBFS: tests failed

2014-09-11 Thread Max Vozeler
Hi everyone, I can reproduce the failure and confirmed that tests succeed with the new upstream release, which I'll upload shortly. Thanks, Max -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact

Bug#563742: aespipe: Missing dependency for uuencode (e.g. sharutils)

2010-01-05 Thread Max Vozeler
On Mon, Jan 04, 2010 at 07:10:12AM -0500, Daniel Dickinson wrote: Package: aespipe Version: 2.3d-2 Severity: serious Justification: required dependences must be listed aespipe with a Standard system emits warnings that uuencode is missing (line 84) sharutils supplies uuencode. I'm

Bug#542695: cannot use crypto loop aes

2009-08-20 Thread Max Vozeler
severity 542695 important thanks Hello, On Thu, Aug 20, 2009 at 10:14:46PM +0200, J.M.Roth wrote: # aptitude install loop-aes-modules-2.6.26-2-686 # modprobe loop-aes # lsmod | grep loop loop 55372 0 # dmesg | tail -3 [ 4457.015307] loop: module loaded [ 4521.947610]

Bug#541115: busybox: No longer creates tty[1-4] devices on s390

2009-08-15 Thread Max Vozeler
On Tue, Aug 11, 2009 at 09:56:43PM +0200, Frans Pop wrote: It looks like busybox also causes a failure on i386. If I boot a daily mini.iso, the boot hangs when executing the last line from /sbin/init: exec /usr/sbin/chroot . /bin/busybox init /dev/console /dev/console 21 I'm seeing this

Bug#539228: partman freezes with encrypted partitions

2009-07-29 Thread Max Vozeler
severity 539228 important thanks Hello, On Thu, Jul 30, 2009 at 12:43:04AM +0200, da jedall wrote: When i try to install debian squeeze on usb key (netinstall) and when i try to create installation over encrypted fs in partman,partman reload and freeze at 52% of loading. The installation is

Bug#515249: installation-reports: Various issues on IBM Power5 (lvm, multipath, yaboot.conf)

2009-07-19 Thread Max Vozeler
severity 515249 normal clone 515249 -1 retitle -1 manual: Mention console=hvc0 for ppc? reassign -1 installation-guide thanks On Sun, Feb 15, 2009 at 10:49:36AM +, Paul McEnery wrote: Comments/Problems: Initial boot: Maybe not soe much an error, I had to specify the console

Bug#520285: netcfg fails to configure dhcp, segfault in libresolv

2009-07-18 Thread Max Vozeler
unarchive 517231 reassign 520285 debian-installer forcemerge 517231 520285 archive 517231 thanks This bug was another instance of the problem described in #517231 and should no longer occur in current images. Thanks for your bug report. Max -- To UNSUBSCRIBE, email to

Bug#521672: FTBFS with linux-image 2.6.29

2009-03-29 Thread Max Vozeler
reassign linux-2.6 2.6.29-1 merge 521472 521672 thanks Hi Dmitry, On Sun, Mar 29, 2009 at 02:45:05PM +0400, Dmitry E. Oboukhov wrote: Usually I use the command like as module-assistant -l 2.6.29-1-686 a-i loop-aes-source but with 2.6.29 (sid) kernel build has failed. This is caused by

Bug#521672: FTBFS with linux-image 2.6.29

2009-03-29 Thread Max Vozeler
Hi Dmitry, On Sun, Mar 29, 2009 at 01:41:47PM +0200, Max Vozeler wrote: On Sun, Mar 29, 2009 at 02:45:05PM +0400, Dmitry E. Oboukhov wrote: Usually I use the command like as module-assistant -l 2.6.29-1-686 a-i loop-aes-source but with 2.6.29 (sid) kernel build has failed

Bug#495682: loop-aes-utils: Diverts essential binaries without implementing some trivial and useful option

2008-08-19 Thread Max Vozeler
Hi Cyril, On Tue, Aug 19, 2008 at 06:32:54PM +0200, Cyril Brulebois wrote: diverting losetup without implementing losetup -f looks quite a serious bug to me. I won't disagree. -f is rather recent and hasn't been picked up by the loop-AES fork so far. Let me check how it can be enabled, and

Bug#495682: [PATCH] loop-AES losetup: Add option -f

2008-08-19 Thread Max Vozeler
Hi Jari, some of our users [in Debian] are starting to expect new options that have been added to losetup in util-linux-ng to work with the loop-AES version of losetup as well. This is starting to cause other packages and scripts to break when users use loop-AES patched losetup. In particular,

Bug#470941: loop-aes-utils: breaks nfs mounts (and thus automount etc.)

2008-03-14 Thread Max Vozeler
tags 470941 + unreproducible thanks Hello Marc, On Fri, Mar 14, 2008 at 06:27:02PM +0100, Marc Lehmann wrote: after installing loop-aes-utils, automount failed to be able to mount nfs volumes, and indeed, mount no longer is able to do nfs mounts: # mount 10.0.0.5:/ /mnt mount: wrong

Bug#470941: loop-aes-utils: breaks nfs mounts (and thus automount etc.)

2008-03-14 Thread Max Vozeler
tags 470941 - unreproducible tags 470941 + confirmed pending thanks On Fri, Mar 14, 2008 at 11:41:11PM +0100, Marc Lehmann wrote: Just guessing as to what the problem could be - If the mount package is an old version that predates the switch to using mount.nfs, it could be that the new

Bug#468137: loop-aes: New version must enter testing together with linux-modules-extra-2.6

2008-02-27 Thread Max Vozeler
Package: loop-aes Version: 3.2b-4 Severity: serious The loop-aes-modules-* binary module packages are no longer built from loop-aes = 3.2b-4. They have been taken over by linux-modules-extra-2.6 starting from version 2.6.24-1. This is a dummy RC bug to make sure the newer loop-aes doesn't

Bug#400055: loop-aes-modules: FTBFS: build-dep on removed package loop-aes-source

2006-11-24 Thread Max Vozeler
tags 400055 + confirmed pending thanks On Thu, Nov 23, 2006 at 06:09:24PM +0100, Lucas Nussbaum wrote: During a rebuild of all packages in etch, I discovered that your package failed to build on i386. Your package depends on loop-aes-source (= 3.1d-3), but this package was removed from

Bug#394457: System left without /bin/mount after upgrade

2006-10-21 Thread Max Vozeler
Hi Rafał, On Sat, Oct 21, 2006 at 06:01:07AM +0200, [EMAIL PROTECTED] wrote: Also, right after doing apt-get upgrade which upgraded the loop-aes-utils probably (among other tools), the systeam was left without ANY mount at all! there was no file /bin/mount, only file /bin/moun.orig which I

Bug#394457: System left without /bin/mount after upgrade

2006-10-21 Thread Max Vozeler
Hi Rafał, On Sat, Oct 21, 2006 at 05:13:44PM +0200, [EMAIL PROTECTED] wrote: Max Vozeler wrote: Can you please send /var/log/dpkg.log (ideally as bzip2) and tell me roughly at which date you did this upgrade? Perhaps you can determine the relevant entries from dpkg.log

Bug#390554: loop-aes - FTBFS: /usr/src/linux-headers-2.6.17-2-s390-tape: No such file or directory. Stop.

2006-10-01 Thread Max Vozeler
tags 390554 + pending thanks On Sun, Oct 01, 2006 at 09:21:13PM +0200, Bastian Blank wrote: /usr/bin/make -C /usr/src/linux-headers-2.6.17-2-s390-tape M=/build/buildd/loop-aes-3.1d/debian/build/build_s390_none_s390-tape make: Entering an unknown directory make: ***

Bug#389456: p-a-c: Fails to configure encrypted volumes

2006-09-26 Thread Max Vozeler
Hey again, On Tue, Sep 26, 2006 at 06:37:59PM +0200, David Härdeman wrote: This leaves libpopt0 and cdebconf-newt-entropy I've committed a preliminary test for the presence of those two libs to crypto_check_required_tools. case $1 in dm-crypt) -

Bug#389456: p-a-c: Fails to configure encrypted volumes

2006-09-26 Thread Max Vozeler
Hey David, Thanks for adding the checks. On Tue, Sep 26, 2006 at 06:37:59PM +0200, David Härdeman wrote: This leaves libpopt0 and cdebconf-newt-entropy cdebconf-newt-entropy is already taken care of through db_capb; blockdev-keygen will return an error dialog if it needs but cannot find the

Bug#389456: p-a-c: Fails to configure encrypted volumes

2006-09-25 Thread Max Vozeler
On Mon, Sep 25, 2006 at 09:53:31PM +0200, Frans Pop wrote: /var/log/syslog shows: kernel: device-mapper: crypt: Error allocating crypto tfm kernel: device-mapper: error adding target to table kernel: device-mapper: device doesn't appear to be in the dev hash table. partman-crypto: Command

Bug#354204: loop-aes-source: FTBFS: Cannot find debian/patches

2006-02-25 Thread Max Vozeler
tags 354204 + confirmed pending thanks On Fri, Feb 24, 2006 at 10:25:12AM +0100, Daniel Schepler wrote: Package: loop-aes-source Version: 3.1c-2 Severity: serious From my pbuilder build log: ... dh_installdocs dh_install cp: cannot stat `./debian/patches': No such file or directory

Bug#344418: CVE reference

2006-01-10 Thread Max Vozeler
This is CVE-2005-4532. BTW, did you have a chance to look at this bug yet? I'm considering to do an NMU for unstable, but I'd prefer if someone who actively uses scponly and who could test the changes would do the upload. cheers, Max -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a

Bug#344418: updated patch for scponly chroot bug

2006-01-02 Thread Max Vozeler
The chroot-fix in 4.2 had a bug that refused to chroot although directory permissions were OK. This bug was also present in the previously attached patch. Attached is a fixed version. cheers, Max diff -ur scponly-4.0/scponly.c scponly-4.0-chrootfix/scponly.c --- scponly-4.0/scponly.c

Bug#344418: scponlyc: local privilege escalation in versions 4.2

2005-12-22 Thread Max Vozeler
Package: scponly Version: 4.1-1 Severity: critical Hey Thomas, scponly 4.2 has been released with a fix for the privilege escalation we've mailed about. http://lists.ccs.neu.edu/pipermail/scponly/2005-December/001027.html: ... Problem Description: If ALL the following conditions are true,

Bug#344418: scponlyc - chroot considered harmful

2005-12-22 Thread Max Vozeler
found 344418 4.0-1 tags 344418 + patch thanks The attached patch is extracted from 4.2 and should apply to 4.0-1 in stable. I've verified that it builds and fixes the bug. Note that there is a small change in behaviour that could break existing (but unsafe) setups. If the home directory is not

Bug#344418: scponlyc: local privilege escalation in versions 4.2

2005-12-22 Thread Max Vozeler
On Thu, Dec 22, 2005 at 04:56:55PM +0100, Max Vozeler wrote: http://lists.ccs.neu.edu/pipermail/scponly/2005-December/001027.html This should read http_s_ https://lists.ccs.neu.edu/pipermail/scponly/2005-December/001027.html cheers, Max -- To UNSUBSCRIBE, email to [EMAIL PROTECTED

Bug#344424: rssh: local privilege escalation in versions 2.3.0 (CVE-2005-3345)

2005-12-22 Thread Max Vozeler
today! Important Security Notice: Max Vozeler has reported a problem whereby rssh can allow users who have shell access to systems where rssh is installed (and rssh_chroot_helper is installed SUID) to gain root access to the system, due to the ability to chroot to arbitrary locations

Bug#343048: linux-image-2.6.14-2-686: fails to boot

2005-12-15 Thread Max Vozeler
On Tue, Dec 13, 2005 at 10:54:34AM +1030, Arthur Marsh wrote: Package: linux-image-2.6.14-2-686 Version: 2.6.14-5 Followup-For: Bug #343048 Same thing happens here. I also had problems trying to install loop-aes at the same time as upgrading from 2.6.14-4 to 2.6.14-5. The installation went

Bug#328141: CAN-2005-2876

2005-09-16 Thread Max Vozeler
This bug has been assigned CAN-2005-2876 cheers, Max -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]

Bug#328626: Sarge update for loop-aes-utils (CAN-2005-2876)

2005-09-16 Thread Max Vozeler
MESSAGE- Hash: SHA1 Format: 1.7 Date: Fri, 16 Sep 2005 15:12:02 +0200 Source: loop-aes-utils Binary: loop-aes-utils Architecture: source i386 Version: 2.12p-4sarge1 Distribution: stable-security Urgency: high Maintainer: [EMAIL PROTECTED] Changed-By: Max Vozeler [EMAIL PROTECTED] Description

Bug#328141: mount: umount -r drops nosuid flag

2005-09-13 Thread Max Vozeler
tags 328141 +patch thanks On Wed, Sep 14, 2005 at 06:22:00AM +1000, Paul Szabo wrote: [ .. umount -r drops flags ] http://www.securityfocus.com/archive/1/410333 The attached patch is extracted from 2.12r-pre1, it simply disallows user r/o remounts. cheers, Max ---

Bug#325135: maildrop: lockmail doesn't drop privileges

2005-08-26 Thread Max Vozeler
Package: maildrop Version: 1.5.3-1.1 Severity: critical Justification: local privilege escalation Tags: security sarge sid patch Hi Josip, I've already tried to contact you about this, but have not heard from you. I'm filing it now to keep track. Please refer to message [EMAIL PROTECTED] for

Bug#319758: pstotext: arbitrary postscript code execution

2005-07-24 Thread Max Vozeler
Package: pstotext Version: 1.9-1 Severity: grave Justification: remote code execution Tags: security woody sarge etch sid patch Hi Ray, we've already talked about this, I'm just filing it to keep track. Please refer to message [EMAIL PROTECTED] (sent to maintainer and security team) for all