Bug#485789: initramfs-tools: With crypted LVM, tries to start LVM before decryption
On Wed, June 11, 2008 15:26, Martin Michlmayr wrote: Adding Max Vozeler and David Härdeman to the CC. * Didier Raboud [EMAIL PROTECTED] [2008-06-11 15:06]: ... I installed LennyBeta2 (under Qemu) with the graphical installer and chose crypted LVM. The thing is that on boot, the initramfs firstly tries to open (initiate ?) the LVM before it actually has access to it (because it is encrypted). It results in an error (attached) which could be avoided if the encrypted partition is opened before the LVM is initiated. It's intentional (although not very aesthetic). The cryptsetup initramfs scripts allows all other disk-related scripts to run first since you could have an encrypted LVM volume as well as LVM on an encrypted volume. After setting up the encrypted volume, the cryptsetup initramfs scripts will then perform the LVM/EVMS/etc setup when necessary. So the process is more like this: 1) LVM/EVMS/md/etc 2) cryptsetup 3) LVM/EVMS/md/etc -- David Härdeman -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Processed: tagging 485873
Processing commands for [EMAIL PROTECTED]: # Automatically generated email from bts, devscripts version 2.9.26 tags 485873 + pending Bug#485873: linux-image-2.6.25-2-686: fails to suspend to ram (hangs when Suspending console(s)) There were no tags set. Tags added: pending End of message, stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#485873: linux-image-2.6.25-2-686: fails to suspend to ram (hangs when Suspending console(s))
On Thu, Jun 12, 2008 at 03:20:37AM +0200, maximilian attems wrote: the screen becomes black, then displays 3 lines, the last one being: Suspending console(s) It hangs at this point. echo mem /sys/power/state #check Doesn't change anything. checkout latest trunk see wiki.d.o/DebianKernel 2.6.25-rc5 Fixes the problem. Thanks. -- Gabriel -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#474648: please re-enable CONFIG_SECCOMP, it's harmless (and needed)
block 477674 by 474648 thanks On Mon, Apr 07, 2008, maximilian attems wrote: unless something substantial comes up that bug can be close right away. Wow, thanks for listening to the users. if it had users we already would have been notified. By the way, our first research paper using results computed using CPUShare will be presented at the International Conference on Image and Signal Processing 2008 (and published by Springer-Verlag in the ICISP proceedings as LNCS 5099-0038). We could not credit Debian. Cheers, -- Sam -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#410807: Fixed in which debian package?
Hi all, I still have the behaviour described above. In which debian kernel package is/will that bug be fixed? Thanks for a status. Marco -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Re: gcc 4.3
Hi! On Tue, Jun 10, 2008 at 09:01:59AM +0200, Bastian Blank wrote: On Mon, Jun 09, 2008 at 11:51:28PM +0200, maximilian attems wrote: planing to switch x86 to it for 2.6.26. compiles, boots and works fine here. NACK. Too late. I'd like to see this for amd64 too, but I guess we are indeed too late. Are we really releasing with .26? Best regards Frederik Schüler -- ENOSIG signature.asc Description: Digital signature
Bug#485944: linux-2.6: CVE-2008-1673 problem when validating length values during decoding of ASN.1 BER data
Package: linux-2.6 Version: 2.6.22-6.lenny1 Severity: grave Tags: security patch Hi, the following CVE (Common Vulnerabilities Exposures) id was published for linux-2.6. CVE-2008-1673[0]: | The asn1 implementation in (a) the Linux kernel 2.4 before 2.4.36.6 | and 2.6 before 2.6.25.5, as used in the cifs and ip_nat_snmp_basic | modules; and (b) the gxsnmp package; does not properly validate length | values during decoding of ASN.1 BER data, which allows remote | attackers to cause a denial of service (crash) or execute arbitrary | code via (1) a length greater than the working buffer, which can lead | to an unspecified overflow; (2) an oid length of zero, which can lead | to an off-by-one error; or (3) an indefinite length for a primitive | encoding. Patches are linked from the mitre site but I guess you will update to 2.6.25.5 anyway. If you fix the vulnerability please also make sure to include the CVE id in your changelog entry. For further information see: [0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1673 http://security-tracker.debian.net/tracker/CVE-2008-1673 -- Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF For security reasons, all text in this mail is double-rot13 encrypted. pgpCmvBsH4REq.pgp Description: PGP signature
Processed: retitle 485944 to net-snmp: CVE-2008-0960 spoofing of authenticated SNMPv3 packets because only length of HMAC code is is taken into account for checks
Processing commands for [EMAIL PROTECTED]: # Automatically generated email from bts, devscripts version 2.10.29 retitle 485944 net-snmp: CVE-2008-0960 spoofing of authenticated SNMPv3 packets because only length of HMAC code is is taken into account for checks Bug#485944: linux-2.6: CVE-2008-1673 problem when validating length values during decoding of ASN.1 BER data Changed Bug title to `net-snmp: CVE-2008-0960 spoofing of authenticated SNMPv3 packets because only length of HMAC code is is taken into account for checks' from `linux-2.6: CVE-2008-1673 problem when validating length values during decoding of ASN.1 BER data'. End of message, stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#485944: marked as done (net-snmp: CVE-2008-0960 spoofing of authenticated SNMPv3 packets because only length of HMAC code is is taken into account for checks)
Your message dated Thu, 12 Jun 2008 16:23:52 +0200 with message-id [EMAIL PROTECTED] and subject line Re: Bug#485944: linux-2.6: CVE-2008-1673 problem when validating length values during decoding of ASN.1 BER data has caused the Debian Bug report #485944, regarding net-snmp: CVE-2008-0960 spoofing of authenticated SNMPv3 packets because only length of HMAC code is is taken into account for checks to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact [EMAIL PROTECTED] immediately.) -- 485944: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=485944 Debian Bug Tracking System Contact [EMAIL PROTECTED] with problems ---BeginMessage--- Package: linux-2.6 Version: 2.6.22-6.lenny1 Severity: grave Tags: security patch Hi, the following CVE (Common Vulnerabilities Exposures) id was published for linux-2.6. CVE-2008-1673[0]: | The asn1 implementation in (a) the Linux kernel 2.4 before 2.4.36.6 | and 2.6 before 2.6.25.5, as used in the cifs and ip_nat_snmp_basic | modules; and (b) the gxsnmp package; does not properly validate length | values during decoding of ASN.1 BER data, which allows remote | attackers to cause a denial of service (crash) or execute arbitrary | code via (1) a length greater than the working buffer, which can lead | to an unspecified overflow; (2) an oid length of zero, which can lead | to an off-by-one error; or (3) an indefinite length for a primitive | encoding. Patches are linked from the mitre site but I guess you will update to 2.6.25.5 anyway. If you fix the vulnerability please also make sure to include the CVE id in your changelog entry. For further information see: [0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1673 http://security-tracker.debian.net/tracker/CVE-2008-1673 -- Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF For security reasons, all text in this mail is double-rot13 encrypted. pgpRoUhTa81rN.pgp Description: PGP signature ---End Message--- ---BeginMessage--- Version: 2.6.25-5 On Thu, Jun 12, 2008 at 03:20:06PM +0200, Nico Golde wrote: CVE-2008-1673[0]: Fixed. Bastian -- In the strict scientific sense we all feed on death -- even vegetarians. -- Spock, Wolf in the Fold, stardate 3615.4 ---End Message---
Bug#464229: Please merge with 480014
This problem appears to be traceable to an old aboot boot image, and has been corrected as described in bug 480014. Please close this report and refer it to that one. Thanks, -Scott -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Processing of linux-2.6_2.6.25-5_s390.changes
linux-2.6_2.6.25-5_s390.changes uploaded successfully to localhost along with the files: linux-2.6_2.6.25-5.dsc linux-2.6_2.6.25-5.diff.gz linux-doc-2.6.25_2.6.25-5_all.deb linux-manual-2.6.25_2.6.25-5_all.deb linux-patch-debian-2.6.25_2.6.25-5_all.deb linux-source-2.6.25_2.6.25-5_all.deb linux-support-2.6.25-2_2.6.25-5_all.deb linux-tree-2.6.25_2.6.25-5_all.deb linux-headers-2.6.25-2-common_2.6.25-5_s390.deb linux-image-2.6.25-2-s390_2.6.25-5_s390.deb linux-headers-2.6.25-2-s390_2.6.25-5_s390.deb linux-image-2.6.25-2-s390-tape_2.6.25-5_s390.deb linux-image-2.6.25-2-s390x_2.6.25-5_s390.deb linux-headers-2.6.25-2-s390x_2.6.25-5_s390.deb linux-headers-2.6.25-2-all_2.6.25-5_s390.deb linux-headers-2.6.25-2-all-s390_2.6.25-5_s390.deb linux-libc-dev_2.6.25-5_s390.deb Greetings, Your Debian queue daemon -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Processed: retitle 485944 to linux-2.6: CVE-2008-1673 problem when validating length values during decoding of ASN.1 BER data
Processing commands for [EMAIL PROTECTED]: # Automatically generated email from bts, devscripts version 2.10.29 # args retitled wrong bug retitle 485944 linux-2.6: CVE-2008-1673 problem when validating length values during decoding of ASN.1 BER data Bug#485944: net-snmp: CVE-2008-0960 spoofing of authenticated SNMPv3 packets because only length of HMAC code is is taken into account for checks Changed Bug title to `linux-2.6: CVE-2008-1673 problem when validating length values during decoding of ASN.1 BER data' from `net-snmp: CVE-2008-0960 spoofing of authenticated SNMPv3 packets because only length of HMAC code is is taken into account for checks'. (By the way, that Bug is currently marked as done.) End of message, stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
linux-2.6_2.6.25-5_s390.changes ACCEPTED
Accepted: linux-2.6_2.6.25-5.diff.gz to pool/main/l/linux-2.6/linux-2.6_2.6.25-5.diff.gz linux-2.6_2.6.25-5.dsc to pool/main/l/linux-2.6/linux-2.6_2.6.25-5.dsc linux-doc-2.6.25_2.6.25-5_all.deb to pool/main/l/linux-2.6/linux-doc-2.6.25_2.6.25-5_all.deb linux-headers-2.6.25-2-all-s390_2.6.25-5_s390.deb to pool/main/l/linux-2.6/linux-headers-2.6.25-2-all-s390_2.6.25-5_s390.deb linux-headers-2.6.25-2-all_2.6.25-5_s390.deb to pool/main/l/linux-2.6/linux-headers-2.6.25-2-all_2.6.25-5_s390.deb linux-headers-2.6.25-2-common_2.6.25-5_s390.deb to pool/main/l/linux-2.6/linux-headers-2.6.25-2-common_2.6.25-5_s390.deb linux-headers-2.6.25-2-s390_2.6.25-5_s390.deb to pool/main/l/linux-2.6/linux-headers-2.6.25-2-s390_2.6.25-5_s390.deb linux-headers-2.6.25-2-s390x_2.6.25-5_s390.deb to pool/main/l/linux-2.6/linux-headers-2.6.25-2-s390x_2.6.25-5_s390.deb linux-image-2.6.25-2-s390-tape_2.6.25-5_s390.deb to pool/main/l/linux-2.6/linux-image-2.6.25-2-s390-tape_2.6.25-5_s390.deb linux-image-2.6.25-2-s390_2.6.25-5_s390.deb to pool/main/l/linux-2.6/linux-image-2.6.25-2-s390_2.6.25-5_s390.deb linux-image-2.6.25-2-s390x_2.6.25-5_s390.deb to pool/main/l/linux-2.6/linux-image-2.6.25-2-s390x_2.6.25-5_s390.deb linux-libc-dev_2.6.25-5_s390.deb to pool/main/l/linux-2.6/linux-libc-dev_2.6.25-5_s390.deb linux-manual-2.6.25_2.6.25-5_all.deb to pool/main/l/linux-2.6/linux-manual-2.6.25_2.6.25-5_all.deb linux-patch-debian-2.6.25_2.6.25-5_all.deb to pool/main/l/linux-2.6/linux-patch-debian-2.6.25_2.6.25-5_all.deb linux-source-2.6.25_2.6.25-5_all.deb to pool/main/l/linux-2.6/linux-source-2.6.25_2.6.25-5_all.deb linux-support-2.6.25-2_2.6.25-5_all.deb to pool/main/l/linux-2.6/linux-support-2.6.25-2_2.6.25-5_all.deb linux-tree-2.6.25_2.6.25-5_all.deb to pool/main/l/linux-2.6/linux-tree-2.6.25_2.6.25-5_all.deb Override entries for your package: linux-2.6_2.6.25-5.dsc - source devel linux-doc-2.6.25_2.6.25-5_all.deb - optional doc linux-headers-2.6.25-2-all-s390_2.6.25-5_s390.deb - optional devel linux-headers-2.6.25-2-all_2.6.25-5_s390.deb - optional devel linux-headers-2.6.25-2-common_2.6.25-5_s390.deb - optional devel linux-headers-2.6.25-2-s390_2.6.25-5_s390.deb - optional devel linux-headers-2.6.25-2-s390x_2.6.25-5_s390.deb - optional devel linux-image-2.6.25-2-s390-tape_2.6.25-5_s390.deb - optional admin linux-image-2.6.25-2-s390_2.6.25-5_s390.deb - optional admin linux-image-2.6.25-2-s390x_2.6.25-5_s390.deb - optional admin linux-libc-dev_2.6.25-5_s390.deb - optional devel linux-manual-2.6.25_2.6.25-5_all.deb - optional doc linux-patch-debian-2.6.25_2.6.25-5_all.deb - optional devel linux-source-2.6.25_2.6.25-5_all.deb - optional devel linux-support-2.6.25-2_2.6.25-5_all.deb - optional devel linux-tree-2.6.25_2.6.25-5_all.deb - optional devel Announcing to [EMAIL PROTECTED] Thank you for your contribution to Debian. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#485944: retitle 485944 to linux-2.6: CVE-2008-1673 problem when validating length values during decoding of ASN.1 BER data
# Automatically generated email from bts, devscripts version 2.10.29 # args retitled wrong bug retitle 485944 linux-2.6: CVE-2008-1673 problem when validating length values during decoding of ASN.1 BER data -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Re: [kernel] r11620 - in dists/trunk/linux-2.6/debian: . config/m68k
On Thu, Jun 12, 2008 at 01:32:48PM +, Christian T. Steigies wrote: Modified: dists/trunk/linux-2.6/debian/changelog == --- dists/trunk/linux-2.6/debian/changelog(original) +++ dists/trunk/linux-2.6/debian/changelogThu Jun 12 13:32:47 2008 @@ -65,7 +65,10 @@ support. * [s390] Enable support for PCI-attached cryptographic adapters. - -- maximilian attems [EMAIL PROTECTED] Sat, 26 Apr 2008 23:11:17 +0200 + [ Christian T. Steigies ] + * [m68k] enable SERIAL_CONSOLE for amiga and atari + + -- Christian T. Steigies [EMAIL PROTECTED] Thu, 12 Jun 2008 15:31:54 +0200 No. Use dch (with DEBCHANGE_RELEASE_HEURISTIC=changelog) if you are not able to read. Bastian -- Humans do claim a great deal for that particular emotion (love). -- Spock, The Lights of Zetar, stardate 5725.6 -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Re: [kernel] r11620 - in dists/trunk/linux-2.6/debian: . config/m68k
On Thu, Jun 12, 2008 at 06:23:14PM +0200, Bastian Blank wrote: On Thu, Jun 12, 2008 at 01:32:48PM +, Christian T. Steigies wrote: Modified: dists/trunk/linux-2.6/debian/changelog == --- dists/trunk/linux-2.6/debian/changelog (original) +++ dists/trunk/linux-2.6/debian/changelog Thu Jun 12 13:32:47 2008 @@ -65,7 +65,10 @@ support. * [s390] Enable support for PCI-attached cryptographic adapters. - -- maximilian attems [EMAIL PROTECTED] Sat, 26 Apr 2008 23:11:17 +0200 + [ Christian T. Steigies ] + * [m68k] enable SERIAL_CONSOLE for amiga and atari + + -- Christian T. Steigies [EMAIL PROTECTED] Thu, 12 Jun 2008 15:31:54 +0200 No. Use dch (with DEBCHANGE_RELEASE_HEURISTIC=changelog) if you are not able to read. If Christian is truly illiterate, I think he may have trouble with your suggestion - maybe you want to give him a call? :) Probably safer to assume it was just an accidental typo. -- dann frazier -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Re: [kernel] r11620 - in dists/trunk/linux-2.6/debian: . config/m68k
On Thu, Jun 12, 2008 at 10:33:23AM -0600, dann frazier wrote: On Thu, Jun 12, 2008 at 06:23:14PM +0200, Bastian Blank wrote: On Thu, Jun 12, 2008 at 01:32:48PM +, Christian T. Steigies wrote: Modified: dists/trunk/linux-2.6/debian/changelog == --- dists/trunk/linux-2.6/debian/changelog(original) +++ dists/trunk/linux-2.6/debian/changelogThu Jun 12 13:32:47 2008 @@ -65,7 +65,10 @@ support. * [s390] Enable support for PCI-attached cryptographic adapters. - -- maximilian attems [EMAIL PROTECTED] Sat, 26 Apr 2008 23:11:17 +0200 + [ Christian T. Steigies ] + * [m68k] enable SERIAL_CONSOLE for amiga and atari + + -- Christian T. Steigies [EMAIL PROTECTED] Thu, 12 Jun 2008 15:31:54 +0200 No. Use dch (with DEBCHANGE_RELEASE_HEURISTIC=changelog) if you are not able to read. If Christian is truly illiterate, I think he may have trouble with your suggestion - maybe you want to give him a call? :) Probably safer to assume it was just an accidental typo. I did use dch, but what is DEBCHANGE_RELEASE_HEURISTIC? And what is wrong? I forgot the dot at the end of the sentence? I did not start the sentence with a capital letter? Sorry, I don't get it. Christian -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Re: [kernel] r11620 - in dists/trunk/linux-2.6/debian: . config/m68k
On Thu, Jun 12, 2008 at 07:00:20PM +0200, Christian T. Steigies wrote: On Thu, Jun 12, 2008 at 10:33:23AM -0600, dann frazier wrote: On Thu, Jun 12, 2008 at 06:23:14PM +0200, Bastian Blank wrote: On Thu, Jun 12, 2008 at 01:32:48PM +, Christian T. Steigies wrote: Modified: dists/trunk/linux-2.6/debian/changelog == --- dists/trunk/linux-2.6/debian/changelog (original) +++ dists/trunk/linux-2.6/debian/changelog Thu Jun 12 13:32:47 2008 @@ -65,7 +65,10 @@ support. * [s390] Enable support for PCI-attached cryptographic adapters. - -- maximilian attems [EMAIL PROTECTED] Sat, 26 Apr 2008 23:11:17 +0200 + [ Christian T. Steigies ] + * [m68k] enable SERIAL_CONSOLE for amiga and atari + + -- Christian T. Steigies [EMAIL PROTECTED] Thu, 12 Jun 2008 15:31:54 +0200 No. Use dch (with DEBCHANGE_RELEASE_HEURISTIC=changelog) if you are not able to read. If Christian is truly illiterate, I think he may have trouble with your suggestion - maybe you want to give him a call? :) Probably safer to assume it was just an accidental typo. I did use dch, but what is DEBCHANGE_RELEASE_HEURISTIC? And what is wrong? I forgot the dot at the end of the sentence? I did not start the sentence with a capital letter? Sorry, I don't get it. I don't really either - I'd assumed you'd added a new changelog entry to a changelog for an already-released version. But, it looks like this changelog was still tagged UNRELEASED. Maybe Bastian thought you'd committed to 2.6.25-5 after he'd released it? Just a guess. -- dann frazier -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#484779: linux-image-2.6.25-2-amd64: enable access to acpi battery/ac info via (deprecated) /proc files
One of the things this missing options breaks is the KDE Laptop Battery control center module. It had stopped working for me after a kernel upgrade. I rebuilt the kernel package with the option on, and confirmed that this was the problem. -- Brian Knotts [EMAIL PROTECTED] -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#480663: marked as done (smbfs: mount.cifs does not work with -o sec=krb)
Your message dated Thu, 12 Jun 2008 19:02:08 + with message-id [EMAIL PROTECTED] and subject line Bug#480663: fixed in samba 2:3.2.0~rc2-1 has caused the Debian Bug report #480663, regarding smbfs: mount.cifs does not work with -o sec=krb to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact [EMAIL PROTECTED] immediately.) -- 480663: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=480663 Debian Bug Tracking System Contact [EMAIL PROTECTED] with problems ---BeginMessage--- Package: smbfs Version: 1:3.0.28a-2 Severity: normal *** Please type your report below this line *** When I try to mount a share on a Samba-Server via mount.cifs //server/share mountpoint -o sec=krb5, mount.cifs ask for a password (which is not needed with kerberos) and fails with the following error-message: mount error 5 = Input/output error Refer to the mount.cifs(8) manual page (e.g.man mount.cifs) dmesg says: CIFS VFS: cifs_mount failed w/return code = -5 -- System Information: Debian Release: lenny/sid APT prefers testing APT policy: (500, 'testing') Architecture: i386 (i686) Kernel: Linux 2.6.24-1-686 (SMP w/2 CPU cores) Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/bash Versions of packages smbfs depends on: ii libc62.7-10 GNU C Library: Shared libraries ii netbase 4.32Basic TCP/IP networking system ii samba-common 1:3.0.28a-2 Samba common files used by both th smbfs recommends no packages. -- no debconf information signature.asc Description: Digital signature ---End Message--- ---BeginMessage--- Source: samba Source-Version: 2:3.2.0~rc2-1 We believe that the bug you reported is fixed in the latest version of samba, which is due to be installed in the Debian FTP archive: libpam-smbpass_3.2.0~rc2-1_i386.deb to pool/main/s/samba/libpam-smbpass_3.2.0~rc2-1_i386.deb libsmbclient-dev_3.2.0~rc2-1_i386.deb to pool/main/s/samba/libsmbclient-dev_3.2.0~rc2-1_i386.deb libsmbclient_3.2.0~rc2-1_i386.deb to pool/main/s/samba/libsmbclient_3.2.0~rc2-1_i386.deb libwbclient0_3.2.0~rc2-1_i386.deb to pool/main/s/samba/libwbclient0_3.2.0~rc2-1_i386.deb samba-common_3.2.0~rc2-1_i386.deb to pool/main/s/samba/samba-common_3.2.0~rc2-1_i386.deb samba-dbg_3.2.0~rc2-1_i386.deb to pool/main/s/samba/samba-dbg_3.2.0~rc2-1_i386.deb samba-doc-pdf_3.2.0~rc2-1_all.deb to pool/main/s/samba/samba-doc-pdf_3.2.0~rc2-1_all.deb samba-doc_3.2.0~rc2-1_all.deb to pool/main/s/samba/samba-doc_3.2.0~rc2-1_all.deb samba_3.2.0~rc2-1.diff.gz to pool/main/s/samba/samba_3.2.0~rc2-1.diff.gz samba_3.2.0~rc2-1.dsc to pool/main/s/samba/samba_3.2.0~rc2-1.dsc samba_3.2.0~rc2-1_i386.deb to pool/main/s/samba/samba_3.2.0~rc2-1_i386.deb samba_3.2.0~rc2.orig.tar.gz to pool/main/s/samba/samba_3.2.0~rc2.orig.tar.gz smbclient_3.2.0~rc2-1_i386.deb to pool/main/s/samba/smbclient_3.2.0~rc2-1_i386.deb smbfs_3.2.0~rc2-1_i386.deb to pool/main/s/samba/smbfs_3.2.0~rc2-1_i386.deb swat_3.2.0~rc2-1_i386.deb to pool/main/s/samba/swat_3.2.0~rc2-1_i386.deb winbind_3.2.0~rc2-1_i386.deb to pool/main/s/samba/winbind_3.2.0~rc2-1_i386.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Christian Perrier [EMAIL PROTECTED] (supplier of updated samba package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Thu, 12 Jun 2008 17:17:38 +0200 Source: samba Binary: samba samba-common smbclient swat samba-doc samba-doc-pdf smbfs libpam-smbpass libsmbclient libsmbclient-dev winbind samba-dbg libwbclient0 Architecture: source all i386 Version: 2:3.2.0~rc2-1 Distribution: experimental Urgency: low Maintainer: Debian Samba Maintainers [EMAIL PROTECTED] Changed-By: Christian Perrier [EMAIL PROTECTED] Description: libpam-smbpass - pluggable authentication module for SMB/CIFS password database libsmbclient - shared library that allows applications to talk to SMB/CIFS serve libsmbclient-dev - libsmbclient static libraries and headers libwbclient0 - client library for interfacing with winbind service samba - a LanManager-like file and printer server for Unix samba-common - Samba common files used by both the server and the client samba-dbg -
Bug#407112: kernel: network and system crashes.
Version: 2.6.18-6 # cat /proc/sys/kernel/version #1 SMP Fri Jun 6 22:22:11 UTC 2008 Bug present, relevant syslog: [..] Jun 11 07:31:08 hera kernel: NETDEV WATCHDOG: eth1: transmit timed out Jun 11 07:31:08 hera kernel: sky2 eth1: tx timeout Jun 11 07:31:08 hera kernel: sky2 eth1: transmit ring 205 .. 182 report=205 done =205 Jun 11 07:31:08 hera kernel: sky2 hardware hung? flushing [..] after that system freezes. With 2.6.24-1 from backports system freezes without any message in logs and console! the node is an intel server sr1435vp2 additional info: # cat /proc/cpuinfo processor : 0 vendor_id : GenuineIntel cpu family : 15 model : 4 model name : Intel(R) Xeon(TM) CPU 2.80GHz stepping: 3 cpu MHz : 2793.334 cache size : 2048 KB physical id : 0 siblings: 2 core id : 0 cpu cores : 1 fdiv_bug: no hlt_bug : no f00f_bug: no coma_bug: no fpu : yes fpu_exception : yes cpuid level : 5 wp : yes flags : fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat pse36 clflush dts acpi mmx fxsr sse sse2 ss ht tm pbe lm constant_tsc pni monitor ds_cpl cid cx16 xtpr bogomips: 5590.47 processor : 1 vendor_id : GenuineIntel cpu family : 15 model : 4 model name : Intel(R) Xeon(TM) CPU 2.80GHz stepping: 3 cpu MHz : 2793.334 cache size : 2048 KB physical id : 0 siblings: 2 core id : 0 cpu cores : 1 fdiv_bug: no hlt_bug : no f00f_bug: no coma_bug: no fpu : yes fpu_exception : yes cpuid level : 5 wp : yes flags : fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat pse36 clflush dts acpi mmx fxsr sse sse2 ss ht tm pbe lm constant_tsc pni monitor ds_cpl cid cx16 xtpr bogomips: 5586.39 processor : 2 vendor_id : GenuineIntel cpu family : 15 model : 4 model name : Intel(R) Xeon(TM) CPU 2.80GHz stepping: 3 cpu MHz : 2793.334 cache size : 2048 KB physical id : 3 siblings: 2 core id : 0 cpu cores : 1 fdiv_bug: no hlt_bug : no f00f_bug: no coma_bug: no fpu : yes fpu_exception : yes cpuid level : 5 wp : yes flags : fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat pse36 clflush dts acpi mmx fxsr sse sse2 ss ht tm pbe lm constant_tsc pni monitor ds_cpl cid cx16 xtpr bogomips: 5586.49 processor : 3 vendor_id : GenuineIntel cpu family : 15 model : 4 model name : Intel(R) Xeon(TM) CPU 2.80GHz stepping: 3 cpu MHz : 2793.334 cache size : 2048 KB physical id : 3 siblings: 2 core id : 0 cpu cores : 1 fdiv_bug: no hlt_bug : no f00f_bug: no coma_bug: no fpu : yes fpu_exception : yes cpuid level : 5 wp : yes flags : fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat pse36 clflush dts acpi mmx fxsr sse sse2 ss ht tm pbe lm constant_tsc pni monitor ds_cpl cid cx16 xtpr bogomips: 5586.52 # lspci 00:00.0 Host bridge: Intel Corporation E7320 Memory Controller Hub (rev 0c) 00:00.1 Class ff00: Intel Corporation E7320 Error Reporting Registers (rev 0c) 00:02.0 PCI bridge: Intel Corporation E7525/E7520/E7320 PCI Express Port A (rev 0c) 00:03.0 PCI bridge: Intel Corporation E7525/E7520/E7320 PCI Express Port A1 (rev 0c) 00:1c.0 PCI bridge: Intel Corporation 6300ESB 64-bit PCI-X Bridge (rev 02) 00:1d.0 USB Controller: Intel Corporation 6300ESB USB Universal Host Controller (rev 02) 00:1d.1 USB Controller: Intel Corporation 6300ESB USB Universal Host Controller (rev 02) 00:1d.4 System peripheral: Intel Corporation 6300ESB Watchdog Timer (rev 02) 00:1d.5 PIC: Intel Corporation 6300ESB I/O Advanced Programmable Interrupt Controller (rev 02) 00:1d.7 USB Controller: Intel Corporation 6300ESB USB2 Enhanced Host Controller (rev 02) 00:1e.0 PCI bridge: Intel Corporation 82801 PCI Bridge (rev 0a) 00:1f.0 ISA bridge: Intel Corporation 6300ESB LPC Interface Controller (rev 02) 00:1f.1 IDE interface: Intel Corporation 6300ESB PATA Storage Controller (rev 02) 00:1f.2 IDE interface: Intel Corporation 6300ESB SATA Storage Controller (rev 02) 00:1f.3 SMBus: Intel Corporation 6300ESB SMBus Controller (rev 02) 02:00.0 Ethernet controller: Marvell Technology Group Ltd. 88E8050 PCI-E ASF Gigabit Ethernet Controller (rev 17) 03:03.0 SCSI storage controller: Adaptec AHA-3960D / AIC-7899A U160/m (rev 01) 03:03.1 SCSI storage controller: Adaptec AHA-3960D / AIC-7899A U160/m (rev 01) 04:02.0 VGA compatible controller: ATI Technologies Inc Rage XL (rev 27) 04:03.0 Ethernet controller: Intel Corporation 82541GI/PI Gigabit Ethernet Controller
Bug#396185: sky2 network driver freezes
Version: 2.6.18-6 # cat /proc/sys/kernel/version #1 SMP Fri Jun 6 22:22:11 UTC 2008 Bug present, relevant syslog: [..] Jun 11 07:31:08 hera kernel: NETDEV WATCHDOG: eth1: transmit timed out Jun 11 07:31:08 hera kernel: sky2 eth1: tx timeout Jun 11 07:31:08 hera kernel: sky2 eth1: transmit ring 205 .. 182 report=205 done =205 Jun 11 07:31:08 hera kernel: sky2 hardware hung? flushing [..] after that system freezes. With 2.6.24-1 from backports system freezes without any message in logs and console! the node is an intel server sr1435vp2 additional info: # cat /proc/cpuinfo processor : 0 vendor_id : GenuineIntel cpu family : 15 model : 4 model name : Intel(R) Xeon(TM) CPU 2.80GHz stepping: 3 cpu MHz : 2793.334 cache size : 2048 KB physical id : 0 siblings: 2 core id : 0 cpu cores : 1 fdiv_bug: no hlt_bug : no f00f_bug: no coma_bug: no fpu : yes fpu_exception : yes cpuid level : 5 wp : yes flags : fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat pse36 clflush dts acpi mmx fxsr sse sse2 ss ht tm pbe lm constant_tsc pni monitor ds_cpl cid cx16 xtpr bogomips: 5590.47 processor : 1 vendor_id : GenuineIntel cpu family : 15 model : 4 model name : Intel(R) Xeon(TM) CPU 2.80GHz stepping: 3 cpu MHz : 2793.334 cache size : 2048 KB physical id : 0 siblings: 2 core id : 0 cpu cores : 1 fdiv_bug: no hlt_bug : no f00f_bug: no coma_bug: no fpu : yes fpu_exception : yes cpuid level : 5 wp : yes flags : fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat pse36 clflush dts acpi mmx fxsr sse sse2 ss ht tm pbe lm constant_tsc pni monitor ds_cpl cid cx16 xtpr bogomips: 5586.39 processor : 2 vendor_id : GenuineIntel cpu family : 15 model : 4 model name : Intel(R) Xeon(TM) CPU 2.80GHz stepping: 3 cpu MHz : 2793.334 cache size : 2048 KB physical id : 3 siblings: 2 core id : 0 cpu cores : 1 fdiv_bug: no hlt_bug : no f00f_bug: no coma_bug: no fpu : yes fpu_exception : yes cpuid level : 5 wp : yes flags : fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat pse36 clflush dts acpi mmx fxsr sse sse2 ss ht tm pbe lm constant_tsc pni monitor ds_cpl cid cx16 xtpr bogomips: 5586.49 processor : 3 vendor_id : GenuineIntel cpu family : 15 model : 4 model name : Intel(R) Xeon(TM) CPU 2.80GHz stepping: 3 cpu MHz : 2793.334 cache size : 2048 KB physical id : 3 siblings: 2 core id : 0 cpu cores : 1 fdiv_bug: no hlt_bug : no f00f_bug: no coma_bug: no fpu : yes fpu_exception : yes cpuid level : 5 wp : yes flags : fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat pse36 clflush dts acpi mmx fxsr sse sse2 ss ht tm pbe lm constant_tsc pni monitor ds_cpl cid cx16 xtpr bogomips: 5586.52 # lspci 00:00.0 Host bridge: Intel Corporation E7320 Memory Controller Hub (rev 0c) 00:00.1 Class ff00: Intel Corporation E7320 Error Reporting Registers (rev 0c) 00:02.0 PCI bridge: Intel Corporation E7525/E7520/E7320 PCI Express Port A (rev 0c) 00:03.0 PCI bridge: Intel Corporation E7525/E7520/E7320 PCI Express Port A1 (rev 0c) 00:1c.0 PCI bridge: Intel Corporation 6300ESB 64-bit PCI-X Bridge (rev 02) 00:1d.0 USB Controller: Intel Corporation 6300ESB USB Universal Host Controller (rev 02) 00:1d.1 USB Controller: Intel Corporation 6300ESB USB Universal Host Controller (rev 02) 00:1d.4 System peripheral: Intel Corporation 6300ESB Watchdog Timer (rev 02) 00:1d.5 PIC: Intel Corporation 6300ESB I/O Advanced Programmable Interrupt Controller (rev 02) 00:1d.7 USB Controller: Intel Corporation 6300ESB USB2 Enhanced Host Controller (rev 02) 00:1e.0 PCI bridge: Intel Corporation 82801 PCI Bridge (rev 0a) 00:1f.0 ISA bridge: Intel Corporation 6300ESB LPC Interface Controller (rev 02) 00:1f.1 IDE interface: Intel Corporation 6300ESB PATA Storage Controller (rev 02) 00:1f.2 IDE interface: Intel Corporation 6300ESB SATA Storage Controller (rev 02) 00:1f.3 SMBus: Intel Corporation 6300ESB SMBus Controller (rev 02) 02:00.0 Ethernet controller: Marvell Technology Group Ltd. 88E8050 PCI-E ASF Gigabit Ethernet Controller (rev 17) 03:03.0 SCSI storage controller: Adaptec AHA-3960D / AIC-7899A U160/m (rev 01) 03:03.1 SCSI storage controller: Adaptec AHA-3960D / AIC-7899A U160/m (rev 01) 04:02.0 VGA compatible controller: ATI Technologies Inc Rage XL (rev 27) 04:03.0 Ethernet controller: Intel Corporation 82541GI/PI Gigabit Ethernet Controller
sata_nv ADMA breaks ATAPI 4Gof RAM (AMD64?) and Which kernel will Lenny likely use when it is released?
Please reply off-list If you try to mount a SATA DVD or CDROM and have more than 4G on a amd64 system: $mount cdrom mount: wrong fs type, bad option, bad superblock on /dev/scd0, missing codepage or helper program, or other error In some cases useful info is found in syslog - try dmesg | tail or so $ tail syslog Jun 12 14:30:17 singapore kernel: UDF-fs: No VRS found But these error messages are a bit misleading - see the links below I would think that they would fix the 2.6.24 4G bug if that is what they will release with, but from what I read that isn't going to happen? Seems like it would be a bad idea to release with a kernel that prevents mounting the CDrom if you have 4G of memory. I can't find this bug listed in debian for linux-image-2.6.24-1-amd64, but I'm not sure that is the right place for it. links: http://lkml.org/lkml/2008/1/11/6 http://linux.derkeiler.com/Mailing-Lists/Kernel/2007-11/msg07780.html http://www.mail-archive.com/[EMAIL PROTECTED]/msg14797.html There is a patch around #55 https://bugzilla.redhat.com/show_bug.cgi?id=351451 I'm thinking of pulling in 2.6.25 from unstable for my machine running lenny, but don't want to create other problems once it goes stable. How can I find the ETA of 2.6.25 entering lenny? (I think some of lenny is already frozen - would that include the linux-image? (it isn't on the frozen list?)). Karl Schmidt EMail [EMAIL PROTECTED] Transtronics, Inc. WEB http://xtronics.com 3209 West 9th StreetPh (785) 841-3089 Lawrence, KS 66049 FAX (785) 841-0434 True wisdom is knowing what we don't know; True maturity is being comfortable with the idea of not knowing. -KPS -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#418757: Debian Etch: Patch: /proc/scsi/aacraid missing
In message [EMAIL PROTECTED], dann frazier writes: On Wed, Jun 11, 2008 at 04:28:49PM +1200, Ewen McNeill wrote: Amongst other things this prevents using the Dell afacli management tool to monitor/manage the RAID arrays, since it checks for /proc/scsi/aacraid and aborts if [/proc/scsi/aacraid] is not found. [Trivial patch, from Dell engineers] Thanks Ewen. The first step in getting it into Debian would be to make sure it gets upstream. Thanks for the prompt response. I've checked the Linux 2.6.24 kernel source (eg, as in Testing now) and it's not present there. I also emailed the two Dell engineers listed on the original patch and they tell me that the subsystem maintainer rejected their patch due to the move away from using procfs for such information (to using sysfs instead). Apparently Dell got their core management tool updated to use the new interface (by the third party supplier), but it looks like the command line management tool I want to use never got updated. I understand your reluctance to carry a special patch in Debian, but I do note that this appears to be a feature regression from Sarge - Etch as Marcin Owsiany noted 14 months ago (since the /proc interface was present in Sarge and gone in Etch, and the tool seems to have worked with Sarge but doesn't work with Etch, due to changes in the way the compiler handled uninitialised data and the things that needed to be set to make the proc file appear). Perhaps it's now too late to do anything about this. Ewen -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#407112: kernel: network and system crashes.
On Thu, Jun 12, 2008 at 08:59:40PM +0200, Servizio Reti wrote: Version: 2.6.18-6 # cat /proc/sys/kernel/version #1 SMP Fri Jun 6 22:22:11 UTC 2008 Bug present, relevant syslog: [..] Jun 11 07:31:08 hera kernel: NETDEV WATCHDOG: eth1: transmit timed out Jun 11 07:31:08 hera kernel: sky2 eth1: tx timeout Jun 11 07:31:08 hera kernel: sky2 eth1: transmit ring 205 .. 182 report=205 done =205 Jun 11 07:31:08 hera kernel: sky2 hardware hung? flushing [..] after that system freezes. With 2.6.24-1 from backports system freezes without any message in logs and console! the node is an intel server sr1435vp2 please try out 2.6.25 from unstable should install fine thanks for feedback -- maks -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#464910: Bug#485064: clock-setup: Detect if --directisa option is needed?
# hwclock select() to /dev/rtc to wait for clock tick timed out Just FWIW, my laptop, which has had this problem with 2.6.24 since February, doesn't seem to have the problem with 2.6.25. -- see shy jo signature.asc Description: Digital signature
Bug#418757: /proc/scsi/aacraid workarounds
FTR, a couple of (partial) work arounds for this issue: 1. Use an older version of afacli: http://ftp.us.dell.com/scsi-raid/afa-apps-snmp.2806076-A02.tar.gz as suggested by: http://wiki.club.cc.cmu.edu/org/ccwiki/AACRAID (and various mailing list postings I eventually found.) The older version doesn't abort when /proc/scsi/aacraid is missing, but is quite a bit older so is probably lacking some features. 2. Use the Adaptec Storage Manager tools instead, following these instructions on the Adaptec blog: http://linux.adaptec.com/?p=17 http://linux.adaptec.com/?p=15 The instructions given there work well enough with Debian Etch to get /usr/StorMan/arcconf running at leasst for getconfig which allows retrieving status information. (The Dell Perc 3/Di is an OEM'd Adaptec aacraid card.) I'm not sure if either of these solutions gives the full control of more recent afacli versions (eg, some options I tried with arcconf errored out on the Dell Perc 3/Di), but they do work for basic monitoring which was the main thing I wanted. From discussion with the Dell engineers listed on the patch it appears very unlikely that a newer version of the afacli tool will ever be built that doesn't need /proc/scsi/aacraid, so patching the kernel appears to be the only way to get the most recent version to work. They also told me that the Dell OMSA management set was updated to work without /proc/scsi/aacraid, so that's possibly another option for monitoring. So given this, and the time that has passed, perhaps we just accept this as a Sarge - Etch regression and hope others who run into the problem find this bug and possible work arounds. Ewen -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#486033: gfs-tools: bashism in /bin/sh script
Package: gfs-tools Severity: important Version: 2.20080603-1 User: [EMAIL PROTECTED] Usertags: goal-dash Hello maintainer, While performing an archive wide checkbashisms (from the 'devscripts' package) check I've found your package containing one or more /bin/sh scripts making use of bashisms. checkbashisms' output: possible bashism in ./etc/init.d/gfs-tools line 89 ($foo should be eval gettext foo): echo $Usage: $0 {start|stop|restart|reload|force-reload|status} Not using bash (or a Debian Policy conformant shell interpreter which does provide such an extra feature) as /bin/sh is likely to lead to errors or unexpected behaviours. Please be aware that although bash is currently the default /bin/sh there's a release goal for Lenny to make dash the default /bin/sh[1]. If you want more information about dash as /bin/sh, you can read: http://lists.debian.org/debian-release/2008/01/msg00189.html For more information please refer to the Debian Policy section 10.4 supporting this argument at: http://www.debian.org/doc/debian-policy/ch-files.html#s-scripts Hints about how to fix bashisms: Sometimes these bugs are already fixed in Ubuntu, look at the PTS. If not already fixed you can read: https://wiki.ubuntu.com/DashAsBinSh [1]http://release.debian.org/lenny/goals.txt Thank you, -- Atomo64 - Raphael Please avoid sending me Word, PowerPoint or Excel attachments. See http://www.gnu.org/philosophy/no-word-attachments.html -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#486032: gfs2-tools: bashism in /bin/sh script
Package: gfs2-tools Severity: important Version: 2.20080603-1 User: [EMAIL PROTECTED] Usertags: goal-dash Hello maintainer, While performing an archive wide checkbashisms (from the 'devscripts' package) check I've found your package containing one or more /bin/sh scripts making use of bashisms. checkbashisms' output: possible bashism in ./etc/init.d/gfs2-tools line 89 ($foo should be eval gettext foo): echo $Usage: $0 {start|stop|restart|reload|force-reload|status} Not using bash (or a Debian Policy conformant shell interpreter which does provide such an extra feature) as /bin/sh is likely to lead to errors or unexpected behaviours. Please be aware that although bash is currently the default /bin/sh there's a release goal for Lenny to make dash the default /bin/sh[1]. If you want more information about dash as /bin/sh, you can read: http://lists.debian.org/debian-release/2008/01/msg00189.html For more information please refer to the Debian Policy section 10.4 supporting this argument at: http://www.debian.org/doc/debian-policy/ch-files.html#s-scripts Hints about how to fix bashisms: Sometimes these bugs are already fixed in Ubuntu, look at the PTS. If not already fixed you can read: https://wiki.ubuntu.com/DashAsBinSh [1]http://release.debian.org/lenny/goals.txt Thank you, -- Atomo64 - Raphael Please avoid sending me Word, PowerPoint or Excel attachments. See http://www.gnu.org/philosophy/no-word-attachments.html -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]