devfs style names
Hi, [ please CC me ] In previous releases d-i used devfs style device node names, is it true that you have moved away from that? That would simplify the uswsusp maitainer script... grts Tim -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
base-installer_1.76etch1_amd64.changes INSTALLED into stable
Installing: base-installer_1.76etch1.dsc to pool/main/b/base-installer/base-installer_1.76etch1.dsc base-installer_1.76etch1.tar.gz to pool/main/b/base-installer/base-installer_1.76etch1.tar.gz base-installer_1.76etch1_amd64.udeb to pool/main/b/base-installer/base-installer_1.76etch1_amd64.udeb Override entries for your package: base-installer_1.76etch1.dsc - source debian-installer base-installer_1.76etch1_amd64.udeb - required debian-installer Announcing to [EMAIL PROTECTED] Closing bugs: 469030 Thank you for your contribution to Debian. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
debian-installer_20070308etch3_s390.changes INSTALLED into stable
Installing: debian-installer_20070308etch3.dsc to pool/main/d/debian-installer/debian-installer_20070308etch3.dsc debian-installer_20070308etch3.tar.gz to pool/main/d/debian-installer/debian-installer_20070308etch3.tar.gz debian-installer_20070308etch3_s390.deb to pool/main/d/debian-installer/debian-installer_20070308etch3_s390.deb Override entries for your package: debian-installer_20070308etch3.dsc - source devel debian-installer_20070308etch3_s390.deb - optional devel Announcing to [EMAIL PROTECTED] Closing bugs: 491263 Thank you for your contribution to Debian. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#491263: marked as done (network-console, etch netinst, openssh)
Your message dated Sat, 26 Jul 2008 09:40:27 + with message-id [EMAIL PROTECTED] and subject line Bug#491263: fixed in debian-installer 20070308etch3 has caused the Debian Bug report #491263, regarding network-console, etch netinst, openssh to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact [EMAIL PROTECTED] immediately.) -- 491263: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=491263 Debian Bug Tracking System Contact [EMAIL PROTECTED] with problems ---BeginMessage--- Package: network-console Version: 1.11 A few issues relating to network-console on etch netinst 4.0r3: * Keys generated by network-console are found on the blacklist included with newer versions of openssh-server. * If network-console is used for a new installation, openssh-server is installed on the new system, but .broken keys are left lying around in /etc/ssh. * Likewise to above, the rsa host key (/etc/ssh/ssh_host_rsa_key.pub) is found to be on the blacklist, and appears that it may be the same rsa key used during installation via network-console. An 'ls -al *key*' in /etc/ssh on a newly installed system gives something similar to: -rw--- 1 root root 668 2008-07-17 07:24 ssh_host_dsa_key -rw--- 1 root root 668 2008-07-17 07:21 ssh_host_dsa_key.broken -rw-r--r-- 1 root root 612 2008-07-17 07:24 ssh_host_dsa_key.pub -rw-r--r-- 1 root root 612 2008-07-17 07:21 ssh_host_dsa_key.pub.broken -rw--- 1 root root 1675 2008-07-17 07:26 ssh_host_rsa_key -rw--- 1 root root 1675 2008-07-17 07:21 ssh_host_rsa_key.broken -rw-r--r-- 1 root root 404 2008-07-17 07:26 ssh_host_rsa_key.pub -rw-r--r-- 1 root root 404 2008-07-17 07:21 ssh_host_rsa_key.pub.broken Likewise, checking for these keys in the blacklist: # for key in ssh_host_[rd]sa_key.pub{,.broken}; do grep -q $(ssh-keygen \ -l -f $key | awk '{print $2}' | cut -d: -f7- | tr -d :) blacklist.* \ echo $key is on the blacklist; done ssh_host_rsa_key.pub is on the blacklist ssh_host_dsa_key.pub.broken is on the blacklist ssh_host_rsa_key.pub.broken is on the blacklist -- Mike Edwards| If this email address disappears, Unsolicited advertisments to| assume it was spammed to death. To this address are not welcome. | reach me in that case, s/-.*@/@/ Our progress as a nation can be no swifter than our progress in education. The human mind is our fundamental resource. -- John F. Kennedy ---End Message--- ---BeginMessage--- Source: debian-installer Source-Version: 20070308etch3 We believe that the bug you reported is fixed in the latest version of debian-installer, which is due to be installed in the Debian FTP archive: debian-installer_20070308etch3.dsc to pool/main/d/debian-installer/debian-installer_20070308etch3.dsc debian-installer_20070308etch3.tar.gz to pool/main/d/debian-installer/debian-installer_20070308etch3.tar.gz debian-installer_20070308etch3_s390.deb to pool/main/d/debian-installer/debian-installer_20070308etch3_s390.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Frans Pop [EMAIL PROTECTED] (supplier of updated debian-installer package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Sat, 19 Jul 2008 10:03:12 +0200 Source: debian-installer Binary: debian-installer Architecture: source s390 Version: 20070308etch3 Distribution: stable Urgency: low Maintainer: Debian Install System Team debian-boot@lists.debian.org Changed-By: Frans Pop [EMAIL PROTECTED] Description: debian-installer - Debian installer Closes: 491263 Changes: debian-installer (20070308etch3) stable; urgency=low . * Rebuild to ensure the installer includes fixed versions of openssh for the SSH key vulnerability (DSA-1576-1). This affects architectures using network-console (arm, mipsel) and generic (s390) images. The upcoming 4.0r4 point release will ensure fixed versions of openssh are also included for all CD-based installations. Closes: #491263. Files: 2afb2d02a80eb62e802bd9ffd09e28d2 2146 devel optional debian-installer_20070308etch3.dsc 7ba0aac31e6876bb3d2c9f69879badfb 1230217 devel optional
partman-lvm_53etch1_amd64.changes INSTALLED into stable
Installing: partman-lvm_53etch1.dsc to pool/main/p/partman-lvm/partman-lvm_53etch1.dsc partman-lvm_53etch1.tar.gz to pool/main/p/partman-lvm/partman-lvm_53etch1.tar.gz partman-lvm_53etch1_all.udeb to pool/main/p/partman-lvm/partman-lvm_53etch1_all.udeb Override entries for your package: partman-lvm_53etch1.dsc - source debian-installer partman-lvm_53etch1_all.udeb - standard debian-installer Announcing to [EMAIL PROTECTED] Thank you for your contribution to Debian. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Re: Is it possible to create several LV on a VG with different names using partman ?
OK, I managed to get qemu running in a sid chroot and to access it via serial console. This is for the good part. Le jeudi 24 juillet 2008 11:05, Jérémy Bobbio a écrit : Please also test normal guided partitioning using LVM and LVM+crypto, if you can. Now the bad part is that the base recipes doesn't work with the patch applied. I'll do some debugging, trying to trace what have changed, and come back with a working patch. Cheers, Grégory -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Please review announcement of upcoming release of Debian 4.0r4 etch-and-a-half
Hi! Attached you'll find the current draft for the announcement of etch-and-a-half. Please review it; current schedule for it to be send out is tomorrow. I'll make the most up to date version available at http://people.debian.org/~tolimar/tmp/ ; patches for the wml-file (which is used to generate the HTML and the TXT version for the mail) are most welcome, everything else is more work for me ;) Frans, could you please pay special attention to the paragraph about d-i? Yours sincerely, Alexander define-tag pagetitleDebian GNU/Linux 4.0 updated and support for newer hardware added/define-tag define-tag release_date2008-07-26/define-tag #use wml::debian::news # $Id: 20080217.wml,v 1.2 2008-02-17 21:30:56 kreutzm Exp $ define-tag release4.0/define-tag define-tag codenameetch/define-tag define-tag revision4.0r4/define-tag define-tag dsa trtd align=centera href=$(HOME)/security/%0/dsa-%1DSA-%1/a/td td align=center: my @p = (); for my $p (split (/,\s*/, %2)) { push (@p, sprintf ('a href=http://packages.debian.org/src:%s;%s/a', $p, $p)); } print join (, , @p); :/tdtd align=left%3/td/tr /define-tag define-tag correction trtda href=http://packages.debian.org/src:%0;%0/a/td td%1/td/tr /define-tag define-tag srcpkga href=http://packages.debian.org/src:%0;%0/a/define-tag pThe Debian project is pleased to announce the fourth update of its stable distribution Debian GNU/Linux 4.0 (codename codename). This update not only adds corrections for security problems and a few adjustment to serious problems to a stable release, it also adds support for newer hardware by giving users the option to install newer drivers./p pPlease note that this update does not constitute a new version of Debian GNU/Linux 4.0 but only updates some of the packages included. Even if you need new drivers during installation time there is no need to throw away 4.0 CDs or DVDs. If you don't need newer drivers you'll only to update against ftp.debian.org after an installation, in order to incorporate those late changes./p pThose who frequently install updates from security.debian.org won't have to update many packages and most updates from security.debian.org are included in this update./p pNew CD and DVD images containing updated packages and the regular installation media accompanied with the package archive respectively will be available soon at the regular locations./p pUpgrading to this revision online is usually done by pointing the aptitude (or apt) package tool (see the sources.list(5) manual page) to one of Debian's many FTP or HTTP mirrors. A comprehensive list of mirrors is available at:/p div class=center a href=$(HOME)/mirror/listhttp://www.debian.org/mirror/list/a /div h2Regarding qetch-and-a-half/q/h2 pAdditional packages have been added in the Debian 4.0r4 point release to increase the set of hardware supported by Debian 4.0 (qetch/q). This includes packages based upon the Linux 2.6.24 kernel and additional drivers for the X window system. Installation of these additional packages is not required and will not occur by default. This update represents no change to the support of previously available packages./p pThe existing 2.6.18-based kernel will continue to be the default kernel for the etch release./p pThese package are update for qetch-and-a-half/q:/p table border=0 trthPackage/ththReason/th/tr correction linux-2.6.24 Updated for new kernel for etchnhalf correction linux-kbuild-2.6.24 Updated for new kernel for etchnhalf correction linux-latest-2.6-etchnhalf New kernel for etchnhalf correction xserver-xorg-video-nv Supporting more hardware correction xserver-xorg-video-intel Supporting more hardware correction aboot Fix alpha build, add support for kernels newer than 2.6.23 correction b43-fwcutter Fix wrongly encoded es.po correction debconf Make debconf-apt-progress compatible with the Lenny installer correction sysvinit Update shutdown to work w/ libata in linux newer than 2.6.23 correction wireless-tools Update to claim support for WE API in etchnhalf kernel /table pa href=http://www.debian.org/releases/etch/etchnhalf;Release notes/a covering the specialties of qetch-and-a-half/q have been written as well as a a href=http://www.debian.org/releases/etch/debian-installer/etchnhalf;short update for the installation instructions/a./p h2Debian-Installer Update/h2 pDue to changes regarding creating of ssl certificates used during installation via the network-console the Debian-Installer got updated, too. Two other issues regarding installation on already existing RAID setups and recognizing PowerPC64 system have been fixed, too./p h2Miscellaneous Bugfixes/h2 pThis stable update adds several binary updates for various architectures to packages whose version was not synchronised across all architectures. It also adds a few important corrections to the following packages:/p table border=0 trthPackage/th thReason/th/tr
Bug#409412: setting package to cdebconf-gtk-udeb cdebconf-slang-udeb cdebconf-text-udeb cdebconf cdebconf-udeb cdebconf-newt-udeb libdebconfclient0-dev cdebconf-priority libdebconfclient0 libdebconfcl
# Automatically generated email from bts, devscripts version 2.10.33 # via tagpending # # cdebconf (0.133) UNRELEASED; urgency=low # # * Switch to GtkEntry instead of GtkLabel to display progress info underneath #the progress bar. The later has issue when displaying combined LTR and #RTL scripts. (Closes: #409412) # package cdebconf-gtk-udeb cdebconf-slang-udeb cdebconf-text-udeb cdebconf cdebconf-udeb cdebconf-newt-udeb libdebconfclient0-dev cdebconf-priority libdebconfclient0 libdebconfclient0-udeb tags 409412 + pending -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Processed: setting package to cdebconf-gtk-udeb cdebconf-slang-udeb cdebconf-text-udeb cdebconf cdebconf-udeb cdebconf-newt-udeb libdebconfclient0-dev cdebconf-priority libdebconfclient0 libdebconfcli
Processing commands for [EMAIL PROTECTED]: # Automatically generated email from bts, devscripts version 2.10.33 # via tagpending # # cdebconf (0.133) UNRELEASED; urgency=low # # * Switch to GtkEntry instead of GtkLabel to display progress info underneath #the progress bar. The later has issue when displaying combined LTR and #RTL scripts. (Closes: #409412) # package cdebconf-gtk-udeb cdebconf-slang-udeb cdebconf-text-udeb cdebconf cdebconf-udeb cdebconf-newt-udeb libdebconfclient0-dev cdebconf-priority libdebconfclient0 libdebconfclient0-udeb Ignoring bugs not assigned to: cdebconf-slang-udeb cdebconf-gtk-udeb cdebconf cdebconf-text-udeb cdebconf-udeb cdebconf-newt-udeb libdebconfclient0-dev cdebconf-priority libdebconfclient0-udeb libdebconfclient0 tags 409412 + pending Bug#409412: g-i: RTL text changes place under the progress bar There were no tags set. Tags added: pending End of message, stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Re: Please review announcement of upcoming release of Debian 4.0r4 etch-and-a-half
Alexander Reichle-Schmehl wrote: Attached you'll find the current draft for the announcement of etch-and-a-half. Please review it; Patch attached. Mostly null grammar changes. I also replaced the reference to update against ftp.debian.org to update against a Debian mirror as using ftp.debian.org as a mirror is deprecated. Regards, -- Chris Lamb, UK [EMAIL PROTECTED] GPG: 0x634F9A20 --- 20080726.wml.orig 2008-07-26 15:30:39.0 +0100 +++ 20080726.wml2008-07-26 16:13:20.0 +0100 @@ -33,17 +33,17 @@ pPlease note that this update does not constitute a new version of Debian GNU/Linux 4.0 but only updates some of the packages included. Even if you need new drivers during installation time there is no need to throw away 4.0 CDs or -DVDs. If you don't need newer drivers you'll only to update against -ftp.debian.org after an installation, in order to incorporate those late +DVDs. If you do not need newer drivers you will only need to update against a +Debian mirror after an installation in order to incorporate these late changes./p -pThose who frequently install updates from security.debian.org won't have -to update many packages and most updates from security.debian.org are -included in this update./p +pThose who frequently install updates from security.debian.org will not have +to update many packages as most updates from security.debian.org are included +in this update./p pNew CD and DVD images containing updated packages and the regular -installation media accompanied with the package archive respectively -will be available soon at the regular locations./p +installation media accompanied with the package archive will be available +soon at the regular locations./p pUpgrading to this revision online is usually done by pointing the aptitude (or apt) package tool (see the sources.list(5) manual page) to @@ -91,10 +91,10 @@ h2Debian-Installer Update/h2 -pDue to changes regarding creating of ssl certificates used during -installation via the network-console the Debian-Installer got updated, -too. Two other issues regarding installation on already existing RAID -setups and recognizing PowerPC64 system have been fixed, too./p +pThe Debian-Installer was also updated due to changes regarding the creation +of SSL certificates used during installation via the network-console. Two other +issues regarding installation on existing RAID setups and recognizing PowerPC64 +systems have also been fixed./p h2Miscellaneous Bugfixes/h2 @@ -137,7 +137,7 @@ correction zncFix NULL pointer deferences leading to crashes /table -pThese packages got updated on the named architecture, to bring the architectures back in sync:/p +pThese packages were updated on the specified architecture to bring the architectures back in sync:/p table border=0 trthPackage/th thArchitecture mdash; Reason/th/tr correction apache2-mpm-itks390 amd64 sparc powerpc arm i386 mips ia64 alpha mipsel hppa mdash; Rebuild against updated apache2 @@ -266,7 +266,7 @@ /table pA complete list of all accepted and rejected packages together with -rationale is on the preparation page for this revision:/p +rationale is available on the preparation page for this revision:/p div class=center url http://release.debian.org/stable/release/revision/ @@ -276,7 +276,7 @@ h2Removed packages/h2 -pThe following packages got removed due to circumstances beyond our control:/p +pThe following packages were removed due to circumstances beyond our control:/p table border=0 trthPackage/ththReason/th/tr correction glimpse Licensing issues signature.asc Description: PGP signature
Re: Please review announcement of upcoming release of Debian 4.0r4 etch-and-a-half
On Sat, Jul 26, 2008 at 04:24:20PM +0200, Alexander Reichle-Schmehl wrote: Attached you'll find the current draft for the announcement of etch-and-a-half. Please review it; current schedule for it to be send out is tomorrow. Shouldn't it be etch-and-nine-tenth or something like this :-) DVDs. If you don't need newer drivers you'll only to update against only have to ... ftp.debian.org after an installation, in order to incorporate those late changes./p pThese package are update for qetch-and-a-half/q:/p are updated (or better: got updated) correction sysvinit Update shutdown to work w/ libata in linux newer than 2.6.23 w/ pa href=http://www.debian.org/releases/etch/etchnhalf;Release notes/a covering the specialties of qetch-and-a-half/q have been written as well as specialties? correction chkrootkitEnye check was killing random applications Enye??? correction hal Allows mounting ntfs volumes from within KDE Allow to be consistent with other entries correction znc Fix NULL pointer deferences leading to crashes dereferences (please check DSA as well) trthPackage/th thArchitecture mdash; Reason/th/tr Mhm ... is the usage of mdash; OK? dsa 2008 1535iceweasel Fix several vulnerabilities dsa 2008 1536xine-libFix Several vulnerabilities several (no capitalisation, check DSA as well) dsa 2008 1554roundup Fix cross-site scripting vulnerabily vulnerabily? dsa 2008 1593tomcat5.5 Fix missing input sanitising and cross-site scripting issue Didn't you used also cross site already? Jens -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Re: Please review announcement of upcoming release of Debian 4.0r4 etch-and-a-half
Hi Chris! Chris Lamb schrieb: Mostly null grammar changes. I also replaced the reference to update against ftp.debian.org to update against a Debian mirror as using ftp.debian.org as a mirror is deprecated. Ah, good point. Many thanks! Yours sincerely, Alexander signature.asc Description: OpenPGP digital signature
Re: Please review announcement of upcoming release of Debian 4.0r4 etch-and-a-half
python2.4 Fix several vulnerabilities dsa 2008 1552mplayer Fix arbitrary code execution dsa 2008 1553ikiwiki Fix cross-site request forgery dsa 2008 1554roundup Fix cross-site scripting vulnerabily dsa 2008 1555iceweasel Fix arbitrary code execution dsa 2008 1556perl Fix denial of service dsa 2008 1557phpmyadmin Fix several vulnerabilities dsa 2008 1558xulrunner Fix arbitrary code execution dsa 2008 1559phpgedview Fix cross site scripting dsa 2008 1560kronolith2 Fix cross site scripting dsa 2008 1561ltsp Fix information disclosure dsa 2008 1562iceape Fix arbitrary code execution dsa 2008 1563asterisk Fix denial of service dsa 2008 1564wordpress Fix several vulnerabilities dsa 2008 1566cpio Fix denial of service dsa 2008 1567blender Fix arbitrary code execution dsa 2008 1568b2evolution Fix cross site scripting dsa 2008 1569cacti Fix multiple vulnerabilities dsa 2008 1570kazehakase Fix arbitrary code execution dsa 2008 1571openssl Fix predictable random number generator dsa 2008 1572php5 Fix several vulnerabilities dsa 2008 1573rdesktop Fix several vulnerabilities dsa 2008 1574icedove Fix several vulnerabilities dsa 2008 1576openssh Fix predictable randomness dsa 2008 1577gforge Fix insecure temporary files dsa 2008 1578php4 Fix several vulnerabilities dsa 2008 1579netpbm-free Fix arbitrary code execution dsa 2008 1580phpgedview Fix privilege escalation dsa 2008 1581gnutls13 Fix potential code execution dsa 2008 1582peercast Fix arbitrary code execution dsa 2008 1583gnome-peercastFix several vulnerabilities dsa 2008 1584libfishsound Fix arbitrary code execution dsa 2008 1585speex Fix arbitrary code execution dsa 2008 1586xine-lib Fix several vulnerabilities dsa 2008 1587mtr Fix arbitrary code execution dsa 2008 1589libxslt Fix arbitrary code execution dsa 2008 1590samba Fix arbitrary code execution dsa 2008 1591libvorbis Fix several vulnerabilities dsa 2008 1593tomcat5.5 Fix missing input sanitising and cross-site scripting issue dsa 2008 1594imlib2 Fix buffer overflows in XPM and PNM loaders dsa 2008 1595xorg-server Fix several vulnerabilities dsa 2008 1596typo3-src Fix several vulnerabilities dsa 2008 1597mt-daapd Fix several vulnerabilities dsa 2008 1598libtk-img Fix buffer overflow dsa 2008 1599dbus Fix programming error dsa 2008 1600sympa Fix denial of service dsa 2008 1601wordpress Fix several vulnerabilities dsa 2008 1602pcre3 Fix arbitrary code execution dsa 2008 1603bind9 Fix cache poisioning dsa 2008 1606poppler Fix arbitrary code execution dsa 2008 1608mysql-dfsg-5.0 Fix authorization bypass dsa 2008 1611afuse Fix privilege escalation dsa 2008 1612ruby1.8 Fix several vulnerabilities dsa 2008 1613libgd2 Fix multiple vulnerabilities /table pA complete list of all accepted and rejected packages together with rationale is available on the preparation page for this revision:/p div class=center url http://release.debian.org/stable/release/revision/ /div h2Removed packages/h2 pThe following packages were removed due to circumstances beyond our control:/p table border=0 trthPackage/ththReason/th/tr correction glimpse Licensing issues correction dccSecurity issues correction maxdb-7.5.00 Security issues /table h2URLs/h2 pThe complete lists of packages that have changed with this release:/p div class=center url http://ftp.debian.org/debian/dists/downcase codename/ChangeLog /div pThe current stable distribution:/p div class=center url http://ftp.debian.org/debian/dists/stable/; /div pProposed updates to the stable distribution:/p div class=center url http://ftp.debian.org/debian/dists/proposed-updates/; /div pStable distribution information (release notes, errata, etc.):/p div class=center a href=$(HOME)/releases/stable/http://www.debian.org/releases/stable//a /div pSecurity announcements and information:/p div class=center a href=$(HOME)/security/http://security.debian.org//a /div h2About Debian/h2 pThe Debian Project is an association of Free Software developers who volunteer their time and effort in order to produce the completely free operating system Debian GNU/Linux./p h2Contact Information/h2 pFor further information, please visit the Debian web pages at a href=$(HOME)/http://www.debian.org//a, send mail to lt;[EMAIL PROTECTED]gt;, or contact the stable release team at lt;[EMAIL PROTECTED]gt;./p --- 20080726.wml.old 2008-07-26 17:01:43.0 +0100 +++ 20080726.wml 2008-07-26 17:05:44.0 +0100 @@ -26,27 +26,26 @@ pThe Debian project is pleased to announce the fourth update of its stable distribution Debian GNU/Linux 4.0 (codename codename). This update -not only adds corrections for security problems and a few adjustment
linux-kernel-di-m68k-2.6 REMOVED from testing
FYI: The status of the linux-kernel-di-m68k-2.6 source package in Debian's testing distribution has changed. Previous version: 0.83 Current version: (not in testing) Hint: http://release.debian.org/britney/hints/luk # m68k specific source packages The script that generates this mail tries to extract removal reasons from comments in the britney hint files. Those comments were not originally meant to be machine readable, so if the reason for removing your package seems to be nonsense, it is probably the reporting script that got confused. Please check the actual hints file before you complain about meaningless removals. -- This email is automatically generated; the Debian Release Team [EMAIL PROTECTED] is responsible. See http://release.debian.org/testing-watch/ for more information. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
vmelilo-installer REMOVED from testing
FYI: The status of the vmelilo-installer source package in Debian's testing distribution has changed. Previous version: 1.15 Current version: (not in testing) Hint: http://release.debian.org/britney/hints/luk # m68k specific source packages The script that generates this mail tries to extract removal reasons from comments in the britney hint files. Those comments were not originally meant to be machine readable, so if the reason for removing your package seems to be nonsense, it is probably the reporting script that got confused. Please check the actual hints file before you complain about meaningless removals. -- This email is automatically generated; the Debian Release Team [EMAIL PROTECTED] is responsible. See http://release.debian.org/testing-watch/ for more information. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Re: Please review announcement of upcoming release of Debian 4.0r4 etch-and-a-half
On Sat, Jul 26, 2008 at 04:24:20PM +0200, Alexander Reichle-Schmehl wrote: Hi! Attached you'll find the current draft for the announcement of etch-and-a-half. Please review it; current schedule for it to be send out is tomorrow. I'll make the most up to date version available at http://people.debian.org/~tolimar/tmp/ ; patches for the wml-file (which is used to generate the HTML and the TXT version for the mail) are most welcome, everything else is more work for me ;) hey Alexander, Thanks for working on this. Here's some suggested that helped clarify the language for me, and includes some stronger wording around the d-i network console issue (Frans may have something better though). --- /home/tolimar/public_html/tmp/20080726.wml 2008-07-26 10:10:56.0 -0600 +++ 20080726.wml2008-07-26 10:55:28.0 -0600 @@ -25,25 +25,25 @@ define-tag srcpkga href=http://packages.debian.org/src:%0;%0/a/define-tag pThe Debian project is pleased to announce the fourth update of its -stable distribution Debian GNU/Linux 4.0 (codename codename). This update -not only adds corrections for security problems and a few adjustment to serious -problems to a stable release, it also adds support for newer hardware by giving +stable distribution Debian GNU/Linux 4.0 (codename codename). In addition +to correcting several security problems and a few serious defects in the +stable release, this update also adds support for newer hardware by giving users the option to install newer drivers./p -pPlease note that this update does not constitute a new version of Debian -GNU/Linux 4.0 but only updates some of the packages included. Even if you need -new drivers during installation time there is no need to throw away 4.0 CDs or -DVDs. If you do not need newer drivers you will only need to update against a -Debian mirror after an installation in order to incorporate these late -changes./p - -pThose who frequently install updates from security.debian.org will not have -to update many packages as most updates from security.debian.org are included -in this update./p +pExisting Debian GNU/Linux 4.0 installation CDs and DVDs can continue to be +used to install this update. After installation, upgrading via an up-to-date +Debian mirror will cause any out of date packages to be updated. However, users +of the network-console installation method are strongly encouraged to update +their media, see the Debian Installer portion of this announcment for +more information./p + +pThose who frequently install updates from security.debian.org won't have +to update many packages and most updates from security.debian.org are +included in this update./p pNew CD and DVD images containing updated packages and the regular -installation media accompanied with the package archive will be available -soon at the regular locations./p +installation media accompanied with the package archive respectively +will be available soon at the regular locations./p pUpgrading to this revision online is usually done by pointing the aptitude (or apt) package tool (see the sources.list(5) manual page) to @@ -91,16 +91,17 @@ h2Debian-Installer Update/h2 -pThe Debian-Installer was also updated due to changes regarding the creation -of SSL certificates used during installation via the network-console. Two other -issues regarding installation on existing RAID setups and recognizing PowerPC64 -systems have also been fixed./p +pThe Debian-Installer was updated to repair an issue with the network-console +installation option. Due to a lack of entropy in how the host key is generated, +earlier Debian GNU/Linux 4.0 installers are vulnerable to a man-in-the-middle +attack. Two other issues regarding installation on already existing RAID +setups and recognizing PowerPC64 system have been fixed as well./p h2Miscellaneous Bugfixes/h2 -pThis stable update adds several binary updates for various architectures -to packages whose version was not synchronised across all architectures. +pThis stable update adds several updates to packages for various +architectures whose version was not synchronised across all architectures. It also adds a few important corrections to the following packages:/p table border=0 -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Re: Please review announcement of upcoming release of Debian 4.0r4 etch-and-a-half
dann frazier wrote: Thanks for working on this. Here's some suggested that helped clarify the language for me, and includes some stronger wording around the d-i network console issue (Frans may have something better though). I spotted one typo: +pExisting Debian GNU/Linux 4.0 installation CDs and DVDs can continue to be +used to install this update. After installation, upgrading via an up-to-date +Debian mirror will cause any out of date packages to be updated. However, users +of the network-console installation method are strongly encouraged to update +their media, see the Debian Installer portion of this announcment for ^e (And how about a semicolon on the same line before see?) -- JBR with qualifications in linguistics, experience as a Debian sysadmin, and probably no clue about this particular package -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Processed: setting package to cdebconf-gtk-udeb cdebconf-slang-udeb cdebconf-text-udeb cdebconf cdebconf-udeb cdebconf-newt-udeb libdebconfclient0-dev cdebconf-priority libdebconfclient0 libdebconfcli
Processing commands for [EMAIL PROTECTED]: # Automatically generated email from bts, devscripts version 2.10.33 # via tagpending # # cdebconf (0.133) UNRELEASED; urgency=low # # * Fix a segfault happening when GOBACK is selected after adding a new #question to the set previously seen. (Closes: #407577) # package cdebconf-gtk-udeb cdebconf-slang-udeb cdebconf-text-udeb cdebconf cdebconf-udeb cdebconf-newt-udeb libdebconfclient0-dev cdebconf-priority libdebconfclient0 libdebconfclient0-udeb Ignoring bugs not assigned to: cdebconf-slang-udeb cdebconf-gtk-udeb cdebconf cdebconf-text-udeb cdebconf-udeb cdebconf-newt-udeb libdebconfclient0-dev cdebconf-priority libdebconfclient0-udeb libdebconfclient0 tags 407577 + pending Bug#407577: cdebconf: frontend crashes on GoBack from user-setup There were no tags set. Tags added: pending End of message, stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#407577: setting package to cdebconf-gtk-udeb cdebconf-slang-udeb cdebconf-text-udeb cdebconf cdebconf-udeb cdebconf-newt-udeb libdebconfclient0-dev cdebconf-priority libdebconfclient0 libdebconfcl
# Automatically generated email from bts, devscripts version 2.10.33 # via tagpending # # cdebconf (0.133) UNRELEASED; urgency=low # # * Fix a segfault happening when GOBACK is selected after adding a new #question to the set previously seen. (Closes: #407577) # package cdebconf-gtk-udeb cdebconf-slang-udeb cdebconf-text-udeb cdebconf cdebconf-udeb cdebconf-newt-udeb libdebconfclient0-dev cdebconf-priority libdebconfclient0 libdebconfclient0-udeb tags 407577 + pending -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Re: Please review announcement of upcoming release of Debian 4.0r4 etch-and-a-half
Justin B Rye [EMAIL PROTECTED] wrote: pPlease note that this update does not constitute a new version of Debian GNU/Linux 4.0 but only updates some of the packages included. Even if you need ^insert comma? s/the packages included/the included packages/ new drivers during installation time there is no need to throw away 4.0 CDs or ^insert comma after time. DVDs. If you don't need newer drivers you'll only to update against ^need ftp.debian.org after an installation, in order to incorporate those late a Debian mirror XX X(no comma) these changes./p [...] pThose who frequently install updates from security.debian.org won't have s/frequently install updates/install updates frequently/ [...] pUpgrading to this revision online is most easily accomplished by pointing the aptitude (or apt) package tool (see the sources.list(5) manual page) at one of Debian's many FTP or HTTP mirrors. A comprehensive list of mirrors is available at:/p s/is most easily accomplished/should be done/ s/pointing/directing/ s/page) at/page) to/ Otherwise, all good changes IMO. Thanks! -- MJ Ray (slef) Webmaster for hire, statistician and online shop builder for a small worker cooperative http://www.ttllp.co.uk/ http://mjr.towers.org.uk/ (Notice http://mjr.towers.org.uk/email.html) tel:+44-844-4437-237 -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#492521: Installation report - Lenny snapshot 21.07.2008 x64
Package: installation-reports Boot method: DVD Image version: http://cdimage.debian.org/cdimage/weekly-builds/amd64/iso-dvd/debian-testing-amd64-DVD-1.iso Date: 2008-07-26 21:20 CET Machine: Self constructed desktop Processor: Intel Core2Duo E8600 3,16GHz Memory: 2x2GB DDR2 800 GEIL CL5 Dual-Channel Mainboard: Asus P5Q Pro P45 HDD: SEAGATE 250 GB, 16 MB, SATA II - ST3250410AS Partitions: none yet PCI: Gigabyte GF8600GTS 256MB 128bit PCI-express Base System Installation Checklist: [O] = OK, [E] = Error (please elaborate below), [ ] = didn't try it Initial boot: [O] Detect network card:[E] Configure network: [ ] Detect CD: [O] Load installer modules: [O] Detect hard drives: [O] Partition hard drives: [E] Install base system:[ ] Clock/timezone setup: [ ] User/password setup:[ ] Install tasks: [ ] Install boot loader:[ ] Overall install:[ ] Comments/Problems: Network card - default kernel in Lenny doesn't support Atheros L1e Ethernet 10/100/1000 Mb/s card Partitioning HDD - using dmraid - everything is ok beside the fact that during creating a partition manually there is no possibility to set anything - not even mount point automatic partitioning works fine, however. Debian Installer is going into right direction, over past 8 years most of annoying things were fixed. Adding some more advanced support for SATA Raid would be nice as many people use both Linux and Windows on the same machine and like to benefit from controller provided soft raid. There is one small glitch in the expert installer mode [text] - When installer ask on some steps for loading pcima modules, after selecting no, the installer still ask for parameters for those modules despite of not loading them. best regards Sebastian Fyda -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#404950: Installation Report [mips] [rc1] [Failure] SWARM (Broadcom BCM91250a)
* Martin Michlmayr [EMAIL PROTECTED] [2008-06-10 11:23]: * Karsten Merker [EMAIL PROTECTED] [2008-01-21 21:54]: Karsten, can you check if this problem is still there with current kernels? i.e. 2.6.23 or 2.6.24 I'll check it, but I probably won't be able to do so before next week. Karsten, did you ever find time to check this? Karsten? -- Martin Michlmayr http://www.cyrius.com/ -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#492525: debian-installer: wrong device number for root partition
Package: debian-installer Severity: important I installed Debian testing using debian-LennyBeta2-amd64-netinst.iso using lvm2 over raid1. On the first reboot after the install, the initrd failed to mount the root partition and dumped me into a shell. I eventually figured out that the kernel command line had root=fe00 (so it wanted the root partition on device major=254,minor=0), but that my root was actually on major=253,minor=0. (So I fixed it by booting with root=fd00; then once I was inside Linux, I reran LILO, and that fixed the problem permanently.) I don't remember exactly what I did during the install process, but I may have started to use an LVM partitioning before I decided to go for LVM-over-RAID. So perhaps the LVM module got loaded first, and grabbed major=254; but when I rebooted, RAID got major=254 and LVM got major=253. -- System Information: Debian Release: lenny/sid APT prefers testing APT policy: (500, 'testing'), (90, 'unstable') Architecture: amd64 (x86_64) Kernel: Linux 2.6.25-2-amd64 (SMP w/8 CPU cores) Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/bash -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#492086: partman: menus are very slow
Here are the code and the measurements. partman/lib/base.sh currently uses statements such as: template=$(cat $dir/question) As reported before, with the long default PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin then current busybox sh using both fork() and execve() runs cat /dev/null for 1000 iterations in 22.2 seconds on unmodified armel-eabi NSLU2 (133MHz armv5te.) Changing to the the modified short PATH=/bin , then 1000 iterations take 21.5 seconds. Changing tryexec()/shell/ash.c to use only fork() and no execve() [verified using strace]: - struct BB_applet const *app = (struct BB_applet const *)find_applet_by_name(cmd); int argc = 0; { char **p; for (p = argv; *p; ++p) ++argc; } if (app) { __environ = envp; exit(app-main(argc, argv)); } - runs 1000 iterations of the builtin applet cat /dev/null in 12.7 seconds. The syntax for busybox sh to replace template=$(cat $dir/question) is read template $dir/question Then 1000 iterations of read line /dev/null takes 0.66 seconds. [Thus fork() is almost as slow as execve() when measured in the busybox sh environment.] So, avoiding both fork+execve is faster by an order of magnitude than using fork and avoiding only execve. Avoiding both fork+exec also bounds the required testing, because only partman is affected, and not everything else that uses busybox sh. Some d-i developer probably could edit partman/lib/base.sh to use 'read' instead of 'cat', test it, and report the results in less than a day. I got lost in debian-installer-20080522/build/README. -- -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Re: Please review announcement of upcoming release of Debian 4.0r4 etch-and-a-half
(trimmed the cc: list a bit) On Sat, Jul 26, 2008 at 04:24:20PM +0200, Alexander Reichle-Schmehl wrote: Attached you'll find the current draft for the announcement of etch-and-a-half. Please review it; current schedule for it to be send out is tomorrow. We should probably mention in the etch+0.5 release notes that 2.6.24 breaks multipath (since we didn't include the devicemapper/multipath update): http://teams.debian.net/lurker/message/20080430.121446.c24b0824.de.html So people with multipath-tools installed should _not_ install the new kernel. Cheers, -- Guido -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]