Bug#544876: perdition: Perdition needs vanessa_socket 0.0.8

2009-09-03 Thread Horms
Package: perdition
Version: 1.18~rc1-1
Severity: grave
Justification: renders package unusable


Perdition 1.18~rc1 needs symbols provided by vanessa_socket 0.0.8.

I will upload 1.18~rc1-2 with the relevant build dependency fixed.
Noting that currently vanessa_socket 0.0.8 is in NEW.

-- System Information:
Debian Release: squeeze/sid
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: i386 (i686)

Kernel: Linux 2.6.30-1-686 (SMP w/1 CPU core)
Locale: LANG=en_AU.utf8, LC_CTYPE=en_AU.utf8 (charmap=UTF-8) (ignored: LC_ALL 
set to en_AU.utf8)
Shell: /bin/sh linked to /bin/bash



-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#434829: heartbeat: Incorect path for crm.dtd and other scripts

2007-07-26 Thread Horms
Package: heartbeat
Version: 2.1.1-1
Severity: grave
Justification: renders package unusable


Just prior to the release of 2.1.1 a number of files, including crm.dtd
were relocated from /usr/lib/heartbeat and /usr/share/heartbeat. In
order to ease the pain of this relocation compatibility symlinks
were put in place and, accordingly, many references to these
files were not updated to use the new path.

Unfortunately the compatibility symlink creation was added to
the RPM .spec file and nowhere else, and for this reason
they were not included in the Debian package - it turns out
the addition to the .spec file also didn't work, but
that is a different story.

This has been loged as Heartbeat bugzilla bug 1661, and there
is a related bug 1665.

http://old.linux-foundation.org/developer_bugzilla/show_bug.cgi?id=1661
http://old.linux-foundation.org/developer_bugzilla/show_bug.cgi?id=1665

This has been fixed in upstream mecurual as changesets
13dc55dece11, 0c8dc61feeb2 and 635bd958ed2b.

http://hg.linux-ha.org/dev/rev/13dc55dece11
http://hg.linux-ha.org/dev/rev/0c8dc61feeb2
http://hg.linux-ha.org/dev/rev/635bd958ed2b

I will relase 2.1.1-2 ASAP with these patches applied.

-- System Information:
Debian Release: lenny/sid
  APT prefers unstable
  APT policy: (190, 'unstable'), (180, 'experimental')
Architecture: i386 (i686)

Kernel: Linux 2.6.21-1-686 (SMP w/2 CPU cores)
Locale: LANG=ja_JP.utf8, LC_CTYPE=ja_JP.utf8 (charmap=UTF-8) (ignored: LC_ALL 
set to ja_JP.utf8)
Shell: /bin/sh linked to /bin/bash

Versions of packages heartbeat depends on:
ii  adduser 3.103Add and remove users and groups
ii  iproute 20070313-1   Professional tools to control the 
ii  iputils-ping3:20070202-1 Tools to test the reachability of 
ii  libc6   2.5-11   GNU C Library: Shared libraries
ii  libglib1.2  1.2.10-17The GLib library of C routines
ii  libnet1 1.1.2.1-2library for the construction and h
pn  libpils0none   (no description available)
ii  libsensors3 1:2.10.3-1   library to read temperature/voltag
pn  libsnmp9none   (no description available)
ii  libssl0.9.8 0.9.8e-5 SSL shared libraries
pn  libstonith0 none   (no description available)
ii  libuuid11.40.1-1 universally unique id library
ii  libwrap07.6.dbs-13   Wietse Venema's TCP wrappers libra
ii  python  2.4.4-6  An interactive high-level object-o
ii  python-central  0.5.14   register and build utility for Pyt

Versions of packages heartbeat recommends:
ii  iptables1.3.6.0debian1-5 administration tools for packet fi
ii  logrotate   3.7.1-3  Log rotation utility
ii  sysklogd [system-log-da 1.4.1-21 System Logging Daemon


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#432441: heartbeat: FTBFS: unmet build dep modutils

2007-07-18 Thread Horms
On Wed, Jul 18, 2007 at 08:22:00PM -0700, Steve Langasek wrote:
 Hi Horms,
 
  This has been fixed upstream, I am expecting them to release shortly
  and this bug should be closed in the subsequent upload.
 
 Is there any more definite ETA?  This is currently the major issue holding
 the net-snmp soname transition out of testing.

I've been told this month.

I can make an interim upload of 2.0.8 + this fix if you like.
I could make such an upload today unless the sky falls in.

-- 
Horms
  H: http://www.vergenet.net/~horms/
  W: http://www.valinux.co.jp/en/



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#432441: FTBFS: Unmet build dep modutils

2007-07-10 Thread Horms
tag 432441 +pending
thanks

This has been fixed upstream, I am expecting them to release shortly
and this bug should be closed in the subsequent upload.

-- 
Horms
  H: http://www.vergenet.net/~horms/
  W: http://www.valinux.co.jp/en/



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#419617: uim: is not upgradable from uim 1.2

2007-05-25 Thread Horms
tag 419617 -unreproducible
thanks

I am removing the unreproducable tag from this bug as it is trivially
reproducable.

1) have an uim-common  1:1.4.1-1 installed
2) aptitude update
3) aptitude upgrade

-- 
Horms
  H: http://www.vergenet.net/~horms/
  W: http://www.valinux.co.jp/en/



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#415393: uim: is not upgradable from uim 1.2

2007-05-24 Thread Horms
severity 419617 grave
thanks

I think that both #419617 and #415393 are caused by
uim-common missing a dependancy on libuim5 (= ${binary:Version})

http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=419617;msg=32

Is it possible to get this fixed, its really quite broken.



-- 
Horms
  H: http://www.vergenet.net/~horms/
  W: http://www.valinux.co.jp/en/



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#393574: heartbeat-2: mknod in maintainer script

2006-10-16 Thread Horms
On Mon, Oct 16, 2006 at 11:18:06PM +0200, Aurelien Jarno wrote:
 Package: heartbeat-2
 Version: 2.0.7-1
 Severity: serious
 Justification: Policy 10.6
 
 Maintainer scripts should not create device files directly. They should
 call makedev instead. Refer to Policy Manual, section 10.6 for details.

The problem is that the call to mknod is not creating a device,
it is creating a fifo, which is not an operation created by makedev.

I'm not sure what the best fix, if any, is for this. When I asked
around a very long time ago, I was advised to just leave the call
to mknod inside the maintainer script.

-- 
Horms
  H: http://www.vergenet.net/~horms/
  W: http://www.valinux.co.jp/en/



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#393572: heartbeat: mknod in maintainer script

2006-10-16 Thread Horms
On Mon, Oct 16, 2006 at 11:14:56PM +0200, Aurelien Jarno wrote:
 Package: heartbeat
 Version: heartbeat
 Severity: serious
 Justification: Policy 10.6
 
 Maintainer scripts should not create device files directly. They should
 call makedev instead. Refer to Policy Manual, section 10.6 for details.

The problem is that the call to mknod is not creating a device,
it is creating a fifo, which is not an operation created by makedev.

I'm not sure what the best fix, if any, is for this. When I asked
around a very long time ago, I was advised to just leave the call
to mknod inside the maintainer script.

-- 
Horms
  H: http://www.vergenet.net/~horms/
  W: http://www.valinux.co.jp/en/



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#380289: Processed: reopening 380289, found 380289 in 2.0.5-8, closing 380289

2006-09-07 Thread Horms
Thanks for cleaning that up

-- 
Horms
  H: http://www.vergenet.net/~horms/
  W: http://www.valinux.co.jp/en/



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#380180: heartbeat: portblock syntax errors in 1.2.3-9sarge5

2006-07-28 Thread Horms
On Fri, Jul 28, 2006 at 09:57:24AM +0200, Kostja Siefen wrote:
 Package: heartbeat
 Version: 1.2.3-9sarge5
 Severity: grave
 Tags: patch
 Justification: renders package unusable
 
 
 After upgrading to 1.2.3-9sarge5, heartbeat kept rebooting the system as
 there were errors running the portblock resource script.
 
 This bug applies to people which use portblock as heartbeat service
 to drop incoming network packets when service takeover.
 
 The syntax error is due to a missing iptables path which results in
 command not found errors in /etc/ha.d/resource.d/portblock.
 
 Fixing is simple, patch is attached (putting iptables back into place).

Thanks. I suspect that the problem is that ther eis a missing
build depenancy on iptables, and thus its path is not being
auto-detected and filled in at build-time.

I'll get this fixed for the next release.

-- 
Horms
  H: http://www.vergenet.net/~horms/
  W: http://www.valinux.co.jp/en/



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#379904: heartbeat: Local DoS due to world-writable shared memory [CVE-2006-3815]

2006-07-28 Thread Horms
On Wed, Jul 26, 2006 at 11:18:57AM +0200, Martin Pitt wrote:
 Package: heartbeat
 Version: 1.2.4-12
 Severity: grave
 Tags: security patch
 
 Hi!
 
 Recently, a local DoS due to world-writable/readable shared memory
 permissions was found and fixed in heartbeat:
 
 Upstream fix:
 
   
 http://cvs.linux-ha.org/viewcvs/viewcvs.cgi/linux-ha/heartbeat/heartbeat.c?r1=1.513r2=1.514
 
 This has been assigned CVE-2006-3815. Please mention this number in
 the changelog when you fix this to ease tracking.

Thanks, I will get a new relase out for this. Though it probably will
not be until next week.

-- 
Horms
  H: http://www.vergenet.net/~horms/
  W: http://www.valinux.co.jp/en/



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#379071: heartbeat-2: /var/lib/heartbeat/pengine is missing

2006-07-20 Thread Horms
Package: heartbeat-2
Version: 2.0.6-1
Severity: serious

The following required directory is missing

/var/lib/heartbeat/pengine (ownership hacluster:haclient)

I will fix this in the next upload.

-- 
Horms   
  H: http://www.vergenet.net/~horms/
  W: http://www.valinux.co.jp/en/






-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#378450: ldirectord-2 mail spamming and autostart

2006-07-19 Thread Horms
Hi,

here are patches for two emailalert problems. 

The first patch fixes things so that email will no longer be
sent if no address is specified. It also cleans up the logic a bit.

The second patch adds global emailalert and emailalertfreq parameters,
that can be overriden by the existing per-virtual settings.

While investigating this I made a short list of other emailalert related
things that I would like to fix. So this means that the patches are
still evolving. I'll try and get a complete set together in the
not to distant future.

* Use hash instead of array for managing freq, and only add 
  entries that need to resend alerts at any given point of time.
* Add a body to the message - repeating the subject should be fine for
  now
* Add emailalert and emailalertfreq to sample ldirectord.cf
* Log when alerts are sent
バイナリー・ファイル/dev/nullとto-work/.ldirectord.swpは違います
--- from-0002/ldirectord
+++ to-work/ldirectord  2006-07-17 22:25:11.0 -0400
@@ -1834,13 +1834,7 @@ sub ld_main
sleep $CHECKINTERVAL;
}

-   my $currenttime=time();
-   foreach my $es (@EMAILSTATUS){
-   if (($es-{alerttime}  0 )  ($currenttime - 
$es-{alerttime} = $es-{emailalertfreq})){
-   ld_emailalert(Inaccessible real server: 
$es-{server}, $es-{emailalert});
-   ld_set_email_status($es-{server}, 
$currenttime);
-   }
-   }
+   ld_emailalert_resend();
}
 }
 
@@ -2639,18 +2633,14 @@ sub _remove_service {
. $ipvsadm_args $rforw -w 0);
ld_log(Quiescent $log_args (Weight set to 0));
}
-   if(defined($$v{emailalert})) {
-   ld_emailalert(Quiescent $log_args (Weight set to 
0),$$v{emailalert});
-   ld_set_email_status($currentserver, $currenttime);
-   }
+   ld_emailalert(Quiescent $log_args (Weight set to 0),
+  $$v{emailalert}, $currentserver, $currenttime);
 }
else {
 system_wrapper($IPVSADM -d $ipvsadm_args);
ld_log(Deleted $log_args);
-   if(defined($$v{emailalert})) {
-   ld_emailalert(Deleted $log_args,$$v{emailalert});
-   ld_set_email_status($currentserver, $currenttime);
-   }
+   ld_emailalert(Deleted $log_args,$$v{emailalert},
+  $currentserver, $currenttime);
}
 }
 
@@ -2704,19 +2694,16 @@ sub _restore_service {
get_forward_flag($or-{forward}) eq $rforw){
 system_wrapper($IPVSADM -e $ipvsadm_args);
ld_log(Restored $log_args (Weight set to $rwght));
-   if(defined($$v{emailalert})) { 
-   ld_emailalert(Restored $log_args (Weight set 
to $rwght),$$v{emailalert});
-   ld_set_email_status($currentserver, 0);
-   }
+   ld_emailalert(Restored $log_args .
+  (Weight set to $rwght),
+  $$v{emailalert}, $currentserver, 0);
 }
 }
 else {
 system_wrapper($IPVSADM -a $ipvsadm_args);
ld_log(Added $log_args (Weight set to $rwght));
-   if(defined($$v{emailalert})) {
-   ld_emailalert(Added $log_args (Weight set to 
$rwght),$$v{emailalert});
-   ld_set_email_status($currentserver, 0);
-   }
+   ld_emailalert(Added $log_args (Weight set to $rwght),
+  $$v{emailalert}, $currentserver, 0);
 }
 }
 
@@ -3043,19 +3030,46 @@ sub ld_log
 # 1 on error
 sub ld_emailalert
 {
-   my ($emailsubject,$emailto) = (@_);
-   require Mail::Send;
+   my ($emailsubject, $emailto, $currentserver, $currenttime) = (@_);
my $emailmsg;
my $emailfh;
-  
+   my $status = 0;
+
+   if ($emailto eq ) {
+   return 0;
+   }
+
+   use Mail::Send;
+
unless ($emailmsg = new Mail::Send Subject=$emailsubject, To=$emailto
and $emailfh = $emailmsg-open
and print $emailfh 
and $emailfh-close) {
ld_log(failed to send email message\n);
-   return 1;
+   $status = 1;
+   }
+
+   ld_set_email_status($currentserver, $currenttime);
+
+   return($status);
+}
+
+# ld_emailalert_resend
+# Resend email alerts as neccessary
+# pre: none
+# post: EMAILSTATUS array is updated and alears are sent as neccessary
+# return: none
+sub ld_emailalert_resend
+{
+   my $currenttime=time();
+   

Bug#378450: ldirectord-2: unwanted emailalerts

2006-07-16 Thread Horms
Package: ldirectord-2
Version: 2.0.6-1
Severity: serious

ldirectord-2 has been reported to be trying to send emailalerts even if
not configured to do so. I haven't verified this behaviour myself, and I
don't have time to right now. This bug should hold ldirectord-2 out of
etch, until I (or someone else) gets a chance to investigate further.

If worst comes to worse, email alearts can just be stripped out
of the ldirectord source code. But I doubt anything that drastic 
is required.

-- 
Horms   
  H: http://www.vergenet.net/~horms/
  W: http://www.valinux.co.jp/en/



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#375941: heartbeat-2: uses adduser when it may not be available

2006-07-03 Thread Horms
On Mon, Jul 03, 2006 at 05:50:43PM -0400, Justin Pryzby wrote:
 I think the recommendation is to never remove a dynamically created
 user, precisely to avoid another user with the same ID owning those
 files.

Excellent, thanks for the info.

-- 
Horms   
  H: http://www.vergenet.net/~horms/
  W: http://www.valinux.co.jp/en/



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#375507: heartbeat: uses adduser when it may not be available

2006-06-28 Thread Horms
On Mon, Jun 26, 2006 at 02:53:55PM +0100, James Troup wrote:
 Package: heartbeat
 Version: 1.2.4-9
 Severity: serious
 Justification: breaks buildds
 
 | Purging configuration files for heartbeat ...
 | /var/lib/dpkg/info/heartbeat.postrm: line 25: deluser: command not found

Is it sufficient just to make the call do deluser conditional on it
existing (or let it ignore the error) ? Or do I need to move deluser
into prerm somehow?

-- 
Horms   
H: http://www.vergenet.net/~horms/  W: http://www.valinux.co.jp/en/



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#369815: [Linux-ha-dev] Re: Bug#369815: ships binary in /etc

2006-06-07 Thread Horms
On Tue, Jun 06, 2006 at 11:01:25PM -0600, Alan Robertson wrote:
 Horms wrote:
 On Thu, Jun 01, 2006 at 03:24:48PM +0200, Marc 'HE' Brockschmidt wrote:
 Package: heartbeat
 Severity: serious
 
 Heya,
 
 Let's see what the FHS says:
 No binaries should be located under /etc. [3.4]
 
 Now, what does heartbeat do?
 [EMAIL PROTECTED]:/tmp/he$ dpkg-deb -x heartbeat_1.2.4-8_i386.deb bar
 [EMAIL PROTECTED]:/tmp/he$ file bar/etc/ha.d/resource.d/IPv6addr
 bar/etc/ha.d/resource.d/IPv6addr: ELF 32-bit LSB executable, Intel 80386, 
 version 1 (SYSV), for GNU/Linux 2.4.1, dynamically linked (uses shared 
 libs), for GNU/Linux 2.4.1, stripped
 
 
 Unfortunately heartbeat (for fairly broken reasons IMHO) really
 needs those files there.
 
 Could we symlink 'em somewhere?

Yes, I think that is a good solution (short of rearanging the
resource paths completely). I can do this fairly easily in the Debian
packaging and intend to do so shortly. Do you want me to shoe-horn this
into the relevant Makefile.am, or just leave it as a Debian thing?

-- 
Horms   http://www.vergenet.net/~horms/



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#369815: ships binary in /etc

2006-06-05 Thread Horms
On Thu, Jun 01, 2006 at 03:24:48PM +0200, Marc 'HE' Brockschmidt wrote:
 Package: heartbeat
 Severity: serious
 
 Heya,
 
 Let's see what the FHS says:
 No binaries should be located under /etc. [3.4]
 
 Now, what does heartbeat do?
 [EMAIL PROTECTED]:/tmp/he$ dpkg-deb -x heartbeat_1.2.4-8_i386.deb bar
 [EMAIL PROTECTED]:/tmp/he$ file bar/etc/ha.d/resource.d/IPv6addr
 bar/etc/ha.d/resource.d/IPv6addr: ELF 32-bit LSB executable, Intel 80386, 
 version 1 (SYSV), for GNU/Linux 2.4.1, dynamically linked (uses shared libs), 
 for GNU/Linux 2.4.1, stripped
 

Unfortunately heartbeat (for fairly broken reasons IMHO) really
needs those files there.

-- 
Horms   http://www.vergenet.net/~horms/



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#369815: ships binary in /etc

2006-06-05 Thread Horms
On Mon, Jun 05, 2006 at 10:46:02AM +0100, Stephen Gran wrote:
 This one time, at band camp, Horms said:
  On Thu, Jun 01, 2006 at 03:24:48PM +0200, Marc 'HE' Brockschmidt wrote:
   Let's see what the FHS says:
   No binaries should be located under /etc. [3.4]
   
   Now, what does heartbeat do?
   [EMAIL PROTECTED]:/tmp/he$ dpkg-deb -x heartbeat_1.2.4-8_i386.deb bar
   [EMAIL PROTECTED]:/tmp/he$ file bar/etc/ha.d/resource.d/IPv6addr
   bar/etc/ha.d/resource.d/IPv6addr: ELF 32-bit LSB executable, Intel 80386, 
   version 1 (SYSV), for GNU/Linux 2.4.1, dynamically linked (uses shared 
   libs), for GNU/Linux 2.4.1, stripped
  
  Unfortunately heartbeat (for fairly broken reasons IMHO) really
  needs those files there.
 
 Can't it be a symlink?

I didn't realise that would resolve the problem. 
Yes, I believe it can be. I will see about making it so.

-- 
Horms   http://www.vergenet.net/~horms/



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#352027: acknowledged by developer (Bug#352027: fixed in heartbeat 1.2.4-3)

2006-02-12 Thread Horms
On Sat, Feb 11, 2006 at 09:43:09PM -0800, Steve Langasek wrote:
 On Sun, Feb 12, 2006 at 01:17:03PM +0900, Horms wrote:
  On Sat, Feb 11, 2006 at 03:06:36PM -0800, Steve Langasek wrote:
   On Sat, Feb 11, 2006 at 09:50:20PM +0900, Horms wrote:
On Sat, Feb 11, 2006 at 12:51:00PM +0100, Bastian Blank wrote:
 reopen 352027
 severity 352027 serious
 retitle 352027 heartbeat - pre-depends on adduser without consensus
 
What exactly is that supposed to mean?
That we all need to agree before adding the pre-depends?
That we aren't sure if it solves the problem? That
pre-depends should be added with extreeme caution?
Are there other options available? I'm pretty ambivilent
about how this problem gets fixed. Just let me know what
you decide.
 
   Policy says that pre-depends must be discussed on debian-devel.  So post 
   to
   debian-devel, wait a few days, then close this bug again. :)  I don't
   anticipate any objections, adduser is commonly found in pre-depends and
   heartbeat is not a high-priority package (in the Priority: sense).
 
  Ok, understood. 
 
  Adduser is only used to create a system group and user on install
  if it doesn't exist. Is there an alternate way to do this
  that wouldn't require a pre-depends?
 
 Don't ship files in your package that are owned by the user/group, just
 call adduser and create any files/directories you need to in the postinst?

Thats exactly what is happening :-)

 Anyway, ought to be discussed on -devel :)

Fine, though I would have thought that this is a fairly common
scenario with a canned solution.

-- 
Horms


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#352027: acknowledged by developer (Bug#352027: fixed in heartbeat 1.2.4-3)

2006-02-12 Thread Horms
On Sun, Feb 12, 2006 at 12:16:31AM -0800, Steve Langasek wrote:
 On Sun, Feb 12, 2006 at 05:07:57PM +0900, Horms wrote:
  On Sat, Feb 11, 2006 at 09:43:09PM -0800, Steve Langasek wrote:
   On Sun, Feb 12, 2006 at 01:17:03PM +0900, Horms wrote:
On Sat, Feb 11, 2006 at 03:06:36PM -0800, Steve Langasek wrote:
 On Sat, Feb 11, 2006 at 09:50:20PM +0900, Horms wrote:
  On Sat, Feb 11, 2006 at 12:51:00PM +0100, Bastian Blank wrote:
   reopen 352027
   severity 352027 serious
   retitle 352027 heartbeat - pre-depends on adduser without 
   consensus
 
  What exactly is that supposed to mean?
  That we all need to agree before adding the pre-depends?
  That we aren't sure if it solves the problem? That
  pre-depends should be added with extreeme caution?
  Are there other options available? I'm pretty ambivilent
  about how this problem gets fixed. Just let me know what
  you decide.
 
 Policy says that pre-depends must be discussed on debian-devel.  So 
 post to
 debian-devel, wait a few days, then close this bug again. :)  I don't
 anticipate any objections, adduser is commonly found in pre-depends 
 and
 heartbeat is not a high-priority package (in the Priority: sense).
 
Ok, understood. 
 
Adduser is only used to create a system group and user on install
if it doesn't exist. Is there an alternate way to do this
that wouldn't require a pre-depends?
 
   Don't ship files in your package that are owned by the user/group, just
   call adduser and create any files/directories you need to in the postinst?
 
  Thats exactly what is happening :-)
 
 Uh, in that case there shouldn't be any reason to create the user in the
 *pre*inst, right?

Ok, I was confused. Its exactly what should be happening.
I'll rearange things so that it is. And re-upload.



-- 
Horms


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#352027: acknowledged by developer (Bug#352027: fixed in heartbeat 1.2.4-3)

2006-02-11 Thread Horms
On Sat, Feb 11, 2006 at 12:51:00PM +0100, Bastian Blank wrote:
 reopen 352027
 severity 352027 serious
 retitle 352027 heartbeat - pre-depends on adduser without consensus

What exactly is that supposed to mean?
That we all need to agree before adding the pre-depends?
That we aren't sure if it solves the problem? That
pre-depends should be added with extreeme caution?
Are there other options available? I'm pretty ambivilent
about how this problem gets fixed. Just let me know what
you decide.

Presumably these alterations to 352027 also apply to 352158.
Could you please update that bug too?

-- 
Horms


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#352027: acknowledged by developer (Bug#352027: fixed in heartbeat 1.2.4-3)

2006-02-11 Thread Horms
On Sat, Feb 11, 2006 at 03:06:36PM -0800, Steve Langasek wrote:
 On Sat, Feb 11, 2006 at 09:50:20PM +0900, Horms wrote:
  On Sat, Feb 11, 2006 at 12:51:00PM +0100, Bastian Blank wrote:
   reopen 352027
   severity 352027 serious
   retitle 352027 heartbeat - pre-depends on adduser without consensus
 
  What exactly is that supposed to mean?
  That we all need to agree before adding the pre-depends?
  That we aren't sure if it solves the problem? That
  pre-depends should be added with extreeme caution?
  Are there other options available? I'm pretty ambivilent
  about how this problem gets fixed. Just let me know what
  you decide.
 
 Policy says that pre-depends must be discussed on debian-devel.  So post to
 debian-devel, wait a few days, then close this bug again. :)  I don't
 anticipate any objections, adduser is commonly found in pre-depends and
 heartbeat is not a high-priority package (in the Priority: sense).

Ok, understood. 

Adduser is only used to create a system group and user on install
if it doesn't exist. Is there an alternate way to do this
that wouldn't require a pre-depends?



-- 
Horms


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#339485:

2005-11-20 Thread Horms
merge 339487 339485
thanks

In article [EMAIL PROTECTED] you wrote:
 This should be merged with 339487
 
 (typed  --body option rather than --body-file)

Merging as requested.

-- 
Horms


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#333052: Bug#333522: possible problem cause: wait4(-1)

2005-11-01 Thread Horms
On Tue, Nov 01, 2005 at 09:35:35AM +0100, Marco d'Itri wrote:
 On Nov 01, Rusty Russell [EMAIL PROTECTED] wrote:
 
  Hmm, if the root filesystem is read-only, then the locking will fail
  (you need to open a file read/write to get an exclusive fcntl lock).
  Perhaps this is happening to you?  If not, please check again that you
 Sure, all of this happens when / is read only.

Perhaps a rw tmpfs could save the day.
Just an idea.

-- 
Horms


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#333522: linux-image-2.6.14-1-686-smp: occurs in stock linux-image as well

2005-10-31 Thread Horms
On Mon, Oct 31, 2005 at 03:10:29PM -0800, Paul Traina wrote:
 Package: linux-image-2.6.14-1-686-smp
 Version: 2.6.14-1
 Followup-For: Bug #333522
 
 udev/unstable uptodate 0.071-1
 
 Just to cover the blanks, it is occuring as well with stock 2.6.14
 debian kernels.  This is a straight kernel built with an up to date
 initramfs tools.  initramfs-tools rebuilt the initramfs several times
 (I've beend debugging evms) while running 2.6.14 and depmod -a's have
 occured.
 
 Let me know if I can test/help/hack.  I'm 99.9% certain its due to
 modprobe being called in parallel by the new udev code.  Don't
 understand why m-i-t isn't serializing the right bits.

Yes, that seems to be the current school of thought.
Rusty has been thinking it over with Marco, but we are
yet to find the solution.

-- 
Horms


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#333052: udev issue

2005-10-30 Thread Horms
On Sun, Oct 30, 2005 at 09:32:42PM +0100, Sven Luther wrote:
 On Sun, Oct 30, 2005 at 05:23:42PM +0100, Elimar Riesebieter wrote:
  Hi all,
  
  I am running 2.6.14 from Debian sources on my PB5,6. Booting gives
  some Unknown issuses:
  $ dmesg | grep Unk
  ohci_hcd: Unknown symbol usb_hcd_pci_suspend
  ohci_hcd: Unknown symbol usb_hcd_pci_probe
  ohci_hcd: Unknown symbol usb_trylock_device
  ohci_hcd: Unknown symbol usb_disabled
  ohci_hcd: Unknown symbol usb_unlock_device
  ohci_hcd: Unknown symbol usb_lock_device
  ohci_hcd: Unknown symbol usb_calc_bus_time
  ohci_hcd: Unknown symbol usb_hcd_pci_resume
  ohci_hcd: Unknown symbol usb_hcd_giveback_urb
  ohci_hcd: Unknown symbol usb_set_device_state
  ohci_hcd: Unknown symbol usb_hcd_pci_remove
  ohci_hcd: Unknown symbol usb_hcd_pci_suspend
  ohci_hcd: Unknown symbol usb_hcd_pci_probe
  ohci_hcd: Unknown symbol usb_trylock_device
  ohci_hcd: Unknown symbol usb_disabled
  ohci_hcd: Unknown symbol usb_unlock_device
  ohci_hcd: Unknown symbol usb_lock_device
  ohci_hcd: Unknown symbol usb_calc_bus_time
  ohci_hcd: Unknown symbol usb_hcd_pci_resume
  ohci_hcd: Unknown symbol usb_hcd_giveback_urb
  ohci_hcd: Unknown symbol usb_set_device_state
  ohci_hcd: Unknown symbol usb_hcd_pci_remove
  
  The usb2 iface seems to work properly.
  Suggestions?
 
 This is a strange bug in the 2.6.12+ kernel packages.
 
 For some obscure reason, neither at postinst time nor at boot time the depmod
 get's regenerated properly, so simply run depmod yourself and it goes away.
 
 If you have time to investigate this, it would be really appreciated.

Actually, I believe it is #333052 for which a solution still alludes us.
Although it does seem to be a modprobe problem tickled by recent changes
to udev.

http://bugs.debian.org/cgi-bin/333052

-- 
Horms


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#310982: does this affect etch/sid?

2005-10-30 Thread Horms
On Sun, Oct 30, 2005 at 03:42:24PM -0500, Joey Hess wrote:
 This bug seems to be full of discussion of sarge, and was closed until
 3.0.14a-4 didn't make the cut for sarge. Does it also affect etch and
 sid? If not, could you close it for those, so we can stop tracking it as
 a security issue for them?

I believe that this is a 2.4.27 bug. 2.4.27-11, the sid version,
still has this bug. I am still looking for someone to test or
comment on the patch I posted. Though I am tempted to put it
into 2.4.27-12 untested.

-- 
Horms


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#335993: acknowledged by developer (Well, this bug presented itself in experimental, and now is fixed there)

2005-10-29 Thread Horms
On Sat, Oct 29, 2005 at 12:48:15AM -0700, Debian Bug Tracking System wrote:
 Version: 10.002
 
 Hi,
 
 Since the bug is fixed in an upload to experimental, and the
  bug itself was never in Sid, ...

Thats fine by me.

-- 
Horms


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#336295: linux-2.6 arch specific include/asm-$(ARCH)/ headers are not included in linux-headers-2.6.14-1 packages

2005-10-29 Thread Horms
On Sat, Oct 29, 2005 at 12:41:55PM +0300, Modestas Vainius wrote:
 Hi,
 
 the bug title says almost everything. include/asm-${ARCH} headers
 are missing from linux-headers-2.6.14-1 as of revision -1 (tested
 on i836 and amd64). This makes linux-headers almost unusable for
 building external modules.
 
 This is likely the bug in the current kernel-package in unstable.
 Please reassign if so.

Thanks for pointing this out, I'm guessing its actually a problem
in linux-2.6's packaging (the stuff in debian/) rather than
kernel-packaging. In any case it shouldn't be too hard to resolve
and it should go into -2, soon.

-- 
Horms


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#336295: Bug#336412: linux-headers-2.6.14-1-686: missing links on headers' tree render package unusable

2005-10-29 Thread Horms
On Sun, Oct 30, 2005 at 05:36:23AM +0100, Mau wrote:
 Package: linux-headers-2.6.14-1-686
 Version: 2.6.14-1
 Severity: grave
 Justification: renders package unusable
 
 
 many links in the headers' tree are not created by the package; every package 
 installation gives unpredictable results, sometimes a link was made, 
 sometimes not.
 Furthermore an include/asm link to not existing asm-i386 dir is present
 (the package only supplies asm-generic?).
 
 These problems make compilation against these headers impossible, so
 this package is now in an unusable state.

Thanks, this is actually a duplicate of 336295, lets track it there.

http://bugs.debian.org/336295

-- 
Horms


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#333052: Bug#333522: possible problem cause: wait4(-1)

2005-10-28 Thread Horms
On Fri, Oct 28, 2005 at 05:24:44PM +1000, Rusty Russell wrote:
 On Thu, 2005-10-27 at 10:10 +0200, Marco d'Itri wrote:
  And then it fails for ehci-hcd too (which is not loaded at all).
  Rusty, do you have other ideas for debugging?
 
 I have reread the bug reports, and meditated on this issue some more.
 This is a possibility I was aware of when I changed to code to drop the
 module_mutex before calling mod-init(), years ago.  Sorry it took so
 long.

Thanks, very much appreciated. Hopefully this solves our woes.

-- 
Horms


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#336153: kernel-image-2.6.8-2-386: Filesystem errors while writing to DM disk

2005-10-28 Thread Horms
Is it possible for you to see if this problem also exists in 2.6.12?

There is a 2.6.12-5.99.sarge1 backport at
http://packages.vergenet.net/testing/linux-2.6/

-- 
Horms


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#328707: kernel-source-2.4.27: Compile fails

2005-10-28 Thread Horms
On Fri, Oct 28, 2005 at 08:26:45PM -0400, micah wrote:
 -BEGIN PGP SIGNED MESSAGE-
 Hash: SHA1
 
 Björn Andersson wrote:
 
  {standard input}: Assembler messages:
  {standard input}:737: Error: suffix or operands invalid for `mov'
  {standard input}:738: Error: suffix or operands invalid for `mov'
  {standard input}:832: Error: suffix or operands invalid for `mov'
  {standard input}:833: Error: suffix or operands invalid for `mov'
  {standard input}:874: Error: suffix or operands invalid for `mov'
  {standard input}:875: Error: suffix or operands invalid for `mov'
  {standard input}:877: Error: suffix or operands invalid for `mov'
  {standard input}:889: Error: suffix or operands invalid for `mov'
  distcc[25163] ERROR: compile process.c on localhost failed
  make[2]: *** [process.o] Error 1
  
  
  I believe this has to do with the new binutils in unstable.
 
 I had this same problem and solved it by changing my symlink for
 /usr/bin/gcc to point to gcc-3.3 instead of 4.0 for the duration of the
 2.4 compile. Clearly this isn't the best solution, but its a work-around.

Strange, kernel-source-2.4.27-11 should be using gcc-3.3, as I
patched the top-level Makefile to do so. But I think I am seeing
this problem too, so I guess there is a hole in there somewhere.

-- 
Horms



Bug#335993: kernel-package: Problem with kernel_version.mk causes build fauilure

2005-10-27 Thread Horms
Package: kernel-package
Version: 10.001
Severity: grave
Tags: experimental
Justification: renders package unusable


Hi,

first up sorry if this is known, it only manifests in 10.001, 
I built (and uploaded) linux-2.6-2.6.13+2.6.14-rc4 for i386,
using 9.008.4, the version in sid.

I've appended a build log below, but basically it seems
to fail when trying to build linux-2.6-2.6.13+2.6.14-rc4
because of some issue in kernel_version.mk

Let me know if you want me to investigate further,
it seems to be trivial to reproduce over here.

-- System Information:
Debian Release: testing/unstable
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.14-rc4-1-686-smp
Locale: LANG=ja_JP.eucJP, LC_CTYPE=ja_JP.eucJP (charmap=EUC-JP) (ignored: 
LC_ALL set to ja_JP.eucJP)

Versions of packages kernel-package depends on:
ii  dpkg 1.13.11.0.1 package maintenance system for Deb
ii  dpkg-dev 1.13.11 package building tools for Debian
ii  gcc [c-compiler] 4:4.0.2-1   The GNU C compiler
ii  gcc-3.2 [c-compiler] 1:3.2.3-9   The GNU C compiler
ii  gcc-3.3 [c-compiler] 1:3.3.6-10  The GNU C compiler
ii  gcc-3.4 [c-compiler] 3.4.4-9 The GNU C compiler
ii  gcc-4.0 [c-compiler] 4.0.2-3 The GNU C compiler
ii  make 3.80-11 The GNU version of the make util
ii  perl 5.8.7-7 Larry Wall's Practical Extraction 

Versions of packages kernel-package recommends:
ii  bzip2 1.0.2-10   high-quality block-sorting file co
ii  libc6-dev [libc-dev]  2.3.5-7GNU C Library: Development Librari

-- no debconf information


dpkg-buildpackage: source package is linux-2.6
dpkg-buildpackage: source version is 2.6.13+2.6.14-rc4-0experimental.1
dpkg-buildpackage: source changed by Simon Horman [EMAIL PROTECTED]
dpkg-buildpackage: host architecture i386
 fakeroot debian/rules clean
dh_testdir
rm -f version.Debian
cd debian; rm -f *.kpatches.arch
rm -rf debian/build debian/stamps debian/lib/python/*.pyc
dh_clean
 debian/rules build
dh_testdir
/usr/bin/make -f debian/rules.gen setup-i386
make[1]: Entering directory 
`/home/horms/tmp/debian-kernel-test/linux-2.6.13+2.6.14-rc4/linux-2.6-2.6.13+2.6.14-rc4'
/usr/bin/make -f debian/rules.real setup-arch 
SOURCE_VERSION='2.6.13+2.6.14-rc4-0experimental.1' VERSION='2.6.14' 
SOURCE_UPSTREAM='2.6.13+2.6.14-rc4' ABINAME='rc4' KPKG_ABINAME='' ARCH='i386' 
UPSTREAM_VERSION='2.6.14-rc4' REVISIONS='0experimental.1'
make[2]: Entering directory 
`/home/horms/tmp/debian-kernel-test/linux-2.6.13+2.6.14-rc4/linux-2.6-2.6.13+2.6.14-rc4'
rm -rf debian/build/source
mkdir -p debian/build/source
cp -al COPYING CREDITS Documentation Kbuild MAINTAINERS Makefile README 
REPORTING-BUGS arch crypto drivers fs include init ipc kernel lib mm net 
scripts security sound usr debian/build/source
cd debian/build/source; override_version=2.6.13+2.6.14-rc4-0experimental.1 
override_revisions=0experimental.1 
home=/home/horms/tmp/debian-kernel-test/linux-2.6.13+2.6.14-rc4/linux-2.6-2.6.13+2.6.14-rc4/debian/patches-debian
 sh 
/home/horms/tmp/debian-kernel-test/linux-2.6.13+2.6.14-rc4/linux-2.6-2.6.13+2.6.14-rc4/debian/bin/apply
W: No version.Debian file, assuming pristine Linux 2.6.13+2.6.14-rc4
amd64-int3-fix.patchOK (+)
fbdev-radeon-noaccel.patch  OK (+)
fs-asfs-2.patch OK (+)
ia64-irq-affinity-upfix.patch   OK (+)
modular-ide.patch   OK (+)
modular-ide-pnp.patch   OK (+)
powerpc-calibrate-tau.patch OK (+)
powerpc-g3-750cxe.patch OK (+)
powerpc-mkvmlinuz-support.patch OK (+)
powerpc-serial.patchOK (+)
qla2xxx-removed.patch   OK (+)
sparc64-hme-lockup.patchOK (+)
tty-locking-fixes9.patchOK (+)
version.patch   OK (+)
powerpc-mv643xx-hotplug-support.patch   OK (+)
powerpc-apus.patch  OK (+)
s390-uaccess-const.patchOK (+)
-- 2.6.13+2.6.14-rc4-0experimental.1 fully applied.
#make-kpkg does this when building kernel-source.
mv debian/build/source/scripts/package/Makefile 
debian/build/source/scripts/package/Makefile.dist
mv debian/build/source/scripts/package/builddeb 
debian/build/source/scripts/package/builddeb.dist
echo # Dummy Makefile  debian/build/source/scripts/package/Makefile
echo all:  debian/build/source/scripts/package/Makefile
touch debian/stamps/source
make[2]: Leaving directory 
`/home/horms/tmp/debian-kernel-test/linux-2.6.13+2.6.14-rc4/linux

Bug#328534: Reopening

2005-10-26 Thread Horms
On Wed, Oct 26, 2005 at 10:02:05AM +0200, Sven Luther wrote:
 On Tue, Oct 25, 2005 at 11:57:30PM -0700, Jurij Smakov wrote:
  reopen 328534
  thanks
  
  This bug needs to be reopened in view of the new information. Apparently, 
  our 2.6.12-10 kernel, which includes the backported fix for the dpt_i2o 
  SCSI driver still oopses. Also, it has been reported that 2.6.13 that 
  should include all the upstream fixes hangs during dpt_i2o initialization 
  (see the previous message).
 
 What about 2.6.14-rc5 ? 

Jurij, could you send a link to or post the patch?

-- 
Horms


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#333052: Bug#333522: possible problem cause: wait4(-1)

2005-10-26 Thread Horms
On Wed, Oct 26, 2005 at 09:37:54AM +0200, Marco d'Itri wrote:
 On Oct 26, Horms [EMAIL PROTECTED] wrote:
 
  Just to clarify, udevd gets a bunch of events and tries to
  serialise them into modprobe calls, right? Do you think there
 There is no serialization, only some throttling (IIRC it tries to run up
 to 10 child processes in parallel).

Ok, but it runs modprobe, not ismod, right?

  is any chance it might be calling modprobe out of order
  for some reason.
 The point is the dependencies are handled by modprobe, so the order in
 which udevd loads the modules at the top of the dependency tree is not
 relevant.

True.

 As Rusty suggested I wrapped /sbin/modprobe in a logger script, but so
 far I have not been able to reproduce the bug again (which may or may
 not be related, I need a few more reboots).

Thanks. I'm not having any luck reproducing the problem at all.

-- 
Horms


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#333052: Bug#333522: possible problem cause: wait4(-1)

2005-10-25 Thread Horms
On Fri, Oct 21, 2005 at 04:54:35PM +0200, Marco d'Itri wrote:
 On Oct 21, Horms [EMAIL PROTECTED] wrote:
 
  I did a bit of a poke around this symbols problem.
  I puzzeled over it for a while. I began to wonder
  if it might be caused byudevsynthesize[1] which seems
  to be the major change between -2 and -4, and I completely
  failed in all my attempts to reproduce the problem.
 It's *exposed* by udevsynthesize because it makes udevd try to load in
 parallel a big number of modules at the same time. I expect that you
 should be able to reproduce the bug with:
 
 for m in $MODULES; do /sbin/modprobe $m ; done

Just to clarify, udevd gets a bunch of events and tries to
serialise them into modprobe calls, right? Do you think there
is any chance it might be calling modprobe out of order
for some reason.

  I then chatted it over with some people, and they suggested
  that it might actually be a problem with a bogus depmod run.
 No, it's not. I checked my modules.dep and it's correct, and anyway if
 it were broken loading the same modules with modprobe from the command
 line would not work.

True

  Alternateively, its seems there is a high correlation between
  this problem and loading uhci_hcd. Providing lspci -vv might help a bit.
 Also 8250, but I can't see how this could be related to the hardware at
 all... All of this happens before the drivers are even initialised.
 Do not forget that the bug is not reliably reproducible, some days on my
 system may fail one of 8250, 8250_pnp, uhci_hcd or nothing at all.

What I am wondering is, perhaps there are some modules that cause
udevd to generate events in the wrong order. This would line up
with your theory that the bug is probably in the kernel, though
as I can't reproduce it, it is somewhat tricky to debug.

-- 
Horms


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#333052: Bug#333522: possible problem cause: wait4(-1)

2005-10-21 Thread Horms
I did a bit of a poke around this symbols problem.
I puzzeled over it for a while. I began to wonder
if it might be caused byudevsynthesize[1] which seems
to be the major change between -2 and -4, and I completely
failed in all my attempts to reproduce the problem.

[1] http://marc.theaimsgroup.com/?t=11248247225r=1w=2

I then chatted it over with some people, and they suggested
that it might actually be a problem with a bogus depmod run.
Can people who are seeing this run depmod manually and 
see if the problem goes away?

Alternateively, its seems there is a high correlation between
this problem and loading uhci_hcd. Providing lspci -vv might help a bit.
Also, what kind of usb devices do the people who are seeing this have
plugged in. I tried with a few I found lying around the office,
but to no avail. 

-- 
Horms


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#333522: possible problem cause: wait4(-1)

2005-10-20 Thread Horms
On Thu, Oct 20, 2005 at 09:44:07AM +0200, Marco d'Itri wrote:
 On Oct 20, Horms [EMAIL PROTECTED] wrote:
 
  Could you please point me to the part of the code where udevd calls
  modprobe and handles the subsequent SIGCHLD? That will be a good starting 
  poing
  for further investigation.
 run_program() in udev_utils_run.c, called from main in udev.c.
 
 pid = fork();
 switch(pid) {
 ...
 default:
 ...
 waitpid(pid, status, 0);

thanks

-- 
Horms


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#333522: possible problem cause: wait4(-1)

2005-10-19 Thread Horms
On Wed, Oct 19, 2005 at 03:14:53PM +0200, Marco d'Itri wrote:
 reassign 333522 linux-2.6
 thank
 
 On Oct 19, Rusty Russell [EMAIL PROTECTED] wrote:
 
  Right.  It's not a modprobe bug then.  Thanks, that makes sense.
 Oops... I did not read correctly Rusty's answer.
 If it's not a modprobe bug and not an udev bug (I checked udevd and it
 looks fine to me) then looks like it is a kernel bug.

Could you please point me to the part of the code where udevd calls
modprobe and handles the subsequent SIGCHLD? That will be a good starting poing
for further investigation.

-- 
Horms


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#334113: linux-image-2.6.12-1-powerpc: kernel allows loadkeys to be used by any user, allowing for local root compromise

2005-10-18 Thread Horms
Thanks, that seems like a genuine problem, I am forwarding it
upstream for consideration as it is not immediately apparent to me 
what the best solution is.

-- 
Horms


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#334113: kernel allows loadkeys to be used by any user, allowing for local root compromise

2005-10-18 Thread Horms
On Sat, Oct 15, 2005 at 06:03:31PM +0200, Rudolf Polzer wrote:
 Package: linux-image-2.6.12-1-powerpc
 Version: 2.6.12-10
 Severity: critical
 Tags: security
 Justification: root security hole
 
 
 The non-suid command loadkeys can be used by any local user having
 console access. It does not just apply to the current virtual console
 but to all virtual consoles and its effect persists even after logout.
 
 A proof of concept would be (^V, ^C etc. refer to key presses on the
 console):
 
 loadkeys
 keycode 15 = F23
 string F23 = ^V^C^V^Mecho hello world^V^M
 ^D
 
 Then log out and let root login (in a computer pool, you can usually get
 an admin to log on as root on a console somehow). The next time he'll
 press TAB to complete a file name, he instead will run the shell
 command.
 
 Of course, the shell command could be more evil, e.g. add a line to
 /etc/passwd, clear the screen to make it less obvious, sync and write
 stuff to /dev/mem to cause a kernel crash so that most people would not
 suspect anything but a hardware fault. A demo exploit adding a line to
 the password file, clearing the screen and logging out exists in form of
 a shell script.
 
 As a solution, I propose that the loadkeys command (or more exactly, the
 kernel interface it uses) should be restricted to root and instead one
 could add a suid wrapper for loadkeys that only allows the system-wide
 keymaps to be loaded. The old behaviour could still be made selectable
 using a procfs file.
 
 If the last modification time of the manual page of loadkeys is true,
 this bug exists in the Linux kernel at least since 1997. However, the
 BUGS section of the manpage does not hint that the loadkeys command
 can even be used as a root compromise and not just for stuff like
 unbinding all keys.
 
 Plus, it might be good to have a way to disable chvt for non-root users.
 Using chvt, a malicious user could do the same thing in an X session:
 remap Backspace to another key, handle Ctrl-Alt-Backspace by chvt 1;
 chvt 7 (so the video mode switches) and showing a fake login manager on
 the X display. If chvt were not possible for mere mortals, the admin
 would be able to disable all possible video mode switching caused by X
 applications (like xrandr, xvidmode, dpms) in the xorg.conf file so that
 he finally knows: if Ctrl-Alt-Backspace caused video mode switching, the
 resulting login screen is genuine.
 
 Another solution would be a keymap-invariant non-remappable zap key
 combination with the functionality of Alt-SysRq-K - but on an X screen,
 it should tell the X server to exit instead of kill -9ing it so that the
 video mode gets restored. And it should be able to make a kernel support
 it without adding all of the other Magic SysRq Key features. Of
 course, it should lock the keymap until the user tells the system to
 unlock it again.
 
 Or, even better: a root login key. That is, something unremappable
 that causes a new VT to be created with a login prompt for root - and
 while this VT is active, the keymap should be locked to the system-wide
 standard keymap. Ideally, that root login key should also work from X
 and maybe even when the X server has crashed.

Hi,

I recently received the following message through the debian Bug tracker.

http://bugs.debian.org/334113

In a nuthsell it raises concernes about the effects of giving
users access to VT ioctls and outlines a potential attack 
using loadkeys to execute commands as root.

I took a very brief look over it, and the concern does seem valid to me.
Most of the VT ioctls are only garded by the following permissions,
the ioctl in question, which I believe is KDSKBSENT, is no exception:

drivers/char/vt_ioctl.c: vt_ioctl(): line 377

/*
 * To have permissions to do most of the vt ioctls, we either
 * have
 * to be the owner of the tty, or have CAP_SYS_TTY_CONFIG.
 */
perm = 0;
if (current-signal-tty == tty || capable(CAP_SYS_TTY_CONFIG))
perm = 1;


A simple fix for this might be just checking for capable(CAP_SYS_TTY_CONFIG)
in do_kdgkb_ioctl(), which effects KDSKBSENT. This more restrictive
approach is probably appropriate for many of the other ioctls that set
VT parameters.

However, the changes will still affect all consoles and be persistant
after the user logs out of the console. It would seem more logical to
have the state apply only to the current console, and only for the
duration of the session. The latter could be handled in user-space if
the ioctls were privelaged. But I suspect adding the former might be
somewhat difficult.

The same kind of issue also seems to be relevant to many of the other VT
ioctls.

I'm not really familiar enough with the code to comment more, though I
am happy to code-up ideas if people can point me in the right direction.

-- 
Horms


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#334113: [Security] kernel allows loadkeys to be used by any user, allowing for local root compromise

2005-10-18 Thread Horms
On Mon, Oct 17, 2005 at 11:52:11PM -0700, Andrew Morton wrote:
 Horms [EMAIL PROTECTED] wrote:
 
  drivers/char/vt_ioctl.c: vt_ioctl(): line 377
  
   /*
* To have permissions to do most of the vt ioctls, we either
* have
* to be the owner of the tty, or have CAP_SYS_TTY_CONFIG.
*/
   perm = 0;
   if (current-signal-tty == tty || capable(CAP_SYS_TTY_CONFIG))
   perm = 1;
  
  
   A simple fix for this might be just checking for 
  capable(CAP_SYS_TTY_CONFIG)
   in do_kdgkb_ioctl(), which effects KDSKBSENT. This more restrictive
   approach is probably appropriate for many of the other ioctls that set
   VT parameters.
 
 I briefly discussed this with Alan and he agreed that that's a reasonable
 approach.

Thanks, thats pretty much what I had in mind. Though I would expect
some minor breakage, at least for people who expect nonsetuid loadkeys
to work. But then again, that is the whole point.

 I'll stick the below in -mm, see what breaks.
 
 --- devel/drivers/char/vt_ioctl.c~setkeys-needs-root  2005-10-17 
 23:50:37.0 -0700
 +++ devel-akpm/drivers/char/vt_ioctl.c2005-10-17 23:51:43.0 
 -0700
 @@ -192,6 +192,9 @@ do_kdgkb_ioctl(int cmd, struct kbsentry 
   int i, j, k;
   int ret;
  
 + if (!capable(CAP_SYS_TTY_CONFIG))
 + return -EPERM;
 +
   kbs = kmalloc(sizeof(*kbs), GFP_KERNEL);
   if (!kbs) {
   ret = -ENOMEM;
 _

-- 
Horms


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#330446: Fixed in NMU of initrd-tools 0.1.83

2005-10-16 Thread Horms
On Sun, Oct 16, 2005 at 03:17:06PM -0700, Sven Luther wrote:
 tag 324351 + fixed
 tag 329614 + fixed
 tag 330446 + fixed
 tag 333857 + fixed
 
 quit
 
 This message was generated automatically in response to a
 non-maintainer upload.  The .changes file follows.

For anyone who cares, this was not really an NMU, other
than in the technical sense. It was made by Sven, who
is a member of the Kernel Team, who maintains initrd-tools.

I have added him and myself as uploaders to avoid any future
confusion regarding uploads of initrd-tools made by Sven
(or myself).

 -BEGIN PGP SIGNED MESSAGE-
 Hash: SHA1
 
 Format: 1.7
 Date: Fri, 14 Oct 2005 07:50:57 +
 Source: initrd-tools
 Binary: initrd-tools
 Architecture: source all
 Version: 0.1.83
 Distribution: unstable
 Urgency: low
 Maintainer: Debian kernel team debian-kernel@lists.debian.org
 Changed-By: Sven Luther [EMAIL PROTECTED]
 Description: 
  initrd-tools - tools to create initrd image for prepackaged Linux kernel
 Closes: 324351 329614 330446 333857
 Changes: 
  initrd-tools (0.1.83) unstable; urgency=low
  .
[ Simon Horman ]
* Clarify naming of scripts that will be run.
  Thanks to Simon Schoar. (Closes: #324351)
* Make sure that path to output image is always fully qualified,
  else an image with a relative will not end up where requested
  (closes: #329614)
  .
[ dann frazier ]
* Don't assume update-modules is available during postrm (closes: #330446)
  .
[ Sven Luther ]
* Added --supported-(host|target)-version support for the new post-2.6.13
  ramdisk-tool policy. Added linux-ramdisk-tool virtual package too.
  (Closes: #333857)
 Files: 
  bb2f5ea3f208f972649dfb5d1cac123e 644 utils optional initrd-tools_0.1.83.dsc
  eff2ad61dc7e18f607d541bd71a53dac 28815 utils optional 
 initrd-tools_0.1.83.tar.gz
  dc7b11f6eb3cc3cf934c6639f1a1db3d 31728 utils optional 
 initrd-tools_0.1.83_all.deb
 
 -BEGIN PGP SIGNATURE-
 Version: GnuPG v1.4.1 (GNU/Linux)
 
 iD8DBQFDUs2o2WTeT3CRQaQRAhifAJ9jQVG+GwyAs7lGMD/dwllcAN/GmACfSEAA
 igkOcTRK7n9s9dQdA/xC2ew=
 =7/gM
 -END PGP SIGNATURE-

-- 
Horms


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#279689: Same here

2005-10-13 Thread Horms
tag 279689 +pending
tag 333067 +pending
thanks

On Wed, Oct 12, 2005 at 09:29:01PM -0700, Ian Eure wrote:
 Same problem as Rich reported. Old kernel was using the regular text
 console. System now boots with fbcon. It dies sometime after the network
 configuration with the endless scrolling rivafb_pan_display messages.
 
 It's been my experience that fbcon is slow and unreliable, and I don't
 think it should be the default. I'd at least like an option
 to /completely/ disable it - I don't want it loading any modules at all.
 
 Burning a netinst CD so I can get my system bootable again.

Hi, this bug has been merged with 333067 and discussion
there has resolved to disable the rivafb module, as it appears
to be a quite broken.

The discussion there also includes a suggested work around,
to move rivafb.ko (or remove it), so it isn't loaded at boot
(or any other time).

http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=333067

-- 
Horms


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#322273: pending bugs galore

2005-10-06 Thread Horms
tag 322273 +pending
tag 328389 +pending
tag 330353 +pending
thanks

These bugs are fixed for 2.6.8 in SVN and are pending release.
#322273: CAN-2005-2456: XFRM array index buffer overflow
#328389: CAN-2005-2800: memory leak in scsi procfs leads to local DoS
#330353: kernel-source-2.6.8: CAN-2005-3053


-- 
Horms


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#330329: 2.6.12-10 built on my sparc pbuilder

2005-09-28 Thread Horms
On Tue, Sep 27, 2005 at 11:32:29PM -0700, Blars Blarson wrote:
 linux-2.6 2.6.12-10 built fine on my sparc pbuilder.  I think the
 build should be requeued, preferably on auric if it has more disk
 space available.

Thanks for that information. I think Dannf was plaining to
do a binary-upload. But if that doesn't pan out, how can we 
get the build requeued?

-- 
Horms


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#330329: linux-2.6: 2.6.12-10 FTBFS on sparc

2005-09-27 Thread Horms
Package: linux-2.6
Severity: serious
Justification: no longer builds from source


Seems like 2.6.12-10 fails to build on sparc
http://buildd.debian.org/fetch.php?pkg=linux-2.6ver=2.6.12-10arch=sparcstamp=1127830883file=logas=raw

  LD  sound/usb/usx2y/built-in.o
  CC  net/socket.o
  CC  net/802/p8023.o
cc1: No such file or directory: opening dependency file
net/802/.p8023.o.d
make[6]: *** [net/802/p8023.o] Error 1
make[5]: *** [net/802] Error 2
make[4]: *** [net] Error 2

Curiously -6,-7,-8 and -10 all built on sparc
http://buildd.debian.org/fetch.php?pkg=linux-2.6ver=2.6.12-10arch=sparcstamp=1127830883file=logas=raw

I say curious, because -10 made ia64 and hppa changes

Does anyone have any ideas?
And if not, is there a box where I can play with building this?


-- System Information:
Debian Release: testing/unstable
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.13-rc3
Locale: LANG=ja_JP.eucJP, LC_CTYPE=ja_JP.eucJP (charmap=EUC-JP) (ignored: 
LC_ALL set to ja_JP.eucJP)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#330157: paer.debian.org and kernel builds

2005-09-26 Thread Horms
Hi,

We have a build problem with the kernel on hppa and I was hoping to
use paer.debian.org to do some test builds. If there is a better machine
please let me know. Otherwise, would it be possible to get the following
build dependancies installed in the sid chroot?

gcc-4.0-hppa64 
module-init-tools 
kernel-package (= 9.005) 
transfig
xmlto dh-kpatches (= 0.99.3)

-- 
Horms


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#330157: hppa build woe

2005-09-26 Thread Horms
tag 330157 +pending
thanks

I have fixed this in SVN by removing the spurious 
drivers/serial/serial_core.c.orig portion of hppa.patch.

Kyle is doing a test build on hppa, and I will 
upload tomorrow if that goes to plan.


-- 
Horms


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#330157: linux-2.6: [hppa] FTBFS -- hppa patch doesn't apply cleanly.

2005-09-26 Thread Horms
On Mon, Sep 26, 2005 at 01:54:04PM +0200, Sven Luther wrote:
 
 So, i guess there is some uncleanliness in the serial_core.c hppa patch, or
 maybe someting else. Simon Horman mentioned that part of the hppa patch should
 be separated and rejoin the main debian patches instead of keeping such a huge
 hppa-specific patch, maybe this would be the best time to do this, or at
 least try to get that done for 2.6.13-1.

Yes, I at a cursoary glance the hppa (and m68k) patches do
seem to contain portions that could be put in the main patch-set.
But I don't think that 2.6.12-10 is the time to do this, nor do
I think there is any rush to do it. More to the point, I only
took a cursoary look, so the patches may well be best left
where they are, though perhaps broken out a bit - one of the
best things our kernel packages have done over the past year
is to be very good at breaking out patches to correlate
to chanlog-entry level changes.

-- 
Horms


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#330214: kernel-image-2.6.8-2-686: kernel panic when using QUEUE target with iptables

2005-09-26 Thread Horms
On Mon, Sep 26, 2005 at 10:23:48PM +0300, Ilkka Pietikäinen wrote:
 Package: kernel-image-2.6.8-2-686
 Severity: critical
 Justification: breaks unrelated software
 
 
 Our userspace software uses QUEUE target with iptables. We have reports from 
 our
 customers that their debian systems are chrashing (with panics). With other 
 distrubutions
 we have detected similar behaviour and it is fixed by applying the patch from 
 
 https://lists.netfilter.org/pipermail/netfilter-devel/2005-July/020513.html
 
 This is a known problem in vanilla kernel and is already fixed.

Thanks, I will look into gettting that into the next 2.6.8 release.

-- 
Horms



Bug#330157: paer.debian.org and kernel builds

2005-09-26 Thread Horms
On Mon, Sep 26, 2005 at 10:27:56AM -0700, Matt Taggart wrote:
 
 Horms writes...
 
  We have a build problem with the kernel on hppa and I was hoping to
  use paer.debian.org to do some test builds. If there is a better machine
  please let me know.
 
 paer is the correct machine.

Thanks
 
  Otherwise, would it be possible to get the following
  build dependancies installed in the sid chroot?
  
  gcc-4.0-hppa64 
  module-init-tools 
  kernel-package (= 9.005) 
  transfig
  xmlto dh-kpatches (= 0.99.3)

Thanks, much appreciated. I'm using paer right now to
verify 2.6.12-10 before upload, its been a while since
2.6.12 actually built on hppa, but I think we are close
if not there. Thanks to Matthew Wilcox and Kyle McMartin
and others who did the real work.

-- 
Horms


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#328707: partial patch

2005-09-22 Thread Horms
On Thu, Sep 22, 2005 at 08:10:10AM +0200, Joey Hess wrote:
 Here's the best patch I've been able to find for this so far.

This is completely weird, any ideas why this hasn't shown up before?

-- 
Horms


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#328707: partial patch

2005-09-22 Thread Horms
On Thu, Sep 22, 2005 at 09:55:24AM +0200, Joey Hess wrote:
 Horms wrote:
  On Thu, Sep 22, 2005 at 08:10:10AM +0200, Joey Hess wrote:
   Here's the best patch I've been able to find for this so far.
  
  This is completely weird, any ideas why this hasn't shown up before?
 
 Apparently it's known breakage caused by the new binutils that I guess
 only just reached Debian in the past couple weeks. If you google for the
 error message you get several variants of the patch and a little bit of
 explanation.
 
 The patch isn't as partial as I thought, I'm a good way through a 2.4.27
 compile now.

Ok, that makes sense. Let me know if the build completes and if so
I'll add it to the tree.



-- 
Horms


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#289690: cannot access some files with samba

2005-09-13 Thread Horms
On Tue, Sep 13, 2005 at 12:24:49PM -0700, J. William Campbell wrote:
 This bug can easily be produced by creating a zero-length file on the 
 Windows XP system. Attempting to copy this empty file from XP to the 
 Linux system
 will then produce this error. Unfortunately this is not the only way to 
 produce the error, but zero-length files seem to always produce the error.

Hi,

could you please try the sarge backport of 2.6.12 to see
if this problem has been resolved in those packages.

http://packages.vergenet.net/testing/linux-2.6/

-- 
Horms


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#322500: libsnmp5: ABI change without SONAME change

2005-09-12 Thread Horms
On Fri, Sep 09, 2005 at 10:51:02AM +0200, Jochen Friedrich wrote:
 Hi Steve,
 
  The bug log at
  http://sourceforge.net/tracker/index.php?func=detailaid=1256697group_id=12694atid=112694
  shows that upstream has issued an official update for the soname of
  libsnmp, available in patch form at
  http://sourceforge.net/tracker/index.php?func=detailaid=1282477group_id=12694atid=456380.
  It would be ideal if you could apply this patch to net-snmp and upload,
  so that the segfaults in packages depending on libsnmp can be fixed.
 
 I know :-). I'm currently preparing the package and hope to get it out
 today.

Can someone advise me if heartbeat will need to be rebuilt
against these new packages?

-- 
Horms


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#327123: acknowledged by developer (Re: Bug#327123: kernel-kbuild-2.6-3: FTBFS cloop-src with kernel-headers-2.6.8-2-k7 in testing)

2005-09-08 Thread Horms
On Thu, Sep 08, 2005 at 09:30:46AM +0200, Kars de Jong wrote:
 On wo, 2005-09-07 at 21:48 -0700, Debian Bug Tracking System wrote:
 
  On Wed, Sep 07, 2005 at 09:37:29PM +0200, Kars de Jong wrote:
   Package: kernel-kbuild-2.6-3
   Version: 2.6.8-2
   Severity: serious
   Justification: no longer builds from source
  
  Hi,
  
  kernel-kbuild-2.6-3 has been removed from testing and unstable,
  it is only intended for sarge, and will only compile in that
  environment. If you really need to use it, you might be
  able to make it work by using gcc-3.3 instead of gcc-4.0.
 
 1) This package has not been removed from testing or unstable:
 Available versions:  Stable 2.6.8-2 Testing 2.6.8-2 Unstable 2.6.8-2

Sorry, I made a mistake when I checked. Yes kernel-kbuild-2.6-3 indeed in
testing and unstable. Though it is only used in conjucntion 
with the 2.6.11 kernel header packags, and they, along with
kernel-kbuild-2.6-3 will be removed shortly.

 2) I _AM_ using gcc-3.3 to compile. module-assistant automatically
 selects the right compiler. Also see the bug report: 
 
 CC=gcc-3.3 /usr/bin/make install-module KBUILD_VERBOSE=1 
 KERNEL_DIR=/usr/src/kernel-headers-2.6.8-2-k7 
 INSTALL_MOD_PATH=/usr/src/modules/cloop/debian/cloop-module-2.6.8-2-k7
 
 If you look at the log in the bug report you can see it is a missing
 kernel header, it has nothing to do with the compiler version used.

Ok, I did take a closer look. To be honest I'm not sure what
the relationship between the error that you report and 
kernel-kbuild-2.6-3 is.

The irq_vectors.h question is included in kernel-headers-2.6.8-2-k7
(incidently that has been removed from testing/unstable, please use
2.6.12 instead). It seems that you need to add
/usr/src/kernel-headers-2.6.8-2-k7/include/asm/mach-default/ (or
/usr/src/linux-headers-2.6.12-1-k7/include/asm/mach-default/ as the case
may be) to the include path, but I'm not entirely sure where that should
be done.

Actually, I'm not entirely sure what you mean by build cloop-src,
could you be a little more specific so that the problem can be
reproduced.

Thanks





-- 
Horms


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#289690: cannot access some files with samba

2005-09-01 Thread Horms
On Thu, Sep 01, 2005 at 09:54:45AM +0200, Daniel Kabs wrote:
 Hello,
 
 this is my first comment on bugs.debian.org. I hope this is the
 correct way to add my 5 cent to it.

Yes, indeed it is, thanks for the additional information.

-- 
Horms


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#325484: udev = 0.060-1 and kernels = 2.6.12

2005-08-31 Thread Horms
On Wed, Aug 31, 2005 at 01:59:26AM +0200, Marco d'Itri wrote:
 On Aug 31, Steve Langasek [EMAIL PROTECTED] wrote:
 
  If you aren't
  satisfied with the current solution, the answer is to figure out a
  better one rather than lamenting that no one else has.  (I do have a
 This is where these threads usually end...

With one of your terse one-liners?

-- 
Horms


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#325607: realtime-lsm: Module doesn't compile against 2.6.8-2-k7

2005-08-29 Thread Horms
On Mon, Aug 29, 2005 at 11:26:22PM +0200, Guenter Geiger wrote:
 
 
 
 On Mon, 29 Aug 2005, Nicholas Humfrey wrote:
 
  Package: realtime-lsm
  Version: 0.1.1-6
  Severity: grave
  Justification: renders package unusable
 
  The 2.6.8-2 kernel (which is the default on sarge) does not
  have CONFIG_SECURITY_SELINUX enabled, which means it is not
  possible to use this module against the default stock kernel.
 
 Hmm, it used to compile, is there a reason why this is not enabled
 anymore ? Is there something I could do better. Obviously, with the
 current situation realtime-lsm has to go.

From memory, that option was disabled in 2.6.8 because of
performance concerns. In any case, whats done is done, and
Sarge is most definately done. 2.6.8 is now in maintenance mode
and is/has been removed from testing/unstable. 

If this is a sarge issue, I guess we are stuck with it.
If you are looking at testing/unstable, then please use the kernels
provided by the linux-2.6 source package (currently 2.6.12), which
should have CONFIG_SECURITY_SELINUX (and other related options)
enabled.

-- 
Horms


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#325484: udev = 0.060-1 and kernels = 2.6.12

2005-08-28 Thread Horms
On Mon, Aug 29, 2005 at 01:46:49AM +0200, Marco d'Itri wrote:
 Package: udev,linux-2.6
 Severity: grave
 
 udev = 0.060-1 and kernels = 2.6.12 should enter testing at the same
 time.
 If udev is first it will refuse to be upgraded (or install but disable
 itself on new installs), if the kernel is first some udev rules
 (at least the ones referencing sysfs attributes) will not work.
 
 Monitor the situation at:
 
 http://bjorn.haxx.se/debian/testing.pl?package=linux-2.6
 http://bjorn.haxx.se/debian/testing.pl?package=udev
 
 and close this bug when both packages will be ready to enter testing
 at the same time.

Can this be resolved by some dependancies and conflicts?

-- 
Horms


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#324591: kernel-source-2.4.27: FTBFS: Missing Build-Depends

2005-08-22 Thread Horms
tags 324591 +pending
thanks

On Mon, Aug 22, 2005 at 02:29:56PM -0700, Daniel Schepler wrote:
 Package: kernel-source-2.4.27
 Severity: serious
 Version: 2.4.27-11
 
 From my build log (reproduced using pbuilder in an i386 chroot):
 
 ...
 make[5]: Entering directory `/tmp/buildd/kernel-source-2.4.27-2.4.27/scripts'
 gcc-3.3 -Wall -Wstrict-prototypes -O2 -fomit-frame-pointer -c -o docproc.o 
 docproc.c
 make[5]: gcc-3.3: Command not found
 make[5]: *** [docproc.o] Error 127
 make[5]: Leaving directory `/tmp/buildd/kernel-source-2.4.27-2.4.27/scripts'
 make[4]: *** [/tmp/buildd/kernel-source-2.4.27-2.4.27/scripts/docproc] Error 2
 make[4]: Leaving directory 
 `/tmp/buildd/kernel-source-2.4.27-2.4.27/Documentation/DocBook'
 make[3]: *** [sgmldocs] Error 2
 make[3]: Leaving directory `/tmp/buildd/kernel-source-2.4.27-2.4.27'
 make[2]: *** [real_stamp_doc] Error 2
 make[2]: Leaving directory `/tmp/buildd/kernel-source-2.4.27-2.4.27'
 make[1]: *** [stamp-doc] Error 2
 make[1]: Leaving directory `/tmp/buildd/kernel-source-2.4.27-2.4.27'
 make: *** [binary-indep] Error 2

Thanks for bringing this to my attention, I have added gcc-3.3 as a
build dependancy in SVN and it should appear in the next release.

-- 
Horms


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#322723: #322723 D-I: 'ip route add' fails w/ Network is unreachable

2005-08-21 Thread Horms
On Sun, Aug 21, 2005 at 01:14:45PM +0200, Frans Pop wrote:
 On Sunday 21 August 2005 03:56, Horms wrote:
  I've put the following in SVN, so this
  should be resolved in the next release.
 
 I noticed on IRC that you put a closes: #322723 in the changelog.
 I'm wondering if that is correct as I would say there still is a bad bug 
 in gcc-4.0 causing the kernel to break when compiled with optimization.
 
 You may want to leave the bug open at reduced priority so that 
 optimization may be reenabled when the problem in gcc-4.0 is fixed.
 
 For the same reason, maybe this bug should be cloned to gcc-4.0?

Good point, though it might be best just to reassign it to gcc-4.0.
I've seen this flag break stuff many time before - I actually
wonder if it ever works as intended.

-- 
Horms


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#323224: [Linux-ha-dev] heartbeat package is broken on Debian Sid?

2005-08-15 Thread Horms
On Tue, Aug 16, 2005 at 11:04:34AM +0800, James Pan wrote:
 see below please.
 
 
 [EMAIL PROTECTED]:~# dpkg-query -l libsnmp5
 Desired=Unknown/Install/Remove/Purge/Hold
 | Status=Not/Installed/Config-files/Unpacked/Failed-config/Half-installed
 |/ Err?=(none)/Hold/Reinst-required/X=both-problems (Status,Err: 
 uppercase=bad)
 ||/ Name  Version   Description
 +++-=-=-==
 ii  libsnmp5  5.2.1.2-2 NET SNMP (Simple 
 Network Management Protocol) Library
 
 [EMAIL PROTECTED]:~# apt-get install libstonith0
 Reading Package Lists... Done
 Building Dependency Tree... Done
 Some packages could not be installed. This may mean that you have
 requested an impossible situation or if you are using the unstable
 distribution that some required packages have not yet been created
 or been moved out of Incoming.
 
 Since you only requested a single operation it is extremely likely that
 the package is simply not installable and a bug report against
 that package should be filed.
 The following information may help to resolve the situation:
 
 The following packages have unmet dependencies:
  libstonith0: Depends: libsnmp5 (= 5.1) but it is not going to be 
 installed
 E: Broken packages

Thanks,

this was brought to my attention this morning and is being tracked as
Debian Bug #323224. I've CCed that bug ([EMAIL PROTECTED]) on this
mail. I'd appreciate if any folloups did the same.

http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=323224

In a nutshell, there is a problem with libsnmp5 which is
yet to be resolved. Once this happens, it will probably
be neccessary (for me) to recompile and re-upload the
heartbeat package. But I have been asked to hold off
until libsnmp5 is in better shape, and I am doing just that.

In the mean time, it should work fine in sarge, and likely
works in testing too. I believe its just Sid aka unstable
that is broken.

-- 
Horms


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#323224: libstonith0: uninstallable

2005-08-15 Thread Horms
On Mon, Aug 15, 2005 at 03:50:23PM -0700, Steve Langasek wrote:
 On Mon, Aug 15, 2005 at 05:00:42PM +0200, Steinar H. Gunderson wrote:
  Package: libstonith0
  Version: 1.2.3-12
  Severity: serious
 
   - libstonith0 depends on libsnmp5 (= 5.1).
   - libsnmp5 in sid conflicts with libstonith0 (= 1.2.3-12)
 
  libstonith0 should be rebuilt, and have a versioned dependency on the
  new libsnmp5. (libsnmp5 broke the ABI without changing the soname, thus
  the conflict; see #322500.)
 
 Please hold off on reuploading libstonith0; the manner in which the net-snmp
 maintainer chose to fix the ABI problem is not acceptable from a
 dependency management standpoint, and will require further changes that
 would in turn require libstonith0 to be reuploaded.

Ok, holding off. Is there some way that I can get notification
of when to rebuild. I have subscribed to #322500 (well tried to,
we shall see if it works), so if more information goes there I should
see it. Is there a better place to get this informatin?

-- 
Horms


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#323318: Array element has incomplete type

2005-08-15 Thread Horms
reassign 323318 kernel-source-2.4.27
merge 323318 320256
thanks

On Mon, Aug 15, 2005 at 11:22:39AM -0700, Matt Kraai wrote:
 Package: kernel-headers-2.4.27-2
 Version: 2.4.27-10
 Severity: serious
 
 hostap-modules-i386 fails to build because a kernel header has an array type
 with an incomplete element type:
 
  /tmp/buildd/hostap-modules-i386-0.3.7/kernel-headers-2.4.27-2-386/include/asm/processor.h:75:
   error: array type has incomplete element type

Hi,

I believe that this is a duplcate of #320256. 
Please use gcc-3.3 to compile 2.4.27.

Thanks

-- 
Horms


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#309308: [Secure-testing-team] Re: Bug#309308: kernel-image-2.6.8-2-686-smp: VLAN Oops fix for 2.6.8

2005-08-12 Thread Horms
On Fri, Aug 12, 2005 at 09:26:49AM +0200, Moritz Muehlenhoff wrote:
 Horms wrote:
There is no public CVE assignment for this issue. If's it easily 
reproducable
for non-root, it might account as a local DoS vulnerability.
   
   mii-tool's IOCTL is only allowed by root.
   
   The remote DoS comes from the fact that snmpd will call this IOCTL when it
   gets a request for the interface statistics.
   
   So it's exploitable via SNMP if the exploiter has access to the SNMP tree
   in question. (Which is not the default, if I recall correctly?)
   
   However, this means that cricket will bone the machine during the boot 
   process,
   or soon after.
  
  I think thats a strong enough reason to tag it as a security fix,
  and thus include it in a kernel security update.
 
 Hi Horms,
 this is now CAN-2005-2548. Can you please add it to the changelog?

Of course. Its in now.

-- 
Horms


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#321902: fails to rmmod usbnet

2005-08-11 Thread Horms
tags 321902 +wontfix
thanks

On Wed, Aug 10, 2005 at 11:22:39AM +0800, 肖盛文 Faris Xiao wrote:
 Andres Salomon wrote:
 
 On Tue, Aug 09, 2005 at 06:54:46PM +0900, Horms wrote:
 [...]
  
 
 rmmod usbnet
 
 The model usbnet can not be removed.
 Also the process which execute the command can not be finished,it 
 consume the CPU 99% persistent,over and over.Even I can't use
 
  
 
 [...]
 
 If this does happen w/ 2.6.12, then a backtrace would be useful.
 Hit ctrl-alt-sysrq-t to get a dump of all processes on the system; that
 should include the rmmod process.
  
 
 The attachment cast.txt is the out put of  ctrl-alt-sysrq-t.
 I can't execute ctrl-alt-sysrq-t under X Windows terminal,so I only get 
 the last screen of the out put.

Thanks, I assume this was from 2.6.8

I've taken another look at the problem, which the trace
seems to indicate might be do_con_write(). But the
changes to this code, and the usbnet code between
2.6.8 and 2.6.11 are quite extensive, and I have
been unable to isolate the change.

I am tagging this as wontfix, though cantfix might be
a better discription. Perhaps somone will prove me wrong,
but in the mean time, please use 2.6.12.

Thanks

-- 
Horms


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#309308: [Secure-testing-team] Re: Bug#309308: kernel-image-2.6.8-2-686-smp: VLAN Oops fix for 2.6.8

2005-08-11 Thread Horms
On Thu, Aug 11, 2005 at 07:46:12PM +1000, Paul TBBle Hampson wrote:
 On Thu, Aug 11, 2005 at 11:04:17AM +0200, Moritz Muehlenhoff wrote:
  Horms wrote:
   below patch has been slurped into the Debian patches for 2.6.8, but the
   error posted looks like the same error I suffered when hitting this bug.
   
   Patch from 
   http://lists.osdl.org/pipermail/bridge/2004-September/000638.html
   
   Cut and paste from the web archive, so spacing etc. may be boned.
   But it's a typo-only fix anyway, so easy enough to recreate.
  
  Thanks I have added this to SVN. 
  
  Is this considered a security bug and if so does it have a CAN number?
 
  There is no public CVE assignment for this issue. If's it easily 
  reproducable
  for non-root, it might account as a local DoS vulnerability.
 
 mii-tool's IOCTL is only allowed by root.
 
 The remote DoS comes from the fact that snmpd will call this IOCTL when it
 gets a request for the interface statistics.
 
 So it's exploitable via SNMP if the exploiter has access to the SNMP tree
 in question. (Which is not the default, if I recall correctly?)
 
 However, this means that cricket will bone the machine during the boot 
 process,
 or soon after.

I think thats a strong enough reason to tag it as a security fix,
and thus include it in a kernel security update.

-- 
Horms


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#309308: kernel-image-2.6.8-2-686-smp: VLAN Oops fix for 2.6.8

2005-08-11 Thread Horms
tags +pending 309308
tags +patch 309308
thanks

On Thu, Aug 11, 2005 at 11:42:54AM +1000, Paul TBBle Hampson wrote:
 Package: kernel-image-2.6.8-2-686-smp
 Followup-For: Bug #309308
 
 Just noticed this bug in the testing-security list. I don't know if the
 below patch has been slurped into the Debian patches for 2.6.8, but the
 error posted looks like the same error I suffered when hitting this bug.
 
 Patch from http://lists.osdl.org/pipermail/bridge/2004-September/000638.html
 
 The patch was taken into 2.6.9-rc2, and the bug was in code introduced
 very late in the 2.6.8 cycle. (August 2004 I believe)
 
 diff -Nru a/net/8021q/vlan_dev.c b/net/8021q/vlan_dev.c
 --- a/net/8021q/vlan_dev.c  2004-09-10 06:12:16 -07:00
 +++ b/net/8021q/vlan_dev.c  2004-09-10 06:12:16 -07:00
 @@ -772,7 +772,7 @@   
   
  
 case SIOCGMIIREG:
 case SIOCSMIIREG:
 if (real_dev-do_ioctl  netif_device_present(real_dev))
 -   err = real_dev-do_ioctl(dev, ifrr, cmd);
 +   err = real_dev-do_ioctl(real_dev, ifrr, cmd);
 break;
 
 case SIOCETHTOOL:
 
 Cut and paste from the web archive, so spacing etc. may be boned.
 But it's a typo-only fix anyway, so easy enough to recreate.

Thanks I have added this to SVN. 

Is this considered a security bug and if so does it have a CAN number?

-- 
Horms


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#315968: kernel: usb-storage not working, system freeze

2005-08-09 Thread Horms
reopen 315968
thanks

This bug is still valid for 2.6.8, so lets leave it here for now.
At the very least we can use it to coodinate known problems
in 2.6.8


-- 
Horms


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#321902: fails to rmmod usbnet

2005-08-09 Thread Horms
tag 321902 +moreinfo
tag 321902 +upstream
severity 321902 important
thanks

On Mon, Aug 08, 2005 at 01:30:48PM +0800, Ф Faris Xiao wrote:
 Package: kernel-image-2.6.8-2-686
 Version: 2.6.8-16
 Severity: grave
 Justification: renders package unusable
 
 I has a usb cable modem.
 My usb cable modem use kernel driver module usbnet.
 
 When I am using the modem,I execute the command:
 
 rmmod usbnet
 
 The model usbnet can not be removed.
 Also the process which execute the command can not be finished,it 
 consume the CPU 99% persistent,over and over.Even I can't use
 
 kill -9 process id
 
 to terminal it ,only reboot the whole computer.
 
 The following is the dmesg output about my usb cable modem:

Basically this means that the process is exceuting some code
in the kernel, and that code is stuck, perhaps in a loop,
perhaps waiting for a lock, but regardless stuck.
You can't kill a process until it is back in user-space,
and if this doesn't happen, you have to reboot :(

Is it possible to get the dmsg output when this occurs?
That might help track down the problem, but to be honest,
its likely quite hard to narrow this down to a simple fix
that is appropriate for inclusion in 2.6.8, which is
now in maintenane mode for sarge. Your best option
is probably to try linux-image-2.6.12-1-686 from unstable.

Thanks

-- 
Horms


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#315968: kernel: usb-storage not working, system freeze

2005-08-09 Thread Horms
On Tue, Aug 09, 2005 at 03:11:20PM -0400, Andres Salomon wrote:
 reopen 315968
 tags 315968 + sarge
 thanks
 
 I assume you meant to CC [EMAIL PROTECTED] :)

Yes, unfortunately I often forget to do that.

-- 
Horms


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#322273: [CAN-2005-2456]: XFRM array index buffer overflow

2005-08-09 Thread Horms
tag kernel-source-2.6.8 +pending
thanks

On Wed, Aug 10, 2005 at 02:53:07PM +1000, Geoff Crompton wrote:
 Package: kernel-source-2.6.8
 Version: 2.6.8-16
 Severity: critical
 Justification: root security hole
 
 SecurityFocus http://www.securityfocus.com/bid/14477 mentions an array index 
 buffer overflow.
 In short, the suspect it can cause a denial of service attack, but
 aren't sure whether or not it allows code execution.
 
 Balaz Scheidler says at
 http://www.mail-archive.com/netdev@vger.kernel.org/msg00520.html:
 While reading through the xfrm code I've found a possible array
 overflow in struct sock
 
 He goes on to suggest some patches. However the patch at
 http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=a4f1bac62564049ea4718c4624b0fadc9f597c84
 is in the xfrm_user file instead.
 I suspect this second patch that was commited will work, and checks the
 direction earlier in the code flow than the original email from Balaz in
 the first link. The xfrm_user patch is:
 
 --- a/net/xfrm/xfrm_user.c
 +++ b/net/xfrm/xfrm_user.c
 @@ -1350,6 +1350,9 @@ static struct xfrm_policy *xfrm_compile_
   if (nr  XFRM_MAX_DEPTH)
   return NULL;
  
 + if (p-dir  XFRM_POLICY_OUT)
 + return NULL;
 +
   xp = xfrm_policy_alloc(GFP_KERNEL);
   if (xp == NULL) {
   *dir = -ENOBUFS;

Hi Geoff,

Thanks, we became aware of this problem last week
and it has been added to SVN for 2.4.27 (kernel-source-2.4.27), 
2.6.8 (kernel-source-2.6.8) and 2.6.12 (linux-2.6)
The latter has been released. The former are taking a while
to get out the foor as we are still trying to iron out some
process issues relating to kernel updates for sarge.

For linux-2.6 it is bug #321401

 On another note, when I'm looking at bugs like this, and I haven't found
 them in the bug tracking database, should I be putting them against just
 kernel-source-2.6.8, or against kernel-source-2.6.11 as well, or is
 there a generic kernel-source-2.6 package?

Ok, this is pretty non-obvious, so thanks for asking.

Esentially we have three kernels that are being maintained right now,
and the packages you should log bugs against are kernel-source-2.4.27,
kernel-source-2.6.8 and linux-2.6 (which is 2.6.12 at the moment).
Older kernels, like 2.6.11 are currently being phased out and will
be removed from the Debian Archive shortly, so don't bother with them.

You can see what patches have been applied by inspecting the ChangeLog
in SVN.

http://svn.debian.org/wsvn/kernel/trunk/kernel/source/linux-2.6/debian/changelog?op=filerev=0sc=0
http://svn.debian.org/wsvn/kernel/trunk/kernel/source/kernel-source-2.6.8-2.6.8/debian/changelog?op=filerev=0sc=0
http://svn.debian.org/wsvn/kernel/trunk/kernel-2.4/source/kernel-source-2.4.27-2.4.27/debian/changelog?op=filerev=0sc=0

As for which package to log a bug against, or cretion of duplicate bugs.
To be honest it doesn't matter. If you email
debian-kernel@lists.debian.org, then you should get a response,
regardless of if you open a bug in the BTS or not.
CCing secure-testing-team@lists.alioth.debian.org if its a bug testing
and [EMAIL PROTECTED] if its a bug instable is also a good idea.

When we find problems, we just fix them. The BTS is really a bit to
noisy for us to use it to track bugs effectively. Obviously this
is a bit of a problem, but what I am trying to say is adding a bug
to the BTS just emails debian-kernel anyway, and security bugs
sent there are acted on. So my my advice is tho email the addresses
above, and if you want to open a bug, just open it against any
of the above packages that have the vulnerability.

-- 
Horms


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#320256: (kernel-image-2.4.27-2-k6: FTBFS on its intended target) : more info

2005-08-03 Thread Horms
reassign 320256 kernel-source-2.4.27
tag 320256 +pending
thanks

On Thu, Jul 28, 2005 at 09:19:29AM +0200, Emmanuel Charpentier wrote:
 I tried to build this kernel on a newer PIV. This dos *not* build with
 gcc 4.0 or gcc 3.4, but *does* build with gcc 3.3
 
 I'll try this on the target machine, and let you know.

Thanks, I am aware of that problem and it has been fixed in SVN.
However, 2.4 will likely be removed from unstable shortly.

-- 
Horms


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#320053: kernel-image-2.6.8-2-686: Installing it with sarge leads to failing at booting next time

2005-07-28 Thread Horms
reassign 298623 kernel-source-2.6.8
reassign 320053 kernel-source-2.6.8
severity 320053 normal
merge 298623 320053
thanks

On Wed, Jul 27, 2005 at 05:40:59PM +0200, stefan wrote:
 hi thx for your answer...
 
 i don't see why this bug is related to me...
 another developer just mailed me and showed me this bugreport:
 http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=298623
 
 and this is exactly my problem g

Yes, I think you are correct, I have merged these bugs accordingly.

-- 
Horms


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#319958: inkscape: fails to install (wrong dependencies)

2005-07-27 Thread Horms
On Tue, Jul 26, 2005 at 12:45:05AM +0200, Cyril Brulebois wrote:
 Package: inkscape
 Version: 0.41-5
 Severity: grave
 Tags: patch
 Justification: renders package unusable
 
 Hi!
 
 When trying to install inkscape, it doesn't success due to dependency
 problems:
 
   inkscape: Dépend: libgc1 mais il n'est pas installable
 Dépend: libglibmm-2.4-1 (= 2.6.1) mais ne sera pas installé
 Dépend: libgtkmm-2.4-1 (= 2.6.0) mais ne sera pas installé
 Dépend: libsigc++-2.0-0 (= 2.0.2) mais il n'est pas installable
 E: Paquets défectueux
 
 Rebuilding it 'as is' should be sufficient to refresh the dependencies (via
 the ${shlibs:Depends} variable). I joined the diff between the official
 dependencies and mine.

I can confirm that simply rebuilding the packages works fine here too.
I've put these up at http://debian.vergenet.net/testing/inkscape/
on the off chance they are useful to anyone. I'll delete them when
this bug gets closed.


-- 
Horms



Bug#318287: CAN-2005-2231 temporary file vulnerabilities

2005-07-18 Thread Horms
reopen 318287

1.2.3-11 didn't seem to make it into the archive for some reason -
presumably because I mucked up the upload. I am going to resolve this
ASAP.


-- 
Horms


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#317637: kernel-source-2.4.27: kernel compile fails :-(

2005-07-10 Thread Horms
On Sun, Jul 10, 2005 at 11:18:29AM +0100, George B. wrote:
 Package: kernel-source-2.4.27
 Version: 2.4.27-10
 Severity: grave
 Justification: renders package unusable
 
 Hello,
 
 I have just tried recompiling the kernel, to catch up with some security 
 issues, but the compile fails. I am using:

Hi,

It looks a lot like you are trying to build this kernel with gcc-4.0.
This will not work. Please use gcc-3.2.

Also, if you think there are outstanding security issues with this
kernel, pleaese file bugs against kernel-source-2.4.27, and include
any references to CAN numbers, mailing list discusions and best of
all patches, that you have.

Thanks


-- 
Horms


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#317386: Package: kernel-image-2.4.27-2-686

2005-07-08 Thread Horms
On Thu, Jul 07, 2005 at 10:51:19PM -0500, Duane Meyer wrote:
 Package: kernel-image-2.4.27-2-686
 Version: 2.4.27-10
 Severity: grave
 Justification: causes non-serious data loss
 
 
 Jul  6 08:25:45 swr999 kernel: kernel BUG at page_alloc.c:144!
 Jul  6 08:25:45 swr999 kernel: invalid operand: 
 Jul  6 08:25:45 swr999 kernel: CPU:0
 Jul  6 08:25:45 swr999 kernel: EIP:0010:[__free_pages_ok+68/720]
 Not tainted
 Jul  6 08:25:45 swr999 kernel: EFLAGS: 00210282
 Jul  6 08:25:45 swr999 kernel: eax:    ebx: c101ef20   ecx:
 c025ecf0   edx: c025eb40
 Jul  6 08:25:45 swr999 kernel: esi: c101ef20   edi:    ebp:
 dda0bc54   esp: c160bf0c
 Jul  6 08:25:45 swr999 kernel: ds: 0018   es: 0018   ss: 0018
 Jul  6 08:25:45 swr999 kernel: Process kswapd (pid: 4,
 stackpage=3Dc160b000)
 Jul  6 08:25:45 swr999 kernel: Stack: 0001 00200282 0003
 cb5fa140 cb5fa140 cb5fa140 c101ef20 c014282c=20
 Jul  6 08:25:45 swr999 kernel:cb5fa140  c101ef20
 c025ec18 3e6b c0135557 c101ef20 01d0=20
 Jul  6 08:25:45 swr999 kernel:0c7f 01d0 001f
 0020 01d0 c025ec18 c025ec18 c013577d=20
 Jul  6 08:25:45 swr999 kernel: Call Trace:
 [try_to_free_buffers+140/256] [shrink_cache+807/944]
 [shrink_caches+61/96] [try_to_free_pages_zone+98/256]
 [kswapd_balance_pgdat+102/176]
 Jul  6 08:25:45 swr999 kernel:   [kswapd_balance+40/64] [kswapd+152/185]
 [rest_init+0/64] [arch_kernel_thread+46/64] [kswapd+0/185]
 Jul  6 08:25:45 swr999 kernel:=20
 Jul  6 08:25:45 swr999 kernel: Code: 0f 0b 90 00 50 a0 23 c0 8b 35 50 b2
 2c c0 89 d8 29 f0 c1 f8=20

That looks very unfun. Do you have any more information on this.
Was the system under load at the time, do you have any
crazy kernel modules loaded, does it happen every Tuesday at 4am,
have you overcloced the CPU? That kind of thing.

 
 -- System Information:
 Debian Release: testing/unstable
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'testing')
 Architecture: i386 (i686)
 Shell:  /bin/sh linked to /bin/bash
 Kernel: Linux 2.4.27-2-686
 Locale: LANG=3DC, LC_CTYPE=3DC (charmap=3DANSI_X3.4-1968)
 
 Versions of packages kernel-image-2.4.27-2-686 depends on:
 ii  coreutils [fileutils] 5.2.1-2The GNU core utilities
 ii  initrd-tools  0.1.81.1   tools to create initrd image f=
 or p
 ii  modutils  2.4.26-1.2 Linux module utilities
 
 -- no debconf information
 

-- 
Horms


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#310982: smbmount does not honor uid and gid options with 2.4 kernel

2005-07-06 Thread Horms
On Tue, Jun 07, 2005 at 07:44:25PM -0700, Steve Langasek wrote:
 On Tue, Jun 07, 2005 at 06:42:33PM +0900, Horms wrote:
  On Mon, Jun 06, 2005 at 04:19:28AM -0700, Steve Langasek wrote:
   reopen 310982
   tags 310982 security
   thanks
   
   samba 3.0.14a-4 didn't make the cut for sarge, so this bug is still 
   present
   in the release.  That being the case, it would be far better to fix this 
   bug
   in the kernel instead of in smbfs.
 
  Hi Steve,
 
  I'm kind of trying to read your mind here, but are you thinking
  of just making a kernel that doesn't do SMB_CAP_UNIX at all?
 
 I think the best answer is for the kernel to track whether
 uid,gid,fmask,dmask options were specified, and if so, to ignore the
 permission info sent by the CAP_UNIX-enabled server.
 
 That may require changes to the ioctl interface, though; I'd have to check
 again whether there's any distinction between not setting the option, and
 setting the option to 0.

Sorry for being slack about this. I scraped together a few moments to
look into this. parse_options() in fs/smbfs/inode.c seems to handle
the options parsed to a mount, and it does indeed seem to differentiate
betwen an unset option and an option set to 0. I'll poke a bit futher
to find where to put your suggested hack, but I have to run now.

-- 
Horms


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#310982: smbmount does not honor uid and gid options with 2.4 kernel

2005-07-06 Thread Horms
On Wed, Jul 06, 2005 at 07:17:20PM +0900, Horms wrote:
 On Tue, Jun 07, 2005 at 07:44:25PM -0700, Steve Langasek wrote:
  On Tue, Jun 07, 2005 at 06:42:33PM +0900, Horms wrote:
   On Mon, Jun 06, 2005 at 04:19:28AM -0700, Steve Langasek wrote:
reopen 310982
tags 310982 security
thanks

samba 3.0.14a-4 didn't make the cut for sarge, so this bug is still 
present
in the release.  That being the case, it would be far better to fix 
this bug
in the kernel instead of in smbfs.
  
   Hi Steve,
  
   I'm kind of trying to read your mind here, but are you thinking
   of just making a kernel that doesn't do SMB_CAP_UNIX at all?
  
  I think the best answer is for the kernel to track whether
  uid,gid,fmask,dmask options were specified, and if so, to ignore the
  permission info sent by the CAP_UNIX-enabled server.
  
  That may require changes to the ioctl interface, though; I'd have to check
  again whether there's any distinction between not setting the option, and
  setting the option to 0.
 
 Sorry for being slack about this. I scraped together a few moments to
 look into this. parse_options() in fs/smbfs/inode.c seems to handle
 the options parsed to a mount, and it does indeed seem to differentiate
 betwen an unset option and an option set to 0. I'll poke a bit futher
 to find where to put your suggested hack, but I have to run now.

Hi all,

There has been a lot of disucssion of how to resolve this bug,
which can be found at the following URL.

http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=310982

I am pretty detached from this discussion, though it seems
to me that there is no particularly good solution for Sarge.
But the idea of disabling the use of CAP_UNIX if uid,gid,fmask or dmask
are specified does make sense to me. I have gone ahead and coded this
up in the surprisingly simple patch which is attached.

Samba people, my main question is, can smb_newconn() be called before
server.mnt.flags is set?  If so my patch is invalid.

-- 
Horms
diff -pru kernel-source-2.4.27.orig/include/linux/smb_mount.h 
kernel-source-2.4.27/include/linux/smb_mount.h
--- kernel-source-2.4.27.orig/include/linux/smb_mount.h 2004-02-18 
22:36:32.0 +0900
+++ kernel-source-2.4.27/include/linux/smb_mount.h  2005-07-07 
11:27:51.0 +0900
@@ -37,7 +37,9 @@ struct smb_mount_data {
 #define SMB_MOUNT_OLDATTR  0x0002  /* Use core getattr (Win 95 speedup) */
 #define SMB_MOUNT_DIRATTR  0x0004  /* Use find_first for getattr */
 #define SMB_MOUNT_CASE 0x0008  /* Be case sensitive */
-
+#define SMB_MOUNT_NO_CAP_UNIX  0x0010  /* Hack for Debian to disable 
+  SMB_CAP_UNIX if uid, gid, fmask
+  or dmask are set. See Bug#310982 */
 
 struct smb_mount_data_kernel {
int version;
diff -pru kernel-source-2.4.27.orig/fs/smbfs/inode.c 
kernel-source-2.4.27/fs/smbfs/inode.c
--- kernel-source-2.4.27.orig/fs/smbfs/inode.c  2004-02-18 22:36:31.0 
+0900
+++ kernel-source-2.4.27/fs/smbfs/inode.c   2005-07-07 10:50:56.0 
+0900
@@ -286,10 +286,10 @@ static struct option opts[] = {
{ oldattr,SMB_MOUNT_OLDATTR, 1 },
{ dirattr,SMB_MOUNT_DIRATTR, 1 },
{ case,   SMB_MOUNT_CASE, 1 },
-   { uid,0, 'u' },
-   { gid,0, 'g' },
-   { file_mode,  0, 'f' },
-   { dir_mode,   0, 'd' },
+   { uid,SMB_MOUNT_NO_CAP_UNIX, 'u' },
+   { gid,SMB_MOUNT_NO_CAP_UNIX, 'g' },
+   { file_mode,  SMB_MOUNT_NO_CAP_UNIX, 'f' },
+   { dir_mode,   SMB_MOUNT_NO_CAP_UNIX, 'd' },
{ iocharset,  0, 'i' },
{ codepage,   0, 'c' },
{ ttl,0, 't' },
diff -pru kernel-source-2.4.27.orig/fs/smbfs/proc.c 
kernel-source-2.4.27/fs/smbfs/proc.c
--- kernel-source-2.4.27.orig/fs/smbfs/proc.c   2005-05-19 19:29:38.0 
+0900
+++ kernel-source-2.4.27/fs/smbfs/proc.c2005-07-07 10:49:35.0 
+0900
@@ -916,7 +916,8 @@ smb_newconn(struct smb_sb_info *server, 
VERBOSE(LFS enabled\n);
}
 #ifndef CONFIG_SMB_UNIX
-   server-opt.capabilities = ~SMB_CAP_UNIX;
+   if (!server-mnt.flags  SMB_MOUNT_NO_CAP_UNIX)
+   server-opt.capabilities = ~SMB_CAP_UNIX;
 #endif
if (server-opt.capabilities  SMB_CAP_UNIX) {
struct inode *inode;


Bug#316476: kernel-source-2.6.11: Fails to boot since 2.6.11-4

2005-07-01 Thread Horms
On Fri, Jul 01, 2005 at 02:10:04AM -0400, Pascal Giard wrote:
 Package: kernel-source-2.6.11
 Version: 2.6.11-4
 Severity: critical
 Justification: breaks the whole system
 
 (Sorry if this is a dupe, i had filled it against
 kernel-image-2.6.11-amd64-generic).

kernel-source-2.6.11 is probably a better place than
kernel-image-2.6.11-amd64-generic, as it seems likely the
bug is in the code, rather than the config. In either case,
could you pick one, assign both the bugs to it, and merge the bugs
(or alternatively close one). The BTS doesn't sport the
kernel's split packaging very well, but it seems better
to avoid duplicates. On the up side, as of 2.6.12, the
packages will have a single source, and this problem
will go away to some extent.

Sorry I can't offer much help on the bug itself for now,
hopefully someone else can.

 Since kernel-image-2.6.11-amd64-generic 2.6.11-4, the kernel-image won't
 boot.
 
 The first error message says something like:
  Can't load shared object file libc.so.6 
 The second error message says it can't find sda1.
 
 My hypothesis is that the necessary modules for my onboard SATA
 controller are no longer included in the initrd image.
 
 I HAVEN'T modified /etc/mkinitrd/mkinitrd.conf.
 
 I've a pretty common Asus K8V-X motherboard which SATA ctrler
 requires at least scsi_mod, sata_via and libata to work.
 
 Booting with the current kernel-image-2.6.8-amd64-generic image works fine.
 I'm happy i kept my very old image before upgrading 2.6.11!!
 
 -Pascal
 -- System Information:
 Debian Release: testing/unstable
  APT prefers unstable
  APT policy: (500, 'unstable')
 Architecture: amd64 (x86_64)
 Shell:  /bin/sh linked to /bin/bash
 Kernel: Linux 2.6.8-11-amd64-generic
 Locale: LANG=fr_CA, LC_CTYPE=fr_CA (charmap=ISO-8859-1)
 

-- 
Horms


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#315771: perdition: FTBFS: Not using -fPIC to make shared lib.

2005-06-26 Thread Horms
On Sun, Jun 26, 2005 at 12:22:11PM +0900, Horms wrote:
 On Sat, Jun 25, 2005 at 11:02:16PM +0200, Kurt Roeckx wrote:

[snip]

  /build/buildd/perdition-1.17/perdition/db/daemon/libperditiondb_daemon_packet.a:
   could not read symbols: Bad value
  
  Note that the packet.c did not get build using libtool,
  while the rest did.  libtool correctly set -fPIC to make
  the shared version for the other files that are getting
  linked in.
  
  Policy section 10.2 says that shared libs should be build
  using -fPIC and static should be build without it.
 
 Hi Kurt,
 
 This bit of code has been highly problematic forever.
 Thanks for bringing its still-broken state to my attention.
 I will have another go at rearanging the code.
 Any suggestions are more than welcome.

Hi Kurt,

I have tried a fresh approach to this problem, that is making the
code in question a shared object. It is compiled with -fPIC as far as
I can see. This change is included in the 1.17-2 packages that
I have put in http://debian.vergenet.net/pending/perdition/ 
If you have a chance, could you test to see if these solve the
problem that you are seeing. It would be nice to make sure it
is resolved before uploading these to Debian.Org.

Thanks

-- 
Horms


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#315771: perdition: FTBFS: Not using -fPIC to make shared lib.

2005-06-25 Thread Horms
On Sat, Jun 25, 2005 at 11:02:16PM +0200, Kurt Roeckx wrote:
 Package: perdition
 Version: 1.17-1
 Severity: serious
 Tags: sid
 
 Hi,
 
 Your package is is not using -fPIC to make a shared lib.  This
 does not work on some arches, and results in your package
 failing to build:
 make[5]: Entering directory `/build/buildd/perdition-1.17/perdition/db/daemon'
 gcc -DHAVE_CONFIG_H -I. -I. -I../../.. -I../../../ -I../../../perdition 
 -I../../../libjain -DPERDITIONDB_BDB_SYSCONFDIR=\/etc/perdition\-g -O2 
 -c packet.c
 rm -f libperditiondb_daemon_packet.a
 ar cru libperditiondb_daemon_packet.a packet.o
 ranlib libperditiondb_daemon_packet.a
 [...]
 gcc -shared  .libs/perditiondb_daemon.o .libs/unix_socket.o  -ldb 
 -L/build/buildd/perdition-1.17/perdition/db/daemon 
 -lperditiondb_daemon_packet  -Wl,-soname -Wl,libperditiondb_daemon.so.0 -o 
 .libs/libperditiondb_daemon.so.0.0.0  -ldb 
 -L/build/buildd/perdition-1.17/perdition/db/daemon -lperditiondb_daemon_packet
 /usr/bin/ld: 
 /build/buildd/perdition-1.17/perdition/db/daemon/libperditiondb_da
 emon_packet.a(packet.o): relocation R_X86_64_32 can not be used when making a 
 s
 hared object; recompile with -fPIC
 /build/buildd/perdition-1.17/perdition/db/daemon/libperditiondb_daemon_packet.a:
  could not read symbols: Bad value
 
 Note that the packet.c did not get build using libtool,
 while the rest did.  libtool correctly set -fPIC to make
 the shared version for the other files that are getting
 linked in.
 
 Policy section 10.2 says that shared libs should be build
 using -fPIC and static should be build without it.

Hi Kurt,

This bit of code has been highly problematic forever.
Thanks for bringing its still-broken state to my attention.
I will have another go at rearanging the code.
Any suggestions are more than welcome.

-- 
Horms


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#311357: kernel-image-2.6.8-2: via-rhine fails to reserve I/O region, no networking available

2005-06-10 Thread Horms
tag 311357 +pending
thanks

Hi,

I think I have isolated the patch that caused this problem,
I have put up some test 2.6.8 images that do not include the patch in
question.

http://debian.vergenet.net/testing/

-- 
Horms


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#311357: Upgrade of 386 version of the 2.6.8 kernel breaks via-rhine

2005-06-08 Thread Horms
On Tue, Jun 07, 2005 at 08:50:37AM -0700, Alan W. Irwin wrote:
 On 2005-06-07 17:48+0900 Horms wrote:
 
 On Sun, Jun 05, 2005 at 01:11:54PM +0200, Norbert Tretkowski wrote:
 severity 311357 grave
 thanks
 
 * Alan W. Irwin wrote:
 This is a confirmation of the bad problem with the via-rhine module
 for the latest version of the 386 version of the 2.6.8 kernel.
 
 Sounds like a RC bug, so I'm setting it's severity to grave.
 
 I upgraded today from kernel-image-2.6.8.2-386 version 2.6.8-13 to
 2.6.8-16, and my network card (D-link 10/100 DFE-530TX) that is
 controlled by the via-rhine module immediately quit working
 
 Too bad this bug didn't get realized when -16 was in unstable...
 looks like it's too late to fix this for 3.1r0.
 
 True, there was some late minute package shiffling which meant that -16
 ended up going straight into sarge. Unfortunately now we have this bug.
 A similar thing seems to have happened with 2.4.27 and some neftilter
 symbols. It partly my fault (in the sense that I uploaded the packages)
 and partly a process issue. I do appologise for any inconvenience and
 I'll try and get updates together over the next few days. But we have
 clearly missed the boat for 3.1r0.
 
 Hi Horms:
 
 Thanks for acknowledging the via-rhine problem that has gotten into 3.1r0.
 For Debian sarge users it sounds like you have plans to fix version 2.6.8-16
 which is excellent. But until that happens, and for on-going Debian testing
 users like me what kernel 2.6 solution do you recommend for all those who
 require via-rhine for their networking?  For example, do you (or anybody
 else paying attention to this bug thread) know whether the via-rhine
 problems also occur for kernel-image-2.6.11 (currently in unstable)?

I haven't heard any reports that they occur in 2.6.11, and
I imagine there are people using that combination, so if 
I was in your shoes I would try that. I do have a box with
a VIA rhine card, I will fire it up and see if I can a) reproduce
the problem in 2.6.8-16, b) if it goes away in 2.6.11-5 and c)
get some fixes available for 2.6.8. But its not the D Link card
in question, so I am not sure if I am in a position to test
if a given kernel works.

On a brighter note, I have been unable to reproduce the nefilter
bug I mumbled about in my previous post, so that appears to
have been a false alarm.

-- 
Horms


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#311357: Upgrade of 386 version of the 2.6.8 kernel breaks via-rhine

2005-06-07 Thread Horms
On Sun, Jun 05, 2005 at 01:11:54PM +0200, Norbert Tretkowski wrote:
 severity 311357 grave
 thanks
 
 * Alan W. Irwin wrote:
  This is a confirmation of the bad problem with the via-rhine module
  for the latest version of the 386 version of the 2.6.8 kernel.
 
 Sounds like a RC bug, so I'm setting it's severity to grave.
 
  I upgraded today from kernel-image-2.6.8.2-386 version 2.6.8-13 to
  2.6.8-16, and my network card (D-link 10/100 DFE-530TX) that is
  controlled by the via-rhine module immediately quit working
 
 Too bad this bug didn't get realized when -16 was in unstable...
 looks like it's too late to fix this for 3.1r0.

True, there was some late minute package shiffling which meant that -16
ended up going straight into sarge. Unfortunately now we have this bug.
A similar thing seems to have happened with 2.4.27 and some neftilter
symbols. It partly my fault (in the sense that I uploaded the packages)
and partly a process issue. I do appologise for any inconvenience and
I'll try and get updates together over the next few days. But we have
clearly missed the boat for 3.1r0.

-- 
Horms


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#310982: smbmount does not honor uid and gid options with 2.4 kernel

2005-06-07 Thread Horms
On Mon, Jun 06, 2005 at 04:19:28AM -0700, Steve Langasek wrote:
 reopen 310982
 tags 310982 security
 thanks
 
 samba 3.0.14a-4 didn't make the cut for sarge, so this bug is still present
 in the release.  That being the case, it would be far better to fix this bug
 in the kernel instead of in smbfs.

Hi Steve,

I'm kind of trying to read your mind here, but are you thinking
of just making a kernel that doesn't do SMB_CAP_UNIX at all?

-- 
Horms


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#308634: kernel-source-2.6.8: A locally exploitable flaw to gain root.

2005-05-12 Thread Horms
merge 308724 308634
thanks

On Wed, May 11, 2005 at 07:40:15PM +0300, Samuli Suominen wrote:
 Package: kernel-source-2.6.8
 Severity: grave
 Justification: user security hole
 
 
 A locally exploitable flaw has been found in the Linux ELF binary format
 loader's core dump  function  that  allows  local  users  to  gain  root
 privileges and also execute arbitrary code at kernel privilege level.
 
 Version:   2.2 up to and including 2.2.27-rc2, 2.4 up to and including
2.4.31-pre1, 2.6 up to and including 2.6.12-rc4
 
 Exploit, and futher information: 
 http://www.isec.pl/vulnerabilities/isec-0023-coredump.txt
 
 -- System Information:
 Debian Release: 3.1
   APT prefers testing
   APT policy: (500, 'testing')
 Architecture: i386 (i686)
 Kernel: Linux 2.6.12-rc4-optimized
 Locale: [EMAIL PROTECTED], [EMAIL PROTECTED] (charmap=ISO-8859-15)

On Wed, May 11, 2005 at 03:08:38PM -0400, Andres Salomon wrote:
 On Wed, 11 May 2005 19:40:15 +0300, Samuli Suominen wrote:
 
  Package: kernel-source-2.6.8
  Severity: grave
  Justification: user security hole
  
  
  A locally exploitable flaw has been found in the Linux ELF binary format
  loader's core dump  function  that  allows  local  users  to  gain  root
  privileges and also execute arbitrary code at kernel privilege level.
  
  Version:   2.2 up to and including 2.2.27-rc2, 2.4 up to and including
 2.4.31-pre1, 2.6 up to and including 2.6.12-rc4
  
  Exploit, and futher information: 
  http://www.isec.pl/vulnerabilities/isec-0023-coredump.txt
  
 
 Rumor has it, this is CAN-2005-1263.
 I'll commit the patch
 (http://mouth.voxel.net/~dilinger/core_dump_vul.patch) to svn once I'm
 someplace that I can actually log in..

On Wed, May 11, 2005 at 08:59:18PM -0400, Justin Pryzby wrote:
 Package: kernel-source-2.6.8
 Severity: grave
 Tags: security patch
 Justification: user security hole
 
 http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.11.9
 
 The relevent changes for this CAN appear to be solely in
 ./fs/binfmt_elf.c.
 
 There is also a memset in ./drivers/char/drm/drm_ioctl.c which should
 probably be added, among lots of other should-be-fixed things.


I am going to work on getting this fix into 2.6.8 and 2.4.27.

-- 
Horms


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#308639: kernel-build vs. kernel-headers splitted broken, headers unuseable

2005-05-12 Thread Horms
On Wed, May 11, 2005 at 07:09:34PM +0200, Eduard Bloch wrote:
 Package: kernel-build-2.6.8-powerpc
 Version: 2.6.8-12
 Severity: grave
 
 Hello,
 
 I tried to understand your packaging scheme and IMO you do it _wrong_.
 
 a) kernel-build-KVERS on other architectures is a package with common
files. Your packages seem to play the role of kernel-headers-KVERS
packges from other architectures (unique files).
 b) even assuming that you confused the meaning of kernel-headers-KVERS
 SIONS=detect make -C Linux-2.6
 KERNEL_SOURCES=/usr/src/kernel-build-2.6.8-powerpc
 KERNEL=linux-2.6.8-powerpc CC=gcc
 make[2]: Entering directory `/usr/src/modules/shfs/Linux-2.6'
 make -C /usr/src/kernel-build-2.6.8-powerpc
 SUBDIRS=/usr/src/modules/shfs/Linux-2.6 modules
 make[3]: Entering directory `/usr/src/kernel-build-2.6.8-powerpc'
 make[3]: *** No rule to make target `modules'.  Stop.
 make[3]: Leaving directory `/usr/src/kernel-build-2.6.8-powerpc'
 make[2]: *** [default] Error 2
 make[2]: Leaving directory `/usr/src/modules/shfs/Linux-2.6'
 make[1]: *** [binary-modules] Error 2
 make[1]: Leaving directory `/usr/src/modules/shfs'
 make: *** [kdist_build] Error 2
 
 So your package descriptions lie, it is not a working build system and I
 doubt that that it has ever been for anybody.  I suggest a radical
 rework of the headers/kernel-build part to make it work similar to the
 i386 pendants. Tell me if you need assistance, I just got a PPC box to
 play with it.

Hi, 

A fix is being worked on for this, though I am not sure
if/when it will be able to go into Sarge as the kernels
for that release are frozen.

-- 
Horms


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#308757: CAN-2005-1263: Linux kernel ELF core dump privilege elevation

2005-05-12 Thread Horms
tags 308757 + pending
thanks

On Thu, May 12, 2005 at 09:13:48AM +0200, Moritz Muehlenhoff wrote:
 Package: kernel-source-2.4.27
 Version: unavailable; reported 2005-05-12
 Severity: grave
 Tags: security patch
 
 Paul Starzetz has found another flaw in the Linux kernel that can be exploited
 to gain extended local privileges. Please see his detailed advisory at
 http://isec.pl/vulnerabilities/isec-0023-coredump.txt
 
 Greg Kroah-Hartman has posted a patch for 2.6, which should apply to 2.4 as
 well. It's attached.

I have mangled this fix so it applies to 2.4.27 and committed it to SVN.


-- 
Horms


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#308855: CAN-2005-1263 (again)

2005-05-12 Thread Horms
reassign 308855 kernel-source-2.6.8
severity 308855 grave
merge 308855 308724 308634
thanks

Hi Adam,

thanks for reporting this bug. We are already tracking it
as 308724 and 308634 for 2.6.8 and a separate bug for 2.4.27.
A fix is also pending for 2.6.11.

-- 
Horms


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#307900: kernel-image-2.6.8-2-386: This image, and maybe some others are easiably locally rootable. Exploit included.

2005-05-10 Thread Horms
reassign 307900 kernel-source-2.6.8
tag 307900 + pending
tag 307900 + security
thanks

On Fri, May 06, 2005 at 12:02:44PM +0300, Samuli Suominen wrote:
 Package: kernel-image-2.6.8-2-386
 Severity: critical
 Justification: breaks the whole system
 
 
 Proof of consept: http://www.frsirt.com/exploits/20050322.k-rad.c.php
 This would work on other NON-SMP kernels too. Makes kernel images
 unusable for multiuser system.

The fix for this is in SVN and will be made available in the next release.

-- 
Horms


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#307900: acknowledged by developer (Fixed in kernel-source-2.6.8 2.6.8-15)

2005-05-10 Thread Horms
On Tue, May 10, 2005 at 12:57:43PM +0300, Samuli Suominen wrote:
 Debian Bug Tracking System wrote:
 
 This is an automatic notification regarding your Bug report
 #307900: kernel-image-2.6.8-2-386: This image, and maybe some others are 
 easiably locally rootable. Exploit included.,
 which was filed against the kernel-source-2.6.8 package.
 
 It has been closed by one of the developers, namely
 Horms [EMAIL PROTECTED].
 
 Their explanation is attached below.  If this explanation is
 unsatisfactory and you have not received a better one in a separate
 message then please contact the developer, by replying to this email.
 
 Debian bug tracking system administrator
 (administrator, Debian Bugs database)
 
 Received: (at 307900-done) by bugs.debian.org; 10 May 2005 08:40:49 +
  
 
 Great, thanks! One question, this means kernel-images for Sarge will be 
 compiled from fixed kernel-source?

I don't beleive this code will make it into sarge - the kernel
has actually been frozen for a while now because of process
problams that in a nushell mean that updating the kernel
delays the release by 2 months. But it should appear in
the rc1 update release of sarge and/or secutiry updates.

-- 
Horms


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#302704: CAN-2005-0750: Possible local root exploit through insufficient range checking in af_bluetooth

2005-04-03 Thread Horms
tag 302704 +pending
thanks

On Sat, Apr 02, 2005 at 02:54:52PM +0200, Moritz Muehlenhoff wrote:
 Package: kernel-source-2.4.27
 Severity: grave
 Tags: security
 Justification: user security hole
 
 CAN-2005-0750: Insufficient range checking in af_bluetooth allows local root 
 exploit.
 
 This is the full advisory:
 http://lists.grok.org.uk/pipermail/full-disclosure/ 
 attachments/20050327/3f128a09/adv1.pdf
 
 This has been fixed in 2.4.30rc3, a fix is available in Bitkeeper:
 http://linux.bkbits.net:8080/linux-2.4/[EMAIL PROTECTED]

Thanks, I have this fix in SVN.

-- 
Horms


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#302352: kernel-source-2.6.8: possible local DoS in AIO on PPC64 and IA64 (CAN-2005-0916)

2005-04-01 Thread Horms
Thanks, I will add this to SVN ASAP.

-- 
Horms


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#302352: kernel-source-2.6.8: possible local DoS in AIO on PPC64 and IA64 (CAN-2005-0916)

2005-04-01 Thread Horms
tag 30235 +pending
thanks

Thanks,

I have added this fix to both kernel-source-2.6.8 and
kernel-source-2.6.11 in SVN and it should appear in the
next release.

If someone has a chance to test the build for ppc and ia64 that would be
great.

-- 
Horms


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



  1   2   >