DESA 2007-011: linux-2.6 - several vulnerabilities

2007-09-28 Thread Morten Werner Olsen
- --
Debian-Edu/Skolelinux Security Advisory DESA 2007-011
http://www.skolelinux.org/security/  Morten Werner Olsen
September 28th, 2007 [EMAIL PROTECTED]
- --

Package : linux-2.6
Vulnerability   : several vulnerabilities
Problem-Type: local
Need reboot : yes
Debian-Edu-specific : no
CVE ID  : CVE-2007-3731 CVE-2007-3739 CVE-2007-3740 CVE-2007-4573
DSA ID  : DSA-1378


Several vulnerabilities have been found in the Linux kernel. If you
want the details, please take a look at the DSA's from Debian:

 http://www.debian.org/security/2007/dsa-1378

We recommend that you upgrade your kernel packages to the new 2.6.18
version built for Debian (immidiately if you are running x86_64 or the
amd64 flavour of the kernel).

Upgrade Instructions
- 

Make sure 'deb http://security.debian.org/debian etch/updates main' or
similar is present in your /etc/apt/sources.list and run 'aptitude update' 
to update your package lists.

Find which flavour of the kernel you are running with the command
'uname -r' (examples: 386, 586tsc, 686, 686-smp, k6, k7, k7-smp).

To upgrade, run this command replacing  with yours:

  aptitude install linux-image-2.6.18-5-

Remember that you have to reboot your computers after upgrading this
package. If you are unfamiliar with kernel upgrades, please visit our
mini-HOWTO on this subject:

  http://www.skolelinux.org/security/kernel-upgrade

- --
For apt-get: deb htp://ftp.debian.org/debian/ sarge main

Mailing lists: [EMAIL PROTECTED],
   debian-edu@lists.debian.org, [EMAIL PROTECTED],
   [EMAIL PROTECTED], [EMAIL PROTECTED]
Package info: `apt-cache show '

Note: This DESA is the last one going to all the mailinglists above,
  from now on DESA's will only be sent to
  [EMAIL PROTECTED]


pgpdsZKmyhOID.pgp
Description: PGP signature


Re: Stable update proposal: slbackup-php

2007-09-14 Thread Morten Werner Olsen
Steffen Joeris <[EMAIL PROTECTED]> writes:

>> Why 0.3.edu.1-1 and not 0.3-1~edu.1 ?? And can you please provide a
>> diff between 0.2 and 0.3 too? After looking at the debdiff only, I
>> cannot find an obvious reason why we shouldn't update this package...
>
> I would give it an approval, if you do not disagree Werner.

As discussed on IRC, I have removed this package from etch-test. So
please Patrick, can you upload a new one without changing the upstream
version number (0.3-)? Or if you're alright with me of Steffen only
uploads the 0.3-1 from unstable? After that, I agree with accepting it
for the next stable release.

As Petter noticed, slbackup-php did also disappear from the etch-test
DVD.


- Werner


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Stable update proposal: slbackup-php

2007-09-10 Thread Morten Werner Olsen
Patrick Winnertz <[EMAIL PROTECTED]> writes:

>> Why 0.3.edu.1-1 and not 0.3-1~edu.1 ?? And can you please provide a
>> diff between 0.2 and 0.3 too? After looking at the debdiff only, I
>> cannot find an obvious reason why we shouldn't update this package...
>
> It has indeed not much changed between 0.2 and 0.3 . The most important 
> fixes for debian-edu are:
>
> 0.3 contains a reviewed translation by the debian-i18n team. (also the 
> english was reviewed).  And the css file wasn't included into 0.2. so the 
> webinterface looks very ugly. 
>
> This are the two reasons for me to request the update of slbackup-php.

Can you provide the diff between 0.2 and 0.3?

My first question was about the version-number you've used for the new
package (everything left of '-' is upstream version). I guess
0.3-1~edu.1 or 0.3-0.edu.1 is what you want to use?


- Werner


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Stable update proposal: slbackup-php

2007-09-10 Thread Morten Werner Olsen
Patrick Winnertz <[EMAIL PROTECTED]> writes:

> I would like to request the update of slback-php in debian-edu etch from 
> version  0.2-2 to 0.3.edu.1-1.  Several errors are fixed in this version. 
> 0.2-2 is not really usefull, but 0.3 is. Furthermore are a lot more 
> translations included in the new version. 

Why 0.3.edu.1-1 and not 0.3-1~edu.1 ?? And can you please provide a
diff between 0.2 and 0.3 too? After looking at the debdiff only, I
cannot find an obvious reason why we shouldn't update this package...


- Werner


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



DESA-2007-008: Linux kernel

2007-08-19 Thread Morten Werner Olsen
- --
Debian-Edu/Skolelinux Security Advisory DESA 2007-008
http://www.skolelinux.org/security/  Morten Werner Olsen
August 19th, 2007[EMAIL PROTECTED]
- --

Package : linux-2.6
Vulnerability   : several vulnerabilities
Problem-Type: local
Need reboot : yes
Debian-Edu-specific : no
CVE ID  : CVE-2007-1353 CVE-2007-2172 CVE-2007-2453
  CVE-2007-2525 CVE-2007-2876 CVE-2007-3513
  CVE-2007-3642 CVE-2007-3848 CVE-2007-3851
DSA ID  : DSA-1356


Several vulnerabilities have been found in the Linux kernel. If you
want the details, please take a look at the DSA's from Debian:

 http://www.debian.org/security/2007/dsa-1356

We recommend that you upgrade your kernel packages to the new 2.6.18
version built for Debian.

Upgrade Instructions
- 

Make sure 'deb http://ftp.debian.org/debian sarge main' or similar is
present in your /etc/apt/sources.list and run 'apt-get update' to
update your package lists.

Find which flavour of the kernel you are running with the command
'uname -r' (examples: 386, 586tsc, 686, 686-smp, k6, k7, k7-smp).

To upgrade, run this command replacing  with yours:

  apt-get install linux-image-2.6.18-5-

Remember that you have to reboot your computers after upgrading this
package. If you are unfamiliar with kernel upgrades, please visit our
mini-HOWTO on this subject:

  http://www.skolelinux.org/security/kernel-upgrade

- --
For apt-get: deb htp://ftp.debian.org/debian/ sarge main

Mailing lists: [EMAIL PROTECTED], debian-edu@lists.debian.org,
   [EMAIL PROTECTED], [EMAIL PROTECTED],
   [EMAIL PROTECTED]
Package info: `apt-cache show '


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: New developer gathering in Norway schedduled for May 25-27 or June 1-3

2007-04-20 Thread Morten Werner Olsen
On Fri, Apr 20, 2007 at 06:06:43PM +0200, Petter Reinholdtsen wrote:

> > I tried to update the wiki at FRISK with gaterhing information. I did not 
> > have access (even if I got logged in).
> > 
> > http://www.friprogramvareiskolen.no/Gathering/
> 
> I'm not sure, but I believe your login name need to be listed on
> http://www.friprogramvareiskolen.no/FriskGroup> for you to have
> write access.  My wiki username is PetterReinholdtsen.  Please add me
> to the approved list.  Please add Knut as well.  Not sure about his
> username.

Ronny already added both of you. :) As I have written in another
email, these restrictions were added to the wiki because of spam.


- Werner


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



DESA-2007-001: several packages

2007-01-28 Thread Morten Werner Olsen
- --
Debian-Edu/Skolelinux Security Advisory DESA 2007-001
http://www.skolelinux.no/security/  Morten Werner Olsen
January 28th, 2007  [EMAIL PROTECTED]
- --

This DESA deals with severel packages that the Debian Security Team
has fixed. Each section start with "Package" and includes a link to
the Debian Security Team's announce for the security upgrade.


Package : openoffice.org (openoffice.org openoffice.org-bin
  openoffice.org-debian-files openoffice.org-help-el
  openoffice.org-help-en openoffice.org-help-es
  openoffice.org-help-fr openoffice.org-l10n-ca
  openoffice.org-l10n-de openoffice.org-l10n-en
  openoffice.org-l10n-es openoffice.org-l10n-fr
  openoffice.org-l10n-nb openoffice.org-l10n-nl
  openoffice.org-l10n-nn ttf-opensymbol)
Vulnerability   : buffer overflow
Need reboot : no
Debian-Edu-specific : no
CVE ID  : CVE-2006-5870
DSA ID  : DSA-1246-1
DSA URL : http://www.debian.org/security/2007/dsa-1246

Package : xfree86 (libdps1 libice6 libsm6 libx11-6 libxaw7
  libxext6 libxft1 libxi6 libxmu6 libxmuu1 libxp6
  libxpm4 libxrandr2 libxt6 libxtrap6 libxtst6 libxv1
  x-window-system-core xbase-clients xfonts-100dpi
  xfonts-75dpi xfonts-100dpi-transcoded xfonts-base
  xfonts-75dpi-transcoded xfonts-scalable xfree86-common
  xserver-xfree86 xfs xlibmesa-dri xlibmesa-gl
  xlibmesa-glu xlibs xlibs-data xserver-common xutils)
Vulnerability   : several vulnerabilities
Need reboot : no
Debian-Edu-specific : no
CVE ID  : CVE-2006-6101 CVE-2006-6102 CVE-2006-6103
DSA ID  : DSA-1249-1
DSA URL : http://www.debian.org/security/2007/dsa-1249


Upgrade Instructions
- 

Make sure the line

  deb http://security.debian.org/ sarge/updates main contrib non-free

is present in your /etc/apt/sources.list and run 'apt-get update' to
update your package lists. Then run

  'apt-get upgrade'

to upgrade all the packages mentioned above. This might upgrade other
packages too, and if you only want to upgrade the packages above, you
should run

  'apt-get install  ... '

where  to  is the package names in paranthesis
from each package section above.

- --
Mailing lists: [EMAIL PROTECTED], debian-edu@lists.debian.org,
   [EMAIL PROTECTED], [EMAIL PROTECTED],
   [EMAIL PROTECTED]
Package info: `apt-cache show '


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: january meeting conflict

2006-12-19 Thread Morten Werner Olsen
On Mon, Dec 18, 2006 at 08:58:23PM +0100, Holger Levsen wrote:

> I have a clash of meetings on January the 8th: there is a debian-edu
> meeting at 19.30 UTC and a debconf-team meeting scheduled at 20:00
> UTC.
> 
> Any suggestions how to resolve this? Maybe by moving the
> debconf-team meeting to 20:30 UTC? I believe most -edu people are
> happy with the "late" meeting time at 19.30, or?

I'm very happy with these "late" meetings .. and if I should be able
to attend, it must start no earlier than 19:30 UTC (later is ok).


- Werner


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



DESA-2006-009: kernel-image-2.6.8-i386

2006-12-17 Thread Morten Werner Olsen
- --
Debian-Edu/Skolelinux Security Advisory DESA 2006-009
http://www.skolelinux.no/security/  Morten Werner Olsen
December 17th, 2006 [EMAIL PROTECTED]
- --

Package : kernel-image-2.6.8-i386
Vulnerability   : several vulnerabilities
Problem-Type: local
Need reboot : yes
Debian-Edu-specific : no
CVE ID  : CVE-2006-3741 CVE-2006-4538 CVE-2006-4813
  CVE-2006-4997 CVE-2006-5174 CVE-2006-5619
  CVE-2006-5649 CVE-2006-5751 CVE-2006-5871
DSA ID  : DSA-1233


Several vulnerabilities have been found in the Linux kernel. If you
want the details, please take a look at the DSA's from Debian:

 http://www.debian.org/security/2006/dsa-1233

We recommend that you upgrade your kernel packages to the new 2.6.8
version built for Debian.

Upgrade Instructions
- 

Make sure 'deb http://ftp.debian.org/debian sarge main' or similar is
present in your /etc/apt/sources.list and run 'apt-get update' to
update your package lists.

Find which flavour of the kernel you are running with the command
'uname -r' (examples: 386, 586tsc, 686, 686-smp, k6, k7, k7-smp).

To upgrade, run this command replacing  with yours:

  apt-get install kernel-image-2.6.8-3-

Remember that you have to reboot your computers after upgrading this
package. If you are unfamiliar with kernel upgrades, please visit our
mini-HOWTO on this subject:

  http://www.skolelinux.no/security/kernel-upgrade

- --
For apt-get: deb ftp://ftp.skolelinux.no/skolelinux/ woody local

Mailing lists: [EMAIL PROTECTED], debian-edu@lists.debian.org,
   [EMAIL PROTECTED], [EMAIL PROTECTED],
   [EMAIL PROTECTED]
Package info: `apt-cache show '


signature.asc
Description: Digital signature


DESA-2006-008: several vulnerabilities

2006-12-17 Thread Morten Werner Olsen
- --
Debian-Edu/Skolelinux Security Advisory DESA 2006-008
http://www.skolelinux.no/security/  Morten Werner Olsen
December 17th, 2006 [EMAIL PROTECTED]
- --

This DESA deals with severel packages that the Debian Security Team
has fixed. Each section start with "Package" and includes a link to
the Debian Security Team's announce for the security upgrade.


Package : tar (tar)
Vulnerability   : input validation error
Need reboot : no
Debian-Edu-specific : no
CVE ID  : CVE-2006-6097
DSA ID  : DSA-1223-1
DSA URL : http://www.debian.org/security/2006/dsa-1223

Package : libgsf (libgsf-1)
Vulnerability   : buffer overflow
Need reboot : no
Debian-Edu-specific : no
CVE ID  : None
DSA ID  : DSA-1221-1
DSA URL : http://www.debian.org/security/2006/dsa-1221

Package : imagemagick (libmagick6, imagemagick)
Vulnerability   : several vulnerabilities
Need reboot : no
Debian-Edu-specific : no
CVE ID  : CVE-2006-5868
DSA ID  : DSA-1213-1
DSA URL : http://www.debian.org/security/2006/dsa-1213

Package : gnupg (gnupg)
Vulnerability   : several vulnerabilities
Need reboot : no
Debian-Edu-specific : no
CVE ID  : CVE-2006-6235
DSA ID  : DSA-1231-1
DSA URL : http://www.debian.org/security/2006/dsa-1231

Package : gv (gv)
Vulnerability   : buffer overflow
Need reboot : no
Debian-Edu-specific : no
CVE ID  : CVE-2006-5864
DSA ID  : DSA-1214-1
DSA URL : http://www.debian.org/security/2006/dsa-1214

Package : openssh (ssh)
Vulnerability   : Denial of service
Need reboot : no
Debian-Edu-specific : no
CVE ID  : CVE-2006-5051
DSA ID  : DSA-1212-1
DSA URL : http://www.debian.org/security/2006/dsa-1212

Package : texinfo (info)
Vulnerability   : buffer overflow
Need reboot : no
Debian-Edu-specific : no
CVE ID  : CVE-2006-4810
DSA ID  : DSA-1219-1
DSA URL : http://www.debian.org/security/2006/dsa-1219

Package : libpam-ldap
Vulnerability   : programming error
Need reboot : no
Debian-Edu-specific : no
CVE ID  : CVE-2006-5170
DSA ID  : DSA-1203-1
DSA URL : http://www.debian.org/security/2006/dsa-1203

Package : mozilla-thunderbird
Vulnerability   : several vulnerabilities
Need reboot : no
Debian-Edu-specific : no
CVE ID  : CVE-2006-4310
DSA ID  : DSA-1227-1
DSA URL : http://www.debian.org/security/2006/dsa-1227


Upgrade Instructions
- 

Make sure the line

  deb http://security.debian.org/ sarge/updates main contrib non-free

is present in your /etc/apt/sources.list and run 'apt-get update' to
update your package lists. Then run

  'apt-get upgrade'

to upgrade all the packages mentioned above. This might upgrade other
packages too, and if you only want to upgrade the packages above, you
should run

  'apt-get install  ... '

where  to  is the package names in paranthesis
from each package section above.

- --
Mailing lists: [EMAIL PROTECTED], debian-edu@lists.debian.org,
   [EMAIL PROTECTED], [EMAIL PROTECTED],
   [EMAIL PROTECTED]
Package info: `apt-cache show '


signature.asc
Description: Digital signature


Re: Becoming a contributor

2006-11-16 Thread Morten Werner Olsen
On Thu, Nov 16, 2006 at 11:31:09AM +0100, Holger Levsen wrote:

> > Welcome.  I am very happy to have another member on the team, and even
> > better to have an extra debian developer around to help with
> > sponsoring of education-related packages.. :)
> 
> I added him to the keyring. Welcome Luk! :)

And for the archive, I've also added him to our alioth
project. Welcome again! :)


- Werner


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Meeting summary from todays Debian Edu IRC meeting

2006-11-14 Thread Morten Werner Olsen
On Tue, Nov 14, 2006 at 09:17:43AM +0100, Holger Levsen wrote:

> >Next meeting is monday 2006-11-20 17:00 UTC (18:00 CET) in #debian-edu
> >on irc.debian.org.
> 
> People, please attend! These meetings realy are important, to get a accurate 
> status on issues and to discuss how we progress further. And it's frustrating 

I fully agree that these meetings are important. The reason for me not
attending is that the time does not fit my schedule. :( I'm not
available before 20:00 UTC (21:00 CET), but I guess the chosen time fit
most peoples schedules.


- Werner


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



DESA-2006-007: several vulnerabilities

2006-10-30 Thread Morten Werner Olsen
- --
Debian-Edu/Skolelinux Security Advisory DESA 2006-007
http://www.skolelinux.no/security/  Morten Werner Olsen
October 30th, 2006  [EMAIL PROTECTED]
- --

This DESA deals with severel packages that the Debian Security Team
has fixed. Each section start with "Package" and includes a link to
the Debian Security Team's announce for the security upgrade.


Package : gimp (gimp, libgimp2.0, gimp-data)
Vulnerability   : buffer overflow
Need reboot : no
Debian-Edu-specific : no
CVE ID  : CVE-2006-3404
DSA ID  : DSA-1116-1
DSA URL : http://www.debian.org/security/2006/dsa-1116

Package : unzip (unzip)
Vulnerability   : buffer overflow
Need reboot : no
Debian-Edu-specific : no
CVE ID  : CVE-2005-4667
DSA ID  : DSA-1012-1
DSA URL : http://www.debian.org/security/2006/dsa-1012

Package : freetype (libfreetype6)
Vulnerability   : integer overflows
Need reboot : no
Debian-Edu-specific : no
CVE ID  : CVE-2006-2661 CVE-2006-3467
DSA ID  : DSA-1095-1 DSA-1178-1
DSA URL : http://www.debian.org/security/2006/dsa-1095
  http://www.debian.org/security/2006/dsa-1178

Package : openssl (openssl, libssl0.9.7, libcrypto0.9.7-udeb)
Vulnerability   : cryptographic weakness
Need reboot : no
Debian-Edu-specific : no
CVE ID  : CVE-2006-4339 CVE-2006-2940
DSA ID  : DSA-1173-1 DSA-1185-1
DSA URL : http://www.debian.org/security/2006/dsa-1173
  http://www.debian.org/security/2006/dsa-1185

Package : kdebase (kcontrol, kdebase-bin, kdebase-data)
Vulnerability   : programming error
Need reboot : no
Debian-Edu-specific : no
CVE ID  : CVE-2006-2449
DSA ID  : DSA-1156-1
DSA URL : http://www.debian.org/security/2006/dsa-1156

Package : libwmf (libwmf0.2-7)
Vulnerability   : integer overflow
Need reboot : no
Debian-Edu-specific : no
CVE ID  : CVE-2006-3376
DSA ID  : DSA-1194-1
DSA URL : http://www.debian.org/security/2006/dsa-1194

Package : webmin (webmin, webmin-core)
Vulnerability   : multiple vulnerabilities
Need reboot : no
Debian-Edu-specific : no
CVE ID  : CVE-2006-4542
DSA ID  : DSA-1199-1
DSA URL : http://www.debian.org/security/2006/dsa-1199


Upgrade Instructions
- 

Make sure the line

  deb http://security.debian.org/ sarge/updates main contrib non-free

is present in your /etc/apt/sources.list and run 'apt-get update' to
update your package lists. Then run

  'apt-get upgrade'

to upgrade all the packages mentioned above. This might upgrade other
packages too, and if you only want to upgrade the packages above, you
should run

  'apt-get install  ... '

where  to  is the package names in paranthesis
from each package section above.

- --
Mailing lists: [EMAIL PROTECTED], debian-edu@lists.debian.org,
   [EMAIL PROTECTED], [EMAIL PROTECTED],
   [EMAIL PROTECTED]
Package info: `apt-cache show '


signature.asc
Description: Digital signature


DESA-2006-006: several vulnerabilities

2006-10-14 Thread Morten Werner Olsen
- --
Debian-Edu/Skolelinux Security Advisory DESA 2006-006
http://www.skolelinux.no/security/  Morten Werner Olsen
October 14th, 2006  [EMAIL PROTECTED]
- --

This DESA deals with severel packages that the Debian Security Team
has fixed. Each section start with "Package" and includes a link to
the Debian Security Team's announce for the security upgrade.


Package : postgresql (libpq3, postgresql-client)
Vulnerability   : programming error
Need reboot : no
Debian-Edu-specific : no
CVE ID  : CVE-2006-2314
DSA ID  : DSA-1087-1
DSA URL : http://www.debian.org/security/2006/dsa-1087

Package : dhcp (dhcp, dhcp-client-udeb, dhcp-client)
Vulnerability   : programming error
Need reboot : no
Debian-Edu-specific : no
CVE ID  : CVE-2006-3122
DSA ID  : DSA-1143-1
DSA URL : http://www.debian.org/security/2006/dsa-1143

Package : apache (apache-common, apache, apache-doc,
  apache-perl, libapache-mod-perl)
Vulnerability   : missing input sanitising and buffer overflow
Need reboot : no
Debian-Edu-specific : no
CVE ID  : CVE-2006-3918 CVE-2006-3747
DSA ID  : DSA-1167-1 DSA-1131-1
DSA URL : http://www.debian.org/security/2006/dsa-1167
  http://www.debian.org/security/2006/dsa-1131

Package : imagemagick (libmagick6, imagemagick)
Vulnerability   : several vulnerabilities
Need reboot : no
Debian-Edu-specific : no
CVE ID  : CVE-2006-3744 CVE-2005-4601
DSA ID  : DSA-1168-1 DSA-957-1
DSA URL : http://www.debian.org/security/2006/dsa-1168
  http://www.debian.org/security/2006/dsa-957

Package : tar (tar)
Vulnerability   : buffer overflow
Need reboot : no
Debian-Edu-specific : no
CVE ID  : CVE-2006-0300
DSA ID  : DSA-987-1
DSA URL : http://www.debian.org/security/2006/dsa-987

Package : xpdf (xpdf-utils, xpdf-common)
Vulnerability   : several vulnerabilities
Need reboot : no
Debian-Edu-specific : no
CVE ID  : CVE-2006-1244 CVE-2006-0301 CVE-2005-3624 CVE-2005-3625
  CVE-2005-3626 CVE-2005-3627 CVE-2005-3628
DSA ID  : DSA-984-1 DSA-971-1 DSA-931-1
DSA URL : http://www.debian.org/security/2006/dsa-984
  http://www.debian.org/security/2006/dsa-971
  http://www.debian.org/security/2006/dsa-931

Package : lynx (lynx)
Vulnerability   : programming error
Need reboot : no
Debian-Edu-specific : no
CVE ID  : CVE-2004-1617
DSA ID  : DSA-1076-1
DSA URL : http://www.debian.org/security/2006/dsa-1076

Package : cupsys (cupsys-bsd, cupsys-client, libcupsimage2,
  cupsys, libcupsys2-gnutls10)
Vulnerability   : buffer overflows
Need reboot : no
Debian-Edu-specific : no
CVE ID  : CVE-2005-3191 CVE-2005-3192 CVE-2005-3193 CVE-2005-3624
  CVE-2005-3625 CVE-2005-3626 CVE-2005-3627 CVE-2005-3628
DSA ID  : DSA-950-1
DSA URL : http://www.debian.org/security/2006/dsa-950

Package : nagios (nagios-common, nagios-text)
Vulnerability   : buffer overflow
Need reboot : no
Debian-Edu-specific : no
CVE ID  : CVE-2006-2162, CVE-2006-2489
DSA ID  : DSA-1072-1
DSA URL : http://www.debian.org/security/2006/dsa-1072

Package : samba (winbind, smbfs, smbclient, samba, libsmbclient,
  samba-common, samba-doc)
Vulnerability   : missing input sanitising
Need reboot : no
Debian-Edu-specific : no
CVE ID  : CVE-2006-3403
DSA ID  : DSA-1110-1
DSA URL : http://www.debian.org/security/2006/dsa-1110

Package : koffice (kivio-data, kchart, koffice-data, koshell,
  kivio, kugar, kformula, koffice-libs)
Vulnerability   : several vulnerabilities
Need reboot : no
Debian-Edu-specific : no
CVE ID  : CVE-2005-3191 CVE-2005-3193 CVE-2005-3624 CVE-2005-3625
  CVE-2005-3626 CVE-2005-3627 CVE-2005-3628 CVE-2006-1244
DSA ID  : DSA-938-1 DSA-1019-1
DSA URL : http://www.debian.org/security/2006/dsa-938
  http://www.debian.org/security/2006/dsa-1019


Upgrade Instructions
- 

Make sure the line

  deb http://security.debian.org/ sarge/updates main contrib non-free

is present in your /etc/apt/sources.list and run 'apt-get update' to
update your package lists. Then run

  'apt-ge

Re: DESA-2006-005: several vulnerabilities

2006-09-26 Thread Morten Werner Olsen
On Tue, Sep 26, 2006 at 05:45:54PM +0200, Morten Werner Olsen wrote:

> - --
> Debian-Edu/Skolelinux Security Advisory DESA 2006-005
> http://www.skolelinux.no/security/      Morten Werner Olsen
> September 26th, 2006[EMAIL PROTECTED]
> - --

[snip]

> Upgrade Instructions
> - 
> 
> Make sure the line
> 
>   deb http://security.debian.org/ woody/updates main contrib non-free

This should of course be sarge, not woody. Like this:

  deb http://security.debian.org/ sarge/updates main contrib non-free

Sorry about the typo.


- Werner


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



DESA-2006-005: several vulnerabilities

2006-09-26 Thread Morten Werner Olsen
- --
Debian-Edu/Skolelinux Security Advisory DESA 2006-005
http://www.skolelinux.no/security/  Morten Werner Olsen
September 26th, 2006[EMAIL PROTECTED]
- --

This DESA deals with severel packages that the Debian Security Team
has fixed. Each section start with "Package" and includes a link to
the Debian Security Team's announce for the security upgrade.


Package : tiff (libtiff4)
Vulnerability   : several vulnerabilities
Need reboot : no
Debian-Edu-specific : no
CVE ID  : CVE-2006-3465, CVE-2006-2026, CVE-2006-2656
DSA ID  : DSA-1137-1, DSA-1054-1, DSA-1091-1
DSA URL : http://www.debian.org/security/2006/dsa-1137
  http://www.debian.org/security/2006/dsa-1054
  http://www.debian.org/security/2006/dsa-1091

Package : shadow (passwd, login)
Vulnerability   : programming error
Need reboot : no
Debian-Edu-specific : no
CVE ID  : CVE-2006-3378
DSA ID  : DSA-1150-1
DSA URL : http://www.debian.org/security/2006/dsa-1150

Package : dia (dia-libs, dia-common, dia)
Vulnerability   : programming error
Need reboot : no
Debian-Edu-specific : no
CVE ID  : None
DSA ID  : DSA-1025-1
DSA URL : http://www.debian.org/security/2006/dsa-1025

Package : kdelibs (kdelibs4, kdelibs-bin, kdelibs-data)
Vulnerability   : buffer overflow
Need reboot : no
Debian-Edu-specific : no
CVE ID  : CVE-2006-0019
DSA ID  : DSA-948-1
DSA URL : http://www.debian.org/security/2006/dsa-948

Package : kaffeine (kaffeine)
Vulnerability   : buffer overflow
Need reboot : no
Debian-Edu-specific : no
CVE ID  : CVE-2006-0051
DSA ID  : DSA-1023-1
DSA URL : http://www.debian.org/security/2006/dsa-1023

Package : sudo (sudo)
Vulnerability   : missing input sanitising
Need reboot : no
Debian-Edu-specific : no
CVE ID  : CVE-2005-4158, CVE-2006-0151
DSA ID  : DSA-946-1
DSA URL : http://www.debian.org/security/2006/dsa-946

Package : perl (libperl5.8, perl-base, perl-modules, perl)
Vulnerability   : integer overflow
Need reboot : no
Debian-Edu-specific : no
CVE ID  : CVE-2005-3962
DSA ID  : DSA-943-1
DSA URL : http://www.debian.org/security/2006/dsa-943

Package : gzip (gzip)
Vulnerability   : several vulnerabilities
Need reboot : no
Debian-Edu-specific : no
CVE ID  : CVE-2006-4338
DSA ID  : DSA-1181-1
DSA URL : http://www.debian.org/security/2006/dsa-1181

Package : ppp (ppp)
Vulnerability   : programming error
Need reboot : no
Debian-Edu-specific : no
CVE ID  : CVE-2006-2194
DSA ID  : DSA-1106-1
DSA URL : http://www.debian.org/security/2006/dsa-1106

Package : gnupg (gnupg)
Vulnerability   : integer overflows and programming errors
Need reboot : no
Debian-Edu-specific : no
CVE ID  : CVE-2006-3082, CVE-2006-3746, CVE-2006-0455,
  CVE-2006-0049
DSA ID  : DSA-1107-1, DSA-1140-1, DSA-978-1, DSA-993-1
DSA URL : http://www.debian.org/security/2006/dsa-1107
  http://www.debian.org/security/2006/dsa-1140
  http://www.debian.org/security/2006/dsa-978
  http://www.debian.org/security/2006/dsa-993

Package : courier (courier-imap-ssl, courier-imap,
  courier-ldap, courier-base, courier-authdaemon,
  courier-ssl)
Vulnerability   : programming error
Need reboot : no
Debian-Edu-specific : no
CVE ID  : CVE-2006-2659
DSA ID  : DSA-1101-1
DSA URL : http://www.debian.org/security/2006/dsa-1101


Upgrade Instructions
- 

Make sure the line

  deb http://security.debian.org/ woody/updates main contrib non-free

is present in your /etc/apt/sources.list and run 'apt-get update' to
update your package lists. Then run

  'apt-get upgrade'

to upgrade all the packages mentioned above. This might upgrade other
packages too, and if you only want to upgrade the packages above, you
should run

  'apt-get install  ... '

where  to  is the package names in paranthesis
from each package section above.

- --
Mailing lists: [EMAIL PROTECTED], debian-edu@lists.debian.org,
   [EMAIL PROTECTED], [EMAIL PROTECTED],
   [EMAIL PROTECTED]
Package info: `apt-cache

Re: Is the developer gathering at TIK at University of Oslo Oct 13-15?

2006-09-25 Thread Morten Werner Olsen
On Sun, Sep 24, 2006 at 12:56:01PM +0200, Knut Yrvin wrote:

> I have read some e-mail suggesting that the October developer
> gathering will be held at University of Oslo, at TIK?
> 
> Is this officially announced? 

Now it is. Sorry about the delay. :/

> The prices on flights are still low. Trondheim-Oslo-Trondheim are between 
> 557-897, Lowest price Tromsø-Oslo-Tromsø is 698. Bergen-Oslo-Bergen: 557. 
> Munchen (Germany)-Oslo-Munchen: 2346 (all prices in NOK, divide by 8,54 to 
> convert to EUR -> 2346 / 8,54 = 275 Euro).  
> 
> I took the liberty to update this page: 
> http://developer.skolelinux.no/info/prosjektet/delprosjekt/agenda_developergathering_2006-10.txt

Thanks Knut! :)


- Werner


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Debian-Edu developergathering in Oslo

2006-09-25 Thread Morten Werner Olsen
Hi!

We're proud to welcome developers, translators and testers to a
Debian-Edu developer gathering in Oslo 13th to 15th of October. The
gathering will be held at the Centre for technology, innovation and
culture [1] at the University of Oslo.

If you want to attend please reply to this email (to
debian-edu@lists.debian.org) or put your name on the agenda [2] in the
Skolelinux SVN-repository. To get your travel costs reimbursed you
have to ask [EMAIL PROTECTED] in advance of ordering
tickets.

More information is available on the agenda [2].


- Werner

[1] http://www.tik.uio.no/indexeng.html
[2] 
http://d.skolelinux.no/info/prosjektet/delprosjekt/agenda_developergathering_2006-10.txt


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Our deepest condolences

2006-09-22 Thread Morten Werner Olsen
On Wed, Sep 20, 2006 at 12:31:43AM +0200, Michelle Konzack wrote:
 
> Whats going on?  Died naturaly, killed by Mossad, deadly Accident?

http://freenode.net/news.shtml


- Werner


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Our deepest condolences

2006-09-19 Thread Morten Werner Olsen
Hi!

On behalf of the Debian-Edu/Skolelinux-project and the organization
for Open Source Software in schools in Norway I send our deepest
condolences to Rob Levin's family and friends. We would also like to
thank Rob Levin (also known as lilo) for the great service he provided
us on the Freenode network.


- Werner


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Webserver maintenance (20060920 0800CET)

2006-09-18 Thread Morten Werner Olsen
Hi!

Tomorrow morning at around 0800CET I will do some maintenance on
maintainer.skolelinux.no. This server hosts most of the Skolelinux
webservices, and these will be unavailable for about half an hour.


- Werner


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Where are the French extra-packages?

2006-08-21 Thread Morten Werner Olsen
On Mon, Aug 21, 2006 at 11:41:07AM +0200, Xavier Oswald wrote:

> > Where are the French extra-packages?  They need to be uploaded into
> > Debian very soon to make it into Debian/Etch, and should be uploaded
> > into the debian-edu repository as well to make sure we track their
> > existence and try to find room for them on the first CD.
> 
> The packages are in the debian-edu repository : debian-edu/trunk/fr

Thierry and I started a todo-wiki-page [1] in Extremadura as a start of
moving the packages on the French Addon-CD into Debian and the DebianEdu
local-repository. I guess the people working on this should try to
update it with more info about the packages (package names, location in
SVN, maintainer).


- Werner


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: bugs.skolelinux.no

2006-08-08 Thread Morten Werner Olsen
On Tue, Aug 08, 2006 at 02:38:32PM +0200, RalfGesellensetter wrote:

> > As some of you already know, we are moving services [1] away from
> > developer.skolelinux.no to be able to reinstall it with Sarge. Our
> > Bugzilla [2] is one of the services left to move away from developer.
> 
> will the version of bugzilla also be updated with this step 
> (recommended)?

Hi!

I should of course have mentioned this too. The version of bugzilla on
the new webserver is the version in Debian Sarge (2.16.7). This is a
minor upgrade from 2.16.4.

Please let [EMAIL PROTECTED] know if there is any problems with the
"new" Bugzilla!


- Werner


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



bugs.skolelinux.no

2006-08-07 Thread Morten Werner Olsen
Hi!

As some of you already know, we are moving services [1] away from
developer.skolelinux.no to be able to reinstall it with Sarge. Our
Bugzilla [2] is one of the services left to move away from developer.

Sorry about this _very_ short notice, but as noone has been visitng
bugs.skolelinux.no since 17:40+0200 today I will close it down, move
the database to maintainer and ask our hostmaster to make the
DNS-change right away.

As we will have to wait until hostmaster responds and makes the
DNS-change, I guess the bugzilla will be down until tomorrow morning
around 10:00+0200.

Sorry for the inconvenience.


- Werner

[1] http://wiki.debian.org/DebianEdu/Infrastructure
[2] http://bugs.skolelinux.no/


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Security support for Woody/Venus terminated in the end of June

2006-06-10 Thread Morten Werner Olsen
Hi!

Quoting the latest debian-news announcement [1];

 "Security Support for Woody ending. The Debian Project [2]announced
  that more than one year after the release of Debian GNU/Linux 3.1
  alias 'sarge' the security [3]support for the old stable
  distribution 3.0 will be terminated at the end of June 2006. Debian
  GNU/Linux 3.0 alias 'woody' has been released nearly four years ago
  on July 19th 2002."

As the Debian-Edu/Skolelinux Security Support [4] depends on the work
by the Debian Security Team, our Security Support for
Debian-Edu/Skolelinux alias 'woody' and 'venus' will also be
terminated in the end of June 2006.

We recommend all users and schools using the Debian-Edu/Skolelinux
distribution to upgrade [5] or reinstall [6] to the Sarge-based version
soon. Sorry about the short notice.


- Werner

[1] http://lists.debian.org/debian-news/debian-news-2006/msg00024.html
[2] http://www.debian.org/News/2006/20060601
[3] http://www.debian.org/security/
[4] http://www.skolelinux.no/security/
[5] http://wiki.debian.org/DebianEdu/HowTo/UpgradeFrom1.0
[6] http://wiki.debian.org/DebianEdu/Download


signature.asc
Description: Digital signature


Archive move - ftp.skolelinux.(no|org)

2006-05-16 Thread Morten Werner Olsen
Hi!

This morning the Debian-Edu/Skolelinux FTP archive
ftp.skolelinux.(no|org) was relocated from developer.skolelinux.no to
administrator.skolelinux.no. As a user you should not notice this at
all. If you do have any problems after this relocation, please let us
know!

For the developers and contributors, an announcement regarding package
uploads, daily builds and maybe a few other things will be sent to
debian-edu@lists.debian.org later this week.


- Werner


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: sarge kernel-image for woody?

2006-04-27 Thread Morten Werner Olsen
On Thu, Apr 27, 2006 at 08:02:44AM +0200, Frank Weißer wrote:

> So what? A sarge-kernel for woody? I stopped the upgrade, not knowing if 
> i saw a bug or a feature ;-)

This is a feature [1]. :) As some earlier have decided that we need a
more recent kernel than the one present in woody, we use the kernels
from sarge as they are security maintained by the Debian security
team [2].


- Werner

[1] http://www.skolelinux.no/security/desa-2006-004.txt
[2] http://www.debian.org/security/


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



DESA-2006-004: kernel-image-2.4.27-i386

2006-04-23 Thread Morten Werner Olsen
- --
Debian-Edu/Skolelinux Security Advisory DESA 2006-004
http://www.skolelinux.no/security/  Morten Werner Olsen
April 23rd, 2006[EMAIL PROTECTED]
- --

Package : kernel-image-2.4.27-i386
Vulnerability   : several vulnerabilities
Problem-Type: local
Need reboot : yes
Debian-Edu-specific : no
CVE ID  : CVE-2005-0756 CVE-2005-0757 CVE-2005-1762
  CVE-2005-1767 CVE-2005-1768 CVE-2005-2456
  CVE-2005-2458 CVE-2005-2459 CVE-2005-2553
  CVE-2005-2801 CVE-2005-2872 CVE-2005-3275
  CVE-2004-0887 CVE-2004-1058 CVE-2004-2607
  CVE-2005-0449 CVE-2005-1761 CVE-2005-2457
  CVE-2005-2555 CVE-2005-2709 CVE-2005-2973
  CVE-2005-3257 CVE-2005-3783 CVE-2005-3806
  CVE-2005-3848 CVE-2005-3857 CVE-2005-3858
  CVE-2005-4618
DSA ID  : DSA-921 DSA-1018


Several security vulnerability has been found in the Linux kernel. If
you want the details, please take a look at the two latest DSA's from
Debian:

 http://www.debian.org/security/2005/dsa-921
 http://www.debian.org/security/2006/dsa-1018

We recommend that you upgrade your kernel packages to the new 2.4.27
version built for Debian.

Upgrade Instructions
- 

Make sure 'deb ftp://ftp.skolelinux.no/skolelinux/ woody local' is
present in your /etc/apt/sources.list and run 'apt-get update' to
update your package lists.

Find which flavour of the kernel you are running with the command
'uname -r' (examples: 386, 586tsc, 686, 686-smp, k6, k7, k7-smp).

To upgrade, run this command replacing  with yours:

  apt-get install kernel-image-2.4.27-3-

If you are unfamiliar with kernel upgrades, please visit our
mini-HOWTO on this subject:

  http://www.skolelinux.no/security/kernel-upgrade

- --
For apt-get: deb ftp://ftp.skolelinux.no/skolelinux/ woody local

Mailing lists: [EMAIL PROTECTED], debian-edu@lists.debian.org,
   [EMAIL PROTECTED], [EMAIL PROTECTED],
   [EMAIL PROTECTED]
Package info: `apt-cache show '


signature.asc
Description: Digital signature


Re: Asking for help profreading this debconf6 article

2006-04-13 Thread Morten Werner Olsen
On Wed, Apr 12, 2006 at 02:03:32PM +0200, Knut Yrvin wrote:

> > Please do. I assume OpenOffice.org 1.X also have some sort of
> > proofreading features?
> 
> I believe it's even the same menues if I remember correctly. Here to OO 
> 1.0 docformat: 
> 
> http://developer.skolelinux.no/~knuty/2006-04-02-debconf6.sxw

http://folk.uio.no/werner/2006-04-02-debconf6-werner.sxw

I did not have time to read through the whole text, so there are only
comments on the first pages.


- Werner


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Asking for help profreading this debconf6 article

2006-04-12 Thread Morten Werner Olsen
On Wed, Apr 12, 2006 at 01:27:40PM +0200, Knut Yrvin wrote:

> It's really a good tool for proofreading. You should try it out at once. 
> If you don't have OpenOffice.org 2.0, i can downgrade the document to 
> the internal OpenOffice.org 1.0 format. 

Please do. I assume OpenOffice.org 1.X also have some sort of
proofreading features?


- Werner


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Next Skolelinux/Debian-Edu developer gathering (21-23/4-2006)

2006-03-27 Thread Morten Werner Olsen
Dear developers, testers and translators!

We are lucky to have the municipality of Narvik (in the north of
Norway) to host our next developer gathering. In addition to help us
with the location and fix most of the local arrangement, they will
also sponsor travel costs for some of you!

The date for the gathering is set to 21st to 23rd of April, and more
details is on our webpage for this gathering [1]. If you want to
attend, sign yourself up on this page or send an email to
debian-edu@lists.debian.org with your details (as described in the
document [1]).

Unfortunately the member-organization in Norway (FRISK) have limited
amounts of money to spend for this gathering. By limiting our costs at
this gathering we will be able to arrange more gatherings this
year. To be able to do this, we require (as always) all participants
who want reimbursements to send an application to
[EMAIL PROTECTED] *prior* to the gathering. No approval
from the board means no money back to you, so make sure this is in
order. We have a zero tolerance policy here :-).


- Werner

[1] 
http://d.skolelinux.no/info/prosjektet/delprosjekt/agenda_developergathering_2006-04.txt


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Small Report of Dev WE in France 18-19/03 – Work on user administration tool

2006-03-24 Thread Morten Werner Olsen
On Wed, Mar 22, 2006 at 02:40:07PM +0100, Thierry STAUDER wrote:

> In Erkelenz a group of developers wanted to work on a user
> administration tool.  This group is formed by: Christian Kuelker,
> Benjamin Sonntag, Thomas Courbeil, Xavier Oswald, Jean Charles
> Siegel … Sorry if I forgot somebody.

Great to hear!

> The idea was to use the very good work made by Christian Kuelker
> with CiPux.  Cipux is a whole of very powerful Perl scripts which
> makes it possible to manage LDAP.

I studied some of the CiPux-code a bit, and there are several security
issues which must be fixed before we can using this in our
Debian-Edu/Skolelinux distribution. I've found examples in the code
where passwords are send to the command-line. One example in
get_value.pl [1] where the LDAP-password is provided on the
command-line to LDAP-commandline utilities.

In another file [2] passwords, crypts and some NT-passwordhashes are
written directly in the logfile which is, in my eyes, far away from
acceptable.

First of all I hope that the pepole that have implemented a solution
based on CiPux have restricted the access to the CiPux logfile!
Second, the problem with the passwords in commands called in perl is
that a student can watch the processlist with e.g. 'ps ax' and be able
to pick up passwords for users or machines.

If we can get the CiPux-framework free for these kind of bugs, we
should start the process of packaging it and uploading it to Debian.

> The proposition is to add an interface for CiPux in the Intranet
> made by the French team with Moodle. The solution adopted in
> Erkelenz is to create a RPC engine which controls CiPux and which
> can interact with various interfaces:
> • modules moodle
> • CAT' in PHP
> • Somethink in java
> • PAS
> • ...
> 
> If you want to see the work made on the Intranet, you can have a
> look at http://moodle.skolelinux.fr/
> 
> We can announce that the RPC engine is running. The source code of
> this work can be found in the fr branch in the moodle – ldap
> package.
> 
> At the beginning of the next month, two students will start to write
> the interface for Moodle. We hope that this work will be ready for
> the Dev Camp.

Unfortunately I don't have any Moodle-knowledge, but do you know how
hard/easy it will be to make a CiPux-plugin written for Moodle
preconfigured for our Debian-Edu/Skolelinux distribution? At least you
should make sure the students write the configuration part of the
plugin with this in mind.

> This work is a first result from the collaboration started between
> the French and German team and of course everybody must feel free to
> join this work even if he’s not French or German ;)

I believe that working together across the country borders is how we
all will have a better product to offer our "customers", and I hope
that many will contribute so we'll have a nicer utility for user
administration tool ready this summer when Debian starts the freeze
for etch. I hope that my comments about CiPux are taken seriously as I
believe the problems commented are very serious in a security point of
view.


- Werner

[1] http://cvs.cipworx.org/cvsweb.cgi/cipux/cibot/src/bin/get_value.pl?rev=1.2
[2] http://cvs.cipworx.org/cvsweb.cgi/cipux/cibot/src/bin/add.pl?rev=1.5


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#356879: debian-edu: Cleanup duplicate relations

2006-03-16 Thread Morten Werner Olsen
On Wed, Mar 15, 2006 at 05:53:17PM +0100, Stefan Huehner wrote:

> > Note that the debian/control file is generated, so the script used to
> > generate it need to be fixed for this change to be permanent.
> > 
> > These isn't much use updating the control file without fixing the
> > script.
> 
> hmm i've missed that script before. I assume that you refer to the
> 'gen-control' script. I can work on this but this tries the apt-sources
> as specified by your 'sources.list.*' files. Some of these point to now
> unexisting sources and i'm not sure what your current sources for these
> are: i.e. 'people.linuxlabs.no'.. Could you please look over these and
> provide information for the current sources. Would be easier to fix the
> script if it could be run ;)

I removed the line containing people.linuxlabs.no as it is
obsolete. It is great if you have time to fix this problem in the
gen-control-script! :)


- Werner


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Simplifying skolelinux.org as a showcase

2006-03-13 Thread Morten Werner Olsen
On Mon, Mar 13, 2006 at 03:25:09AM +0100, Knut Yrvin wrote:

> > I read those minutes from your leaders meeting only as interesting
> > ideas.
> 
> I know you well enough to engage in this debate with you Jonas, other 
> than to repeat my question: 

I think Jonas have read a few thread on this list that you have
missed. But I don't think that is an interesting topic to discuss
here, so we can take it over a beer (and soda) later. :)

> It would be nice if sombody gave me some feedback on the design: 
> 
> http://developer.skolelinux.no/~knuty/skolelinux_mockup.jpg

I think this design look good! Petter Reinholdtsen asked if this can
be implemented in a moinmoin-wiki, and I believe an answer to that
question is important for the further discussion to this topic.

If it is not possible to implement the design and content in a
moinmoin-wiki, you mean that we will have to have a
skolelinux.org-website in addition to Debian's Wiki [1]?

I think we shall keep the number of web technologies to a minimum and
stick to moinmoin-wiki's and static html-pages. So if a moinmoin-wiki
is not an opportunity, I guess static html-pages can do the job? You
said that your plans does not involve more than 10-20 different pages?
And maintaining static html-pages in SVN is something we know how to
do, and do well. :) The job would just be to get the design and empty
pages in place.

It is also a much smaller job to maintain (talking with my [EMAIL PROTECTED]
on) a solution with statical html-pages than a solution which involve
a framework (like Plone and Ez).


- Werner

[1] http://wiki.debian.org/DebianEdu


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



DESA-2006-001: several packages

2006-03-13 Thread Morten Werner Olsen
- --
Debian-Edu/Skolelinux Security Advisory DESA 2006-003
http://www.skolelinux.no/security/  Morten Werner Olsen
March 13th, 2005[EMAIL PROTECTED]
- --

This DESA deals with severel packages that the Debian Security Team
has fixed. Each section start with "Package" and includes a link to
the Debian Security Team's announce for the security upgrade.


Package : gnupg (gnupg)
Vulnerability   : programming error
Need reboot : no
Debian-Edu-specific : no
CVE ID  : CAN-2006-0455
DSA ID  : DSA-978-1 DSA-993-2
DSA URL : http://www.debian.org/security/2006/dsa-978
  http://www.debian.org/security/2006/dsa-993

Package : curl (libcurl2)
Vulnerability   : buffer overflow
Need reboot : no
Debian-Edu-specific : no
CVE ID  : CAN-2005-4077
DSA ID  : DSA-919-2
DSA URL : http://www.debian.org/security/2005/dsa-919


Upgrade Instructions
- 

Make sure the line

  deb http://security.debian.org/ woody/updates main contrib non-free

is present in your /etc/apt/sources.list and run 'apt-get update' to
update your package lists. Then run

  'apt-get upgrade'

to upgrade all the packages mentioned above. This might upgrade other
packages too, and if you only want to upgrade the packages above, you
should run

  'apt-get install  ... '

where  to  is the package names in paranthesis
from each package section above.

- --
Mailing lists: [EMAIL PROTECTED], debian-edu@lists.debian.org,
   [EMAIL PROTECTED], [EMAIL PROTECTED],
   [EMAIL PROTECTED]
Package info: `apt-cache show '


signature.asc
Description: Digital signature


Re: Simplifying skolelinux.org as a showcase

2006-03-12 Thread Morten Werner Olsen
On Sun, Mar 12, 2006 at 09:59:39PM +0100, Knut Yrvin wrote:

> Here it is, the mockup of a showcase Skolelinux/Debian_Edu presentation 
> site: 
> 
> http://developer.skolelinux.no/~knuty/skolelinux_mockup.jpg
> 
> Do we need changes, and how should this site look like? Let the 
> discussion begin :-). 

The discussion about the skolelinux.org website has in my eyes already
been finished on this mailinglist (debian-edu@lists.debian.org) with
the conclusion that we should redirect all skolelinux.org-pages to
http://wiki.debian.org/DebianEdu.

> Oh, the idea behind this design come from Halvor Dahls brother, a 
> university professor. He showed us the www.koha.org website. The mockup 
> is made by Alex Brasetvik. 
> 
> * Background
> 
> A lot of progress is done lately to improve the workflow in the
> Skolelinux/Debian Edu project. The wiki.debian.org/DebianEdu taking
> form. The irc-meetings for developers as far I can see is a
> success. On the project leader meeting at Erkelenz we agreed on that a
> showcase web was needed. 
>
> The main goal is to help decision makers to choose
> Skolelinux/Debian_Edu. The showcase should be a well designed
> web-pages informing about Skolelinux as a product and give examples
> and answer to questions. The users can be teachers, admins, local
> government and decision makers. Also some pages for pupils will be
> nice that many ask for using computer programs used at their local
> school to their home assignment. Then we should get them easy access
> and guides to free software to use at home.

So why doesn't http://wiki.debian.org/DebianEdu fit this purpose? In
my opinion the front-page can be edited to fit the purpose you
describe (not as sexy, but still).

> Since the project meeting in Erkelenz I've pointed out to Markus
> Gamenius that it was 12 months ago we planed to improve the
> skolelinux.org as a multilingual showcase promoting
> Skolelinux/Debian_Edu.  The board in "Free Software in Schools" had
> also donated some compensation to Alex Brasetvik for some initially
> training learning eZ publish.  Alex are studying at The Norwegian
> University of Science and Technology, and working with rolling out web
> publishing systems for LinuxLabs.  He is already overbooked. So Markus
> at LinuxLabs are helping out, and Alex can to this job without other
> assignment coming his way.

So this new skolelinux.org-website you propose, Alex should be paid
for creating it? What technology should it be based on? Who shall be
responsible for updating it?

I still think we shall stick to http://wiki.debian.org/DebianEdu as
our one and only international website. Earlier we have proven with
the multiple tries on creating a skolelinux.org-website that we don't
have manpower to maintain this .. and I don't think the"Free software
in schools"-organization in Norway have any money left spending on
creating nor maintaining a website.

Please followup to debian-edu@lists.debian.org only.


- Werner


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Spanish profile translations

2006-02-20 Thread Morten Werner Olsen
On Mon, Feb 20, 2006 at 06:58:38PM -0500, Patrice Neff wrote:

> Currently the following languages have still install strings marked  
> as fuzzy. Should I write to the translators marked in the individual  
> PO file about this?
>   - Portuguese
>   - Portuguese Brazil
>   - Italian
>   - Low Saxon (nds)
>   - Finnish

They all received a mail from me a couple of weeks ago, but you can of
course send them another reminder. :)


- Werner


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Spanish profile translations

2006-02-20 Thread Morten Werner Olsen
On Mon, Feb 20, 2006 at 07:24:04AM -0500, Patrice Neff wrote:

> Thank you, that may have been the cause. I have now checked in a new  
> PO-file version without the fuzzy marks.
> 
> When is the next daily build available, so I can check that out?

The daily build is rebuilt everytime a new package enters the
archives. I've build a new debian-edu-install now and sent it off to
the archive. :)

In 5-10 minutes I believe a new daily build should be ready.


- Werner


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Spanish profile translations

2006-02-18 Thread Morten Werner Olsen
On Thu, Feb 16, 2006 at 10:43:46PM -0500, Patrice Neff wrote:

> I tested the daily build again today and found that the Spanish  
> translations are broken. The profile explanations appear in English  
> during a Spanish installation. I did now add the translation for the  
> Barebone profile in Subversion, but somehow I think the problem is  
> somewhere else (especially because the Barebone profile doesn't even  
> appear in the explanations).

I've tested the daily build from yesterday, and it was not english
templates describing the profiles. My Spanish is not existing at all,
but I could not recognize any english there. :)

The rest of the debconf templates also seemed to be Spanish, so can
you please test once more?


- Werner


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Projectleader meeting Erkelenz

2006-02-17 Thread Morten Werner Olsen
On Fri, Feb 17, 2006 at 01:58:09PM +0100, Kurt Gramlich wrote:

> Knut, Thierry and I had a talk in Erkelenz and we agreed:
> 
> 1 try to get EU Funding
>   coordination french team

Sounds great, but do you have more details?

> 2 to call all developers to join the
>   skolelinux devcamp in france
>   coordination french team

Can you please elaborate this? It seems like this is just notes that
is almost only understandable for you guys joined this "meeting".

> 3 to use skolelinux.org only as showcase
>   means only 10 or 20 static and well designed webpages to inform
>   about the project, aimed for teachers, pupils, admins,
>   goverment or local deciders.

This is an ongoing thread on this mailinglist, so I believe you should
just join that discussion instead of starting a new one here.

> 4 to start with 3 moinmoin wikis for the activ work process
>   wiki.debian.org/DebianEdu/ english
>   skolelinux.de/wiki/  german
>   wiki.skolelinux.fr french
>   and with this use
>   the subpage functionality /
>   the interlink functionality
>   (same page in different languages on different servers, only
>   one click away)
>   and the subscribe functionality to update the information
>   (people subscribe pages and take reponsability to keep it up to
>   date)

I believe that we should use only http://wiki.debian.org/DebianEdu for
all technical documentation because the technical solution should be,
at least in my eyes, the same for all countries and as much as
possible a part of Debian. The local wiki's (.de, .fr, .no, ..) should
be used for political and local stuff.

> 5 to internationalize the new member process
>   starting with update of the german page, translation into
>   english an french and coordinate it internationaly
>   coordination german team

I'm kind of miss the main goal about this new member process. Is it an
offer for new developers wanting to help out, or do you want _every_
new developer joining us to go through this process?

> 6 to be present in the regulary IRC meetings
>   every two week mondays international meeting at #debian-edu
>   GMT 19:00
>   every wednesday 22:00 MEZ german speaking activists
>   #skolelinux.de

Everyone interested in the technical part should try to join these
meetings on #debian-edu. :)


- Werner


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: .org proposal 2nd

2006-02-17 Thread Morten Werner Olsen
On Fri, Feb 17, 2006 at 08:13:35AM +0100, Patrick Winnertz wrote:

> sound also like an good solution :) important is that the new member
> process for developers is international, because later they will mostly
> work international and not in the national teams.

Do we have and need a new member process? I did a search on google and
found a page about it in the German wiki [1]. What is the intention
with this, is it for the German or international community?

I can agree that we probably should offer an optional new member
process for persons that wants to go through such a process. We have
great examples of contributors that do great work for us without going
through such a process. In my opinion we don't have enough manpower
now to afford forcing contributors through such a process and risk
losing them because such process.


- Werner

[1] http://www.skolelinux.de/wiki/NewMember/Process


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: .org proposal 2nd

2006-02-16 Thread Morten Werner Olsen
On Thu, Feb 16, 2006 at 11:23:58PM +0100, Jonas Smedegaard wrote:

> David C. Weichert suggest setting up global Skolelinux services in
> separate skolelinux.org subdomains[2].
>
> Kurt suggest using existing german tools[3].
>
> Morten Werner Olsen suggest setting up services separated by folders
> on one big skolelinux.org server[4].
>
> I suggest using existing Debian tools for anything development, and
> setup language-specific Skolelinux services for each local
> community[5].
>
>
> Putting my proposal last on this list is not due to manipulation,
> but simply that it seems to me as being the last proposal before
> that latest thread got absorbed by technical details.

Some of us talked a bit about this in Erkelenz and also later in the
Norwegian community, and I believe "we" agreed that the international
part of Skolelinux is, like I think Jonas means, the techical part or
Debian-Edu if you like. We started a bit in Erkelenz to use the Wiki
at http://wiki.debian.org/DebianEdu for information and documentation
about our techical solution. My suggestion for the international
"portal" is to redirect all traffic which now comes to the portal at
http://skolelinux.org/ to http://wiki.debian.org/DebianEdu .

> (but feel free to see this final remark as manipulation if you
> like ;-) )

Don't think it was your manipulation that made me change my mind, but
anyway.. :)

I still think there are needs for local teams with local portals for
e.g. political reasons. It is important to have local teams not only
to support the local developers, but also to do political work and
translating software and documentation. I'm sure there are many other
reasons as well.

But the important thing is that we stick togeter for a common goal is
to coordinate all techical work as one international group on this
mailinglist, the SVN repository at svn.debian.org (Alioth) and on
http://wiki.debian.org/DebianEdu .


- Werner


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: preconfigured radiusserver

2006-02-15 Thread Morten Werner Olsen
On Tue, Feb 14, 2006 at 09:01:16PM +0100, RalfGesellensetter wrote:

> Hi Georg, could this be a case for a regional add-on CD, like the French 
> team is using? There had been a voting for an option "extracd" that 
> makes the installer ask for the 2nd CD after base installation...

A radius-server configured to use our already set up LDAP-server could
be a new service which is interesting for our Etch-based release. So
we should absolutely think about installing and configuring this
out-of-the-box for next release.

Why on a localized "extracd"? There is nothing "localized" about it..


- Werner


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Release Candidate 1 for Sarge-based Debian-Edu/Skolelinux

2006-02-13 Thread Morten Werner Olsen
On Mon, Feb 13, 2006 at 12:05:46AM +0100, Finn-Arne Johansen wrote:

> OK, we are pushing it now, to get it out the door.
> Please test, to make sure we have a working CD.

Great work guys! :)

> For known bugs an limitations, please look at look through bugzilla at
>  http://bugs.skolelinux.no/buglist.cgi?version=sarge-rc1

So everyone; please help us test, verify and fix these bugs!


- Werner


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Developer gathering, Feb. 2006

2006-02-06 Thread Morten Werner Olsen
On Mon, Feb 06, 2006 at 10:44:03PM +0100, Frode Jemtland wrote:

> We have not any proposed places to be, so suggestions would be great. (I 
> think 
> we have a fallback in University of Oslo (Forskningsparken), anyone that can 
> confirm this )

If the date is Feb 17th-19th, I will attend and still have the key,
and if the date is Feb 24th-26th Petter Reinholdtsen has claimed to
come [1] and I assume he still has the key? Some rumors say that there
is not SLX Debian Labs that pays for the Office in Forskningsparken
anymore, can someone with knowledge please give us a status here?


- Werner

[1] 
http://d.skolelinux.no/info/prosjektet/delprosjekt/agenda_developergathering_2006-02.txt



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



DESA-2006-001: several packages

2006-01-27 Thread Morten Werner Olsen
- --
Debian-Edu/Skolelinux Security Advisory DESA 2006-001
http://www.skolelinux.no/security/  Morten Werner Olsen
January 27th, 2005  [EMAIL PROTECTED]
- --

This DESA deals with severel packages that the Debian Security Team
has fixed. Each section start with "Package" and includes a link to
the Debian Security Team's announce for the security upgrade.


Package : courier (courier-authdaemon, courier-base,
  courier-imap, courier-ldap)
Vulnerability   : programming error
Need reboot : no
Debian-Edu-specific : no
CVE ID  : CAN-2005-3532
DSA ID  : DSA-917-1
DSA URL : http://www.debian.org/security/2005/dsa-917

Package : curl (libcurl2)
Vulnerability   : buffer overflow
Need reboot : no
Debian-Edu-specific : no
CVE ID  : CAN-2005-4077 CVE-2005-3185
DSA ID  : DSA-919-1
DSA URL : http://www.debian.org/security/2005/dsa-919

Package : xpdf (xpdf xpdf-common xpdf-reader xpdf-utils)
Vulnerability   : buffer overflows
Need reboot : no
Debian-Edu-specific : no
CVE ID  : CAN-2005-3191 CAN-2005-3192 CAN-2005-3193
  CVE-2005-3624 CVE-2005-3625 CVE-2005-3626
  CVE-2005-3627 CVE-2005-3628
DSA ID  : DSA-931-1
DSA URL : http://www.debian.org/security/2005/dsa-931

Package : unzip (unzip)
Vulnerability   : race condition
Need reboot : no
Debian-Edu-specific : no
CVE ID  : CAN-2005-2475
DSA ID  : DSA-903-2
DSA URL : http://www.debian.org/security/2005/dsa-903

Package : tetex-bin (tetex-bin libkpathsea3)
Vulnerability   : buffer overflows
Need reboot : no
Debian-Edu-specific : no
CVE ID  : CAN-2005-3191 CVE-2005-3192 CVE-2005-3624
  CVE-2005-3625 CVE-2005-3626 CVE-2005-3627
  CVE-2005-3628
DSA ID  : DSA-937-1
DSA URL : http://www.debian.org/security/2005/dsa-937

Package : sudo (sudo)
Vulnerability   : missing input sanitising
Need reboot : no
Debian-Edu-specific : no
CVE ID  : CAN-2005-4158 CVE-2006-0151
DSA ID  : DSA-946-1
DSA URL : http://www.debian.org/security/2005/dsa-946

Package : cupsys (cupsys cupsys-bsd cupsys-client
  cupsys-pstoraster libcupsys2)
Vulnerability   : buffer overflows
Need reboot : no
Debian-Edu-specific : no
CVE ID  : CAN-2005-3191 CVE-2005-3192 CVE-2005-3193
  CVE-2005-3624 CVE-2005-3625 CVE-2005-3626
  CVE-2005-3627 CVE-2005-3628
DSA ID  : DSA-950-1
DSA URL : http://www.debian.org/security/2005/dsa-950


Upgrade Instructions
- 

Make sure the line

  deb http://security.debian.org/ woody/updates main contrib non-free

is present in your /etc/apt/sources.list and run 'apt-get update' to
update your package lists. Then run

  'apt-get upgrade'

to upgrade all the packages mentioned above. This might upgrade other
packages too, and if you only want to upgrade the packages above, you
should run

  'apt-get install  ... '

where  to  is the package names in paranthesis
from each package section above.

- --
Mailing lists: [EMAIL PROTECTED], debian-edu@lists.debian.org,
   [EMAIL PROTECTED], [EMAIL PROTECTED],
   [EMAIL PROTECTED]
Package info: `apt-cache show '


signature.asc
Description: Digital signature


Re: Nagios script autoconfiguring skolelinux Network?

2006-01-24 Thread Morten Werner Olsen
On Tue, Jan 24, 2006 at 03:18:17PM +0100, RalfGesellensetter wrote:

> > And it is probably an idea to default to not sending any mail from
> > Nagios, and document how the admin can enable this if he/she
> > wants. What do you think?
> 
> Sudden idea (maybe non-sense): use nagiosadmin (or any other account) as 
> recipient for nagios mailings - and logrotate his mailbox, triggered by 
> size.

What would we benefit from such solution? If I remember correct,
Nagios has searchable alarm database where one can find the history. I
still believe not sending Nagios alarm's as email per default is the
best solution.


- Werner


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Nagios script autoconfiguring skolelinux Network?

2006-01-24 Thread Morten Werner Olsen
On Mon, Jan 23, 2006 at 08:38:33PM +0100, RalfGesellensetter wrote:

> As I can read at
> http://bugs.skolelinux.no/show_bug.cgi?id=1026 it is considered to drop 
> Nagios as we also have Munin which has nicer graphs...

I strongly believe that we should not drop Nagios, but we have to
adjust some of it's limits a bit to minimize the noise. And it is
probably an idea to default to not sending any mail from Nagios, and
document how the admin can enable this if he/she wants. What do you 
think?


- Werner


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: IRC meeting to plan the next release

2006-01-18 Thread Morten Werner Olsen
On Sun, Jan 15, 2006 at 04:17:25PM +0100, Petter Reinholdtsen wrote:

> Getting all the active people in one place seem to be getting harder.
> To handle it, I suggest we start doing IRC meetings.
> 
> Should we do the first one this week, to make sure we have a common
> understanding of the debian-edu status before the german development
> meeting?
> 
> What about Thursday 2006-01-19 18:00 GMT?  I guess we should limit it
> to one hour, and make a summary of the meeting as well as the IRC log
> available on the web.

Sounds fine to me. I'll be there .. whereever that will be. Shall we
use #debian-edu on Freenode or a new channel for the "happening"? :)


- Werner


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Debian Edu Extremadura work meeting june 2006

2006-01-05 Thread Morten Werner Olsen
On Thu, Jan 05, 2006 at 11:21:27AM +0100, Andreas Schuldei wrote:

> > please have a look at
> > http://wiki.debian.org/DebianEduExtremadura2006
> > ...
> >
> 
> so, nothing else came out of this then the thread about jefferson
> and franklin?
> 
> should i cancel the meeting or is there any interest?

I'm absolutely interested in such a meeting, so sign me up! :)

I also see [1] that Emdebian has set up meetings both in April and
March, and I don't assume they will use both? So will more people be
able to attend if we use the one in March or April that Emdebian
doesn't use?


- Werner

[1] http://wiki.debian.org/WorkSessionsExtremadura


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: About cvs for french dev.

2005-12-29 Thread Morten Werner Olsen
On Thu, Dec 29, 2005 at 01:04:49PM +0100, Xavier Oswald wrote:

> > What if you add the contents of this CD into the SVN-repository at
> > alioth.debian.org (debian-edu/src/french-addon-cd) ?
> > 
> > > Other good point is that some additionnal learning software are in french
> > > and it would be nice if translation could be made, and become official
> > > debian packages ;)
> > 
> > If you have the whole addon-cd in SVN others can also take a look and
> > maybe help suggesting solutions for implement your
> > addon-cd-functionality into Debian the first Skolelinux/Debian-Edu CD.
> 
> You are right, that's why, we are waiting of the decision from the no
> and de community about using a common svn or not.

Please use the SVN on svn.debian.org (with alioth-usernames). As I
said in an earlier email src/french-addon-cd/ might be a good
location.


- Werner


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: About cvs for french dev.

2005-12-29 Thread Morten Werner Olsen
On Tue, Dec 06, 2005 at 03:05:28PM +0100, Xavier Oswald wrote:

> -> After installing the skolelinux official CD, we wants a second CD
> which will contains all modifications we want, like an upgrade CD.
> -> It should be easy to use so, we made a install script for automatic
> software installation(additionnal packages which aren't on the
> official skolelinux cd), Intranet(Moodle which modification for french
> school), Personnalization of home desktop for users(french need too
> :),Ldap administration tools(Cipux),Openoffice plugins
> 
> This CD was made because every school don't have an internet access to
> upgrade skolelinux and install additionnal packages.
> 
> I hope we could use a common cvs repository or a new branch of the
> official repository so everybody could have easily access to the
> modifications.

What if you add the contents of this CD into the SVN-repository at
alioth.debian.org (debian-edu/src/french-addon-cd) ?

> Other good point is that some additionnal learning software are in french
> and it would be nice if translation could be made, and become official
> debian packages ;)

If you have the whole addon-cd in SVN others can also take a look and
maybe help suggesting solutions for implement your
addon-cd-functionality into Debian the first Skolelinux/Debian-Edu CD.


- Werner


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: the .org proposal or "join forces"

2005-12-27 Thread Morten Werner Olsen
On Tue, Dec 20, 2005 at 12:30:28PM +0100, Jonas Smedegaard wrote:

David C. Weichert's proposal:

> > * www.skolelinux.org (International Portal)
> > * blogs.skolelinux.org (Blogs)
> > * planet.skolelinux.org (Planet)
> > * people.skolelinux.org (Pages about members)
> > * wiki.skolelinux.org (Wiki)
> > * doc.skolelinux.org (Documentation)
> > * bugs.skolelinux.org (Bugtracking)
>
> What about schools.skolelinux.org ?

My old proposal:

>  o http://skolelinux.org/  -> forwarded to /wiki/ (?)
>  o http://skolelinux.org/wiki/
>  o http://skolelinux.org/blogs/
>  o http://skolelinux.org/planet/
>  o http://skolelinux.org/doc/
>  o http://skolelinux.org/schools/
>  o http://bugs.skolelinux.org/
>  o http://people.skolelinux.org/ or http://folk.skolelinux.org/

> > So who feels responsible for the organisation of the .org-proposal
> > and who has the control about that?
> 
> I still have a hard time understanding the difference between
> skolelinux development and Debian development. I have no interest in
> building up a parallel to Debian.
> 
> And no, I do not believe it is necessary that all development is done
> by "authorized personel" (read: official Debian developers). Official
> developers are needed for the final packaging steps of signing and
> uploading (which means they personally take responsibility of the
> quality of the package, so in reality there's more to it than just the
> simple acts).

This is a more detailed proposal from me where I try to figure out
which parts of the Debian infrastructure we can/should use.

 o http://skolelinux.org/ - I would like to forward this front-page to a
   wiki where a lot of our information is present and at least most of
   it is linked up. Maybe to one or more SVN-dumps to
   http://skolelinux.org// where our documentation-tree from
   d.skolelinux.no/documentation/ is a great example.

   Can we use Debian's webpages for this? I don't think so, because we
   don't have enough DD's for commiting patches to the webpages,
   right?

 o http://skolelinux.org/wiki/ - our main site where the content is
   like described above. The Germans have done a great job with their
   wiki, so I believe we should be able to use the same technology for
   our international site. But, if this should work out we must agree
   that the master language is english. Does anyone have a problem
   with that?

   And will the Germans move some of their content (which is of
   interest to the international and technical visitors) from their
   wiki at skolelinux.de/wiki/ to this wiki?

   Could we use http://wiki.debian.org/DebianEdu for this? Yes
   probably. The only challenge I see is that if we for one reason
   would like to do any changes deeper into the wiki, we don't have
   permissions to that. I'm not sure if this will be a problem. Can
   we have the opinion of you guys administrating the wiki on
   http://skolelinux.de/wiki/ ?? Do we have other arguments for not
   using wiki.debian.org?

 o http://blogs.skolelinus.org/ - I'm not a blogger nor a blog-admin
   myself, so if anyone have any comments that would have been great.

   I don't believe Debian have any blogging-infrastructure, so we'll
   have to set up our own.

 o http://planet.skolelinux.org/ - Can we use planet.debian.org? Is
   there only DD's that are linked up there? And planet.debian.org's
   target is probably Developers not users, teachers, and admins, or
   am I wrong?

 o http://skolelinux.org/doc/ - I believe this can be a good place do
   dump a directory from SVN with our Skolelinux-specific
   documentation. That is the documentation that has to do with our
   CD, architecture, the sysadmin-documentation and so on. I don't
   believe Debian has any place where this fit in?

 o http://skolelinux.org/schools/ - The list of schools that we
   already have today.

 o http://bugs.skolelinux.org/ - Can we use bugs.d.o? Yes, for a lot
   of bugs we can and we should, but I don't think pointing teachers
   to bugs.d.o's interfaces is a good idea. So if we want bugreports
   from our primary users, I believe we should continue use the
   bugzilla we have at bugs.skolelinux.no now. It has been put a lot
   of effort in cleaning it up too.

 o http://people.skolelinux.org/ or http://folk.skolelinux.org/ -
   homepages for all that have an skolelinux.org-account. As we not
   are only Debian Developers, people.debian.org cannot be used.

Comments are more than welcome! :)


- Werner


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#275028: debian-edu-install: We should have a Education-barebone

2005-12-21 Thread Morten Werner Olsen
On Tue, Dec 20, 2005 at 05:31:02PM +0100, Petter Reinholdtsen wrote:

> > The profile should have an option to create an education-barebone,
> > were you might install a spesific task, like LDAP-server,
> > backup-server mail-server and such
> 
> Yes, it would make it easier to install a server for a single service.
> I believe this option should only be available when in expert mode.
> Perhaps it should be possible to install single services in expert
> mode?

I don't understand why you want this in expert mode only? Cant we have
barebone as one of the choises in a normal install too?


- Werner


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Proposed patch for default cfengine configuration

2005-12-21 Thread Morten Werner Olsen
On Wed, Dec 21, 2005 at 03:30:43AM -0500, Patrice Neff wrote:

> >And as long as you're the one doing this, you've got the power.
> >If someone disagrees they'll have to do something.
> >And if not, well...
> 
> So I used that power to check the patch in now. Have tested it quite  
> extensively and it worked for me. Please tell me what I broke... :)
> 
> Just as a reminder: this patch changes debian-edu from cfengine to  
> cfengine2. I did not find any incompatibilities so far.

Two things;

 o We've earlier tried to use cfengine2, but as the line you removed
   from one of the configuration files said, we had problems with
   cfengine didn't run well when installing thin-client-server. Have
   you tested that this setup installs well now?

 o Please document very changes in the debian/changelog of the
   packages you make changes for.

It's great if you can make this work out-of-the-box! I'll have to test
it some time, but the time is a bit strict now before christmas. :/


- Werner


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Should we rent a car, and drive to Germany to the Skolelinux treffen 2006?

2005-12-20 Thread Morten Werner Olsen
On Tue, Dec 20, 2005 at 09:49:58AM +0100, Petter Reinholdtsen wrote:

> > I believe it take 10-12 hours to drive from Oslo Norway, trough
> > Sweden, Denmark and to the Cornelius-Burgh-Gymnasium?
> 
> I doubt that I will be able to set aside 3-4 days for travelling back
> and forth, so unless flying takes almost as long, I'll fly.

/me too..


- Werner


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: the .org proposal or "join forces"

2005-12-19 Thread Morten Werner Olsen
On Fri, Dec 16, 2005 at 09:36:20PM +0100, Ole-Anders Andreassen wrote:

> > The site could be split into different subdomains reflecting the
> > different users rather than technologies:
> >
> > * www.skolelinux.org (International Portal)
> > * blogs.skolelinux.org (Blogs)
> > * planet.skolelinux.org (Planet)
> > * people.skolelinux.org (Pages about members)
> > * wiki.skolelinux.org (Wiki)
> > * doc.skolelinux.org (Documentation)
> > * bugs.skolelinux.org (Bugtracking)
> 
> What about schools.skolelinux.org ? 

I agree .. but I think that we should keep the domains to a
minimum and rather have something like this:

 o http://skolelinux.org/  -> forwarded to /wiki/ (?)
 o http://skolelinux.org/wiki/
 o http://skolelinux.org/blogs/
 o http://skolelinux.org/planet/
 o http://skolelinux.org/doc/
 o http://skolelinux.org/schools/
 o http://bugs.skolelinux.org/
 o http://people.skolelinux.org/ or http://folk.skolelinux.org/

> On the norwegian list's I've been asking about blogs.  Petter told me about 
> this thread on [EMAIL PROTECTED]
> 
> As a skolelinux-administrator on a school, I belive that a blog and a wiki 
> would be a great suplement to the already existing documentation.  
> 
> I also belive that it's important to bring the developers and the 
> administrators closer together. Blogging could be one way to do this...

Blogs and people's homepages (people.s.o or folk.s.o) can of course be
written in the language that each person prefers, but for the other
website's I would stronly recommend that we should use english as the
_only_ language. Why? Because it is the only language we have common,
and if we should be able to join our forces towards a common goal I
believe this is very important.


- Werner


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: policy for pools?

2005-12-14 Thread Morten Werner Olsen
On Tue, Dec 13, 2005 at 01:10:56PM +0100, Steffen Joeris wrote:

> I am curious about the future situation of the pool-handling, means the 
> skolelinux pools of packages.
> 
> My question is how we will do our work in the future?
> Is there a policy for uploading packages to skolelinux?

Well, for the sarge-based pool I don't believe we have any clear
policy, but for the woody-based (stable) we have earlier agreed on
send an email to [EMAIL PROTECTED] and ask if anyone had objections to
the new upload. And only a few people have access to add new packages
or overwrite packages in the pool for Venus (stable woody-based).

When upgrading packages in our test-pool (which the Sarge-pool now
is), I believe it's ok to just upload new version of packages for
bugfixing. For those of us that reads the commit-list the changes
appears there. For _new_ packages to the test-pool I believe it would
be nice with an email to [EMAIL PROTECTED] to ask for objections to the
upload. Comments?

Of course these "policies" should have been written down somewhere,
but .. the well known lack of time.

> Ok we have three kinds of packages.
> 
> 1. Backports
> 2. native skolelinux packages (LTSP, webmin*stuff, ...)
> 3. own skolelinux packages (keep the minimum because we are normally 
> including 
> all packages into Debian)

We should try to keep the nubmer of backported packages as low as
possible. The best thing to do if we want new packages in
Debian-Edu/Skolelinux is make sure they are present in Debian.

> So this was just the current summary.
> Currently Finn-Arne is working on reprepro and on a transition to get the 
> current pools in reprepro, then we will have an upload queue in the future
> (Thanks for that finnarne, although i am bothering you all the time with 
> that).

I'm looking forward to this! :)

> My question now is do we need a policy?

Yes, our socalled policy should probably have been written down on a
webpage on d.skolelinux.no. Maybe included in the "Guidelines for
developer .." [1]?

> Will we make a keyring with gpg keys for uploading, or will we accept 
> packages 
> from everyone?

Either a keyring (probably the best) or manually ack'ing of
packages. Or maybe a mix with manually ack'ing of packages uploaded by
people not in the keyring.

> Will we make source-only uploads? (I prefer not to make it, but will mention 
> it as a possibility).

I would prefer source-only uploads as we then will be sure that the
packages do not FTBFS.

> Who can upload packages? 

Well, probably those who are interested .. and are able to behave. For
the stable archive I believe that only a few persons should be able.

> Who is interested in that?

Too few? :)

> Is there a need for help on archive (reprepro)?

Finn-Arne?

> Maybe some specifications about uploading after the transition.
> 
> So what do you think on this topic???
> 
> Please take this mail as the start of a discussion or reject it if you see no 
> need in discussing it, i just write this mail because i want to talk about 
> it.

We have not (yet) had any problems with people misusing their rights
to the archive pools, so this is not a big deal in my eyes. But if a
missing policy keeps new developers from uploading packages to our
test(ing)-pool, it is more important. If someone have time to write a
policy-draft, I'll gladly read through and comment it.
 
> P.S. If someone of you will come to the meeting in january and need 
> accomodation for some more days during the week because of a cheaper flight 
> or so just let me know i will find a way ;)

Unfortunately I'm not able to attend this gathering, but afaik
both Finn-Arne and Petter will come so you could perhaps continue
parts of this discussion there..


- Werner

[1] http://d.skolelinux.no/dokumentasjon/contributing-developers.html


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Advise for new default configuration

2005-12-14 Thread Morten Werner Olsen
On Thu, Dec 15, 2005 at 01:04:34AM +0100, RalfGesellensetter wrote:

> this sounds promising.

Absolutely! :)

> >    - Proceed with my idea (and change the domain name used for
> > testing to cfservd.intern for example)
> >    - Opt-out solution so that manually removing the cfengine.intern
> > does not install this configuration on new workstations
> 
> one of those - please note that:
> 
> - during installation process, the workstations might lack access to
>   net/tjener - so checking means some risk.

Can't we assume that main server (tjener) and network connection is in
place when workstations and thin client servers are installed? I think
so.

> - until entered in dhcpd.conf, workstation IPs might change
> - pre06 adds etherwake
> - some gui/webmin interface would be nice ;)

If I remember correctly the cfengine-setup needs some keys in place
before the cfservd-communication can start, is that right? If so, I
have not been able to see a solution where we out-of-the-box can do
this keysetup without sacrifising some security. Or have I missed a
solution here?

I believe a solution where we can run a script on the main-server
(from a webmin-module or something) to "add" the workstation into the
cfservd-setup would be a satisfactory solution to the problem.


- Werner


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: bugzilla-skolelinux subscribed?

2005-12-08 Thread Morten Werner Olsen
On Thu, Dec 08, 2005 at 11:15:57PM +0100, Frode Jemtland wrote:

> Then again, a big round of applause to Werner, White and Faj, and others, for 
> getting the bugzilla back in shape.

And for Frode who started this process!


- Werner


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: About cvs for french dev.

2005-12-06 Thread Morten Werner Olsen
On Tue, Dec 06, 2005 at 02:15:22PM +0100, Benjamin Sonntag wrote:

> The french team who is developping skolelinux since 2005-05 has no cvs
> for now.
> 
> I joined the team on 2005-11 and convinced them to use cvs for our
> sources. cool idea huh ?
> 
> Do you think it is possible to have a dedicated cvs module in your
> debian-edu cvs server for the french project, or do you think we'd
> rather use our own cvs in France (we can administrate a local version of
> course) ? We want to store our specific packages sources in this cvs and
> the cd builder scripts too.
> 
> We also want to use some scripts to send a mail when a commit is sent to
> the repository so that our french server can do nightly builds and so
> that our mailing list can receive cvs commit warning messages.
> 
> What is your opinion and what solution do you prefer ?

Hi!

First I have to admit that I might have missed some of the emails
regarding the French project to this list. But I have one question
that I hope you can answer to give me a clearer picture of the
situation.

How come you build your own CD, have your own sources for packages and
so on? Isn't it possible for you to cooperate with us on the
Skolelinux-CD, SVN-archives on svn.debian.org and
developer.skolelinux.no, and bugtracker? I believe we would be able to
make a better product if we stoped all this "double-work" and started
to work in the same direction on the same product.

This is not ment as criticism, but as questions because I probably
have missed the answers earlier on.


- Werner


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: bugzilla-skolelinux subscribed?

2005-12-04 Thread Morten Werner Olsen
On Sun, Dec 04, 2005 at 06:57:11PM +0100, Florian Reitmeir wrote:

> after the many bugzilla mails on this list, i wonder why bugzilla is
> subscribed to this list? isn't it simplier/nicer to create a own list for it?
> Instead of flooding/spamming this one?

The reason bugzilla is sending mail to this list is that the list is
registered as "owner" of unowned bugs. And the reason for the huge
amount of bugzilla-mail this weekend is that we have had a developer
gathering in Oslo and one of the main activities has been to clean up
old bugs from our bugzilla.

I suggest we wait a few weeks and see how many mail that are generated
by bugzilla, and then see what a more normal amount of mail from the
bugzilla is.


- Werner


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



DESA-2005-014: several packages

2005-12-02 Thread Morten Werner Olsen
- --
Debian-Edu/Skolelinux Security Advisory DESA 2005-014
http://www.skolelinux.no/security/  Morten Werner Olsen
December 2nd, 2005  [EMAIL PROTECTED]
- --

This DESA deals with severel packages that the Debian Security Team
has fixed. Each section start with "Package" and includes a link to
the Debian Security Team's announce for the security upgrade.


Package : sudo (sudo)
Vulnerability   : missing input sanitising
Need reboot : no
Debian-Edu-specific : no
CVE ID  : CAN-2005-2959
DSA ID  : DSA-870-1
DSA URL : http://www.debian.org/security/2005/dsa-870

Package : imlib (gdk-imlib1)
Vulnerability   : unsanitised input
Need reboot : no
Debian-Edu-specific : no
CVE ID  : CAN-2004-0817
DSA ID  : DSA-548-2
DSA URL : http://www.debian.org/security/2004/dsa-548

Package : lynx (lynx)
Vulnerability   : buffer overflow
Need reboot : no
Debian-Edu-specific : no
CVE ID  : CAN-2005-3120
DSA ID  : DSA-874-1
DSA URL : http://www.debian.org/security/2005/dsa-874

Package : lynx-ssl (lynx-ssl)
Vulnerability   : buffer overflow
Need reboot : no
Debian-Edu-specific : no
CVE ID  : CAN-2005-3120
DSA ID  : DSA-876-1
DSA URL : http://www.debian.org/security/2005/dsa-876

Package : squid (squid)
Vulnerability   : assertion error
Need reboot : no
Debian-Edu-specific : no
CVE ID  : CAN-2005-2794
DSA ID  : DSA-809-1
DSA URL : http://www.debian.org/security/2005/dsa-809

Package : openssl (libssl0.9.6 openssl)
Vulnerability   : 
Need reboot : no
Debian-Edu-specific : no
CVE ID  : CAN-2005-2969
DSA ID  : DSA-888-1
DSA URL : http://www.debian.org/security/2005/dsa-888

Package : libungif4 (libungif4g)
Vulnerability   : several
Need reboot : no
Debian-Edu-specific : no
CVE ID  : CAN-2005-2974 CVE-2005-3350
DSA ID  : DSA-890-1
DSA URL : http://www.debian.org/security/2005/dsa-890

Package : unzip (unzip)
Vulnerability   : race condition
Need reboot : no
Debian-Edu-specific : no
CVE ID  : CAN-2005-2475
DSA ID  : DSA-903-1
DSA URL : http://www.debian.org/security/2005/dsa-903

Package : netpbm-free (libnetpbm9 netpbm)
Vulnerability   : buffer overflows
Need reboot : no
Debian-Edu-specific : no
CVE ID  : CAN-2005-3632
DSA ID  : DSA-904-1
DSA URL : http://www.debian.org/security/2005/dsa-904

Package : gdk-pixbuf (libgdk-pixbuf-gnome2 libgdk-pixbuf2)
Vulnerability   : several
Need reboot : no
Debian-Edu-specific : no
CVE ID  : CAN-2005-2975 CVE-2005-2976 CVE-2005-3186
DSA ID  : DSA-913-1
DSA URL : http://www.debian.org/security/2005/dsa-913


Upgrade Instructions
- 

Make sure the line

  deb http://security.debian.org/ woody/updates main contrib non-free

is present in your /etc/apt/sources.list and run 'apt-get update' to
update your package lists. Then run

  'apt-get upgrade'

to upgrade all the packages mentioned above. This might upgrade other
packages too, and if you only want to upgrade the packages above, you
should run

  'apt-get install  ... '

where  to  is the package names in paranthesis
from each package section above.

- --
Mailing lists: [EMAIL PROTECTED], debian-edu@lists.debian.org,
   [EMAIL PROTECTED], [EMAIL PROTECTED],
   [EMAIL PROTECTED]
Package info: `apt-cache show '


signature.asc
Description: Digital signature


Re: Next skolelinux developer gathering, Nov/Dec '05

2005-11-23 Thread Morten Werner Olsen
On Tue, Nov 15, 2005 at 03:20:13PM +0100, Jakob Breivik Grimstveit wrote:

> The following dates have been suggested for now: 25-27 Nov, 2-4 Dec or
> possibly (but this might be too close to Christmas for some of you?) 9-11
> Dec. What seems like the best solution for you? Please give us your opinion.
> Today.

[snip]

> Please give us an indication of when you would be able to attend so we can
> fix the dates as quickly as possible. Thanks in advance.

We will have to decide which weekend the gathering will be arranged
very soon now (tonight), so if someone haven't registered yet: please
do so now! :)

And remember what Jakob said in the previous mail:

> Further to this, to control the costs associated with the developer
> gathering, we now require all participants who want reimbursements
> to send an application to [EMAIL PROTECTED] *prior* to
> the gathering. No approval from the board means no money back to
> you, so make sure this is in order. We have a zero tolerance policy
> here :-).

Happy hacking! :)


- Werner


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



DESA-2005-013: several packages

2005-10-14 Thread Morten Werner Olsen
- --
Debian-Edu/Skolelinux Security Advisory DESA 2005-013
http://www.skolelinux.no/security/  Morten Werner Olsen
October 14th, 2005  [EMAIL PROTECTED]
- --

This DESA deals with severel packages that the Debian Security Team
has fixed. Each section start with "Package" and includes a link to
the Debian Security Team's announce for the security upgrade.


Package : cfengine (cfengine)
Vulnerability   : insecure temporary files
Need reboot : no
Debian-Edu-specific : no
CVE ID  : CAN-2005-2960
DSA ID  : DSA-835-1
DSA URL : http://www.debian.org/security/2005/dsa-835

Package : cpio (cpio)
Vulnerability   : several
Need reboot : no
Debian-Edu-specific : no
CVE ID  : CAN-2005- CAN-2005-1229
DSA ID  : DSA-846-1
DSA URL : http://www.debian.org/security/2005/dsa-846

Package : tcpdump (tcpdump)
Vulnerability   : infinite loop
Need reboot : no
Debian-Edu-specific : no
CVE ID  : CAN-2005-1279
DSA ID  : DSA-850-1
DSA URL : http://www.debian.org/security/2005/dsa-850

Package : libxine0 (xine-lib)
Vulnerability   : format string vulnerability
Need reboot : no
Debian-Edu-specific : no
CVE ID  : CAN-2005-
DSA ID  : DSA-863-1
DSA URL : http://www.debian.org/security/2005/dsa-863


Upgrade Instructions
- 

Make sure the line

  deb http://security.debian.org/ woody/updates main contrib non-free

is present in your /etc/apt/sources.list and run 'apt-get update' to
update your package lists. Then run

  'apt-get upgrade'

to upgrade all the packages mentioned above. This might upgrade other
packages too, and if you only want to upgrade the packages above, you
should run

  'apt-get install  ... '

where  to  is the package names in paranthesis
from each package section above.

- --
Mailing lists: [EMAIL PROTECTED], debian-edu@lists.debian.org,
   [EMAIL PROTECTED], [EMAIL PROTECTED],
   [EMAIL PROTECTED]
Package info: `apt-cache show '


signature.asc
Description: Digital signature


DESA-2005-012: several packages

2005-10-14 Thread Morten Werner Olsen
- --
Debian-Edu/Skolelinux Security Advisory DESA 2005-012
http://www.skolelinux.no/security/  Morten Werner Olsen
October 14th, 2005  [EMAIL PROTECTED]
- --

This DESA deals with severel packages that the Debian Security Team
has fixed. Each section start with "Package" and includes a link to
the Debian Security Team's announce for the security upgrade.


Package : pcre3 (libpcre3)
Vulnerability   : integer overflow
Need reboot : no
Debian-Edu-specific : no
CVE ID  : CAN-2005-2491
DSA ID  : DSA-800-1
DSA URL : http://www.debian.org/security/2005/dsa-800

Package : cvs (cvs)
Vulnerability   : insecure temporary files
Need reboot : no
Debian-Edu-specific : no
CVE ID  : CAN-2005-2693
DSA ID  : DSA-802-1
DSA URL : http://www.debian.org/security/2005/dsa-802

Package : apache apache-common (apache)
Vulnerability   : programming error
Need reboot : no
Debian-Edu-specific : no
CVE ID  : CAN-2005-2088
DSA ID  : DSA-803-1
DSA URL : http://www.debian.org/security/2005/dsa-803

Package : squid (squid)
Vulnerability   : several
Need reboot : no
Debian-Edu-specific : no
CVE ID  : CAN-2005-2794 CAN-2005-2796
DSA ID  : DSA-809-1
DSA URL : http://www.debian.org/security/2005/dsa-809

Package : python2.2 (python2.2)
Vulnerability   : integer overflow
Need reboot : no
Debian-Edu-specific : no
CVE ID  : CAN-2005-2491
DSA ID  : DSA-817-1
DSA URL : http://www.debian.org/security/2005/dsa-817

Package : python2.1 (python2.1)
Vulnerability   : integer overflow
Need reboot : no
Debian-Edu-specific : no
CVE ID  : CAN-2005-2491
DSA ID  : DSA-819-1
DSA URL : http://www.debian.org/security/2005/dsa-819

Package : util-linux bsdtools mount (util-linux)
Vulnerability   : privilege escalation
Need reboot : no
Debian-Edu-specific : no
CVE ID  : CAN-2005-2876
DSA ID  : DSA-823-1
DSA URL : http://www.debian.org/security/2005/dsa-823


Upgrade Instructions
- 

Make sure the line

  deb http://security.debian.org/ woody/updates main contrib non-free

is present in your /etc/apt/sources.list and run 'apt-get update' to
update your package lists. Then run

  'apt-get upgrade'

to upgrade all the packages mentioned above. This might upgrade other
packages too, and if you only want to upgrade the packages above, you
should run

  'apt-get install  ... '

where  to  is the package names in paranthesis
from each package section above.

- --
Mailing lists: [EMAIL PROTECTED], debian-edu@lists.debian.org,
   [EMAIL PROTECTED], [EMAIL PROTECTED],
   [EMAIL PROTECTED]
Package info: `apt-cache show '


signature.asc
Description: Digital signature


Re: Your Bugzilla buglist needs attention.

2005-08-23 Thread Morten Werner Olsen
On Tue, Aug 23, 2005 at 06:11:03PM +0200, [EMAIL PROTECTED] wrote:

>  http://bugs.skolelinux.no/show_bug.cgi?id=20
>   missing debconf: php4, php4-ldap, php4-snmp 4.0.100-1

>  http://bugs.skolelinux.no/show_bug.cgi?id=41
>   mangler debconf: gpm 1.19.6-5

>  http://bugs.skolelinux.no/show_bug.cgi?id=187
>   Mangler test for å se om PHP fungerer etter installasjon

These three bugs I've recently resolved as WONTFIX. I believe neither
of those bugs matter to us anymore. Does anyone disagree? If not I
will probably start resolving more bugs the same way.


- Werner


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



DESA-2005-011: several packages

2005-08-15 Thread Morten Werner Olsen
- --
Debian-Edu/Skolelinux Security Advisory DESA 2005-011
http://www.skolelinux.no/security/  Morten Werner Olsen
August 15th, 2005   [EMAIL PROTECTED]
- --

This DESA deals with severel packages that the Debian Security Team
has fixed. Each section start with "Package" and includes a link to
the Debian Security Team's announce for the security upgrade.


Package : tiff (libtiff3g)
Vulnerability   : buffer overflow
Need reboot : no
Debian-Edu-specific : no
CVE ID  : CAN-2005-1544
DSA ID  : DSA-755-1
DSA URL : http://www.debian.org/security/2005/dsa-755

Package : krb5 (libkrb53)
Vulnerability   : remote code execution, denial of service
Need reboot : no
Debian-Edu-specific : no
CVE ID  : CAN-2005-1689 CAN-2005-1174 CAN-2005-1175
DSA ID  : DSA-757-1
DSA URL : http://www.debian.org/security/2005/dsa-757

Package : zlib (zlib1g)
Vulnerability   : buffer overflow
Need reboot : no
Debian-Edu-specific : no
CVE ID  : CAN-2005-1849
DSA ID  : DSA-763-1
DSA URL : http://www.debian.org/security/2005/dsa-763


Upgrade Instructions
- 

Make sure the line

  deb http://security.debian.org/ woody/updates main contrib non-free

is present in your /etc/apt/sources.list and run 'apt-get update' to
update your package lists. Then run

  'apt-get upgrade'

to upgrade all the packages mentioned above. This might upgrade other
packages too, and if you only want to upgrade the packages above, you
should run

  'apt-get install  ... '

where  to  is the package names in paranthesis
from each package section above.

- --
Mailing lists: [EMAIL PROTECTED], debian-edu@lists.debian.org,
   [EMAIL PROTECTED], [EMAIL PROTECTED],
   [EMAIL PROTECTED]
Package info: `apt-cache show '


signature.asc
Description: Digital signature


DESA-2005-010: several packages

2005-07-11 Thread Morten Werner Olsen
- --
Debian-Edu/Skolelinux Security Advisory DESA 2005-010
http://www.skolelinux.no/security/  Morten Werner Olsen
July 11th, 2005 [EMAIL PROTECTED]
- --

This DESA deals with severel packages that the Debian Security Team
has fixed. Each section start with "Package" and includes a link to
the Debian Security Team's announce for the security upgrade.


Package : bzip (bzip2)
Vulnerability   : infinite loop
Need reboot : no
Debian-Edu-specific : no
CVE ID  : CAN-2005-1260
DSA ID  : DSA-741-1
DSA URL : http://www.debian.org/security/2005/dsa-741

Package : sudo (sudo)
Vulnerability   : pathname validation race
Need reboot : no
Debian-Edu-specific : no
CVE ID  : CAN-2005-1993
DSA ID  : DSA-735-1
DSA URL : http://www.debian.org/security/2005/dsa-735

Package : squid (squid)
Vulnerability   : IP-spoofing
Need reboot : no
Debian-Edu-specific : no
CVE ID  : CAN-2005-1519
DSA ID  : DSA-751-1
DSA URL : http://www.debian.org/security/2005/dsa-751

Package : gzip (gzip)
Vulnerability   : several
Need reboot : no
Debian-Edu-specific : no
CVE ID  : CAN-2005-0988 CAN-2005-1228
DSA ID  : DSA-752-1
DSA URL : http://www.debian.org/security/2005/dsa-752


Upgrade Instructions
- 

Make sure the line

  deb http://security.debian.org/ woody/updates main contrib non-free

is present in your /etc/apt/sources.list and run 'apt-get update' to
update your package lists. Then run

  'apt-get upgrade'

to upgrade all the packages mentioned above. This might upgrade other
packages too, and if you only want to upgrade the packages above, you
should run

  'apt-get install  ... '

where  to  is the package names in paranthesis
from each package section above.

- --
Mailing lists: [EMAIL PROTECTED], debian-edu@lists.debian.org,
   [EMAIL PROTECTED], [EMAIL PROTECTED],
   [EMAIL PROTECTED]
Package info: `apt-cache show '


signature.asc
Description: Digital signature


DESA-2005-009: several packages

2005-07-01 Thread Morten Werner Olsen
- --
Debian-Edu/Skolelinux Security Advisory DESA 2005-009
http://www.skolelinux.no/security/  Morten Werner Olsen
July 1st, 2005  [EMAIL PROTECTED]
- --

This DESA deals with severel packages that the Debian Security Team
has fixed. Each section start with "Package" and includes a link to
the Debian Security Team's announce for the security upgrade.


Package : squid (squid)
Vulnerability   : design flaw
Need reboot : no
Debian-Edu-specific : no
CVE ID  : CAN-2005-1345
DSA ID  : DSA-721-1
DSA URL : http://www.debian.org/security/2005/dsa-721

Package : bzip2 (bzip2 libbz2-1.0)
Vulnerability   : race condition
Need reboot : no
Debian-Edu-specific : no
CVE ID  : CAN-2005-0953
DSA ID  : DSA-730-1
DSA URL : http://www.debian.org/security/2005/dsa-730

Package : sudo (sudo)
Vulnerability   : pathname validation race
Need reboot : no
Debian-Edu-specific : no
CVE ID  : CAN-2005-1993
DSA ID  : DSA-735-1
DSA URL : http://www.debian.org/security/2005/dsa-735


Upgrade Instructions
- 

Make sure the line

  deb http://security.debian.org/ woody/updates main contrib non-free

is present in your /etc/apt/sources.list and run 'apt-get update' to
update your package lists. Then run

  'apt-get upgrade'

to upgrade all the packages mentioned above. This might upgrade other
packages too, and if you only want to upgrade the packages above, you
should run

  'apt-get install  ... '

where  to  is the package names in paranthesis
from each package section above.

- --
Mailing lists: [EMAIL PROTECTED], debian-edu@lists.debian.org,
   [EMAIL PROTECTED], [EMAIL PROTECTED],
   [EMAIL PROTECTED]
Package info: `apt-cache show '


signature.asc
Description: Digital signature


Re: Worklist for the weekend

2005-06-11 Thread Morten Werner Olsen
On Fri, Jun 10, 2005 at 02:16:39PM +0200, Finn-Arne Johansen wrote:

> - Add backup of slapd to the slbackup routine

I hope to fix this during this weekend.


- Werner


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#311188: debian-edu-config: Messes "programmatically" with conffiles of other packages

2005-05-30 Thread Morten Werner Olsen
On Mon, May 30, 2005 at 11:28:54AM +0200, Jonas Smedegaard wrote:

> > (And yes, I believe we need to find a better way to handle
> > configuration in debian-edu, but while we wait, I see no better way to
> > do it than the current mechanism.  And I believe it is not breaking
> > policy as it is written in the Debian Policy Manual today.
> 
> It sure breaks packages' maintainance that their conffiles are altered
> by other packages (which I believe is the intend of D-P 10.7.4): It is
> expected to be able to remove functionality of a package by removing a
> package - that is not the case with debian-edu-config.

So do you also mean that it breaks packages' maintainance that their
conffiles are altered by the sysadmins too? Package maintainer script
shall perfectly handle that conffiles are changed by the sysadmin.

An extreme solution to this bug could have been to rewrite
debian-edu-config as a HUGE installation-manual, and tell the
sysadmins (I expect that there wouldn't be many left) to manually do
all the configuring. In the same way as it is now after a Debian-edu
installation, the maintainer scripts of the packages that will have a
altered configuration shall handle this during upgrade.

I'm not sure I see the difference. If I know the debian-edu-config
package right, one will have to run a script to change any conffiles
after manually installing the pacakge?


- Werner


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



DESA-2005-008: several packages

2005-04-28 Thread Morten Werner Olsen
- --
Debian-Edu/Skolelinux Security Advisory DESA 2005-008
http://www.skolelinux.no/security/  Morten Werner Olsen
April 28th, 2005[EMAIL PROTECTED]
- --

This DESA deals with severel packages that the Debian Security Team
has fixed. Each section start with "Package" and includes a link to
the Debian Security Team's announce for the security upgrade.


Package : gtkhtml (libgtkhtml20)
Vulnerability   : null pointer dereference
Need reboot : no
Debian-Edu-specific : no
CVE ID  : CAN-2003-0541
DSA ID  : DSA-710-1
DSA URL : http://www.debian.org/security/2005/dsa-710

Package : kdelibs (kdelibs3 kdelibs3-bin kdelibs3-cups
   libarts libkmid)
Vulnerability   : several
Need reboot : no
Debian-Edu-specific : no
CVE ID  : CAN-2005-1046
DSA ID  : DSA-714-1
DSA URL : http://www.debian.org/security/2005/dsa-714

Package : cvs (cvs)
Vulnerability   : serveral
Need reboot : no
Debian-Edu-specific : no
CVE ID  : CAN-2004-1342 CAN-2004-1343
DSA ID  : DSA-715-1
DSA URL : http://www.debian.org/security/2005/dsa-715


Upgrade Instructions
- 

Make sure the line

  deb http://security.debian.org/ stable/updates main contrib non-free

is present in your /etc/apt/sources.list and run 'apt-get update' to
update your package lists. Then run

  'apt-get upgrade'

to upgrade all the packages mentioned above. This might upgrade other
packages too, and if you only want to upgrade the packages above, you
should run

  'apt-get install  ... '

where  to  is the package names in paranthesis
from each package section above.

- --
Mailing lists: [EMAIL PROTECTED], debian-edu@lists.debian.org,
   [EMAIL PROTECTED], [EMAIL PROTECTED],
   [EMAIL PROTECTED]
Package info: `apt-cache show '


signature.asc
Description: Digital signature


DESA-2005-007: several packages

2005-04-16 Thread Morten Werner Olsen
- --
Debian-Edu/Skolelinux Security Advisory DESA 2005-007
http://www.skolelinux.no/security/  Morten Werner Olsen
April 16th, 2005[EMAIL PROTECTED]
- --

This DESA deals with severel packages that the Debian Security Team
has fixed. Each section start with "Package" and includes a link to
the Debian Security Team's announce for the security upgrade.


Package : perl (perl perl-base)
Vulnerability   : design flaw
Need reboot : no
Debian-Edu-specific : no
CVE ID  : CAN-2005-0448
DSA ID  : DSA-696-1
DSA URL : http://www.debian.org/security/2005/dsa-696

Package : mc (mc mc-common)
Vulnerability   : buffer overflow
Need reboot : no
Debian-Edu-specific : no
CVE ID  : CAN-2005-0763
DSA ID  : DSA-698-1
DSA URL : http://www.debian.org/security/2005/dsa-698

Package : krb5 (libkrb53)
Vulnerability   : buffer overflows
Need reboot : no
Debian-Edu-specific : no
CVE ID  : CAN-2005-0468 CAN-2005-0469
DSA ID  : DSA-703-1
DSA URL : http://www.debian.org/security/2005/dsa-703

Package : libexif (libexif5)
Vulnerability   : buffer overflow
Need reboot : no
Debian-Edu-specific : no
CVE ID  : CAN-2005-0664
DSA ID  : DSA-709-1
DSA URL : http://www.debian.org/security/2005/dsa-709


Upgrade Instructions
- 

Make sure the line

  deb http://security.debian.org/ stable/updates main contrib non-free

is present in your /etc/apt/sources.list and run 'apt-get update' to
update your package lists. Then run

  'apt-get upgrade'

to upgrade all the packages mentioned above. This might upgrade other
packages too, and if you only want to upgrade the packages above, you
should run

  'apt-get install  ... '

where  to  is the package names in paranthesis
from each package section above.

- --
Mailing lists: [EMAIL PROTECTED], debian-edu@lists.debian.org,
   [EMAIL PROTECTED], [EMAIL PROTECTED],
   [EMAIL PROTECTED]
Package info: `apt-cache show '


signature.asc
Description: Digital signature


debian-edu@lists.debian.org

2005-03-26 Thread Morten Werner Olsen
On Sat, Mar 26, 2005 at 03:49:30PM +0300, ??? wrote:

> I try to use xdebconfigurator , and it ask for ddcprobe , but i can't find 
> it .
> for example
> --
> [EMAIL PROTECTED]:/# xdebconfigurator
> /usr/sbin/ddcprobe NOT found!
> ...
> [EMAIL PROTECTED]:/# apt-file search ddcprobe
> [EMAIL PROTECTED]:/#
> 
> Maybe it is  a new utilite instead ddcprobe ?

I don't think ddcprobe is available for Debian, and it is not needed
for xdebconfigurator to work. xdebconfigurator use other utilities for
hardware detection.


- Werner


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



DESA-2005-006: several packages

2005-03-16 Thread Morten Werner Olsen
- --
Debian-Edu/Skolelinux Security Advisory DESA 2005-006
http://www.skolelinux.no/security/  Morten Werner Olsen
March 15th, 2005[EMAIL PROTECTED]
- --

This DESA deals with severel packages that the Debian Security Team
has fixed. Each section start with "Package" and includes a link to
the Debian Security Team's announce for the security upgrade.


Package : emacs21 (emacs21)
Vulnerability   : format string
Need reboot : no
Debian-Edu-specific : no
CVE ID  : CAN-2005-0100
DSA ID  : DSA-685-1
DSA URL : http://www.debian.org/security/2005/dsa-685

Package : squid (squid)
Vulnerability   : mising input sanitising
Need reboot : no
Debian-Edu-specific : no
CVE ID  : CAN-2005-0446
DSA ID  : DSA-688-1
DSA URL : http://www.debian.org/security/2005/dsa-688


Upgrade Instructions
- 

Make sure the line

  deb http://security.debian.org/ stable/updates main contrib non-free

is present in your /etc/apt/sources.list and run 'apt-get update' to
update your package lists. Then run

  'apt-get upgrade'

to upgrade all the packages mentioned above. This might upgrade other
packages too, and if you only want to upgrade the packages above, you
should run

  'apt-get install  ... '

where  to  is the package names in paranthesis
from each package section above.

- --
Mailing lists: [EMAIL PROTECTED], debian-edu@lists.debian.org,
   [EMAIL PROTECTED], [EMAIL PROTECTED],
   [EMAIL PROTECTED]
Package info: `apt-cache show '


signature.asc
Description: Digital signature


Re: Dates for developer gatherings in 2005

2005-02-24 Thread Morten Werner Olsen
On Thu, Feb 24, 2005 at 11:52:51AM +0100, Petter Reinholdtsen wrote:

> > er, I forgot to mention I meant _April_ 15-17th, sorry about that :-)
> 
> I have no other plans for that period.  Sounds good to me.  I would
> love to come to Greece, if the meeting actually take place, and enough
> people are willing to join.  Perhaps we should do a count to check the
> interest?  Please report back as soon as possible if you can join us
> in Greece?

I would also love to go! :)


- Werner


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



DESA-2005-005: several packages

2005-02-15 Thread Morten Werner Olsen
- --
Debian-Edu/Skolelinux Security Advisory DESA 2005-005
http://www.skolelinux.no/security/  Morten Werner Olsen
February 15th, 2005  [EMAIL PROTECTED]
- --

This DESA deals with severel packages that the Debian Security Team
has fixed. Each section start with "Package" and includes a link to
the Debian Security Team's announce for the security upgrade.


Package : cpio (cpio)
Vulnerability   : broken file permissions
Need reboot : no
Debian-Edu-specific : no
CVE ID  : CAN-1999-1572
DSA ID  : DSA-664-1
DSA URL : http://www.debian.org/security/2005/dsa-664

Package : python2.2 (python2.2)
Vulnerability   : design flaw
Need reboot : no
Debian-Edu-specific : no
CVE ID  : CAN-2005-0089
DSA ID  : DSA-666-1
DSA URL : http://www.debian.org/security/2005/dsa-666

Package : squid
Vulnerability   : several vulnerabilities
Need reboot : no
Debian-Edu-specific : no
CVE ID  : CAN-2005-0173, CAN-2005-0175, CAN-2005-0194, CAN-2005-0211
DSA ID  : DSA-667-1
DSA URL : http://www.debian.org/security/2005/dsa-667


Upgrade Instructions
- 

Make sure the line

  deb http://security.debian.org/ stable/updates main contrib non-free

is present in your /etc/apt/sources.list and run 'apt-get update' to
update your package lists. Then run

  'apt-get upgrade'

to upgrade all the packages mentioned above. This might upgrade other
packages too, and if you only want to upgrade the packages above, you
should run

  'apt-get install  ... '

where  to  is the package names in paranthesis
from each package section above.

- --
Mailing lists: [EMAIL PROTECTED], debian-edu@lists.debian.org,
   [EMAIL PROTECTED], [EMAIL PROTECTED],
   [EMAIL PROTECTED]
Package info: `apt-cache show '


signature.asc
Description: Digital signature


DESA-2005-001: several packages

2005-01-28 Thread Morten Werner Olsen
- --
Debian-Edu/Skolelinux Security Advisory DESA 2005-004
http://www.skolelinux.no/security/  Morten Werner Olsen
January 28th, 2005  [EMAIL PROTECTED]
- --

This DESA deals with severel packages that the Debian Security Team
has fixed. Each section start with "Package" and includes a link to
the Debian Security Team's announce for the security upgrade.


Package : krb5 (libkrb53)
Vulnerability   : buffer overflow
Need reboot : no
Debian-Edu-specific : no
CVE ID  : CAN-2004-1189
DSA ID  : DSA-629-1
DSA URL : http://www.debian.org/security/2005/dsa-629

Package : kdelibs (kdelibs3 kdelibs3-crypt libarts libkmid)
Vulnerability   : unsanitised input, missing return value check
Need reboot : no
Debian-Edu-specific : no
CVE ID  : CAN-2004-1165 CAN-2005-0078
DSA ID  : DSA-631-1 DSA-660-1
DSA URL : http://www.debian.org/security/2005/dsa-631
  http://www.debian.org/security/2005/dsa-660

Package : exim (exim)
Vulnerability   : buffer overflow
Need reboot : no
Debian-Edu-specific : no
CVE ID  : CAN-2005-0021
DSA ID  : DSA-635-1
DSA URL : http://www.debian.org/security/2005/dsa-635

Package : glibc (libc6 nscd)
Vulnerability   : insecure temporary files
Need reboot : no
Debian-Edu-specific : no
CVE ID  : CAN-2004-0968
DSA ID  : DSA-636-1
DSA URL : http://www.debian.org/security/2005/dsa-636

Package : cupsys (cupsys cupsys-bsd cupsys-client
  cupsys-pstoraster libcupsys2)
Vulnerability   : buffer overflow
Need reboot : no
Debian-Edu-specific : no
CVE ID  : CAN-2005-0064
DSA ID  : DSA-645-1
DSA URL : http://www.debian.org/security/2005/dsa-645

Package : xpdf (xpdf xpdf-common xpdf-reader xpdf-utils)
Vulnerability   : buffer overflow
Need reboot : no
Debian-Edu-specific : no
CVE ID  : CAN-2005-0064
DSA ID  : DSA-648-1
DSA URL : http://www.debian.org/security/2005/dsa-648

Package : squid (squid)
Vulnerability   : buffer overflow, integer overflow
Need reboot : no
Debian-Edu-specific : no
CVE ID  : CAN-2005-0094 CAN-2005-0095
DSA ID  : DSA-651-1
DSA URL : http://www.debian.org/security/2005/dsa-651

Package : xine-lib (libxine0)
Vulnerability   : buffer overflow
Need reboot : no
Debian-Edu-specific : no
CVE ID  : CAN-2004-1379
DSA ID  : DSA-657-1
DSA URL : http://www.debian.org/security/2005/dsa-657


Upgrade Instructions
- 

Make sure the line

  deb http://security.debian.org/ stable/updates main contrib non-free

is present in your /etc/apt/sources.list and run 'apt-get update' to
update your package lists. Then run

  'apt-get upgrade'

to upgrade all the packages mentioned above. This might upgrade other
packages too, and if you only want to upgrade the packages above, you
should run

  'apt-get install  ... '

where  to  is the package names in paranthesis
from each package section above.

- --
Mailing lists: [EMAIL PROTECTED], debian-edu@lists.debian.org,
   [EMAIL PROTECTED], [EMAIL PROTECTED],
   [EMAIL PROTECTED]
Package info: `apt-cache show '


signature.asc
Description: Digital signature


DESA-2004-022 - several packages

2004-12-02 Thread Morten Werner Olsen
- --
Debian-Edu/Skolelinux Security Advisory DESA 2004-022
http://www.skolelinux.no/security/  Morten Werner Olsen
December 2nd, 2004  [EMAIL PROTECTED]
- --

This DESA deals with severel packages that the Debian Security Team
has fixed. Each section start with "Package" and includes a link to
the Debian Security Team's announce for the security upgrade.


Package : tetex-bin (tetex-bin libkpathsea3)
Vulnerability   : integer overflows
Need reboot : no
Debian-Edu-specific : no
CVE ID  : CAN-2004-0888
DSA ID  : DSA-599-1
DSA URL : http://www.debian.org/security/2004/dsa-599

Package : libgd2 (libgd2)
Vulnerability   : integer overflow
Need reboot : no
Debian-Edu-specific : no
CVE ID  : CAN-2004-0941 CAN-2004-0990
DSA ID  : DSA-602-1
DSA URL : http://www.debian.org/security/2004/dsa-602

Package : openssl (openssl libssl0.9.6)
Vulnerability   : insecure temporary file
Need reboot : no
Debian-Edu-specific : no
CVE ID  : CAN-2004-0975
DSA ID  : DSA-603-1
DSA URL : http://www.debian.org/security/2004/dsa-603


Upgrade Instructions
- 

Make sure the line

  deb http://security.debian.org/ stable/updates main contrib non-free

is present in your /etc/apt/sources.list and run 'apt-get update' to
update your package lists. Then run

  'apt-get upgrade'

to upgrade all the packages mentioned above. This might upgrade other
packages too, and if you only want to upgrade the packages above, you
should run

  'apt-get install  ... '

where  to  is the package names in paranthesis
from each package section above.

- --
Mailing lists: [EMAIL PROTECTED], debian-edu@lists.debian.org,
   [EMAIL PROTECTED], [EMAIL PROTECTED],
   [EMAIL PROTECTED]
Package info: `apt-cache show '


signature.asc
Description: Digital signature


DESA-2004-017 - gdk-pixbuf: several vulnerabilities

2004-09-16 Thread Morten Werner Olsen
- --
Debian-Edu/Skolelinux Security Advisory DESA 2004-017
http://www.skolelinux.no/security/  Morten Werner Olsen
September 16, 2004  [EMAIL PROTECTED]
- --

Package : gdk-pixbuf
Vulnerability   : several
Problem-Type: remote
Need reboot : no
Debian-Edu-specific : no
CVE ID  : CAN-2004-0753 CAN-2004-0782 CAN-2004-0788
DSA ID  : DSA-546-1

Chris Evans discovered several problems in gdk-pixbuf, the GdkPixBuf
library used in Gtk.  It is possible for an attacker to execute
arbitrary code on the victims machine.  Gdk-pixbuf for Gtk+1.2 is an
external package.  For Gtk+2.0 it's part of the main gtk package.

We recommend that you update your gdk-pixbuf packages.


Upgrade Instructions
- 

Make sure the line

  deb http://security.debian.org/ stable/updates main contrib non-free

is present in your /etc/apt/sources.list and run 'apt-get update' to
update your package lists. Then run

  'apt-get install libgdk-pixbuf2 libgdk-pixbuf-gnome2'

to upgrade your gdk-pixbuf packages.

- --
Mailing list: [EMAIL PROTECTED], debian-edu@lists.debian.org,
  [EMAIL PROTECTED], [EMAIL PROTECTED]
Package info: `apt-cache show '


signature.asc
Description: Digital signature


DESA-2004-016 - cupsys: denial of service

2004-09-16 Thread Morten Werner Olsen
- --
Debian-Edu/Skolelinux Security Advisory DESA 2004-016
http://www.skolelinux.no/security/  Morten Werner Olsen
September 16, 2004  [EMAIL PROTECTED]
- --

Package : cupsys
Vulnerability   : denial of service
Problem-Type: remote
Need reboot : no
Debian-Edu-specific : no
CVE ID  : CAN-2004-0558
DSA ID  : DSA-545-1

Alvaro Martinez Echevarria discovered a problem in CUPS, the Common
UNIX Printing System.  An attacker can easily disable browsing in CUPS
by sending a specially crafted UDP datagram to port 631 where cupsd is
running.

We recommend that you update your cupsys packages.


Upgrade Instructions
- 

Make sure the line

  deb http://security.debian.org/ stable/updates main contrib non-free

is present in your /etc/apt/sources.list and run 'apt-get update' to
update your package lists. Then run

  'apt-get install cupsys cupsys-bsd cupsys-client cupsys-pstoraster \
   libcupsys2'

to upgrade your python2.2 package.

- --
Mailing list: [EMAIL PROTECTED], debian-edu@lists.debian.org,
  [EMAIL PROTECTED], [EMAIL PROTECTED]
Package info: `apt-cache show '


signature.asc
Description: Digital signature


RFT: new samba packages

2004-09-16 Thread Morten Werner Olsen
Hello.

I would like someone to test the new samba packages as I don't have
access to a Skolelinux network and a computer with MS Windows
installed.

The line to insert into /etc/apt/sources.list is

  deb http://ftp.skolelinux.no/skolelinux/ woody-test local

and the command for installing samba is

  apt-get update && apt-get install samba

I have tested that the package installes successfully, but not it's
functionality. Please check that the Windows client can login and
mount partitions before and after installing new samba
packages. Test-result can be reported to one of the lists or to me per
email.

Thanks in advance!


- Werner




DESA-2004-015 - python2.2: buffer overflow

2004-09-01 Thread Morten Werner Olsen
- --
Debian-Edu/Skolelinux Security Advisory DESA 2004-015
http://www.skolelinux.no/security/  Morten Werner Olsen
September 01, 2004  [EMAIL PROTECTED]
- --

Package : python2.2
Vulnerability   : buffer overflow
Problem-Type: local
Need reboot : no
Debian-Edu-specific : no
CVE ID  : CAN-2004-0150
DSA ID  : DSA-458-2

This security advisory corrects DSA 458-1 which caused some
segmentation faults in gethostbyaddr with non-localhost input. This
update also disables IPv6 on all architectures.

The original advisory said:

  Sebastian Schmidt discovered a buffer overflow bug in Python's
  getaddrinfo function, which could allow an IPv6 address, supplied by
  a remote attacker via DNS, to overwrite memory on the stack.

  This bug only exists in python 2.2 and 2.2.1, and only when IPv6
  support is disabled. The python2.2 package in Debian woody meets
  these conditions (the 'python' package does not).

We recommend that you update your python2.2 package.


Upgrade Instructions
- 

Make sure the line

  deb http://security.debian.org/ stable/updates main contrib non-free

is present in your /etc/apt/sources.list and run 'apt-get update' to
update your package lists. Then run

  'apt-get install python2.2'

to upgrade your python2.2 package.

- --
Mailing list: [EMAIL PROTECTED], debian-edu@lists.debian.org,
  [EMAIL PROTECTED], [EMAIL PROTECTED]
Package info: `apt-cache show '




DESA-2004-014 - kdelibs: symlink integrity

2004-08-29 Thread Morten Werner Olsen
- --
Debian-Edu/Skolelinux Security Advisory DESA 2004-014
http://www.skolelinux.no/security/  Morten Werner Olsen
August 29, 2004 [EMAIL PROTECTED]
- --

Package : kdelibs
Vulnerability   : symlink integrity
Problem-Type: local
Need reboot : no
Debian-Edu-specific : no
CVE ID  : CAN-2004-0689
DSA ID  : DSA-539-1

The SUSE security team was alerted that in some cases the integrity of
symlinks used by KDE are not ensured and that these symlinks can be
pointing to stale locations. This can be abused by a local attacker to
create or truncate arbitrary files or to prevent KDE applications from
functioning correctly.

We recommend that you upgrade your kdelibs packages.

Upgrade Instructions
- 

Make sure the line

  deb http://security.debian.org/ stable/updates main contrib non-free

is present in your /etc/apt/sources.list and run 'apt-get update' to
update your package lists. Then run

  'apt-get install kdelibs3 kdelibs3-bin kdelibs3-cups'

to upgrade your kdelibs packages.

- --
Mailing list: [EMAIL PROTECTED], debian-edu@lists.debian.org,
  [EMAIL PROTECTED], [EMAIL PROTECTED]
Package info: `apt-cache show '


signature.asc
Description: Digital signature


DESA-2004-013 - libpng: several vulnerabilities

2004-08-29 Thread Morten Werner Olsen
- --
Debian-Edu/Skolelinux Security Advisory DESA 2004-013
http://www.skolelinux.no/security/  Morten Werner Olsen
August 29, 2004 [EMAIL PROTECTED]
- --

Package : libpng
Vulnerability   : several
Problem-Type: remote
Need reboot : no
Debian-Edu-specific : no
CVE ID  : CAN-2004-0597, CAN-2004-0598, CAN-2004-0599,
  CAN-2004-0768
DSA ID  : DSA-536-1

Chris Evans discovered several vulnerabilities in libpng. These
include multiple buffer overflows, NULL pointer dereferences and
integer overflows.

We recommend that you upgrade your libpng packages.

Upgrade Instructions
- 

Make sure the line

  deb http://security.debian.org/ stable/updates main contrib non-free

is present in your /etc/apt/sources.list and run 'apt-get update' to
update your package lists. Then run 'apt-get install libpng2' to
upgrade your libpng package.

- --
Mailing list: [EMAIL PROTECTED], debian-edu@lists.debian.org,
  [EMAIL PROTECTED], [EMAIL PROTECTED]
Package info: `apt-cache show '


signature.asc
Description: Digital signature


DESA-2004-012 - samba: buffer overruns

2004-08-28 Thread Morten Werner Olsen
- --
Debian-Edu/Skolelinux Security Advisory DESA 2004-012
http://www.skolelinux.no/security/  Morten Werner Olsen
August 28, 2004 [EMAIL PROTECTED]
- --

Package : samba
Vulnerability   : buffer overruns
Problem-Type: remote
Need reboot : no
Debian-Edu-specific : no
CVE ID  : CAN-2004-0600, CAN-2004-0686
DSA ID  : -

The functionality affected by these vulnerabilities are not enabled in
a standard Debian-Edu/Skolelinux installation, but they will be if
SWAT is started or if the 'mangling method = hash' is used in
smb.conf.

We recommend that you upgrade your samba package.

Upgrade Instructions
- 

Make sure 'deb http://ftp.skolelinux.no/skolelinux woody local' is 
present in your /etc/apt/sources.list and run 'apt-get update' to
update your package lists.

  apt-get install samba

- --
Mailing list: [EMAIL PROTECTED], debian-edu@lists.debian.org,
  [EMAIL PROTECTED], [EMAIL PROTECTED]
Package info: `apt-cache show '




Re: Flashplugin-nonfree version 6 gives error

2004-08-13 Thread Morten Werner Olsen
On Fri, Aug 13, 2004 at 03:17:13PM +0200, [EMAIL PROTECTED] wrote:

> When installing flashplugin-nonfree from 
> deb http://ftp.skolelinux.no/skolelinux woody-test local
> 
> Gives the following error 
> 
> Sætter flashplugin-nonfree (6.0.79-1.skolelinux.1) op...
> Checking new upstream release...
> New version 7.0.25 is detected (current: not installed)
> Updating flashplugin...
> /usr/lib/ruby/1.6/net/protocol.rb:161:in `error!': 404 "Not Found" 
> (Net::ProtoFatalError)
> from /usr/lib/ruby/1.6/net/http.rb:925:in `value'
> from /usr/lib/ruby/1.6/net/http.rb:440:in `get'
> from /usr/sbin/update-flashplugin:143:in `get_file'
> from /usr/sbin/update-flashplugin:210:in `update'
> from /usr/sbin/update-flashplugin:399
> getting install_flash_player_6_linux.tar.gz [321/0 (inf%)]
> 
> Probably only ned new deb for installing flashplugin-nonfree 7.0

I have rebuilt the unstable-version for woody and moved it into
woody-test. Torstein has reported that is installes successfully.


- Werner




Re: Proposed stable update: locale-config-skolelinux

2004-08-09 Thread Morten Werner Olsen
On Sun, Aug 08, 2004 at 10:55:45PM +0200, Petter Reinholdtsen wrote:

> > Any objections?  The new version is in the woody-test APT source, and
> > on the latest woody-test CD.
> 
> Hm, how long should we wait for objections?  We should probably work
> out some minimum wait time.  24 hours?  Three days?  1 week?  What do
> you think?

Three days sounds good to me. And no objections.. :)


- Werner




Re: Source CD's

2004-07-14 Thread Morten Werner Olsen
On Wed, Jul 14, 2004 at 11:58:50AM +0200, Petter Reinholdtsen wrote:

> > A newer version (8.38) of hwinfo is in Debian unstable with full
> > sources, but this version have dependencies that are not met in woody,
> > so I have not made a backport for woody-test (and I don't think I will
> > do either).
> 
> There is already a version in woody-test.  Is this not usable in
> woody?

I removed that version, because I have redesigned the whole package,
and I don't like the upgrade path from the version that was in
woody-test. The new package that is to migrate to testing the next
week or so.


- Werner




Re: Source CD's

2004-07-14 Thread Morten Werner Olsen
On Wed, Jul 14, 2004 at 07:36:35AM +0200, Finn-Arne Johansen wrote:

>   hwInfo (Fetch from CVS?) 

The version of hwinfo we are using today is made by using alien. :/
Maybe we can find a source-rpm in Suse's ftp-archives.

A newer version (8.38) of hwinfo is in Debian unstable with full
sources, but this version have dependencies that are not met in woody,
so I have not made a backport for woody-test (and I don't think I will
do either).


- Werner




Rules for the stable package-repository on developer

2004-06-22 Thread Morten Werner Olsen
Hello,

and congratulations with 1.0 everyone! :)

Now the stable repository on developer.skolelinux.no will be used by
people who installs 1.0 when doing upgrades, and it's important for us
that the upgrades does not break anyone's system.

To deal with this we will have to be very careful when uploading new
packages to that repository, and I think it would be useful to have
some rules regarding uploads to that repository.

I spoke to Petter about it on IRC yesterday, and have the following
proposal:

 1. All packages that is uploaded to our stable archive on
developer.skolelinux.no, must be presented on this list
([EMAIL PROTECTED]) and have other developers and testers accept.

 2. If no one complains, there will be a _small_ group of people (not
yet defined) that have write-access to the repository, and can
upload the packages when the "discussion" is finished on the
list.

 3. In cases where we cannot agree, Petter will have the power to
decide whether the package is allowed to enter the repository or
not.

Of course, we still want to build daily images with our improved
system, and need to include packages from woody-test (or another
test-repository) in the daily built CD's. I'm sure Petter have more
info about this, but I got the impression that a newer version of
debian-cd was preferable.

Comments?


- Werner


signature.asc
Description: Digital signature


Re: Wrong links to iso-images at ftp.skolelinnux.no

2004-06-02 Thread Morten Werner Olsen
On Wed, Jun 02, 2004 at 07:12:54AM +0200, Klaus Ade Johnstad wrote:

> Could someone update the links 
> skolelinux-i386-previous.iso
> points to  skolelinux-i386-pr47.iso
> and
> skolelinux-i386-current.iso
> points to skolelinux-i386-rc1.iso
> 
> both of these now lag 2 releases.

Updated.


- Werner


signature.asc
Description: Digital signature


PHP-packages

2004-06-02 Thread Morten Werner Olsen
Hello!

Can somebody tell med if the php-packages [1] in our repository is in
use? If not, I would like to remove them. Objections?


- Werner


[1]:
 caudium-php4_4.1.2-6.0.skolelinux.1_i386.deb
 php4-cgi_4.1.2-6.0.skolelinux.1_i386.deb
 php4-curl_4.1.2-6.0.skolelinux.1_i386.deb
 php4-dev_4.1.2-6.0.skolelinux.1_all.deb
 php4-domxml_4.1.2-6.0.skolelinux.1_i386.deb
 php4-gd_4.1.2-6.0.skolelinux.1_i386.deb
 php4-imap_4.1.2-6.0.skolelinux.1_i386.deb
 php4-ldap_4.1.2-6.0.skolelinux.1_i386.deb
 php4-mcal_4.1.2-6.0.skolelinux.1_i386.deb
 php4-mhash_4.1.2-6.0.skolelinux.1_i386.deb
 php4-mysql_4.1.2-6.0.skolelinux.1_i386.deb
 php4-odbc_4.1.2-6.0.skolelinux.1_i386.deb
 php4-pear_4.1.2-6.0.skolelinux.1_all.deb
 php4-recode_4.1.2-6.0.skolelinux.1_i386.deb
 php4-snmp_4.1.2-6.0.skolelinux.1_i386.deb
 php4-sybase_4.1.2-6.0.skolelinux.1_i386.deb
 php4-xslt_4.1.2-6.0.skolelinux.1_i386.deb
 php4_4.1.2-6.0.skolelinux.1_i386.deb



signature.asc
Description: Digital signature


Re: real bug or not?

2004-05-30 Thread Morten Werner Olsen
On Sun, May 30, 2004 at 02:24:14AM -0700, Paula Harris wrote:

> before submitting an unnecessary bug-report, short
> question here:
> I've got an ATi Radeon 9200 graphics-card, 128 MB.
> When installing skole rc2, the installer told me to
> fill in a bug-report
> 
> "error:./07debian-edu-config: Unable to install the
> required XFree86 server 'xserver-svga' automatically.,
> error:./76debian-edu-config: failed to run
> /usr/bin/dexconf"

Hmm... seems like the installer tries to install one of the old
xfree86-packages (version 3)?

 
> KDM and KDE start in spite of this message.
> XFree86config-4: graphics-device "vesa". Is that
> sufficient or will the card run with minor
> functionality?
> I've searched the web and found some howtos...

Did this work automatically after the installation, or did you edit
your /etc/X11/XF86Config-4?

I don't think you'll be able to utilize the graphic card with the
vesa-driver, but I guess someone else will be able to give you some
details. By the way, I found this page which can maybe give you some
hints on how to get the card working with another driver:

http://users.actrix.co.nz/michael/radeon9200.html


> Or should I fill in a bug-report?

Please file a bugreport, and please attach the output of these
commands:

 - 'xdebconfigurator -x'
 - 'xdebconfigurator -dx'
 - 'xdebconfigurator -ix'
 - 'xdebconfigurator -kx'

Thanks.


- Werner


signature.asc
Description: Digital signature


Re: CD build failed.

2004-05-28 Thread Morten Werner Olsen
On Fri, May 28, 2004 at 10:08:56PM +0200, [EMAIL PROTECTED] wrote:

> File 
> dists/woody/local/binary-i386/non-official/kernel-patch-debian-2.4.25_2.4.25-3_all.deb
>  can't be found ...
>   
> The mirror has some problems. Please correct them before trying to build
> Debian CDs. To do so you could sync your mirror from one of the primary
> mirror sites listed on the Debian web pages.
> make[1]: *** [mirrorcheck] Error 1
> make[1]: Leaving directory 
> `/home/builder/src/skolelinuxcvs/skolelinux/src/debian-cd'
> make: *** [cd] Error 2

Sorry.. my fault!

I was removing some old debs from the archives and did not watch the
time.. don't hope somebody was _really_ waiting for the 22-build? :(


- Werner


signature.asc
Description: Digital signature


DESA-2004-005 - sane-backends: several vulnerabilities

2004-05-10 Thread Morten Werner Olsen
- --
Debian-Edu/Skolelinux Security Advisory DESA 2004-005
http://www.skolelinux.no/security/  Morten Werner Olsen
May 10th, 2004  [EMAIL PROTECTED]
- --

Package : sane-backends (libsane)
Vulnerability   : several vulnerabilities
Problem-Type: remote
Need reboot : no
Debian-Edu-specific : no
CVE ID  : CAN-2003-0773, CAN-2003-0774, CAN-2003-0775,
  CAN-2003-0776, CAN-2003-0777, CAN-2003-0778
DSA ID  : 379

Alexander Hvostov, Julien Blache and Aurelien Jarno discovered several
security-related problems in the sane-backends package, which contains
an API library for scanners including a scanning daemon (in the
package libsane) that can be remotely exploited. These problems allow
a remote attacker to cause a segmentation fault and/or consume
arbitrary amounts of memory. The attack is successful, even if the
attacker's computer isn't listed in saned.conf.

You are only vulnerable if you actually run saned e.g. in xinetd or
inetd. If the entries in the configuration file of xinetd or inetd
respectively are commented out or do not exist, you are safe.

Try "telnet localhost 6566" on the server that may run saned. If you
get "connection refused" saned is not running and you are safe.

We recommend that you upgrade your libsane package.


Upgrade Instructions
- 

Make sure 'deb ftp://ftp.skolelinux.no/skolelinux/ woody local' is
present in your /etc/apt/sources.list and run 'apt-get update' to
update your package lists.

To upgrade, run this command:

  apt-get install libsane


Upgrade Warning
- ---

This upgrade may result in that your scanners stop working. We have
had reports about a paralell scanner that did not work after the
upgrade, but our recomendation is that you upgrade the package anyway!
If your scanner(s) stop working after the upgrade, please report this
as a bug in our bug-tracking system (http://bugs.skolelinux.no/) or
send an email to the Debian-Edu/Skolelinux Security Team
([EMAIL PROTECTED]).

- --
For apt-get: deb ftp://ftp.skolelinux.no/skolelinux/ woody local

Mailing list: [EMAIL PROTECTED], debian-edu@lists.debian.org,
  [EMAIL PROTECTED], [EMAIL PROTECTED]
Package info: `apt-cache show '


signature.asc
Description: Digital signature


DESA-2004-004 - Linux kernel: vulnerability in the ip_setsockopt() function code

2004-04-22 Thread Morten Werner Olsen
- --
Debian-Edu/Skolelinux Security Advisory DESA 2004-004
http://www.skolelinux.no/security/  Morten Werner Olsen
April 22th, 2004[EMAIL PROTECTED]
- --

Package : kernel-image-2.4.25-1-i386
Vulnerability   : vulnerability in the ip_setsockopt() function code
Problem-Type: local
Need reboot : yes
Debian-Edu-specific : no
CVE ID  : -
DSA ID  : -

A critical security  vulnerability has been found in the Linux kernel in 
the ip_setsockopt() function code. For more details, take a look at:

 http://www.isec.pl/vulnerabilities/isec-0015-msfilter.txt

The new kernel packages are fetched directly from Debian's unstable
archives, packaged by Herbert Xu.

We recommend that you upgrade your kernel packages to the new 2.4.26
version.


Upgrade Instructions
- 

Make sure 'deb ftp://ftp.skolelinux.no/skolelinux/ woody local' is
present in your /etc/apt/sources.list and run 'apt-get update' to
update your package lists.

Find which flavour of the kernel you are running with the command
'uname -r' (examples: 386, 586tsc, 686, 686-smp, k6, k7, k7-smp).

To upgrade, run this command replacing  with yours:

  apt-get install kernel-image-2.4.26-1-

If you are unfamiliar with kernel upgrades, please visit our
mini-HOWTO on this subject:

  http://www.skolelinux.no/security/kernel-upgrade

- --
For apt-get: deb ftp://ftp.skolelinux.no/skolelinux/ woody local

Mailing list: [EMAIL PROTECTED], debian-edu@lists.debian.org,
  [EMAIL PROTECTED], [EMAIL PROTECTED]
Package info: `apt-cache show '


signature.asc
Description: Digital signature


RFT: new hwinfo package

2004-04-18 Thread Morten Werner Olsen
Hello!

I have prepared a new version of hwinfo (hardware detection) for
Skolelinux / Debian-Edu. In that case I need someone to test the
output of the old and the new version so I have some data to compare
before we start using the new version of hwinfo in Skolelinux /
Debian-Edu.

Test procedure:
 (1) run 'hwinfo > hwinfo_old' (as root) on your Skolelinux /
 Debian-Edu computer
 (2) add 'deb ftp://ftp.skolelinux.no/skolelinux/ woody-test local' to
 your /etc/apt/sources.list
 (3) run 'apt-get update && apt-get install hwinfo'
 (4) remove/uncomment the line inserted from (2)
 (5) run 'hwinfo > hwinfo_new' (as root) again
 (6) send an email to [EMAIL PROTECTED] with hwinfo_old and
 hwinfo_new as attatchments

Thanks in advance!


- Werner




DESA-2004-003 - Linux kernel: several vulnerabilities

2004-04-16 Thread Morten Werner Olsen
- --
Debian-Edu/Skolelinux Security Advisory DESA 2004-003
http://www.skolelinux.no/security/  Morten Werner Olsen
April 15th, 2004[EMAIL PROTECTED]
- --

Package : kernel-image-2.4.25-1-i386
Vulnerability   : several vulnerabilities
Problem-Type: local
Need reboot : yes
Debian-Edu-specific : no
CVE ID  : CAN-2004-0003, CAN-2004-0010, CAN-2004-0109,
  CAN-2004-0177, CAN-2004-0178
DSA ID  : DSA 479-1

Several serious problems have been discovered in the Linux kernel. For
a more detailed description, take a look at the Debian Security
Advisory which describes the same vulnerabilities:

  http://www.debian.org/security/2004/dsa-479

The new kernel packages are fetched directly from Debian's unstable
archives, packaged by Herbert Xu.

We recommend that you upgrade your kernel packages. These problems
will also be fixed by upstream in Linux 2.4.26 and future versions of
2.6.


Upgrade Instructions
- 

Make sure 'deb ftp://ftp.skolelinux.no/skolelinux/ woody local' is
present in your /etc/apt/sources.list and run 'apt-get update' to
update your package lists.

Find which flavour of the kernel you are running with the command
'uname -r' (examples: 386, 586tsc, 686, 686-smp, k6, k7, k7-smp).

To upgrade, run this command replacing  with yours:

  apt-get install kernel-image-2.4.25-1-

If you are unfamiliar with kernel upgrades, please visit our
mini-HOWTO on this subject:

  http://www.skolelinux.no/security/kernel-upgrade

- --
For apt-get: deb ftp://ftp.skolelinux.no/skolelinux/ woody local

Mailing list: [EMAIL PROTECTED], debian-edu@lists.debian.org,
  [EMAIL PROTECTED]
Package info: `apt-cache show '


signature.asc
Description: Digital signature


  1   2   >