DESA 2007-011: linux-2.6 - several vulnerabilities
- -- Debian-Edu/Skolelinux Security Advisory DESA 2007-011 http://www.skolelinux.org/security/ Morten Werner Olsen September 28th, 2007 [EMAIL PROTECTED] - -- Package : linux-2.6 Vulnerability : several vulnerabilities Problem-Type: local Need reboot : yes Debian-Edu-specific : no CVE ID : CVE-2007-3731 CVE-2007-3739 CVE-2007-3740 CVE-2007-4573 DSA ID : DSA-1378 Several vulnerabilities have been found in the Linux kernel. If you want the details, please take a look at the DSA's from Debian: http://www.debian.org/security/2007/dsa-1378 We recommend that you upgrade your kernel packages to the new 2.6.18 version built for Debian (immidiately if you are running x86_64 or the amd64 flavour of the kernel). Upgrade Instructions - Make sure 'deb http://security.debian.org/debian etch/updates main' or similar is present in your /etc/apt/sources.list and run 'aptitude update' to update your package lists. Find which flavour of the kernel you are running with the command 'uname -r' (examples: 386, 586tsc, 686, 686-smp, k6, k7, k7-smp). To upgrade, run this command replacing with yours: aptitude install linux-image-2.6.18-5- Remember that you have to reboot your computers after upgrading this package. If you are unfamiliar with kernel upgrades, please visit our mini-HOWTO on this subject: http://www.skolelinux.org/security/kernel-upgrade - -- For apt-get: deb htp://ftp.debian.org/debian/ sarge main Mailing lists: [EMAIL PROTECTED], debian-edu@lists.debian.org, [EMAIL PROTECTED], [EMAIL PROTECTED], [EMAIL PROTECTED] Package info: `apt-cache show ' Note: This DESA is the last one going to all the mailinglists above, from now on DESA's will only be sent to [EMAIL PROTECTED] pgpdsZKmyhOID.pgp Description: PGP signature
Re: Stable update proposal: slbackup-php
Steffen Joeris <[EMAIL PROTECTED]> writes: >> Why 0.3.edu.1-1 and not 0.3-1~edu.1 ?? And can you please provide a >> diff between 0.2 and 0.3 too? After looking at the debdiff only, I >> cannot find an obvious reason why we shouldn't update this package... > > I would give it an approval, if you do not disagree Werner. As discussed on IRC, I have removed this package from etch-test. So please Patrick, can you upload a new one without changing the upstream version number (0.3-)? Or if you're alright with me of Steffen only uploads the 0.3-1 from unstable? After that, I agree with accepting it for the next stable release. As Petter noticed, slbackup-php did also disappear from the etch-test DVD. - Werner -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Re: Stable update proposal: slbackup-php
Patrick Winnertz <[EMAIL PROTECTED]> writes: >> Why 0.3.edu.1-1 and not 0.3-1~edu.1 ?? And can you please provide a >> diff between 0.2 and 0.3 too? After looking at the debdiff only, I >> cannot find an obvious reason why we shouldn't update this package... > > It has indeed not much changed between 0.2 and 0.3 . The most important > fixes for debian-edu are: > > 0.3 contains a reviewed translation by the debian-i18n team. (also the > english was reviewed). And the css file wasn't included into 0.2. so the > webinterface looks very ugly. > > This are the two reasons for me to request the update of slbackup-php. Can you provide the diff between 0.2 and 0.3? My first question was about the version-number you've used for the new package (everything left of '-' is upstream version). I guess 0.3-1~edu.1 or 0.3-0.edu.1 is what you want to use? - Werner -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Re: Stable update proposal: slbackup-php
Patrick Winnertz <[EMAIL PROTECTED]> writes: > I would like to request the update of slback-php in debian-edu etch from > version 0.2-2 to 0.3.edu.1-1. Several errors are fixed in this version. > 0.2-2 is not really usefull, but 0.3 is. Furthermore are a lot more > translations included in the new version. Why 0.3.edu.1-1 and not 0.3-1~edu.1 ?? And can you please provide a diff between 0.2 and 0.3 too? After looking at the debdiff only, I cannot find an obvious reason why we shouldn't update this package... - Werner -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
DESA-2007-008: Linux kernel
- -- Debian-Edu/Skolelinux Security Advisory DESA 2007-008 http://www.skolelinux.org/security/ Morten Werner Olsen August 19th, 2007[EMAIL PROTECTED] - -- Package : linux-2.6 Vulnerability : several vulnerabilities Problem-Type: local Need reboot : yes Debian-Edu-specific : no CVE ID : CVE-2007-1353 CVE-2007-2172 CVE-2007-2453 CVE-2007-2525 CVE-2007-2876 CVE-2007-3513 CVE-2007-3642 CVE-2007-3848 CVE-2007-3851 DSA ID : DSA-1356 Several vulnerabilities have been found in the Linux kernel. If you want the details, please take a look at the DSA's from Debian: http://www.debian.org/security/2007/dsa-1356 We recommend that you upgrade your kernel packages to the new 2.6.18 version built for Debian. Upgrade Instructions - Make sure 'deb http://ftp.debian.org/debian sarge main' or similar is present in your /etc/apt/sources.list and run 'apt-get update' to update your package lists. Find which flavour of the kernel you are running with the command 'uname -r' (examples: 386, 586tsc, 686, 686-smp, k6, k7, k7-smp). To upgrade, run this command replacing with yours: apt-get install linux-image-2.6.18-5- Remember that you have to reboot your computers after upgrading this package. If you are unfamiliar with kernel upgrades, please visit our mini-HOWTO on this subject: http://www.skolelinux.org/security/kernel-upgrade - -- For apt-get: deb htp://ftp.debian.org/debian/ sarge main Mailing lists: [EMAIL PROTECTED], debian-edu@lists.debian.org, [EMAIL PROTECTED], [EMAIL PROTECTED], [EMAIL PROTECTED] Package info: `apt-cache show ' -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Re: New developer gathering in Norway schedduled for May 25-27 or June 1-3
On Fri, Apr 20, 2007 at 06:06:43PM +0200, Petter Reinholdtsen wrote: > > I tried to update the wiki at FRISK with gaterhing information. I did not > > have access (even if I got logged in). > > > > http://www.friprogramvareiskolen.no/Gathering/ > > I'm not sure, but I believe your login name need to be listed on > http://www.friprogramvareiskolen.no/FriskGroup> for you to have > write access. My wiki username is PetterReinholdtsen. Please add me > to the approved list. Please add Knut as well. Not sure about his > username. Ronny already added both of you. :) As I have written in another email, these restrictions were added to the wiki because of spam. - Werner -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
DESA-2007-001: several packages
- -- Debian-Edu/Skolelinux Security Advisory DESA 2007-001 http://www.skolelinux.no/security/ Morten Werner Olsen January 28th, 2007 [EMAIL PROTECTED] - -- This DESA deals with severel packages that the Debian Security Team has fixed. Each section start with "Package" and includes a link to the Debian Security Team's announce for the security upgrade. Package : openoffice.org (openoffice.org openoffice.org-bin openoffice.org-debian-files openoffice.org-help-el openoffice.org-help-en openoffice.org-help-es openoffice.org-help-fr openoffice.org-l10n-ca openoffice.org-l10n-de openoffice.org-l10n-en openoffice.org-l10n-es openoffice.org-l10n-fr openoffice.org-l10n-nb openoffice.org-l10n-nl openoffice.org-l10n-nn ttf-opensymbol) Vulnerability : buffer overflow Need reboot : no Debian-Edu-specific : no CVE ID : CVE-2006-5870 DSA ID : DSA-1246-1 DSA URL : http://www.debian.org/security/2007/dsa-1246 Package : xfree86 (libdps1 libice6 libsm6 libx11-6 libxaw7 libxext6 libxft1 libxi6 libxmu6 libxmuu1 libxp6 libxpm4 libxrandr2 libxt6 libxtrap6 libxtst6 libxv1 x-window-system-core xbase-clients xfonts-100dpi xfonts-75dpi xfonts-100dpi-transcoded xfonts-base xfonts-75dpi-transcoded xfonts-scalable xfree86-common xserver-xfree86 xfs xlibmesa-dri xlibmesa-gl xlibmesa-glu xlibs xlibs-data xserver-common xutils) Vulnerability : several vulnerabilities Need reboot : no Debian-Edu-specific : no CVE ID : CVE-2006-6101 CVE-2006-6102 CVE-2006-6103 DSA ID : DSA-1249-1 DSA URL : http://www.debian.org/security/2007/dsa-1249 Upgrade Instructions - Make sure the line deb http://security.debian.org/ sarge/updates main contrib non-free is present in your /etc/apt/sources.list and run 'apt-get update' to update your package lists. Then run 'apt-get upgrade' to upgrade all the packages mentioned above. This might upgrade other packages too, and if you only want to upgrade the packages above, you should run 'apt-get install ... ' where to is the package names in paranthesis from each package section above. - -- Mailing lists: [EMAIL PROTECTED], debian-edu@lists.debian.org, [EMAIL PROTECTED], [EMAIL PROTECTED], [EMAIL PROTECTED] Package info: `apt-cache show ' -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Re: january meeting conflict
On Mon, Dec 18, 2006 at 08:58:23PM +0100, Holger Levsen wrote: > I have a clash of meetings on January the 8th: there is a debian-edu > meeting at 19.30 UTC and a debconf-team meeting scheduled at 20:00 > UTC. > > Any suggestions how to resolve this? Maybe by moving the > debconf-team meeting to 20:30 UTC? I believe most -edu people are > happy with the "late" meeting time at 19.30, or? I'm very happy with these "late" meetings .. and if I should be able to attend, it must start no earlier than 19:30 UTC (later is ok). - Werner -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
DESA-2006-009: kernel-image-2.6.8-i386
- -- Debian-Edu/Skolelinux Security Advisory DESA 2006-009 http://www.skolelinux.no/security/ Morten Werner Olsen December 17th, 2006 [EMAIL PROTECTED] - -- Package : kernel-image-2.6.8-i386 Vulnerability : several vulnerabilities Problem-Type: local Need reboot : yes Debian-Edu-specific : no CVE ID : CVE-2006-3741 CVE-2006-4538 CVE-2006-4813 CVE-2006-4997 CVE-2006-5174 CVE-2006-5619 CVE-2006-5649 CVE-2006-5751 CVE-2006-5871 DSA ID : DSA-1233 Several vulnerabilities have been found in the Linux kernel. If you want the details, please take a look at the DSA's from Debian: http://www.debian.org/security/2006/dsa-1233 We recommend that you upgrade your kernel packages to the new 2.6.8 version built for Debian. Upgrade Instructions - Make sure 'deb http://ftp.debian.org/debian sarge main' or similar is present in your /etc/apt/sources.list and run 'apt-get update' to update your package lists. Find which flavour of the kernel you are running with the command 'uname -r' (examples: 386, 586tsc, 686, 686-smp, k6, k7, k7-smp). To upgrade, run this command replacing with yours: apt-get install kernel-image-2.6.8-3- Remember that you have to reboot your computers after upgrading this package. If you are unfamiliar with kernel upgrades, please visit our mini-HOWTO on this subject: http://www.skolelinux.no/security/kernel-upgrade - -- For apt-get: deb ftp://ftp.skolelinux.no/skolelinux/ woody local Mailing lists: [EMAIL PROTECTED], debian-edu@lists.debian.org, [EMAIL PROTECTED], [EMAIL PROTECTED], [EMAIL PROTECTED] Package info: `apt-cache show ' signature.asc Description: Digital signature
DESA-2006-008: several vulnerabilities
- -- Debian-Edu/Skolelinux Security Advisory DESA 2006-008 http://www.skolelinux.no/security/ Morten Werner Olsen December 17th, 2006 [EMAIL PROTECTED] - -- This DESA deals with severel packages that the Debian Security Team has fixed. Each section start with "Package" and includes a link to the Debian Security Team's announce for the security upgrade. Package : tar (tar) Vulnerability : input validation error Need reboot : no Debian-Edu-specific : no CVE ID : CVE-2006-6097 DSA ID : DSA-1223-1 DSA URL : http://www.debian.org/security/2006/dsa-1223 Package : libgsf (libgsf-1) Vulnerability : buffer overflow Need reboot : no Debian-Edu-specific : no CVE ID : None DSA ID : DSA-1221-1 DSA URL : http://www.debian.org/security/2006/dsa-1221 Package : imagemagick (libmagick6, imagemagick) Vulnerability : several vulnerabilities Need reboot : no Debian-Edu-specific : no CVE ID : CVE-2006-5868 DSA ID : DSA-1213-1 DSA URL : http://www.debian.org/security/2006/dsa-1213 Package : gnupg (gnupg) Vulnerability : several vulnerabilities Need reboot : no Debian-Edu-specific : no CVE ID : CVE-2006-6235 DSA ID : DSA-1231-1 DSA URL : http://www.debian.org/security/2006/dsa-1231 Package : gv (gv) Vulnerability : buffer overflow Need reboot : no Debian-Edu-specific : no CVE ID : CVE-2006-5864 DSA ID : DSA-1214-1 DSA URL : http://www.debian.org/security/2006/dsa-1214 Package : openssh (ssh) Vulnerability : Denial of service Need reboot : no Debian-Edu-specific : no CVE ID : CVE-2006-5051 DSA ID : DSA-1212-1 DSA URL : http://www.debian.org/security/2006/dsa-1212 Package : texinfo (info) Vulnerability : buffer overflow Need reboot : no Debian-Edu-specific : no CVE ID : CVE-2006-4810 DSA ID : DSA-1219-1 DSA URL : http://www.debian.org/security/2006/dsa-1219 Package : libpam-ldap Vulnerability : programming error Need reboot : no Debian-Edu-specific : no CVE ID : CVE-2006-5170 DSA ID : DSA-1203-1 DSA URL : http://www.debian.org/security/2006/dsa-1203 Package : mozilla-thunderbird Vulnerability : several vulnerabilities Need reboot : no Debian-Edu-specific : no CVE ID : CVE-2006-4310 DSA ID : DSA-1227-1 DSA URL : http://www.debian.org/security/2006/dsa-1227 Upgrade Instructions - Make sure the line deb http://security.debian.org/ sarge/updates main contrib non-free is present in your /etc/apt/sources.list and run 'apt-get update' to update your package lists. Then run 'apt-get upgrade' to upgrade all the packages mentioned above. This might upgrade other packages too, and if you only want to upgrade the packages above, you should run 'apt-get install ... ' where to is the package names in paranthesis from each package section above. - -- Mailing lists: [EMAIL PROTECTED], debian-edu@lists.debian.org, [EMAIL PROTECTED], [EMAIL PROTECTED], [EMAIL PROTECTED] Package info: `apt-cache show ' signature.asc Description: Digital signature
Re: Becoming a contributor
On Thu, Nov 16, 2006 at 11:31:09AM +0100, Holger Levsen wrote: > > Welcome. I am very happy to have another member on the team, and even > > better to have an extra debian developer around to help with > > sponsoring of education-related packages.. :) > > I added him to the keyring. Welcome Luk! :) And for the archive, I've also added him to our alioth project. Welcome again! :) - Werner -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Re: Meeting summary from todays Debian Edu IRC meeting
On Tue, Nov 14, 2006 at 09:17:43AM +0100, Holger Levsen wrote: > >Next meeting is monday 2006-11-20 17:00 UTC (18:00 CET) in #debian-edu > >on irc.debian.org. > > People, please attend! These meetings realy are important, to get a accurate > status on issues and to discuss how we progress further. And it's frustrating I fully agree that these meetings are important. The reason for me not attending is that the time does not fit my schedule. :( I'm not available before 20:00 UTC (21:00 CET), but I guess the chosen time fit most peoples schedules. - Werner -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
DESA-2006-007: several vulnerabilities
- -- Debian-Edu/Skolelinux Security Advisory DESA 2006-007 http://www.skolelinux.no/security/ Morten Werner Olsen October 30th, 2006 [EMAIL PROTECTED] - -- This DESA deals with severel packages that the Debian Security Team has fixed. Each section start with "Package" and includes a link to the Debian Security Team's announce for the security upgrade. Package : gimp (gimp, libgimp2.0, gimp-data) Vulnerability : buffer overflow Need reboot : no Debian-Edu-specific : no CVE ID : CVE-2006-3404 DSA ID : DSA-1116-1 DSA URL : http://www.debian.org/security/2006/dsa-1116 Package : unzip (unzip) Vulnerability : buffer overflow Need reboot : no Debian-Edu-specific : no CVE ID : CVE-2005-4667 DSA ID : DSA-1012-1 DSA URL : http://www.debian.org/security/2006/dsa-1012 Package : freetype (libfreetype6) Vulnerability : integer overflows Need reboot : no Debian-Edu-specific : no CVE ID : CVE-2006-2661 CVE-2006-3467 DSA ID : DSA-1095-1 DSA-1178-1 DSA URL : http://www.debian.org/security/2006/dsa-1095 http://www.debian.org/security/2006/dsa-1178 Package : openssl (openssl, libssl0.9.7, libcrypto0.9.7-udeb) Vulnerability : cryptographic weakness Need reboot : no Debian-Edu-specific : no CVE ID : CVE-2006-4339 CVE-2006-2940 DSA ID : DSA-1173-1 DSA-1185-1 DSA URL : http://www.debian.org/security/2006/dsa-1173 http://www.debian.org/security/2006/dsa-1185 Package : kdebase (kcontrol, kdebase-bin, kdebase-data) Vulnerability : programming error Need reboot : no Debian-Edu-specific : no CVE ID : CVE-2006-2449 DSA ID : DSA-1156-1 DSA URL : http://www.debian.org/security/2006/dsa-1156 Package : libwmf (libwmf0.2-7) Vulnerability : integer overflow Need reboot : no Debian-Edu-specific : no CVE ID : CVE-2006-3376 DSA ID : DSA-1194-1 DSA URL : http://www.debian.org/security/2006/dsa-1194 Package : webmin (webmin, webmin-core) Vulnerability : multiple vulnerabilities Need reboot : no Debian-Edu-specific : no CVE ID : CVE-2006-4542 DSA ID : DSA-1199-1 DSA URL : http://www.debian.org/security/2006/dsa-1199 Upgrade Instructions - Make sure the line deb http://security.debian.org/ sarge/updates main contrib non-free is present in your /etc/apt/sources.list and run 'apt-get update' to update your package lists. Then run 'apt-get upgrade' to upgrade all the packages mentioned above. This might upgrade other packages too, and if you only want to upgrade the packages above, you should run 'apt-get install ... ' where to is the package names in paranthesis from each package section above. - -- Mailing lists: [EMAIL PROTECTED], debian-edu@lists.debian.org, [EMAIL PROTECTED], [EMAIL PROTECTED], [EMAIL PROTECTED] Package info: `apt-cache show ' signature.asc Description: Digital signature
DESA-2006-006: several vulnerabilities
- -- Debian-Edu/Skolelinux Security Advisory DESA 2006-006 http://www.skolelinux.no/security/ Morten Werner Olsen October 14th, 2006 [EMAIL PROTECTED] - -- This DESA deals with severel packages that the Debian Security Team has fixed. Each section start with "Package" and includes a link to the Debian Security Team's announce for the security upgrade. Package : postgresql (libpq3, postgresql-client) Vulnerability : programming error Need reboot : no Debian-Edu-specific : no CVE ID : CVE-2006-2314 DSA ID : DSA-1087-1 DSA URL : http://www.debian.org/security/2006/dsa-1087 Package : dhcp (dhcp, dhcp-client-udeb, dhcp-client) Vulnerability : programming error Need reboot : no Debian-Edu-specific : no CVE ID : CVE-2006-3122 DSA ID : DSA-1143-1 DSA URL : http://www.debian.org/security/2006/dsa-1143 Package : apache (apache-common, apache, apache-doc, apache-perl, libapache-mod-perl) Vulnerability : missing input sanitising and buffer overflow Need reboot : no Debian-Edu-specific : no CVE ID : CVE-2006-3918 CVE-2006-3747 DSA ID : DSA-1167-1 DSA-1131-1 DSA URL : http://www.debian.org/security/2006/dsa-1167 http://www.debian.org/security/2006/dsa-1131 Package : imagemagick (libmagick6, imagemagick) Vulnerability : several vulnerabilities Need reboot : no Debian-Edu-specific : no CVE ID : CVE-2006-3744 CVE-2005-4601 DSA ID : DSA-1168-1 DSA-957-1 DSA URL : http://www.debian.org/security/2006/dsa-1168 http://www.debian.org/security/2006/dsa-957 Package : tar (tar) Vulnerability : buffer overflow Need reboot : no Debian-Edu-specific : no CVE ID : CVE-2006-0300 DSA ID : DSA-987-1 DSA URL : http://www.debian.org/security/2006/dsa-987 Package : xpdf (xpdf-utils, xpdf-common) Vulnerability : several vulnerabilities Need reboot : no Debian-Edu-specific : no CVE ID : CVE-2006-1244 CVE-2006-0301 CVE-2005-3624 CVE-2005-3625 CVE-2005-3626 CVE-2005-3627 CVE-2005-3628 DSA ID : DSA-984-1 DSA-971-1 DSA-931-1 DSA URL : http://www.debian.org/security/2006/dsa-984 http://www.debian.org/security/2006/dsa-971 http://www.debian.org/security/2006/dsa-931 Package : lynx (lynx) Vulnerability : programming error Need reboot : no Debian-Edu-specific : no CVE ID : CVE-2004-1617 DSA ID : DSA-1076-1 DSA URL : http://www.debian.org/security/2006/dsa-1076 Package : cupsys (cupsys-bsd, cupsys-client, libcupsimage2, cupsys, libcupsys2-gnutls10) Vulnerability : buffer overflows Need reboot : no Debian-Edu-specific : no CVE ID : CVE-2005-3191 CVE-2005-3192 CVE-2005-3193 CVE-2005-3624 CVE-2005-3625 CVE-2005-3626 CVE-2005-3627 CVE-2005-3628 DSA ID : DSA-950-1 DSA URL : http://www.debian.org/security/2006/dsa-950 Package : nagios (nagios-common, nagios-text) Vulnerability : buffer overflow Need reboot : no Debian-Edu-specific : no CVE ID : CVE-2006-2162, CVE-2006-2489 DSA ID : DSA-1072-1 DSA URL : http://www.debian.org/security/2006/dsa-1072 Package : samba (winbind, smbfs, smbclient, samba, libsmbclient, samba-common, samba-doc) Vulnerability : missing input sanitising Need reboot : no Debian-Edu-specific : no CVE ID : CVE-2006-3403 DSA ID : DSA-1110-1 DSA URL : http://www.debian.org/security/2006/dsa-1110 Package : koffice (kivio-data, kchart, koffice-data, koshell, kivio, kugar, kformula, koffice-libs) Vulnerability : several vulnerabilities Need reboot : no Debian-Edu-specific : no CVE ID : CVE-2005-3191 CVE-2005-3193 CVE-2005-3624 CVE-2005-3625 CVE-2005-3626 CVE-2005-3627 CVE-2005-3628 CVE-2006-1244 DSA ID : DSA-938-1 DSA-1019-1 DSA URL : http://www.debian.org/security/2006/dsa-938 http://www.debian.org/security/2006/dsa-1019 Upgrade Instructions - Make sure the line deb http://security.debian.org/ sarge/updates main contrib non-free is present in your /etc/apt/sources.list and run 'apt-get update' to update your package lists. Then run 'apt-ge
Re: DESA-2006-005: several vulnerabilities
On Tue, Sep 26, 2006 at 05:45:54PM +0200, Morten Werner Olsen wrote: > - -- > Debian-Edu/Skolelinux Security Advisory DESA 2006-005 > http://www.skolelinux.no/security/ Morten Werner Olsen > September 26th, 2006[EMAIL PROTECTED] > - -- [snip] > Upgrade Instructions > - > > Make sure the line > > deb http://security.debian.org/ woody/updates main contrib non-free This should of course be sarge, not woody. Like this: deb http://security.debian.org/ sarge/updates main contrib non-free Sorry about the typo. - Werner -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
DESA-2006-005: several vulnerabilities
- -- Debian-Edu/Skolelinux Security Advisory DESA 2006-005 http://www.skolelinux.no/security/ Morten Werner Olsen September 26th, 2006[EMAIL PROTECTED] - -- This DESA deals with severel packages that the Debian Security Team has fixed. Each section start with "Package" and includes a link to the Debian Security Team's announce for the security upgrade. Package : tiff (libtiff4) Vulnerability : several vulnerabilities Need reboot : no Debian-Edu-specific : no CVE ID : CVE-2006-3465, CVE-2006-2026, CVE-2006-2656 DSA ID : DSA-1137-1, DSA-1054-1, DSA-1091-1 DSA URL : http://www.debian.org/security/2006/dsa-1137 http://www.debian.org/security/2006/dsa-1054 http://www.debian.org/security/2006/dsa-1091 Package : shadow (passwd, login) Vulnerability : programming error Need reboot : no Debian-Edu-specific : no CVE ID : CVE-2006-3378 DSA ID : DSA-1150-1 DSA URL : http://www.debian.org/security/2006/dsa-1150 Package : dia (dia-libs, dia-common, dia) Vulnerability : programming error Need reboot : no Debian-Edu-specific : no CVE ID : None DSA ID : DSA-1025-1 DSA URL : http://www.debian.org/security/2006/dsa-1025 Package : kdelibs (kdelibs4, kdelibs-bin, kdelibs-data) Vulnerability : buffer overflow Need reboot : no Debian-Edu-specific : no CVE ID : CVE-2006-0019 DSA ID : DSA-948-1 DSA URL : http://www.debian.org/security/2006/dsa-948 Package : kaffeine (kaffeine) Vulnerability : buffer overflow Need reboot : no Debian-Edu-specific : no CVE ID : CVE-2006-0051 DSA ID : DSA-1023-1 DSA URL : http://www.debian.org/security/2006/dsa-1023 Package : sudo (sudo) Vulnerability : missing input sanitising Need reboot : no Debian-Edu-specific : no CVE ID : CVE-2005-4158, CVE-2006-0151 DSA ID : DSA-946-1 DSA URL : http://www.debian.org/security/2006/dsa-946 Package : perl (libperl5.8, perl-base, perl-modules, perl) Vulnerability : integer overflow Need reboot : no Debian-Edu-specific : no CVE ID : CVE-2005-3962 DSA ID : DSA-943-1 DSA URL : http://www.debian.org/security/2006/dsa-943 Package : gzip (gzip) Vulnerability : several vulnerabilities Need reboot : no Debian-Edu-specific : no CVE ID : CVE-2006-4338 DSA ID : DSA-1181-1 DSA URL : http://www.debian.org/security/2006/dsa-1181 Package : ppp (ppp) Vulnerability : programming error Need reboot : no Debian-Edu-specific : no CVE ID : CVE-2006-2194 DSA ID : DSA-1106-1 DSA URL : http://www.debian.org/security/2006/dsa-1106 Package : gnupg (gnupg) Vulnerability : integer overflows and programming errors Need reboot : no Debian-Edu-specific : no CVE ID : CVE-2006-3082, CVE-2006-3746, CVE-2006-0455, CVE-2006-0049 DSA ID : DSA-1107-1, DSA-1140-1, DSA-978-1, DSA-993-1 DSA URL : http://www.debian.org/security/2006/dsa-1107 http://www.debian.org/security/2006/dsa-1140 http://www.debian.org/security/2006/dsa-978 http://www.debian.org/security/2006/dsa-993 Package : courier (courier-imap-ssl, courier-imap, courier-ldap, courier-base, courier-authdaemon, courier-ssl) Vulnerability : programming error Need reboot : no Debian-Edu-specific : no CVE ID : CVE-2006-2659 DSA ID : DSA-1101-1 DSA URL : http://www.debian.org/security/2006/dsa-1101 Upgrade Instructions - Make sure the line deb http://security.debian.org/ woody/updates main contrib non-free is present in your /etc/apt/sources.list and run 'apt-get update' to update your package lists. Then run 'apt-get upgrade' to upgrade all the packages mentioned above. This might upgrade other packages too, and if you only want to upgrade the packages above, you should run 'apt-get install ... ' where to is the package names in paranthesis from each package section above. - -- Mailing lists: [EMAIL PROTECTED], debian-edu@lists.debian.org, [EMAIL PROTECTED], [EMAIL PROTECTED], [EMAIL PROTECTED] Package info: `apt-cache
Re: Is the developer gathering at TIK at University of Oslo Oct 13-15?
On Sun, Sep 24, 2006 at 12:56:01PM +0200, Knut Yrvin wrote: > I have read some e-mail suggesting that the October developer > gathering will be held at University of Oslo, at TIK? > > Is this officially announced? Now it is. Sorry about the delay. :/ > The prices on flights are still low. Trondheim-Oslo-Trondheim are between > 557-897, Lowest price Tromsø-Oslo-Tromsø is 698. Bergen-Oslo-Bergen: 557. > Munchen (Germany)-Oslo-Munchen: 2346 (all prices in NOK, divide by 8,54 to > convert to EUR -> 2346 / 8,54 = 275 Euro). > > I took the liberty to update this page: > http://developer.skolelinux.no/info/prosjektet/delprosjekt/agenda_developergathering_2006-10.txt Thanks Knut! :) - Werner -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Debian-Edu developergathering in Oslo
Hi! We're proud to welcome developers, translators and testers to a Debian-Edu developer gathering in Oslo 13th to 15th of October. The gathering will be held at the Centre for technology, innovation and culture [1] at the University of Oslo. If you want to attend please reply to this email (to debian-edu@lists.debian.org) or put your name on the agenda [2] in the Skolelinux SVN-repository. To get your travel costs reimbursed you have to ask [EMAIL PROTECTED] in advance of ordering tickets. More information is available on the agenda [2]. - Werner [1] http://www.tik.uio.no/indexeng.html [2] http://d.skolelinux.no/info/prosjektet/delprosjekt/agenda_developergathering_2006-10.txt -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Re: Our deepest condolences
On Wed, Sep 20, 2006 at 12:31:43AM +0200, Michelle Konzack wrote: > Whats going on? Died naturaly, killed by Mossad, deadly Accident? http://freenode.net/news.shtml - Werner -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Our deepest condolences
Hi! On behalf of the Debian-Edu/Skolelinux-project and the organization for Open Source Software in schools in Norway I send our deepest condolences to Rob Levin's family and friends. We would also like to thank Rob Levin (also known as lilo) for the great service he provided us on the Freenode network. - Werner -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Webserver maintenance (20060920 0800CET)
Hi! Tomorrow morning at around 0800CET I will do some maintenance on maintainer.skolelinux.no. This server hosts most of the Skolelinux webservices, and these will be unavailable for about half an hour. - Werner -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Re: Where are the French extra-packages?
On Mon, Aug 21, 2006 at 11:41:07AM +0200, Xavier Oswald wrote: > > Where are the French extra-packages? They need to be uploaded into > > Debian very soon to make it into Debian/Etch, and should be uploaded > > into the debian-edu repository as well to make sure we track their > > existence and try to find room for them on the first CD. > > The packages are in the debian-edu repository : debian-edu/trunk/fr Thierry and I started a todo-wiki-page [1] in Extremadura as a start of moving the packages on the French Addon-CD into Debian and the DebianEdu local-repository. I guess the people working on this should try to update it with more info about the packages (package names, location in SVN, maintainer). - Werner -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Re: bugs.skolelinux.no
On Tue, Aug 08, 2006 at 02:38:32PM +0200, RalfGesellensetter wrote: > > As some of you already know, we are moving services [1] away from > > developer.skolelinux.no to be able to reinstall it with Sarge. Our > > Bugzilla [2] is one of the services left to move away from developer. > > will the version of bugzilla also be updated with this step > (recommended)? Hi! I should of course have mentioned this too. The version of bugzilla on the new webserver is the version in Debian Sarge (2.16.7). This is a minor upgrade from 2.16.4. Please let [EMAIL PROTECTED] know if there is any problems with the "new" Bugzilla! - Werner -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
bugs.skolelinux.no
Hi! As some of you already know, we are moving services [1] away from developer.skolelinux.no to be able to reinstall it with Sarge. Our Bugzilla [2] is one of the services left to move away from developer. Sorry about this _very_ short notice, but as noone has been visitng bugs.skolelinux.no since 17:40+0200 today I will close it down, move the database to maintainer and ask our hostmaster to make the DNS-change right away. As we will have to wait until hostmaster responds and makes the DNS-change, I guess the bugzilla will be down until tomorrow morning around 10:00+0200. Sorry for the inconvenience. - Werner [1] http://wiki.debian.org/DebianEdu/Infrastructure [2] http://bugs.skolelinux.no/ -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Security support for Woody/Venus terminated in the end of June
Hi! Quoting the latest debian-news announcement [1]; "Security Support for Woody ending. The Debian Project [2]announced that more than one year after the release of Debian GNU/Linux 3.1 alias 'sarge' the security [3]support for the old stable distribution 3.0 will be terminated at the end of June 2006. Debian GNU/Linux 3.0 alias 'woody' has been released nearly four years ago on July 19th 2002." As the Debian-Edu/Skolelinux Security Support [4] depends on the work by the Debian Security Team, our Security Support for Debian-Edu/Skolelinux alias 'woody' and 'venus' will also be terminated in the end of June 2006. We recommend all users and schools using the Debian-Edu/Skolelinux distribution to upgrade [5] or reinstall [6] to the Sarge-based version soon. Sorry about the short notice. - Werner [1] http://lists.debian.org/debian-news/debian-news-2006/msg00024.html [2] http://www.debian.org/News/2006/20060601 [3] http://www.debian.org/security/ [4] http://www.skolelinux.no/security/ [5] http://wiki.debian.org/DebianEdu/HowTo/UpgradeFrom1.0 [6] http://wiki.debian.org/DebianEdu/Download signature.asc Description: Digital signature
Archive move - ftp.skolelinux.(no|org)
Hi! This morning the Debian-Edu/Skolelinux FTP archive ftp.skolelinux.(no|org) was relocated from developer.skolelinux.no to administrator.skolelinux.no. As a user you should not notice this at all. If you do have any problems after this relocation, please let us know! For the developers and contributors, an announcement regarding package uploads, daily builds and maybe a few other things will be sent to debian-edu@lists.debian.org later this week. - Werner -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Re: sarge kernel-image for woody?
On Thu, Apr 27, 2006 at 08:02:44AM +0200, Frank Weißer wrote: > So what? A sarge-kernel for woody? I stopped the upgrade, not knowing if > i saw a bug or a feature ;-) This is a feature [1]. :) As some earlier have decided that we need a more recent kernel than the one present in woody, we use the kernels from sarge as they are security maintained by the Debian security team [2]. - Werner [1] http://www.skolelinux.no/security/desa-2006-004.txt [2] http://www.debian.org/security/ -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
DESA-2006-004: kernel-image-2.4.27-i386
- -- Debian-Edu/Skolelinux Security Advisory DESA 2006-004 http://www.skolelinux.no/security/ Morten Werner Olsen April 23rd, 2006[EMAIL PROTECTED] - -- Package : kernel-image-2.4.27-i386 Vulnerability : several vulnerabilities Problem-Type: local Need reboot : yes Debian-Edu-specific : no CVE ID : CVE-2005-0756 CVE-2005-0757 CVE-2005-1762 CVE-2005-1767 CVE-2005-1768 CVE-2005-2456 CVE-2005-2458 CVE-2005-2459 CVE-2005-2553 CVE-2005-2801 CVE-2005-2872 CVE-2005-3275 CVE-2004-0887 CVE-2004-1058 CVE-2004-2607 CVE-2005-0449 CVE-2005-1761 CVE-2005-2457 CVE-2005-2555 CVE-2005-2709 CVE-2005-2973 CVE-2005-3257 CVE-2005-3783 CVE-2005-3806 CVE-2005-3848 CVE-2005-3857 CVE-2005-3858 CVE-2005-4618 DSA ID : DSA-921 DSA-1018 Several security vulnerability has been found in the Linux kernel. If you want the details, please take a look at the two latest DSA's from Debian: http://www.debian.org/security/2005/dsa-921 http://www.debian.org/security/2006/dsa-1018 We recommend that you upgrade your kernel packages to the new 2.4.27 version built for Debian. Upgrade Instructions - Make sure 'deb ftp://ftp.skolelinux.no/skolelinux/ woody local' is present in your /etc/apt/sources.list and run 'apt-get update' to update your package lists. Find which flavour of the kernel you are running with the command 'uname -r' (examples: 386, 586tsc, 686, 686-smp, k6, k7, k7-smp). To upgrade, run this command replacing with yours: apt-get install kernel-image-2.4.27-3- If you are unfamiliar with kernel upgrades, please visit our mini-HOWTO on this subject: http://www.skolelinux.no/security/kernel-upgrade - -- For apt-get: deb ftp://ftp.skolelinux.no/skolelinux/ woody local Mailing lists: [EMAIL PROTECTED], debian-edu@lists.debian.org, [EMAIL PROTECTED], [EMAIL PROTECTED], [EMAIL PROTECTED] Package info: `apt-cache show ' signature.asc Description: Digital signature
Re: Asking for help profreading this debconf6 article
On Wed, Apr 12, 2006 at 02:03:32PM +0200, Knut Yrvin wrote: > > Please do. I assume OpenOffice.org 1.X also have some sort of > > proofreading features? > > I believe it's even the same menues if I remember correctly. Here to OO > 1.0 docformat: > > http://developer.skolelinux.no/~knuty/2006-04-02-debconf6.sxw http://folk.uio.no/werner/2006-04-02-debconf6-werner.sxw I did not have time to read through the whole text, so there are only comments on the first pages. - Werner -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Re: Asking for help profreading this debconf6 article
On Wed, Apr 12, 2006 at 01:27:40PM +0200, Knut Yrvin wrote: > It's really a good tool for proofreading. You should try it out at once. > If you don't have OpenOffice.org 2.0, i can downgrade the document to > the internal OpenOffice.org 1.0 format. Please do. I assume OpenOffice.org 1.X also have some sort of proofreading features? - Werner -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Next Skolelinux/Debian-Edu developer gathering (21-23/4-2006)
Dear developers, testers and translators! We are lucky to have the municipality of Narvik (in the north of Norway) to host our next developer gathering. In addition to help us with the location and fix most of the local arrangement, they will also sponsor travel costs for some of you! The date for the gathering is set to 21st to 23rd of April, and more details is on our webpage for this gathering [1]. If you want to attend, sign yourself up on this page or send an email to debian-edu@lists.debian.org with your details (as described in the document [1]). Unfortunately the member-organization in Norway (FRISK) have limited amounts of money to spend for this gathering. By limiting our costs at this gathering we will be able to arrange more gatherings this year. To be able to do this, we require (as always) all participants who want reimbursements to send an application to [EMAIL PROTECTED] *prior* to the gathering. No approval from the board means no money back to you, so make sure this is in order. We have a zero tolerance policy here :-). - Werner [1] http://d.skolelinux.no/info/prosjektet/delprosjekt/agenda_developergathering_2006-04.txt -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Re: Small Report of Dev WE in France 18-19/03 Work on user administration tool
On Wed, Mar 22, 2006 at 02:40:07PM +0100, Thierry STAUDER wrote: > In Erkelenz a group of developers wanted to work on a user > administration tool. This group is formed by: Christian Kuelker, > Benjamin Sonntag, Thomas Courbeil, Xavier Oswald, Jean Charles > Siegel Sorry if I forgot somebody. Great to hear! > The idea was to use the very good work made by Christian Kuelker > with CiPux. Cipux is a whole of very powerful Perl scripts which > makes it possible to manage LDAP. I studied some of the CiPux-code a bit, and there are several security issues which must be fixed before we can using this in our Debian-Edu/Skolelinux distribution. I've found examples in the code where passwords are send to the command-line. One example in get_value.pl [1] where the LDAP-password is provided on the command-line to LDAP-commandline utilities. In another file [2] passwords, crypts and some NT-passwordhashes are written directly in the logfile which is, in my eyes, far away from acceptable. First of all I hope that the pepole that have implemented a solution based on CiPux have restricted the access to the CiPux logfile! Second, the problem with the passwords in commands called in perl is that a student can watch the processlist with e.g. 'ps ax' and be able to pick up passwords for users or machines. If we can get the CiPux-framework free for these kind of bugs, we should start the process of packaging it and uploading it to Debian. > The proposition is to add an interface for CiPux in the Intranet > made by the French team with Moodle. The solution adopted in > Erkelenz is to create a RPC engine which controls CiPux and which > can interact with various interfaces: > modules moodle > CAT' in PHP > Somethink in java > PAS > ... > > If you want to see the work made on the Intranet, you can have a > look at http://moodle.skolelinux.fr/ > > We can announce that the RPC engine is running. The source code of > this work can be found in the fr branch in the moodle ldap > package. > > At the beginning of the next month, two students will start to write > the interface for Moodle. We hope that this work will be ready for > the Dev Camp. Unfortunately I don't have any Moodle-knowledge, but do you know how hard/easy it will be to make a CiPux-plugin written for Moodle preconfigured for our Debian-Edu/Skolelinux distribution? At least you should make sure the students write the configuration part of the plugin with this in mind. > This work is a first result from the collaboration started between > the French and German team and of course everybody must feel free to > join this work even if hes not French or German ;) I believe that working together across the country borders is how we all will have a better product to offer our "customers", and I hope that many will contribute so we'll have a nicer utility for user administration tool ready this summer when Debian starts the freeze for etch. I hope that my comments about CiPux are taken seriously as I believe the problems commented are very serious in a security point of view. - Werner [1] http://cvs.cipworx.org/cvsweb.cgi/cipux/cibot/src/bin/get_value.pl?rev=1.2 [2] http://cvs.cipworx.org/cvsweb.cgi/cipux/cibot/src/bin/add.pl?rev=1.5 -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#356879: debian-edu: Cleanup duplicate relations
On Wed, Mar 15, 2006 at 05:53:17PM +0100, Stefan Huehner wrote: > > Note that the debian/control file is generated, so the script used to > > generate it need to be fixed for this change to be permanent. > > > > These isn't much use updating the control file without fixing the > > script. > > hmm i've missed that script before. I assume that you refer to the > 'gen-control' script. I can work on this but this tries the apt-sources > as specified by your 'sources.list.*' files. Some of these point to now > unexisting sources and i'm not sure what your current sources for these > are: i.e. 'people.linuxlabs.no'.. Could you please look over these and > provide information for the current sources. Would be easier to fix the > script if it could be run ;) I removed the line containing people.linuxlabs.no as it is obsolete. It is great if you have time to fix this problem in the gen-control-script! :) - Werner -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Re: Simplifying skolelinux.org as a showcase
On Mon, Mar 13, 2006 at 03:25:09AM +0100, Knut Yrvin wrote: > > I read those minutes from your leaders meeting only as interesting > > ideas. > > I know you well enough to engage in this debate with you Jonas, other > than to repeat my question: I think Jonas have read a few thread on this list that you have missed. But I don't think that is an interesting topic to discuss here, so we can take it over a beer (and soda) later. :) > It would be nice if sombody gave me some feedback on the design: > > http://developer.skolelinux.no/~knuty/skolelinux_mockup.jpg I think this design look good! Petter Reinholdtsen asked if this can be implemented in a moinmoin-wiki, and I believe an answer to that question is important for the further discussion to this topic. If it is not possible to implement the design and content in a moinmoin-wiki, you mean that we will have to have a skolelinux.org-website in addition to Debian's Wiki [1]? I think we shall keep the number of web technologies to a minimum and stick to moinmoin-wiki's and static html-pages. So if a moinmoin-wiki is not an opportunity, I guess static html-pages can do the job? You said that your plans does not involve more than 10-20 different pages? And maintaining static html-pages in SVN is something we know how to do, and do well. :) The job would just be to get the design and empty pages in place. It is also a much smaller job to maintain (talking with my [EMAIL PROTECTED] on) a solution with statical html-pages than a solution which involve a framework (like Plone and Ez). - Werner [1] http://wiki.debian.org/DebianEdu -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
DESA-2006-001: several packages
- -- Debian-Edu/Skolelinux Security Advisory DESA 2006-003 http://www.skolelinux.no/security/ Morten Werner Olsen March 13th, 2005[EMAIL PROTECTED] - -- This DESA deals with severel packages that the Debian Security Team has fixed. Each section start with "Package" and includes a link to the Debian Security Team's announce for the security upgrade. Package : gnupg (gnupg) Vulnerability : programming error Need reboot : no Debian-Edu-specific : no CVE ID : CAN-2006-0455 DSA ID : DSA-978-1 DSA-993-2 DSA URL : http://www.debian.org/security/2006/dsa-978 http://www.debian.org/security/2006/dsa-993 Package : curl (libcurl2) Vulnerability : buffer overflow Need reboot : no Debian-Edu-specific : no CVE ID : CAN-2005-4077 DSA ID : DSA-919-2 DSA URL : http://www.debian.org/security/2005/dsa-919 Upgrade Instructions - Make sure the line deb http://security.debian.org/ woody/updates main contrib non-free is present in your /etc/apt/sources.list and run 'apt-get update' to update your package lists. Then run 'apt-get upgrade' to upgrade all the packages mentioned above. This might upgrade other packages too, and if you only want to upgrade the packages above, you should run 'apt-get install ... ' where to is the package names in paranthesis from each package section above. - -- Mailing lists: [EMAIL PROTECTED], debian-edu@lists.debian.org, [EMAIL PROTECTED], [EMAIL PROTECTED], [EMAIL PROTECTED] Package info: `apt-cache show ' signature.asc Description: Digital signature
Re: Simplifying skolelinux.org as a showcase
On Sun, Mar 12, 2006 at 09:59:39PM +0100, Knut Yrvin wrote: > Here it is, the mockup of a showcase Skolelinux/Debian_Edu presentation > site: > > http://developer.skolelinux.no/~knuty/skolelinux_mockup.jpg > > Do we need changes, and how should this site look like? Let the > discussion begin :-). The discussion about the skolelinux.org website has in my eyes already been finished on this mailinglist (debian-edu@lists.debian.org) with the conclusion that we should redirect all skolelinux.org-pages to http://wiki.debian.org/DebianEdu. > Oh, the idea behind this design come from Halvor Dahls brother, a > university professor. He showed us the www.koha.org website. The mockup > is made by Alex Brasetvik. > > * Background > > A lot of progress is done lately to improve the workflow in the > Skolelinux/Debian Edu project. The wiki.debian.org/DebianEdu taking > form. The irc-meetings for developers as far I can see is a > success. On the project leader meeting at Erkelenz we agreed on that a > showcase web was needed. > > The main goal is to help decision makers to choose > Skolelinux/Debian_Edu. The showcase should be a well designed > web-pages informing about Skolelinux as a product and give examples > and answer to questions. The users can be teachers, admins, local > government and decision makers. Also some pages for pupils will be > nice that many ask for using computer programs used at their local > school to their home assignment. Then we should get them easy access > and guides to free software to use at home. So why doesn't http://wiki.debian.org/DebianEdu fit this purpose? In my opinion the front-page can be edited to fit the purpose you describe (not as sexy, but still). > Since the project meeting in Erkelenz I've pointed out to Markus > Gamenius that it was 12 months ago we planed to improve the > skolelinux.org as a multilingual showcase promoting > Skolelinux/Debian_Edu. The board in "Free Software in Schools" had > also donated some compensation to Alex Brasetvik for some initially > training learning eZ publish. Alex are studying at The Norwegian > University of Science and Technology, and working with rolling out web > publishing systems for LinuxLabs. He is already overbooked. So Markus > at LinuxLabs are helping out, and Alex can to this job without other > assignment coming his way. So this new skolelinux.org-website you propose, Alex should be paid for creating it? What technology should it be based on? Who shall be responsible for updating it? I still think we shall stick to http://wiki.debian.org/DebianEdu as our one and only international website. Earlier we have proven with the multiple tries on creating a skolelinux.org-website that we don't have manpower to maintain this .. and I don't think the"Free software in schools"-organization in Norway have any money left spending on creating nor maintaining a website. Please followup to debian-edu@lists.debian.org only. - Werner -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Re: Spanish profile translations
On Mon, Feb 20, 2006 at 06:58:38PM -0500, Patrice Neff wrote: > Currently the following languages have still install strings marked > as fuzzy. Should I write to the translators marked in the individual > PO file about this? > - Portuguese > - Portuguese Brazil > - Italian > - Low Saxon (nds) > - Finnish They all received a mail from me a couple of weeks ago, but you can of course send them another reminder. :) - Werner -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Re: Spanish profile translations
On Mon, Feb 20, 2006 at 07:24:04AM -0500, Patrice Neff wrote: > Thank you, that may have been the cause. I have now checked in a new > PO-file version without the fuzzy marks. > > When is the next daily build available, so I can check that out? The daily build is rebuilt everytime a new package enters the archives. I've build a new debian-edu-install now and sent it off to the archive. :) In 5-10 minutes I believe a new daily build should be ready. - Werner -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Re: Spanish profile translations
On Thu, Feb 16, 2006 at 10:43:46PM -0500, Patrice Neff wrote: > I tested the daily build again today and found that the Spanish > translations are broken. The profile explanations appear in English > during a Spanish installation. I did now add the translation for the > Barebone profile in Subversion, but somehow I think the problem is > somewhere else (especially because the Barebone profile doesn't even > appear in the explanations). I've tested the daily build from yesterday, and it was not english templates describing the profiles. My Spanish is not existing at all, but I could not recognize any english there. :) The rest of the debconf templates also seemed to be Spanish, so can you please test once more? - Werner -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Re: Projectleader meeting Erkelenz
On Fri, Feb 17, 2006 at 01:58:09PM +0100, Kurt Gramlich wrote: > Knut, Thierry and I had a talk in Erkelenz and we agreed: > > 1 try to get EU Funding > coordination french team Sounds great, but do you have more details? > 2 to call all developers to join the > skolelinux devcamp in france > coordination french team Can you please elaborate this? It seems like this is just notes that is almost only understandable for you guys joined this "meeting". > 3 to use skolelinux.org only as showcase > means only 10 or 20 static and well designed webpages to inform > about the project, aimed for teachers, pupils, admins, > goverment or local deciders. This is an ongoing thread on this mailinglist, so I believe you should just join that discussion instead of starting a new one here. > 4 to start with 3 moinmoin wikis for the activ work process > wiki.debian.org/DebianEdu/ english > skolelinux.de/wiki/ german > wiki.skolelinux.fr french > and with this use > the subpage functionality / > the interlink functionality > (same page in different languages on different servers, only > one click away) > and the subscribe functionality to update the information > (people subscribe pages and take reponsability to keep it up to > date) I believe that we should use only http://wiki.debian.org/DebianEdu for all technical documentation because the technical solution should be, at least in my eyes, the same for all countries and as much as possible a part of Debian. The local wiki's (.de, .fr, .no, ..) should be used for political and local stuff. > 5 to internationalize the new member process > starting with update of the german page, translation into > english an french and coordinate it internationaly > coordination german team I'm kind of miss the main goal about this new member process. Is it an offer for new developers wanting to help out, or do you want _every_ new developer joining us to go through this process? > 6 to be present in the regulary IRC meetings > every two week mondays international meeting at #debian-edu > GMT 19:00 > every wednesday 22:00 MEZ german speaking activists > #skolelinux.de Everyone interested in the technical part should try to join these meetings on #debian-edu. :) - Werner -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Re: .org proposal 2nd
On Fri, Feb 17, 2006 at 08:13:35AM +0100, Patrick Winnertz wrote: > sound also like an good solution :) important is that the new member > process for developers is international, because later they will mostly > work international and not in the national teams. Do we have and need a new member process? I did a search on google and found a page about it in the German wiki [1]. What is the intention with this, is it for the German or international community? I can agree that we probably should offer an optional new member process for persons that wants to go through such a process. We have great examples of contributors that do great work for us without going through such a process. In my opinion we don't have enough manpower now to afford forcing contributors through such a process and risk losing them because such process. - Werner [1] http://www.skolelinux.de/wiki/NewMember/Process -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Re: .org proposal 2nd
On Thu, Feb 16, 2006 at 11:23:58PM +0100, Jonas Smedegaard wrote: > David C. Weichert suggest setting up global Skolelinux services in > separate skolelinux.org subdomains[2]. > > Kurt suggest using existing german tools[3]. > > Morten Werner Olsen suggest setting up services separated by folders > on one big skolelinux.org server[4]. > > I suggest using existing Debian tools for anything development, and > setup language-specific Skolelinux services for each local > community[5]. > > > Putting my proposal last on this list is not due to manipulation, > but simply that it seems to me as being the last proposal before > that latest thread got absorbed by technical details. Some of us talked a bit about this in Erkelenz and also later in the Norwegian community, and I believe "we" agreed that the international part of Skolelinux is, like I think Jonas means, the techical part or Debian-Edu if you like. We started a bit in Erkelenz to use the Wiki at http://wiki.debian.org/DebianEdu for information and documentation about our techical solution. My suggestion for the international "portal" is to redirect all traffic which now comes to the portal at http://skolelinux.org/ to http://wiki.debian.org/DebianEdu . > (but feel free to see this final remark as manipulation if you > like ;-) ) Don't think it was your manipulation that made me change my mind, but anyway.. :) I still think there are needs for local teams with local portals for e.g. political reasons. It is important to have local teams not only to support the local developers, but also to do political work and translating software and documentation. I'm sure there are many other reasons as well. But the important thing is that we stick togeter for a common goal is to coordinate all techical work as one international group on this mailinglist, the SVN repository at svn.debian.org (Alioth) and on http://wiki.debian.org/DebianEdu . - Werner -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Re: preconfigured radiusserver
On Tue, Feb 14, 2006 at 09:01:16PM +0100, RalfGesellensetter wrote: > Hi Georg, could this be a case for a regional add-on CD, like the French > team is using? There had been a voting for an option "extracd" that > makes the installer ask for the 2nd CD after base installation... A radius-server configured to use our already set up LDAP-server could be a new service which is interesting for our Etch-based release. So we should absolutely think about installing and configuring this out-of-the-box for next release. Why on a localized "extracd"? There is nothing "localized" about it.. - Werner -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Re: Release Candidate 1 for Sarge-based Debian-Edu/Skolelinux
On Mon, Feb 13, 2006 at 12:05:46AM +0100, Finn-Arne Johansen wrote: > OK, we are pushing it now, to get it out the door. > Please test, to make sure we have a working CD. Great work guys! :) > For known bugs an limitations, please look at look through bugzilla at > http://bugs.skolelinux.no/buglist.cgi?version=sarge-rc1 So everyone; please help us test, verify and fix these bugs! - Werner -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Re: Developer gathering, Feb. 2006
On Mon, Feb 06, 2006 at 10:44:03PM +0100, Frode Jemtland wrote: > We have not any proposed places to be, so suggestions would be great. (I > think > we have a fallback in University of Oslo (Forskningsparken), anyone that can > confirm this ) If the date is Feb 17th-19th, I will attend and still have the key, and if the date is Feb 24th-26th Petter Reinholdtsen has claimed to come [1] and I assume he still has the key? Some rumors say that there is not SLX Debian Labs that pays for the Office in Forskningsparken anymore, can someone with knowledge please give us a status here? - Werner [1] http://d.skolelinux.no/info/prosjektet/delprosjekt/agenda_developergathering_2006-02.txt -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
DESA-2006-001: several packages
- -- Debian-Edu/Skolelinux Security Advisory DESA 2006-001 http://www.skolelinux.no/security/ Morten Werner Olsen January 27th, 2005 [EMAIL PROTECTED] - -- This DESA deals with severel packages that the Debian Security Team has fixed. Each section start with "Package" and includes a link to the Debian Security Team's announce for the security upgrade. Package : courier (courier-authdaemon, courier-base, courier-imap, courier-ldap) Vulnerability : programming error Need reboot : no Debian-Edu-specific : no CVE ID : CAN-2005-3532 DSA ID : DSA-917-1 DSA URL : http://www.debian.org/security/2005/dsa-917 Package : curl (libcurl2) Vulnerability : buffer overflow Need reboot : no Debian-Edu-specific : no CVE ID : CAN-2005-4077 CVE-2005-3185 DSA ID : DSA-919-1 DSA URL : http://www.debian.org/security/2005/dsa-919 Package : xpdf (xpdf xpdf-common xpdf-reader xpdf-utils) Vulnerability : buffer overflows Need reboot : no Debian-Edu-specific : no CVE ID : CAN-2005-3191 CAN-2005-3192 CAN-2005-3193 CVE-2005-3624 CVE-2005-3625 CVE-2005-3626 CVE-2005-3627 CVE-2005-3628 DSA ID : DSA-931-1 DSA URL : http://www.debian.org/security/2005/dsa-931 Package : unzip (unzip) Vulnerability : race condition Need reboot : no Debian-Edu-specific : no CVE ID : CAN-2005-2475 DSA ID : DSA-903-2 DSA URL : http://www.debian.org/security/2005/dsa-903 Package : tetex-bin (tetex-bin libkpathsea3) Vulnerability : buffer overflows Need reboot : no Debian-Edu-specific : no CVE ID : CAN-2005-3191 CVE-2005-3192 CVE-2005-3624 CVE-2005-3625 CVE-2005-3626 CVE-2005-3627 CVE-2005-3628 DSA ID : DSA-937-1 DSA URL : http://www.debian.org/security/2005/dsa-937 Package : sudo (sudo) Vulnerability : missing input sanitising Need reboot : no Debian-Edu-specific : no CVE ID : CAN-2005-4158 CVE-2006-0151 DSA ID : DSA-946-1 DSA URL : http://www.debian.org/security/2005/dsa-946 Package : cupsys (cupsys cupsys-bsd cupsys-client cupsys-pstoraster libcupsys2) Vulnerability : buffer overflows Need reboot : no Debian-Edu-specific : no CVE ID : CAN-2005-3191 CVE-2005-3192 CVE-2005-3193 CVE-2005-3624 CVE-2005-3625 CVE-2005-3626 CVE-2005-3627 CVE-2005-3628 DSA ID : DSA-950-1 DSA URL : http://www.debian.org/security/2005/dsa-950 Upgrade Instructions - Make sure the line deb http://security.debian.org/ woody/updates main contrib non-free is present in your /etc/apt/sources.list and run 'apt-get update' to update your package lists. Then run 'apt-get upgrade' to upgrade all the packages mentioned above. This might upgrade other packages too, and if you only want to upgrade the packages above, you should run 'apt-get install ... ' where to is the package names in paranthesis from each package section above. - -- Mailing lists: [EMAIL PROTECTED], debian-edu@lists.debian.org, [EMAIL PROTECTED], [EMAIL PROTECTED], [EMAIL PROTECTED] Package info: `apt-cache show ' signature.asc Description: Digital signature
Re: Nagios script autoconfiguring skolelinux Network?
On Tue, Jan 24, 2006 at 03:18:17PM +0100, RalfGesellensetter wrote: > > And it is probably an idea to default to not sending any mail from > > Nagios, and document how the admin can enable this if he/she > > wants. What do you think? > > Sudden idea (maybe non-sense): use nagiosadmin (or any other account) as > recipient for nagios mailings - and logrotate his mailbox, triggered by > size. What would we benefit from such solution? If I remember correct, Nagios has searchable alarm database where one can find the history. I still believe not sending Nagios alarm's as email per default is the best solution. - Werner -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Re: Nagios script autoconfiguring skolelinux Network?
On Mon, Jan 23, 2006 at 08:38:33PM +0100, RalfGesellensetter wrote: > As I can read at > http://bugs.skolelinux.no/show_bug.cgi?id=1026 it is considered to drop > Nagios as we also have Munin which has nicer graphs... I strongly believe that we should not drop Nagios, but we have to adjust some of it's limits a bit to minimize the noise. And it is probably an idea to default to not sending any mail from Nagios, and document how the admin can enable this if he/she wants. What do you think? - Werner -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Re: IRC meeting to plan the next release
On Sun, Jan 15, 2006 at 04:17:25PM +0100, Petter Reinholdtsen wrote: > Getting all the active people in one place seem to be getting harder. > To handle it, I suggest we start doing IRC meetings. > > Should we do the first one this week, to make sure we have a common > understanding of the debian-edu status before the german development > meeting? > > What about Thursday 2006-01-19 18:00 GMT? I guess we should limit it > to one hour, and make a summary of the meeting as well as the IRC log > available on the web. Sounds fine to me. I'll be there .. whereever that will be. Shall we use #debian-edu on Freenode or a new channel for the "happening"? :) - Werner -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Re: Debian Edu Extremadura work meeting june 2006
On Thu, Jan 05, 2006 at 11:21:27AM +0100, Andreas Schuldei wrote: > > please have a look at > > http://wiki.debian.org/DebianEduExtremadura2006 > > ... > > > > so, nothing else came out of this then the thread about jefferson > and franklin? > > should i cancel the meeting or is there any interest? I'm absolutely interested in such a meeting, so sign me up! :) I also see [1] that Emdebian has set up meetings both in April and March, and I don't assume they will use both? So will more people be able to attend if we use the one in March or April that Emdebian doesn't use? - Werner [1] http://wiki.debian.org/WorkSessionsExtremadura -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Re: About cvs for french dev.
On Thu, Dec 29, 2005 at 01:04:49PM +0100, Xavier Oswald wrote: > > What if you add the contents of this CD into the SVN-repository at > > alioth.debian.org (debian-edu/src/french-addon-cd) ? > > > > > Other good point is that some additionnal learning software are in french > > > and it would be nice if translation could be made, and become official > > > debian packages ;) > > > > If you have the whole addon-cd in SVN others can also take a look and > > maybe help suggesting solutions for implement your > > addon-cd-functionality into Debian the first Skolelinux/Debian-Edu CD. > > You are right, that's why, we are waiting of the decision from the no > and de community about using a common svn or not. Please use the SVN on svn.debian.org (with alioth-usernames). As I said in an earlier email src/french-addon-cd/ might be a good location. - Werner -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Re: About cvs for french dev.
On Tue, Dec 06, 2005 at 03:05:28PM +0100, Xavier Oswald wrote: > -> After installing the skolelinux official CD, we wants a second CD > which will contains all modifications we want, like an upgrade CD. > -> It should be easy to use so, we made a install script for automatic > software installation(additionnal packages which aren't on the > official skolelinux cd), Intranet(Moodle which modification for french > school), Personnalization of home desktop for users(french need too > :),Ldap administration tools(Cipux),Openoffice plugins > > This CD was made because every school don't have an internet access to > upgrade skolelinux and install additionnal packages. > > I hope we could use a common cvs repository or a new branch of the > official repository so everybody could have easily access to the > modifications. What if you add the contents of this CD into the SVN-repository at alioth.debian.org (debian-edu/src/french-addon-cd) ? > Other good point is that some additionnal learning software are in french > and it would be nice if translation could be made, and become official > debian packages ;) If you have the whole addon-cd in SVN others can also take a look and maybe help suggesting solutions for implement your addon-cd-functionality into Debian the first Skolelinux/Debian-Edu CD. - Werner -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Re: the .org proposal or "join forces"
On Tue, Dec 20, 2005 at 12:30:28PM +0100, Jonas Smedegaard wrote: David C. Weichert's proposal: > > * www.skolelinux.org (International Portal) > > * blogs.skolelinux.org (Blogs) > > * planet.skolelinux.org (Planet) > > * people.skolelinux.org (Pages about members) > > * wiki.skolelinux.org (Wiki) > > * doc.skolelinux.org (Documentation) > > * bugs.skolelinux.org (Bugtracking) > > What about schools.skolelinux.org ? My old proposal: > o http://skolelinux.org/ -> forwarded to /wiki/ (?) > o http://skolelinux.org/wiki/ > o http://skolelinux.org/blogs/ > o http://skolelinux.org/planet/ > o http://skolelinux.org/doc/ > o http://skolelinux.org/schools/ > o http://bugs.skolelinux.org/ > o http://people.skolelinux.org/ or http://folk.skolelinux.org/ > > So who feels responsible for the organisation of the .org-proposal > > and who has the control about that? > > I still have a hard time understanding the difference between > skolelinux development and Debian development. I have no interest in > building up a parallel to Debian. > > And no, I do not believe it is necessary that all development is done > by "authorized personel" (read: official Debian developers). Official > developers are needed for the final packaging steps of signing and > uploading (which means they personally take responsibility of the > quality of the package, so in reality there's more to it than just the > simple acts). This is a more detailed proposal from me where I try to figure out which parts of the Debian infrastructure we can/should use. o http://skolelinux.org/ - I would like to forward this front-page to a wiki where a lot of our information is present and at least most of it is linked up. Maybe to one or more SVN-dumps to http://skolelinux.org// where our documentation-tree from d.skolelinux.no/documentation/ is a great example. Can we use Debian's webpages for this? I don't think so, because we don't have enough DD's for commiting patches to the webpages, right? o http://skolelinux.org/wiki/ - our main site where the content is like described above. The Germans have done a great job with their wiki, so I believe we should be able to use the same technology for our international site. But, if this should work out we must agree that the master language is english. Does anyone have a problem with that? And will the Germans move some of their content (which is of interest to the international and technical visitors) from their wiki at skolelinux.de/wiki/ to this wiki? Could we use http://wiki.debian.org/DebianEdu for this? Yes probably. The only challenge I see is that if we for one reason would like to do any changes deeper into the wiki, we don't have permissions to that. I'm not sure if this will be a problem. Can we have the opinion of you guys administrating the wiki on http://skolelinux.de/wiki/ ?? Do we have other arguments for not using wiki.debian.org? o http://blogs.skolelinus.org/ - I'm not a blogger nor a blog-admin myself, so if anyone have any comments that would have been great. I don't believe Debian have any blogging-infrastructure, so we'll have to set up our own. o http://planet.skolelinux.org/ - Can we use planet.debian.org? Is there only DD's that are linked up there? And planet.debian.org's target is probably Developers not users, teachers, and admins, or am I wrong? o http://skolelinux.org/doc/ - I believe this can be a good place do dump a directory from SVN with our Skolelinux-specific documentation. That is the documentation that has to do with our CD, architecture, the sysadmin-documentation and so on. I don't believe Debian has any place where this fit in? o http://skolelinux.org/schools/ - The list of schools that we already have today. o http://bugs.skolelinux.org/ - Can we use bugs.d.o? Yes, for a lot of bugs we can and we should, but I don't think pointing teachers to bugs.d.o's interfaces is a good idea. So if we want bugreports from our primary users, I believe we should continue use the bugzilla we have at bugs.skolelinux.no now. It has been put a lot of effort in cleaning it up too. o http://people.skolelinux.org/ or http://folk.skolelinux.org/ - homepages for all that have an skolelinux.org-account. As we not are only Debian Developers, people.debian.org cannot be used. Comments are more than welcome! :) - Werner -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#275028: debian-edu-install: We should have a Education-barebone
On Tue, Dec 20, 2005 at 05:31:02PM +0100, Petter Reinholdtsen wrote: > > The profile should have an option to create an education-barebone, > > were you might install a spesific task, like LDAP-server, > > backup-server mail-server and such > > Yes, it would make it easier to install a server for a single service. > I believe this option should only be available when in expert mode. > Perhaps it should be possible to install single services in expert > mode? I don't understand why you want this in expert mode only? Cant we have barebone as one of the choises in a normal install too? - Werner -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Re: Proposed patch for default cfengine configuration
On Wed, Dec 21, 2005 at 03:30:43AM -0500, Patrice Neff wrote: > >And as long as you're the one doing this, you've got the power. > >If someone disagrees they'll have to do something. > >And if not, well... > > So I used that power to check the patch in now. Have tested it quite > extensively and it worked for me. Please tell me what I broke... :) > > Just as a reminder: this patch changes debian-edu from cfengine to > cfengine2. I did not find any incompatibilities so far. Two things; o We've earlier tried to use cfengine2, but as the line you removed from one of the configuration files said, we had problems with cfengine didn't run well when installing thin-client-server. Have you tested that this setup installs well now? o Please document very changes in the debian/changelog of the packages you make changes for. It's great if you can make this work out-of-the-box! I'll have to test it some time, but the time is a bit strict now before christmas. :/ - Werner -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Re: Should we rent a car, and drive to Germany to the Skolelinux treffen 2006?
On Tue, Dec 20, 2005 at 09:49:58AM +0100, Petter Reinholdtsen wrote: > > I believe it take 10-12 hours to drive from Oslo Norway, trough > > Sweden, Denmark and to the Cornelius-Burgh-Gymnasium? > > I doubt that I will be able to set aside 3-4 days for travelling back > and forth, so unless flying takes almost as long, I'll fly. /me too.. - Werner -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Re: the .org proposal or "join forces"
On Fri, Dec 16, 2005 at 09:36:20PM +0100, Ole-Anders Andreassen wrote: > > The site could be split into different subdomains reflecting the > > different users rather than technologies: > > > > * www.skolelinux.org (International Portal) > > * blogs.skolelinux.org (Blogs) > > * planet.skolelinux.org (Planet) > > * people.skolelinux.org (Pages about members) > > * wiki.skolelinux.org (Wiki) > > * doc.skolelinux.org (Documentation) > > * bugs.skolelinux.org (Bugtracking) > > What about schools.skolelinux.org ? I agree .. but I think that we should keep the domains to a minimum and rather have something like this: o http://skolelinux.org/ -> forwarded to /wiki/ (?) o http://skolelinux.org/wiki/ o http://skolelinux.org/blogs/ o http://skolelinux.org/planet/ o http://skolelinux.org/doc/ o http://skolelinux.org/schools/ o http://bugs.skolelinux.org/ o http://people.skolelinux.org/ or http://folk.skolelinux.org/ > On the norwegian list's I've been asking about blogs. Petter told me about > this thread on [EMAIL PROTECTED] > > As a skolelinux-administrator on a school, I belive that a blog and a wiki > would be a great suplement to the already existing documentation. > > I also belive that it's important to bring the developers and the > administrators closer together. Blogging could be one way to do this... Blogs and people's homepages (people.s.o or folk.s.o) can of course be written in the language that each person prefers, but for the other website's I would stronly recommend that we should use english as the _only_ language. Why? Because it is the only language we have common, and if we should be able to join our forces towards a common goal I believe this is very important. - Werner -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Re: policy for pools?
On Tue, Dec 13, 2005 at 01:10:56PM +0100, Steffen Joeris wrote: > I am curious about the future situation of the pool-handling, means the > skolelinux pools of packages. > > My question is how we will do our work in the future? > Is there a policy for uploading packages to skolelinux? Well, for the sarge-based pool I don't believe we have any clear policy, but for the woody-based (stable) we have earlier agreed on send an email to [EMAIL PROTECTED] and ask if anyone had objections to the new upload. And only a few people have access to add new packages or overwrite packages in the pool for Venus (stable woody-based). When upgrading packages in our test-pool (which the Sarge-pool now is), I believe it's ok to just upload new version of packages for bugfixing. For those of us that reads the commit-list the changes appears there. For _new_ packages to the test-pool I believe it would be nice with an email to [EMAIL PROTECTED] to ask for objections to the upload. Comments? Of course these "policies" should have been written down somewhere, but .. the well known lack of time. > Ok we have three kinds of packages. > > 1. Backports > 2. native skolelinux packages (LTSP, webmin*stuff, ...) > 3. own skolelinux packages (keep the minimum because we are normally > including > all packages into Debian) We should try to keep the nubmer of backported packages as low as possible. The best thing to do if we want new packages in Debian-Edu/Skolelinux is make sure they are present in Debian. > So this was just the current summary. > Currently Finn-Arne is working on reprepro and on a transition to get the > current pools in reprepro, then we will have an upload queue in the future > (Thanks for that finnarne, although i am bothering you all the time with > that). I'm looking forward to this! :) > My question now is do we need a policy? Yes, our socalled policy should probably have been written down on a webpage on d.skolelinux.no. Maybe included in the "Guidelines for developer .." [1]? > Will we make a keyring with gpg keys for uploading, or will we accept > packages > from everyone? Either a keyring (probably the best) or manually ack'ing of packages. Or maybe a mix with manually ack'ing of packages uploaded by people not in the keyring. > Will we make source-only uploads? (I prefer not to make it, but will mention > it as a possibility). I would prefer source-only uploads as we then will be sure that the packages do not FTBFS. > Who can upload packages? Well, probably those who are interested .. and are able to behave. For the stable archive I believe that only a few persons should be able. > Who is interested in that? Too few? :) > Is there a need for help on archive (reprepro)? Finn-Arne? > Maybe some specifications about uploading after the transition. > > So what do you think on this topic??? > > Please take this mail as the start of a discussion or reject it if you see no > need in discussing it, i just write this mail because i want to talk about > it. We have not (yet) had any problems with people misusing their rights to the archive pools, so this is not a big deal in my eyes. But if a missing policy keeps new developers from uploading packages to our test(ing)-pool, it is more important. If someone have time to write a policy-draft, I'll gladly read through and comment it. > P.S. If someone of you will come to the meeting in january and need > accomodation for some more days during the week because of a cheaper flight > or so just let me know i will find a way ;) Unfortunately I'm not able to attend this gathering, but afaik both Finn-Arne and Petter will come so you could perhaps continue parts of this discussion there.. - Werner [1] http://d.skolelinux.no/dokumentasjon/contributing-developers.html -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Re: Advise for new default configuration
On Thu, Dec 15, 2005 at 01:04:34AM +0100, RalfGesellensetter wrote: > this sounds promising. Absolutely! :) > > - Proceed with my idea (and change the domain name used for > > testing to cfservd.intern for example) > > - Opt-out solution so that manually removing the cfengine.intern > > does not install this configuration on new workstations > > one of those - please note that: > > - during installation process, the workstations might lack access to > net/tjener - so checking means some risk. Can't we assume that main server (tjener) and network connection is in place when workstations and thin client servers are installed? I think so. > - until entered in dhcpd.conf, workstation IPs might change > - pre06 adds etherwake > - some gui/webmin interface would be nice ;) If I remember correctly the cfengine-setup needs some keys in place before the cfservd-communication can start, is that right? If so, I have not been able to see a solution where we out-of-the-box can do this keysetup without sacrifising some security. Or have I missed a solution here? I believe a solution where we can run a script on the main-server (from a webmin-module or something) to "add" the workstation into the cfservd-setup would be a satisfactory solution to the problem. - Werner -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Re: bugzilla-skolelinux subscribed?
On Thu, Dec 08, 2005 at 11:15:57PM +0100, Frode Jemtland wrote: > Then again, a big round of applause to Werner, White and Faj, and others, for > getting the bugzilla back in shape. And for Frode who started this process! - Werner -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Re: About cvs for french dev.
On Tue, Dec 06, 2005 at 02:15:22PM +0100, Benjamin Sonntag wrote: > The french team who is developping skolelinux since 2005-05 has no cvs > for now. > > I joined the team on 2005-11 and convinced them to use cvs for our > sources. cool idea huh ? > > Do you think it is possible to have a dedicated cvs module in your > debian-edu cvs server for the french project, or do you think we'd > rather use our own cvs in France (we can administrate a local version of > course) ? We want to store our specific packages sources in this cvs and > the cd builder scripts too. > > We also want to use some scripts to send a mail when a commit is sent to > the repository so that our french server can do nightly builds and so > that our mailing list can receive cvs commit warning messages. > > What is your opinion and what solution do you prefer ? Hi! First I have to admit that I might have missed some of the emails regarding the French project to this list. But I have one question that I hope you can answer to give me a clearer picture of the situation. How come you build your own CD, have your own sources for packages and so on? Isn't it possible for you to cooperate with us on the Skolelinux-CD, SVN-archives on svn.debian.org and developer.skolelinux.no, and bugtracker? I believe we would be able to make a better product if we stoped all this "double-work" and started to work in the same direction on the same product. This is not ment as criticism, but as questions because I probably have missed the answers earlier on. - Werner -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Re: bugzilla-skolelinux subscribed?
On Sun, Dec 04, 2005 at 06:57:11PM +0100, Florian Reitmeir wrote: > after the many bugzilla mails on this list, i wonder why bugzilla is > subscribed to this list? isn't it simplier/nicer to create a own list for it? > Instead of flooding/spamming this one? The reason bugzilla is sending mail to this list is that the list is registered as "owner" of unowned bugs. And the reason for the huge amount of bugzilla-mail this weekend is that we have had a developer gathering in Oslo and one of the main activities has been to clean up old bugs from our bugzilla. I suggest we wait a few weeks and see how many mail that are generated by bugzilla, and then see what a more normal amount of mail from the bugzilla is. - Werner -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
DESA-2005-014: several packages
- -- Debian-Edu/Skolelinux Security Advisory DESA 2005-014 http://www.skolelinux.no/security/ Morten Werner Olsen December 2nd, 2005 [EMAIL PROTECTED] - -- This DESA deals with severel packages that the Debian Security Team has fixed. Each section start with "Package" and includes a link to the Debian Security Team's announce for the security upgrade. Package : sudo (sudo) Vulnerability : missing input sanitising Need reboot : no Debian-Edu-specific : no CVE ID : CAN-2005-2959 DSA ID : DSA-870-1 DSA URL : http://www.debian.org/security/2005/dsa-870 Package : imlib (gdk-imlib1) Vulnerability : unsanitised input Need reboot : no Debian-Edu-specific : no CVE ID : CAN-2004-0817 DSA ID : DSA-548-2 DSA URL : http://www.debian.org/security/2004/dsa-548 Package : lynx (lynx) Vulnerability : buffer overflow Need reboot : no Debian-Edu-specific : no CVE ID : CAN-2005-3120 DSA ID : DSA-874-1 DSA URL : http://www.debian.org/security/2005/dsa-874 Package : lynx-ssl (lynx-ssl) Vulnerability : buffer overflow Need reboot : no Debian-Edu-specific : no CVE ID : CAN-2005-3120 DSA ID : DSA-876-1 DSA URL : http://www.debian.org/security/2005/dsa-876 Package : squid (squid) Vulnerability : assertion error Need reboot : no Debian-Edu-specific : no CVE ID : CAN-2005-2794 DSA ID : DSA-809-1 DSA URL : http://www.debian.org/security/2005/dsa-809 Package : openssl (libssl0.9.6 openssl) Vulnerability : Need reboot : no Debian-Edu-specific : no CVE ID : CAN-2005-2969 DSA ID : DSA-888-1 DSA URL : http://www.debian.org/security/2005/dsa-888 Package : libungif4 (libungif4g) Vulnerability : several Need reboot : no Debian-Edu-specific : no CVE ID : CAN-2005-2974 CVE-2005-3350 DSA ID : DSA-890-1 DSA URL : http://www.debian.org/security/2005/dsa-890 Package : unzip (unzip) Vulnerability : race condition Need reboot : no Debian-Edu-specific : no CVE ID : CAN-2005-2475 DSA ID : DSA-903-1 DSA URL : http://www.debian.org/security/2005/dsa-903 Package : netpbm-free (libnetpbm9 netpbm) Vulnerability : buffer overflows Need reboot : no Debian-Edu-specific : no CVE ID : CAN-2005-3632 DSA ID : DSA-904-1 DSA URL : http://www.debian.org/security/2005/dsa-904 Package : gdk-pixbuf (libgdk-pixbuf-gnome2 libgdk-pixbuf2) Vulnerability : several Need reboot : no Debian-Edu-specific : no CVE ID : CAN-2005-2975 CVE-2005-2976 CVE-2005-3186 DSA ID : DSA-913-1 DSA URL : http://www.debian.org/security/2005/dsa-913 Upgrade Instructions - Make sure the line deb http://security.debian.org/ woody/updates main contrib non-free is present in your /etc/apt/sources.list and run 'apt-get update' to update your package lists. Then run 'apt-get upgrade' to upgrade all the packages mentioned above. This might upgrade other packages too, and if you only want to upgrade the packages above, you should run 'apt-get install ... ' where to is the package names in paranthesis from each package section above. - -- Mailing lists: [EMAIL PROTECTED], debian-edu@lists.debian.org, [EMAIL PROTECTED], [EMAIL PROTECTED], [EMAIL PROTECTED] Package info: `apt-cache show ' signature.asc Description: Digital signature
Re: Next skolelinux developer gathering, Nov/Dec '05
On Tue, Nov 15, 2005 at 03:20:13PM +0100, Jakob Breivik Grimstveit wrote: > The following dates have been suggested for now: 25-27 Nov, 2-4 Dec or > possibly (but this might be too close to Christmas for some of you?) 9-11 > Dec. What seems like the best solution for you? Please give us your opinion. > Today. [snip] > Please give us an indication of when you would be able to attend so we can > fix the dates as quickly as possible. Thanks in advance. We will have to decide which weekend the gathering will be arranged very soon now (tonight), so if someone haven't registered yet: please do so now! :) And remember what Jakob said in the previous mail: > Further to this, to control the costs associated with the developer > gathering, we now require all participants who want reimbursements > to send an application to [EMAIL PROTECTED] *prior* to > the gathering. No approval from the board means no money back to > you, so make sure this is in order. We have a zero tolerance policy > here :-). Happy hacking! :) - Werner -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
DESA-2005-013: several packages
- -- Debian-Edu/Skolelinux Security Advisory DESA 2005-013 http://www.skolelinux.no/security/ Morten Werner Olsen October 14th, 2005 [EMAIL PROTECTED] - -- This DESA deals with severel packages that the Debian Security Team has fixed. Each section start with "Package" and includes a link to the Debian Security Team's announce for the security upgrade. Package : cfengine (cfengine) Vulnerability : insecure temporary files Need reboot : no Debian-Edu-specific : no CVE ID : CAN-2005-2960 DSA ID : DSA-835-1 DSA URL : http://www.debian.org/security/2005/dsa-835 Package : cpio (cpio) Vulnerability : several Need reboot : no Debian-Edu-specific : no CVE ID : CAN-2005- CAN-2005-1229 DSA ID : DSA-846-1 DSA URL : http://www.debian.org/security/2005/dsa-846 Package : tcpdump (tcpdump) Vulnerability : infinite loop Need reboot : no Debian-Edu-specific : no CVE ID : CAN-2005-1279 DSA ID : DSA-850-1 DSA URL : http://www.debian.org/security/2005/dsa-850 Package : libxine0 (xine-lib) Vulnerability : format string vulnerability Need reboot : no Debian-Edu-specific : no CVE ID : CAN-2005- DSA ID : DSA-863-1 DSA URL : http://www.debian.org/security/2005/dsa-863 Upgrade Instructions - Make sure the line deb http://security.debian.org/ woody/updates main contrib non-free is present in your /etc/apt/sources.list and run 'apt-get update' to update your package lists. Then run 'apt-get upgrade' to upgrade all the packages mentioned above. This might upgrade other packages too, and if you only want to upgrade the packages above, you should run 'apt-get install ... ' where to is the package names in paranthesis from each package section above. - -- Mailing lists: [EMAIL PROTECTED], debian-edu@lists.debian.org, [EMAIL PROTECTED], [EMAIL PROTECTED], [EMAIL PROTECTED] Package info: `apt-cache show ' signature.asc Description: Digital signature
DESA-2005-012: several packages
- -- Debian-Edu/Skolelinux Security Advisory DESA 2005-012 http://www.skolelinux.no/security/ Morten Werner Olsen October 14th, 2005 [EMAIL PROTECTED] - -- This DESA deals with severel packages that the Debian Security Team has fixed. Each section start with "Package" and includes a link to the Debian Security Team's announce for the security upgrade. Package : pcre3 (libpcre3) Vulnerability : integer overflow Need reboot : no Debian-Edu-specific : no CVE ID : CAN-2005-2491 DSA ID : DSA-800-1 DSA URL : http://www.debian.org/security/2005/dsa-800 Package : cvs (cvs) Vulnerability : insecure temporary files Need reboot : no Debian-Edu-specific : no CVE ID : CAN-2005-2693 DSA ID : DSA-802-1 DSA URL : http://www.debian.org/security/2005/dsa-802 Package : apache apache-common (apache) Vulnerability : programming error Need reboot : no Debian-Edu-specific : no CVE ID : CAN-2005-2088 DSA ID : DSA-803-1 DSA URL : http://www.debian.org/security/2005/dsa-803 Package : squid (squid) Vulnerability : several Need reboot : no Debian-Edu-specific : no CVE ID : CAN-2005-2794 CAN-2005-2796 DSA ID : DSA-809-1 DSA URL : http://www.debian.org/security/2005/dsa-809 Package : python2.2 (python2.2) Vulnerability : integer overflow Need reboot : no Debian-Edu-specific : no CVE ID : CAN-2005-2491 DSA ID : DSA-817-1 DSA URL : http://www.debian.org/security/2005/dsa-817 Package : python2.1 (python2.1) Vulnerability : integer overflow Need reboot : no Debian-Edu-specific : no CVE ID : CAN-2005-2491 DSA ID : DSA-819-1 DSA URL : http://www.debian.org/security/2005/dsa-819 Package : util-linux bsdtools mount (util-linux) Vulnerability : privilege escalation Need reboot : no Debian-Edu-specific : no CVE ID : CAN-2005-2876 DSA ID : DSA-823-1 DSA URL : http://www.debian.org/security/2005/dsa-823 Upgrade Instructions - Make sure the line deb http://security.debian.org/ woody/updates main contrib non-free is present in your /etc/apt/sources.list and run 'apt-get update' to update your package lists. Then run 'apt-get upgrade' to upgrade all the packages mentioned above. This might upgrade other packages too, and if you only want to upgrade the packages above, you should run 'apt-get install ... ' where to is the package names in paranthesis from each package section above. - -- Mailing lists: [EMAIL PROTECTED], debian-edu@lists.debian.org, [EMAIL PROTECTED], [EMAIL PROTECTED], [EMAIL PROTECTED] Package info: `apt-cache show ' signature.asc Description: Digital signature
Re: Your Bugzilla buglist needs attention.
On Tue, Aug 23, 2005 at 06:11:03PM +0200, [EMAIL PROTECTED] wrote: > http://bugs.skolelinux.no/show_bug.cgi?id=20 > missing debconf: php4, php4-ldap, php4-snmp 4.0.100-1 > http://bugs.skolelinux.no/show_bug.cgi?id=41 > mangler debconf: gpm 1.19.6-5 > http://bugs.skolelinux.no/show_bug.cgi?id=187 > Mangler test for å se om PHP fungerer etter installasjon These three bugs I've recently resolved as WONTFIX. I believe neither of those bugs matter to us anymore. Does anyone disagree? If not I will probably start resolving more bugs the same way. - Werner -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
DESA-2005-011: several packages
- -- Debian-Edu/Skolelinux Security Advisory DESA 2005-011 http://www.skolelinux.no/security/ Morten Werner Olsen August 15th, 2005 [EMAIL PROTECTED] - -- This DESA deals with severel packages that the Debian Security Team has fixed. Each section start with "Package" and includes a link to the Debian Security Team's announce for the security upgrade. Package : tiff (libtiff3g) Vulnerability : buffer overflow Need reboot : no Debian-Edu-specific : no CVE ID : CAN-2005-1544 DSA ID : DSA-755-1 DSA URL : http://www.debian.org/security/2005/dsa-755 Package : krb5 (libkrb53) Vulnerability : remote code execution, denial of service Need reboot : no Debian-Edu-specific : no CVE ID : CAN-2005-1689 CAN-2005-1174 CAN-2005-1175 DSA ID : DSA-757-1 DSA URL : http://www.debian.org/security/2005/dsa-757 Package : zlib (zlib1g) Vulnerability : buffer overflow Need reboot : no Debian-Edu-specific : no CVE ID : CAN-2005-1849 DSA ID : DSA-763-1 DSA URL : http://www.debian.org/security/2005/dsa-763 Upgrade Instructions - Make sure the line deb http://security.debian.org/ woody/updates main contrib non-free is present in your /etc/apt/sources.list and run 'apt-get update' to update your package lists. Then run 'apt-get upgrade' to upgrade all the packages mentioned above. This might upgrade other packages too, and if you only want to upgrade the packages above, you should run 'apt-get install ... ' where to is the package names in paranthesis from each package section above. - -- Mailing lists: [EMAIL PROTECTED], debian-edu@lists.debian.org, [EMAIL PROTECTED], [EMAIL PROTECTED], [EMAIL PROTECTED] Package info: `apt-cache show ' signature.asc Description: Digital signature
DESA-2005-010: several packages
- -- Debian-Edu/Skolelinux Security Advisory DESA 2005-010 http://www.skolelinux.no/security/ Morten Werner Olsen July 11th, 2005 [EMAIL PROTECTED] - -- This DESA deals with severel packages that the Debian Security Team has fixed. Each section start with "Package" and includes a link to the Debian Security Team's announce for the security upgrade. Package : bzip (bzip2) Vulnerability : infinite loop Need reboot : no Debian-Edu-specific : no CVE ID : CAN-2005-1260 DSA ID : DSA-741-1 DSA URL : http://www.debian.org/security/2005/dsa-741 Package : sudo (sudo) Vulnerability : pathname validation race Need reboot : no Debian-Edu-specific : no CVE ID : CAN-2005-1993 DSA ID : DSA-735-1 DSA URL : http://www.debian.org/security/2005/dsa-735 Package : squid (squid) Vulnerability : IP-spoofing Need reboot : no Debian-Edu-specific : no CVE ID : CAN-2005-1519 DSA ID : DSA-751-1 DSA URL : http://www.debian.org/security/2005/dsa-751 Package : gzip (gzip) Vulnerability : several Need reboot : no Debian-Edu-specific : no CVE ID : CAN-2005-0988 CAN-2005-1228 DSA ID : DSA-752-1 DSA URL : http://www.debian.org/security/2005/dsa-752 Upgrade Instructions - Make sure the line deb http://security.debian.org/ woody/updates main contrib non-free is present in your /etc/apt/sources.list and run 'apt-get update' to update your package lists. Then run 'apt-get upgrade' to upgrade all the packages mentioned above. This might upgrade other packages too, and if you only want to upgrade the packages above, you should run 'apt-get install ... ' where to is the package names in paranthesis from each package section above. - -- Mailing lists: [EMAIL PROTECTED], debian-edu@lists.debian.org, [EMAIL PROTECTED], [EMAIL PROTECTED], [EMAIL PROTECTED] Package info: `apt-cache show ' signature.asc Description: Digital signature
DESA-2005-009: several packages
- -- Debian-Edu/Skolelinux Security Advisory DESA 2005-009 http://www.skolelinux.no/security/ Morten Werner Olsen July 1st, 2005 [EMAIL PROTECTED] - -- This DESA deals with severel packages that the Debian Security Team has fixed. Each section start with "Package" and includes a link to the Debian Security Team's announce for the security upgrade. Package : squid (squid) Vulnerability : design flaw Need reboot : no Debian-Edu-specific : no CVE ID : CAN-2005-1345 DSA ID : DSA-721-1 DSA URL : http://www.debian.org/security/2005/dsa-721 Package : bzip2 (bzip2 libbz2-1.0) Vulnerability : race condition Need reboot : no Debian-Edu-specific : no CVE ID : CAN-2005-0953 DSA ID : DSA-730-1 DSA URL : http://www.debian.org/security/2005/dsa-730 Package : sudo (sudo) Vulnerability : pathname validation race Need reboot : no Debian-Edu-specific : no CVE ID : CAN-2005-1993 DSA ID : DSA-735-1 DSA URL : http://www.debian.org/security/2005/dsa-735 Upgrade Instructions - Make sure the line deb http://security.debian.org/ woody/updates main contrib non-free is present in your /etc/apt/sources.list and run 'apt-get update' to update your package lists. Then run 'apt-get upgrade' to upgrade all the packages mentioned above. This might upgrade other packages too, and if you only want to upgrade the packages above, you should run 'apt-get install ... ' where to is the package names in paranthesis from each package section above. - -- Mailing lists: [EMAIL PROTECTED], debian-edu@lists.debian.org, [EMAIL PROTECTED], [EMAIL PROTECTED], [EMAIL PROTECTED] Package info: `apt-cache show ' signature.asc Description: Digital signature
Re: Worklist for the weekend
On Fri, Jun 10, 2005 at 02:16:39PM +0200, Finn-Arne Johansen wrote: > - Add backup of slapd to the slbackup routine I hope to fix this during this weekend. - Werner -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#311188: debian-edu-config: Messes "programmatically" with conffiles of other packages
On Mon, May 30, 2005 at 11:28:54AM +0200, Jonas Smedegaard wrote: > > (And yes, I believe we need to find a better way to handle > > configuration in debian-edu, but while we wait, I see no better way to > > do it than the current mechanism. And I believe it is not breaking > > policy as it is written in the Debian Policy Manual today. > > It sure breaks packages' maintainance that their conffiles are altered > by other packages (which I believe is the intend of D-P 10.7.4): It is > expected to be able to remove functionality of a package by removing a > package - that is not the case with debian-edu-config. So do you also mean that it breaks packages' maintainance that their conffiles are altered by the sysadmins too? Package maintainer script shall perfectly handle that conffiles are changed by the sysadmin. An extreme solution to this bug could have been to rewrite debian-edu-config as a HUGE installation-manual, and tell the sysadmins (I expect that there wouldn't be many left) to manually do all the configuring. In the same way as it is now after a Debian-edu installation, the maintainer scripts of the packages that will have a altered configuration shall handle this during upgrade. I'm not sure I see the difference. If I know the debian-edu-config package right, one will have to run a script to change any conffiles after manually installing the pacakge? - Werner -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
DESA-2005-008: several packages
- -- Debian-Edu/Skolelinux Security Advisory DESA 2005-008 http://www.skolelinux.no/security/ Morten Werner Olsen April 28th, 2005[EMAIL PROTECTED] - -- This DESA deals with severel packages that the Debian Security Team has fixed. Each section start with "Package" and includes a link to the Debian Security Team's announce for the security upgrade. Package : gtkhtml (libgtkhtml20) Vulnerability : null pointer dereference Need reboot : no Debian-Edu-specific : no CVE ID : CAN-2003-0541 DSA ID : DSA-710-1 DSA URL : http://www.debian.org/security/2005/dsa-710 Package : kdelibs (kdelibs3 kdelibs3-bin kdelibs3-cups libarts libkmid) Vulnerability : several Need reboot : no Debian-Edu-specific : no CVE ID : CAN-2005-1046 DSA ID : DSA-714-1 DSA URL : http://www.debian.org/security/2005/dsa-714 Package : cvs (cvs) Vulnerability : serveral Need reboot : no Debian-Edu-specific : no CVE ID : CAN-2004-1342 CAN-2004-1343 DSA ID : DSA-715-1 DSA URL : http://www.debian.org/security/2005/dsa-715 Upgrade Instructions - Make sure the line deb http://security.debian.org/ stable/updates main contrib non-free is present in your /etc/apt/sources.list and run 'apt-get update' to update your package lists. Then run 'apt-get upgrade' to upgrade all the packages mentioned above. This might upgrade other packages too, and if you only want to upgrade the packages above, you should run 'apt-get install ... ' where to is the package names in paranthesis from each package section above. - -- Mailing lists: [EMAIL PROTECTED], debian-edu@lists.debian.org, [EMAIL PROTECTED], [EMAIL PROTECTED], [EMAIL PROTECTED] Package info: `apt-cache show ' signature.asc Description: Digital signature
DESA-2005-007: several packages
- -- Debian-Edu/Skolelinux Security Advisory DESA 2005-007 http://www.skolelinux.no/security/ Morten Werner Olsen April 16th, 2005[EMAIL PROTECTED] - -- This DESA deals with severel packages that the Debian Security Team has fixed. Each section start with "Package" and includes a link to the Debian Security Team's announce for the security upgrade. Package : perl (perl perl-base) Vulnerability : design flaw Need reboot : no Debian-Edu-specific : no CVE ID : CAN-2005-0448 DSA ID : DSA-696-1 DSA URL : http://www.debian.org/security/2005/dsa-696 Package : mc (mc mc-common) Vulnerability : buffer overflow Need reboot : no Debian-Edu-specific : no CVE ID : CAN-2005-0763 DSA ID : DSA-698-1 DSA URL : http://www.debian.org/security/2005/dsa-698 Package : krb5 (libkrb53) Vulnerability : buffer overflows Need reboot : no Debian-Edu-specific : no CVE ID : CAN-2005-0468 CAN-2005-0469 DSA ID : DSA-703-1 DSA URL : http://www.debian.org/security/2005/dsa-703 Package : libexif (libexif5) Vulnerability : buffer overflow Need reboot : no Debian-Edu-specific : no CVE ID : CAN-2005-0664 DSA ID : DSA-709-1 DSA URL : http://www.debian.org/security/2005/dsa-709 Upgrade Instructions - Make sure the line deb http://security.debian.org/ stable/updates main contrib non-free is present in your /etc/apt/sources.list and run 'apt-get update' to update your package lists. Then run 'apt-get upgrade' to upgrade all the packages mentioned above. This might upgrade other packages too, and if you only want to upgrade the packages above, you should run 'apt-get install ... ' where to is the package names in paranthesis from each package section above. - -- Mailing lists: [EMAIL PROTECTED], debian-edu@lists.debian.org, [EMAIL PROTECTED], [EMAIL PROTECTED], [EMAIL PROTECTED] Package info: `apt-cache show ' signature.asc Description: Digital signature
debian-edu@lists.debian.org
On Sat, Mar 26, 2005 at 03:49:30PM +0300, ??? wrote: > I try to use xdebconfigurator , and it ask for ddcprobe , but i can't find > it . > for example > -- > [EMAIL PROTECTED]:/# xdebconfigurator > /usr/sbin/ddcprobe NOT found! > ... > [EMAIL PROTECTED]:/# apt-file search ddcprobe > [EMAIL PROTECTED]:/# > > Maybe it is a new utilite instead ddcprobe ? I don't think ddcprobe is available for Debian, and it is not needed for xdebconfigurator to work. xdebconfigurator use other utilities for hardware detection. - Werner -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
DESA-2005-006: several packages
- -- Debian-Edu/Skolelinux Security Advisory DESA 2005-006 http://www.skolelinux.no/security/ Morten Werner Olsen March 15th, 2005[EMAIL PROTECTED] - -- This DESA deals with severel packages that the Debian Security Team has fixed. Each section start with "Package" and includes a link to the Debian Security Team's announce for the security upgrade. Package : emacs21 (emacs21) Vulnerability : format string Need reboot : no Debian-Edu-specific : no CVE ID : CAN-2005-0100 DSA ID : DSA-685-1 DSA URL : http://www.debian.org/security/2005/dsa-685 Package : squid (squid) Vulnerability : mising input sanitising Need reboot : no Debian-Edu-specific : no CVE ID : CAN-2005-0446 DSA ID : DSA-688-1 DSA URL : http://www.debian.org/security/2005/dsa-688 Upgrade Instructions - Make sure the line deb http://security.debian.org/ stable/updates main contrib non-free is present in your /etc/apt/sources.list and run 'apt-get update' to update your package lists. Then run 'apt-get upgrade' to upgrade all the packages mentioned above. This might upgrade other packages too, and if you only want to upgrade the packages above, you should run 'apt-get install ... ' where to is the package names in paranthesis from each package section above. - -- Mailing lists: [EMAIL PROTECTED], debian-edu@lists.debian.org, [EMAIL PROTECTED], [EMAIL PROTECTED], [EMAIL PROTECTED] Package info: `apt-cache show ' signature.asc Description: Digital signature
Re: Dates for developer gatherings in 2005
On Thu, Feb 24, 2005 at 11:52:51AM +0100, Petter Reinholdtsen wrote: > > er, I forgot to mention I meant _April_ 15-17th, sorry about that :-) > > I have no other plans for that period. Sounds good to me. I would > love to come to Greece, if the meeting actually take place, and enough > people are willing to join. Perhaps we should do a count to check the > interest? Please report back as soon as possible if you can join us > in Greece? I would also love to go! :) - Werner -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
DESA-2005-005: several packages
- -- Debian-Edu/Skolelinux Security Advisory DESA 2005-005 http://www.skolelinux.no/security/ Morten Werner Olsen February 15th, 2005 [EMAIL PROTECTED] - -- This DESA deals with severel packages that the Debian Security Team has fixed. Each section start with "Package" and includes a link to the Debian Security Team's announce for the security upgrade. Package : cpio (cpio) Vulnerability : broken file permissions Need reboot : no Debian-Edu-specific : no CVE ID : CAN-1999-1572 DSA ID : DSA-664-1 DSA URL : http://www.debian.org/security/2005/dsa-664 Package : python2.2 (python2.2) Vulnerability : design flaw Need reboot : no Debian-Edu-specific : no CVE ID : CAN-2005-0089 DSA ID : DSA-666-1 DSA URL : http://www.debian.org/security/2005/dsa-666 Package : squid Vulnerability : several vulnerabilities Need reboot : no Debian-Edu-specific : no CVE ID : CAN-2005-0173, CAN-2005-0175, CAN-2005-0194, CAN-2005-0211 DSA ID : DSA-667-1 DSA URL : http://www.debian.org/security/2005/dsa-667 Upgrade Instructions - Make sure the line deb http://security.debian.org/ stable/updates main contrib non-free is present in your /etc/apt/sources.list and run 'apt-get update' to update your package lists. Then run 'apt-get upgrade' to upgrade all the packages mentioned above. This might upgrade other packages too, and if you only want to upgrade the packages above, you should run 'apt-get install ... ' where to is the package names in paranthesis from each package section above. - -- Mailing lists: [EMAIL PROTECTED], debian-edu@lists.debian.org, [EMAIL PROTECTED], [EMAIL PROTECTED], [EMAIL PROTECTED] Package info: `apt-cache show ' signature.asc Description: Digital signature
DESA-2005-001: several packages
- -- Debian-Edu/Skolelinux Security Advisory DESA 2005-004 http://www.skolelinux.no/security/ Morten Werner Olsen January 28th, 2005 [EMAIL PROTECTED] - -- This DESA deals with severel packages that the Debian Security Team has fixed. Each section start with "Package" and includes a link to the Debian Security Team's announce for the security upgrade. Package : krb5 (libkrb53) Vulnerability : buffer overflow Need reboot : no Debian-Edu-specific : no CVE ID : CAN-2004-1189 DSA ID : DSA-629-1 DSA URL : http://www.debian.org/security/2005/dsa-629 Package : kdelibs (kdelibs3 kdelibs3-crypt libarts libkmid) Vulnerability : unsanitised input, missing return value check Need reboot : no Debian-Edu-specific : no CVE ID : CAN-2004-1165 CAN-2005-0078 DSA ID : DSA-631-1 DSA-660-1 DSA URL : http://www.debian.org/security/2005/dsa-631 http://www.debian.org/security/2005/dsa-660 Package : exim (exim) Vulnerability : buffer overflow Need reboot : no Debian-Edu-specific : no CVE ID : CAN-2005-0021 DSA ID : DSA-635-1 DSA URL : http://www.debian.org/security/2005/dsa-635 Package : glibc (libc6 nscd) Vulnerability : insecure temporary files Need reboot : no Debian-Edu-specific : no CVE ID : CAN-2004-0968 DSA ID : DSA-636-1 DSA URL : http://www.debian.org/security/2005/dsa-636 Package : cupsys (cupsys cupsys-bsd cupsys-client cupsys-pstoraster libcupsys2) Vulnerability : buffer overflow Need reboot : no Debian-Edu-specific : no CVE ID : CAN-2005-0064 DSA ID : DSA-645-1 DSA URL : http://www.debian.org/security/2005/dsa-645 Package : xpdf (xpdf xpdf-common xpdf-reader xpdf-utils) Vulnerability : buffer overflow Need reboot : no Debian-Edu-specific : no CVE ID : CAN-2005-0064 DSA ID : DSA-648-1 DSA URL : http://www.debian.org/security/2005/dsa-648 Package : squid (squid) Vulnerability : buffer overflow, integer overflow Need reboot : no Debian-Edu-specific : no CVE ID : CAN-2005-0094 CAN-2005-0095 DSA ID : DSA-651-1 DSA URL : http://www.debian.org/security/2005/dsa-651 Package : xine-lib (libxine0) Vulnerability : buffer overflow Need reboot : no Debian-Edu-specific : no CVE ID : CAN-2004-1379 DSA ID : DSA-657-1 DSA URL : http://www.debian.org/security/2005/dsa-657 Upgrade Instructions - Make sure the line deb http://security.debian.org/ stable/updates main contrib non-free is present in your /etc/apt/sources.list and run 'apt-get update' to update your package lists. Then run 'apt-get upgrade' to upgrade all the packages mentioned above. This might upgrade other packages too, and if you only want to upgrade the packages above, you should run 'apt-get install ... ' where to is the package names in paranthesis from each package section above. - -- Mailing lists: [EMAIL PROTECTED], debian-edu@lists.debian.org, [EMAIL PROTECTED], [EMAIL PROTECTED], [EMAIL PROTECTED] Package info: `apt-cache show ' signature.asc Description: Digital signature
DESA-2004-022 - several packages
- -- Debian-Edu/Skolelinux Security Advisory DESA 2004-022 http://www.skolelinux.no/security/ Morten Werner Olsen December 2nd, 2004 [EMAIL PROTECTED] - -- This DESA deals with severel packages that the Debian Security Team has fixed. Each section start with "Package" and includes a link to the Debian Security Team's announce for the security upgrade. Package : tetex-bin (tetex-bin libkpathsea3) Vulnerability : integer overflows Need reboot : no Debian-Edu-specific : no CVE ID : CAN-2004-0888 DSA ID : DSA-599-1 DSA URL : http://www.debian.org/security/2004/dsa-599 Package : libgd2 (libgd2) Vulnerability : integer overflow Need reboot : no Debian-Edu-specific : no CVE ID : CAN-2004-0941 CAN-2004-0990 DSA ID : DSA-602-1 DSA URL : http://www.debian.org/security/2004/dsa-602 Package : openssl (openssl libssl0.9.6) Vulnerability : insecure temporary file Need reboot : no Debian-Edu-specific : no CVE ID : CAN-2004-0975 DSA ID : DSA-603-1 DSA URL : http://www.debian.org/security/2004/dsa-603 Upgrade Instructions - Make sure the line deb http://security.debian.org/ stable/updates main contrib non-free is present in your /etc/apt/sources.list and run 'apt-get update' to update your package lists. Then run 'apt-get upgrade' to upgrade all the packages mentioned above. This might upgrade other packages too, and if you only want to upgrade the packages above, you should run 'apt-get install ... ' where to is the package names in paranthesis from each package section above. - -- Mailing lists: [EMAIL PROTECTED], debian-edu@lists.debian.org, [EMAIL PROTECTED], [EMAIL PROTECTED], [EMAIL PROTECTED] Package info: `apt-cache show ' signature.asc Description: Digital signature
DESA-2004-017 - gdk-pixbuf: several vulnerabilities
- -- Debian-Edu/Skolelinux Security Advisory DESA 2004-017 http://www.skolelinux.no/security/ Morten Werner Olsen September 16, 2004 [EMAIL PROTECTED] - -- Package : gdk-pixbuf Vulnerability : several Problem-Type: remote Need reboot : no Debian-Edu-specific : no CVE ID : CAN-2004-0753 CAN-2004-0782 CAN-2004-0788 DSA ID : DSA-546-1 Chris Evans discovered several problems in gdk-pixbuf, the GdkPixBuf library used in Gtk. It is possible for an attacker to execute arbitrary code on the victims machine. Gdk-pixbuf for Gtk+1.2 is an external package. For Gtk+2.0 it's part of the main gtk package. We recommend that you update your gdk-pixbuf packages. Upgrade Instructions - Make sure the line deb http://security.debian.org/ stable/updates main contrib non-free is present in your /etc/apt/sources.list and run 'apt-get update' to update your package lists. Then run 'apt-get install libgdk-pixbuf2 libgdk-pixbuf-gnome2' to upgrade your gdk-pixbuf packages. - -- Mailing list: [EMAIL PROTECTED], debian-edu@lists.debian.org, [EMAIL PROTECTED], [EMAIL PROTECTED] Package info: `apt-cache show ' signature.asc Description: Digital signature
DESA-2004-016 - cupsys: denial of service
- -- Debian-Edu/Skolelinux Security Advisory DESA 2004-016 http://www.skolelinux.no/security/ Morten Werner Olsen September 16, 2004 [EMAIL PROTECTED] - -- Package : cupsys Vulnerability : denial of service Problem-Type: remote Need reboot : no Debian-Edu-specific : no CVE ID : CAN-2004-0558 DSA ID : DSA-545-1 Alvaro Martinez Echevarria discovered a problem in CUPS, the Common UNIX Printing System. An attacker can easily disable browsing in CUPS by sending a specially crafted UDP datagram to port 631 where cupsd is running. We recommend that you update your cupsys packages. Upgrade Instructions - Make sure the line deb http://security.debian.org/ stable/updates main contrib non-free is present in your /etc/apt/sources.list and run 'apt-get update' to update your package lists. Then run 'apt-get install cupsys cupsys-bsd cupsys-client cupsys-pstoraster \ libcupsys2' to upgrade your python2.2 package. - -- Mailing list: [EMAIL PROTECTED], debian-edu@lists.debian.org, [EMAIL PROTECTED], [EMAIL PROTECTED] Package info: `apt-cache show ' signature.asc Description: Digital signature
RFT: new samba packages
Hello. I would like someone to test the new samba packages as I don't have access to a Skolelinux network and a computer with MS Windows installed. The line to insert into /etc/apt/sources.list is deb http://ftp.skolelinux.no/skolelinux/ woody-test local and the command for installing samba is apt-get update && apt-get install samba I have tested that the package installes successfully, but not it's functionality. Please check that the Windows client can login and mount partitions before and after installing new samba packages. Test-result can be reported to one of the lists or to me per email. Thanks in advance! - Werner
DESA-2004-015 - python2.2: buffer overflow
- -- Debian-Edu/Skolelinux Security Advisory DESA 2004-015 http://www.skolelinux.no/security/ Morten Werner Olsen September 01, 2004 [EMAIL PROTECTED] - -- Package : python2.2 Vulnerability : buffer overflow Problem-Type: local Need reboot : no Debian-Edu-specific : no CVE ID : CAN-2004-0150 DSA ID : DSA-458-2 This security advisory corrects DSA 458-1 which caused some segmentation faults in gethostbyaddr with non-localhost input. This update also disables IPv6 on all architectures. The original advisory said: Sebastian Schmidt discovered a buffer overflow bug in Python's getaddrinfo function, which could allow an IPv6 address, supplied by a remote attacker via DNS, to overwrite memory on the stack. This bug only exists in python 2.2 and 2.2.1, and only when IPv6 support is disabled. The python2.2 package in Debian woody meets these conditions (the 'python' package does not). We recommend that you update your python2.2 package. Upgrade Instructions - Make sure the line deb http://security.debian.org/ stable/updates main contrib non-free is present in your /etc/apt/sources.list and run 'apt-get update' to update your package lists. Then run 'apt-get install python2.2' to upgrade your python2.2 package. - -- Mailing list: [EMAIL PROTECTED], debian-edu@lists.debian.org, [EMAIL PROTECTED], [EMAIL PROTECTED] Package info: `apt-cache show '
DESA-2004-014 - kdelibs: symlink integrity
- -- Debian-Edu/Skolelinux Security Advisory DESA 2004-014 http://www.skolelinux.no/security/ Morten Werner Olsen August 29, 2004 [EMAIL PROTECTED] - -- Package : kdelibs Vulnerability : symlink integrity Problem-Type: local Need reboot : no Debian-Edu-specific : no CVE ID : CAN-2004-0689 DSA ID : DSA-539-1 The SUSE security team was alerted that in some cases the integrity of symlinks used by KDE are not ensured and that these symlinks can be pointing to stale locations. This can be abused by a local attacker to create or truncate arbitrary files or to prevent KDE applications from functioning correctly. We recommend that you upgrade your kdelibs packages. Upgrade Instructions - Make sure the line deb http://security.debian.org/ stable/updates main contrib non-free is present in your /etc/apt/sources.list and run 'apt-get update' to update your package lists. Then run 'apt-get install kdelibs3 kdelibs3-bin kdelibs3-cups' to upgrade your kdelibs packages. - -- Mailing list: [EMAIL PROTECTED], debian-edu@lists.debian.org, [EMAIL PROTECTED], [EMAIL PROTECTED] Package info: `apt-cache show ' signature.asc Description: Digital signature
DESA-2004-013 - libpng: several vulnerabilities
- -- Debian-Edu/Skolelinux Security Advisory DESA 2004-013 http://www.skolelinux.no/security/ Morten Werner Olsen August 29, 2004 [EMAIL PROTECTED] - -- Package : libpng Vulnerability : several Problem-Type: remote Need reboot : no Debian-Edu-specific : no CVE ID : CAN-2004-0597, CAN-2004-0598, CAN-2004-0599, CAN-2004-0768 DSA ID : DSA-536-1 Chris Evans discovered several vulnerabilities in libpng. These include multiple buffer overflows, NULL pointer dereferences and integer overflows. We recommend that you upgrade your libpng packages. Upgrade Instructions - Make sure the line deb http://security.debian.org/ stable/updates main contrib non-free is present in your /etc/apt/sources.list and run 'apt-get update' to update your package lists. Then run 'apt-get install libpng2' to upgrade your libpng package. - -- Mailing list: [EMAIL PROTECTED], debian-edu@lists.debian.org, [EMAIL PROTECTED], [EMAIL PROTECTED] Package info: `apt-cache show ' signature.asc Description: Digital signature
DESA-2004-012 - samba: buffer overruns
- -- Debian-Edu/Skolelinux Security Advisory DESA 2004-012 http://www.skolelinux.no/security/ Morten Werner Olsen August 28, 2004 [EMAIL PROTECTED] - -- Package : samba Vulnerability : buffer overruns Problem-Type: remote Need reboot : no Debian-Edu-specific : no CVE ID : CAN-2004-0600, CAN-2004-0686 DSA ID : - The functionality affected by these vulnerabilities are not enabled in a standard Debian-Edu/Skolelinux installation, but they will be if SWAT is started or if the 'mangling method = hash' is used in smb.conf. We recommend that you upgrade your samba package. Upgrade Instructions - Make sure 'deb http://ftp.skolelinux.no/skolelinux woody local' is present in your /etc/apt/sources.list and run 'apt-get update' to update your package lists. apt-get install samba - -- Mailing list: [EMAIL PROTECTED], debian-edu@lists.debian.org, [EMAIL PROTECTED], [EMAIL PROTECTED] Package info: `apt-cache show '
Re: Flashplugin-nonfree version 6 gives error
On Fri, Aug 13, 2004 at 03:17:13PM +0200, [EMAIL PROTECTED] wrote: > When installing flashplugin-nonfree from > deb http://ftp.skolelinux.no/skolelinux woody-test local > > Gives the following error > > Sætter flashplugin-nonfree (6.0.79-1.skolelinux.1) op... > Checking new upstream release... > New version 7.0.25 is detected (current: not installed) > Updating flashplugin... > /usr/lib/ruby/1.6/net/protocol.rb:161:in `error!': 404 "Not Found" > (Net::ProtoFatalError) > from /usr/lib/ruby/1.6/net/http.rb:925:in `value' > from /usr/lib/ruby/1.6/net/http.rb:440:in `get' > from /usr/sbin/update-flashplugin:143:in `get_file' > from /usr/sbin/update-flashplugin:210:in `update' > from /usr/sbin/update-flashplugin:399 > getting install_flash_player_6_linux.tar.gz [321/0 (inf%)] > > Probably only ned new deb for installing flashplugin-nonfree 7.0 I have rebuilt the unstable-version for woody and moved it into woody-test. Torstein has reported that is installes successfully. - Werner
Re: Proposed stable update: locale-config-skolelinux
On Sun, Aug 08, 2004 at 10:55:45PM +0200, Petter Reinholdtsen wrote: > > Any objections? The new version is in the woody-test APT source, and > > on the latest woody-test CD. > > Hm, how long should we wait for objections? We should probably work > out some minimum wait time. 24 hours? Three days? 1 week? What do > you think? Three days sounds good to me. And no objections.. :) - Werner
Re: Source CD's
On Wed, Jul 14, 2004 at 11:58:50AM +0200, Petter Reinholdtsen wrote: > > A newer version (8.38) of hwinfo is in Debian unstable with full > > sources, but this version have dependencies that are not met in woody, > > so I have not made a backport for woody-test (and I don't think I will > > do either). > > There is already a version in woody-test. Is this not usable in > woody? I removed that version, because I have redesigned the whole package, and I don't like the upgrade path from the version that was in woody-test. The new package that is to migrate to testing the next week or so. - Werner
Re: Source CD's
On Wed, Jul 14, 2004 at 07:36:35AM +0200, Finn-Arne Johansen wrote: > hwInfo (Fetch from CVS?) The version of hwinfo we are using today is made by using alien. :/ Maybe we can find a source-rpm in Suse's ftp-archives. A newer version (8.38) of hwinfo is in Debian unstable with full sources, but this version have dependencies that are not met in woody, so I have not made a backport for woody-test (and I don't think I will do either). - Werner
Rules for the stable package-repository on developer
Hello, and congratulations with 1.0 everyone! :) Now the stable repository on developer.skolelinux.no will be used by people who installs 1.0 when doing upgrades, and it's important for us that the upgrades does not break anyone's system. To deal with this we will have to be very careful when uploading new packages to that repository, and I think it would be useful to have some rules regarding uploads to that repository. I spoke to Petter about it on IRC yesterday, and have the following proposal: 1. All packages that is uploaded to our stable archive on developer.skolelinux.no, must be presented on this list ([EMAIL PROTECTED]) and have other developers and testers accept. 2. If no one complains, there will be a _small_ group of people (not yet defined) that have write-access to the repository, and can upload the packages when the "discussion" is finished on the list. 3. In cases where we cannot agree, Petter will have the power to decide whether the package is allowed to enter the repository or not. Of course, we still want to build daily images with our improved system, and need to include packages from woody-test (or another test-repository) in the daily built CD's. I'm sure Petter have more info about this, but I got the impression that a newer version of debian-cd was preferable. Comments? - Werner signature.asc Description: Digital signature
Re: Wrong links to iso-images at ftp.skolelinnux.no
On Wed, Jun 02, 2004 at 07:12:54AM +0200, Klaus Ade Johnstad wrote: > Could someone update the links > skolelinux-i386-previous.iso > points to skolelinux-i386-pr47.iso > and > skolelinux-i386-current.iso > points to skolelinux-i386-rc1.iso > > both of these now lag 2 releases. Updated. - Werner signature.asc Description: Digital signature
PHP-packages
Hello! Can somebody tell med if the php-packages [1] in our repository is in use? If not, I would like to remove them. Objections? - Werner [1]: caudium-php4_4.1.2-6.0.skolelinux.1_i386.deb php4-cgi_4.1.2-6.0.skolelinux.1_i386.deb php4-curl_4.1.2-6.0.skolelinux.1_i386.deb php4-dev_4.1.2-6.0.skolelinux.1_all.deb php4-domxml_4.1.2-6.0.skolelinux.1_i386.deb php4-gd_4.1.2-6.0.skolelinux.1_i386.deb php4-imap_4.1.2-6.0.skolelinux.1_i386.deb php4-ldap_4.1.2-6.0.skolelinux.1_i386.deb php4-mcal_4.1.2-6.0.skolelinux.1_i386.deb php4-mhash_4.1.2-6.0.skolelinux.1_i386.deb php4-mysql_4.1.2-6.0.skolelinux.1_i386.deb php4-odbc_4.1.2-6.0.skolelinux.1_i386.deb php4-pear_4.1.2-6.0.skolelinux.1_all.deb php4-recode_4.1.2-6.0.skolelinux.1_i386.deb php4-snmp_4.1.2-6.0.skolelinux.1_i386.deb php4-sybase_4.1.2-6.0.skolelinux.1_i386.deb php4-xslt_4.1.2-6.0.skolelinux.1_i386.deb php4_4.1.2-6.0.skolelinux.1_i386.deb signature.asc Description: Digital signature
Re: real bug or not?
On Sun, May 30, 2004 at 02:24:14AM -0700, Paula Harris wrote: > before submitting an unnecessary bug-report, short > question here: > I've got an ATi Radeon 9200 graphics-card, 128 MB. > When installing skole rc2, the installer told me to > fill in a bug-report > > "error:./07debian-edu-config: Unable to install the > required XFree86 server 'xserver-svga' automatically., > error:./76debian-edu-config: failed to run > /usr/bin/dexconf" Hmm... seems like the installer tries to install one of the old xfree86-packages (version 3)? > KDM and KDE start in spite of this message. > XFree86config-4: graphics-device "vesa". Is that > sufficient or will the card run with minor > functionality? > I've searched the web and found some howtos... Did this work automatically after the installation, or did you edit your /etc/X11/XF86Config-4? I don't think you'll be able to utilize the graphic card with the vesa-driver, but I guess someone else will be able to give you some details. By the way, I found this page which can maybe give you some hints on how to get the card working with another driver: http://users.actrix.co.nz/michael/radeon9200.html > Or should I fill in a bug-report? Please file a bugreport, and please attach the output of these commands: - 'xdebconfigurator -x' - 'xdebconfigurator -dx' - 'xdebconfigurator -ix' - 'xdebconfigurator -kx' Thanks. - Werner signature.asc Description: Digital signature
Re: CD build failed.
On Fri, May 28, 2004 at 10:08:56PM +0200, [EMAIL PROTECTED] wrote: > File > dists/woody/local/binary-i386/non-official/kernel-patch-debian-2.4.25_2.4.25-3_all.deb > can't be found ... > > The mirror has some problems. Please correct them before trying to build > Debian CDs. To do so you could sync your mirror from one of the primary > mirror sites listed on the Debian web pages. > make[1]: *** [mirrorcheck] Error 1 > make[1]: Leaving directory > `/home/builder/src/skolelinuxcvs/skolelinux/src/debian-cd' > make: *** [cd] Error 2 Sorry.. my fault! I was removing some old debs from the archives and did not watch the time.. don't hope somebody was _really_ waiting for the 22-build? :( - Werner signature.asc Description: Digital signature
DESA-2004-005 - sane-backends: several vulnerabilities
- -- Debian-Edu/Skolelinux Security Advisory DESA 2004-005 http://www.skolelinux.no/security/ Morten Werner Olsen May 10th, 2004 [EMAIL PROTECTED] - -- Package : sane-backends (libsane) Vulnerability : several vulnerabilities Problem-Type: remote Need reboot : no Debian-Edu-specific : no CVE ID : CAN-2003-0773, CAN-2003-0774, CAN-2003-0775, CAN-2003-0776, CAN-2003-0777, CAN-2003-0778 DSA ID : 379 Alexander Hvostov, Julien Blache and Aurelien Jarno discovered several security-related problems in the sane-backends package, which contains an API library for scanners including a scanning daemon (in the package libsane) that can be remotely exploited. These problems allow a remote attacker to cause a segmentation fault and/or consume arbitrary amounts of memory. The attack is successful, even if the attacker's computer isn't listed in saned.conf. You are only vulnerable if you actually run saned e.g. in xinetd or inetd. If the entries in the configuration file of xinetd or inetd respectively are commented out or do not exist, you are safe. Try "telnet localhost 6566" on the server that may run saned. If you get "connection refused" saned is not running and you are safe. We recommend that you upgrade your libsane package. Upgrade Instructions - Make sure 'deb ftp://ftp.skolelinux.no/skolelinux/ woody local' is present in your /etc/apt/sources.list and run 'apt-get update' to update your package lists. To upgrade, run this command: apt-get install libsane Upgrade Warning - --- This upgrade may result in that your scanners stop working. We have had reports about a paralell scanner that did not work after the upgrade, but our recomendation is that you upgrade the package anyway! If your scanner(s) stop working after the upgrade, please report this as a bug in our bug-tracking system (http://bugs.skolelinux.no/) or send an email to the Debian-Edu/Skolelinux Security Team ([EMAIL PROTECTED]). - -- For apt-get: deb ftp://ftp.skolelinux.no/skolelinux/ woody local Mailing list: [EMAIL PROTECTED], debian-edu@lists.debian.org, [EMAIL PROTECTED], [EMAIL PROTECTED] Package info: `apt-cache show ' signature.asc Description: Digital signature
DESA-2004-004 - Linux kernel: vulnerability in the ip_setsockopt() function code
- -- Debian-Edu/Skolelinux Security Advisory DESA 2004-004 http://www.skolelinux.no/security/ Morten Werner Olsen April 22th, 2004[EMAIL PROTECTED] - -- Package : kernel-image-2.4.25-1-i386 Vulnerability : vulnerability in the ip_setsockopt() function code Problem-Type: local Need reboot : yes Debian-Edu-specific : no CVE ID : - DSA ID : - A critical security vulnerability has been found in the Linux kernel in the ip_setsockopt() function code. For more details, take a look at: http://www.isec.pl/vulnerabilities/isec-0015-msfilter.txt The new kernel packages are fetched directly from Debian's unstable archives, packaged by Herbert Xu. We recommend that you upgrade your kernel packages to the new 2.4.26 version. Upgrade Instructions - Make sure 'deb ftp://ftp.skolelinux.no/skolelinux/ woody local' is present in your /etc/apt/sources.list and run 'apt-get update' to update your package lists. Find which flavour of the kernel you are running with the command 'uname -r' (examples: 386, 586tsc, 686, 686-smp, k6, k7, k7-smp). To upgrade, run this command replacing with yours: apt-get install kernel-image-2.4.26-1- If you are unfamiliar with kernel upgrades, please visit our mini-HOWTO on this subject: http://www.skolelinux.no/security/kernel-upgrade - -- For apt-get: deb ftp://ftp.skolelinux.no/skolelinux/ woody local Mailing list: [EMAIL PROTECTED], debian-edu@lists.debian.org, [EMAIL PROTECTED], [EMAIL PROTECTED] Package info: `apt-cache show ' signature.asc Description: Digital signature
RFT: new hwinfo package
Hello! I have prepared a new version of hwinfo (hardware detection) for Skolelinux / Debian-Edu. In that case I need someone to test the output of the old and the new version so I have some data to compare before we start using the new version of hwinfo in Skolelinux / Debian-Edu. Test procedure: (1) run 'hwinfo > hwinfo_old' (as root) on your Skolelinux / Debian-Edu computer (2) add 'deb ftp://ftp.skolelinux.no/skolelinux/ woody-test local' to your /etc/apt/sources.list (3) run 'apt-get update && apt-get install hwinfo' (4) remove/uncomment the line inserted from (2) (5) run 'hwinfo > hwinfo_new' (as root) again (6) send an email to [EMAIL PROTECTED] with hwinfo_old and hwinfo_new as attatchments Thanks in advance! - Werner
DESA-2004-003 - Linux kernel: several vulnerabilities
- -- Debian-Edu/Skolelinux Security Advisory DESA 2004-003 http://www.skolelinux.no/security/ Morten Werner Olsen April 15th, 2004[EMAIL PROTECTED] - -- Package : kernel-image-2.4.25-1-i386 Vulnerability : several vulnerabilities Problem-Type: local Need reboot : yes Debian-Edu-specific : no CVE ID : CAN-2004-0003, CAN-2004-0010, CAN-2004-0109, CAN-2004-0177, CAN-2004-0178 DSA ID : DSA 479-1 Several serious problems have been discovered in the Linux kernel. For a more detailed description, take a look at the Debian Security Advisory which describes the same vulnerabilities: http://www.debian.org/security/2004/dsa-479 The new kernel packages are fetched directly from Debian's unstable archives, packaged by Herbert Xu. We recommend that you upgrade your kernel packages. These problems will also be fixed by upstream in Linux 2.4.26 and future versions of 2.6. Upgrade Instructions - Make sure 'deb ftp://ftp.skolelinux.no/skolelinux/ woody local' is present in your /etc/apt/sources.list and run 'apt-get update' to update your package lists. Find which flavour of the kernel you are running with the command 'uname -r' (examples: 386, 586tsc, 686, 686-smp, k6, k7, k7-smp). To upgrade, run this command replacing with yours: apt-get install kernel-image-2.4.25-1- If you are unfamiliar with kernel upgrades, please visit our mini-HOWTO on this subject: http://www.skolelinux.no/security/kernel-upgrade - -- For apt-get: deb ftp://ftp.skolelinux.no/skolelinux/ woody local Mailing list: [EMAIL PROTECTED], debian-edu@lists.debian.org, [EMAIL PROTECTED] Package info: `apt-cache show ' signature.asc Description: Digital signature