Bug#813327: linux-image-3.16.0-4-amd64: cryptroot + VIA padlock fails with message from testmgr.c

2016-12-18 Thread Carsten Wolff
Hi, that Hardware of mine passed away recently, so I won't be able to track this issue anymore. I suggest closing the bugreport, unless anybody else speaks up about the same problem. Regards Carsten

Bug#813327: linux-image-3.16.0-4-amd64: cryptroot + VIA padlock fails with message from testmgr.c

2016-03-19 Thread Carsten Wolff
Hi Ben, On Friday 05 February 2016 16:54:59 Ben Hutchings wrote: > On Fri, 2016-02-05 at 16:58 +0100, Carsten Wolff wrote: > > At least, it does not fix the error > > I'm seeing. The message stays the same, including the 32 byte it dumps. > > Then I'm out

Bug#813327: linux-image-3.16.0-4-amd64: cryptroot + VIA padlock fails with message from testmgr.c

2016-02-05 Thread Carsten Wolff
On Friday 05 February 2016 01:10:37 Ben Hutchings wrote: > I found what seems to be a bug in the driver, but it was present in > both 3.2 and 3.16. Please test whether the attached patch fixes this > issue Hum, the patch only fixes the decision, if and when the key is reset before an operation,

Bug#813327: linux-image-3.16.0-4-amd64: cryptroot + VIA padlock fails with message from testmgr.c

2016-02-02 Thread Carsten Wolff
Hi Ben, thanks for the quick answer. On Sunday 31 January 2016 23:37:56 Ben Hutchings wrote: > That suggests a regression in the padlock-aes driver, although I don't > see any functional changes there. As a workaround, you can blacklist > it by adding "blacklist=padlock-aes" to the kernel

Bug#813327: linux-image-3.16.0-4-amd64: cryptroot + VIA padlock fails with message from testmgr.c

2016-01-31 Thread Carsten Wolff
Package: src:linux Version: 3.16.7-ckt20-1+deb8u3 Severity: normal Hi, I'm not at all sure I'm filing this against the right package. Maybe cryptsetup, maybe linux, ... After upgrading this system from wheezy to jessie, unlocking the cryptroot from initrd with padlock-aes and padlock-sha loaded

Bug#703993: file: possible DoS in awk magic

2013-03-26 Thread Carsten Wolff
Package: file Version: 5.04-5+squeeze2 Severity: important Tags: security, patch Hi, there's a DoS risk in the magic for awk scripts, which causes excessive runtimes of `file` on files which cause lots of backtracking in the regex engine, like files with many, many newlines: # dd ibs=100

Bug#701799: squid3: new upstream version

2013-02-27 Thread Carsten Wolff
+ * removed obsolete CVE patches + + -- Carsten Wolff cars...@wolffcarsten.de Fri, 22 Feb 2013 16:21:41 +0100 + squid3 (3.1.20-2.1) unstable; urgency=high * Non-maintainer upload diff -urN squid3-3.1.20/debian/patches/01-cf.data.debian.patch squid3-3.3.1/debian/patches/01

Bug#685087: kernel panic in tcp_v4_err() on icmp unreachable

2012-08-16 Thread Carsten Wolff
:33 lb01 kernel: [71034.937051] [c1003d47] ? kernel_thread_helper+0x7/0x10 Aug 15 20:38:44 lb02 kernel: [73520.996050] IPVS: stopping backup sync thread 24426 ... Aug 15 20:38:44 lb02 kernel: [73520.996806] IPVS: sync thread started: state = MASTER, mcast_ifn = vlan0400, syncid = 22 -- Carsten

Bug#664497: RFA: distcc

2012-03-18 Thread Carsten Wolff
Package: wnpp Severity: normal I have not used distcc for a long time. And honestly, I've stopped maintaining the package, too. Daniel has an interest in becoming maintainer, so he should. Thanks! Carsten

Bug#523846: No IPv6 support

2011-04-07 Thread Carsten Wolff
Package: munin Version: 1.4.5-3 Hi, On Monday 13 April 2009, Brian May wrote: Package: libnet-server-perl Version: 0.97-1 Tags: ipv6 This affects any package that uses libnet-server-perl, such as munin. Upstream references: * http://munin.projects.linpro.no/ticket/358 *

Bug#564170: Announce of the upcoming NMU for the distcc package

2010-03-15 Thread Carsten Wolff
Bonjour Christian, On Thursday 11 March 2010, Christian PERRIER wrote: Some days ago, I sent a notice to the maintainer of the distcc Debian package, mentioning the status of at least one old po-debconf translation update in the BTS. The package maintainer agreed for the NMU or did not

Bug#431918: [Pkg-openssl-devel] Bug#431918: openssl: multiple causes for libssl0.9.8 - unable to load crypto engines

2010-01-04 Thread Carsten Wolff
Hi! On Tuesday 22 December 2009, Kurt Roeckx wrote: On Tue, Dec 22, 2009 at 11:02:52AM +0100, Carsten Wolff wrote: Does the resulting shared object actually have an bind_engine symbol in it? Try using objdump -T libpadlock.so to see if it has any. Looking at the sources, only the capi

Bug#431918: openssl: multiple causes for libssl0.9.8 - unable to load crypto engines

2009-12-22 Thread Carsten Wolff
Package: openssl Version: 0.9.8k-7 Severity: normal I think there are multiple causes for this bug. 1) If I use the package from squeeze with the above mentioned version and try to use the padlock engine, openssl tries to load a shared object for this engine, even though padlock is a

Bug#548053: distcc: error in postinst script

2009-09-23 Thread Carsten Wolff
Hi, On Wednesday 23 September 2009, Alexander Kogan wrote: chown: invalid user: `distccd:adm' as you're upgrading, that user should already be there. Did you somehow remove that user in the past? Carsten -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject

Bug#539867: distccmon-gnome has empty output

2009-08-04 Thread Carsten Wolff
Hi Dominique, On Tuesday 04 August 2009, Dominique Brazziel wrote: There is nothing in the window but load average. I just compiled a kernel and the distccd.log file has all the details but I saw nothing in the distccmon-gnome window for the entire 49 minutes but the load average. The

Bug#537399: [distcc] FTBFS: src/srvnet.c:264: error: cast increases required alignment of target type

2009-07-29 Thread Carsten Wolff
Hi, On Wednesday 29 July 2009, Julien Lavergne wrote: This should be fixed by passing the --disable-Werror flag to configure. Ubuntu have same problems but with others warnings and on others archi. thanks! I'll include it. Carsten -- To UNSUBSCRIBE, email to

Bug#495770: marble has rpath to insecure location (/tmp/buildd/marble-0.6+svn837399/debian/tmp/usr/)

2008-08-20 Thread Carsten Wolff
Hi! On Wednesday 20 August 2008, Bill Allombert wrote: the amd64 marble package includes a ELF file /usr/lib/marble/plugins/libMarbleStarsPlugin.so with a rpath pointing to /tmp/buildd/marble-0.6+svn837399/debian/tmp/usr/. Thanks for reporting this, I will fix it tomorrow morning. Carsten

Bug#495568: kipi-plugins: Shouldn't it depend on imagemagick?

2008-08-18 Thread Carsten Wolff
Package: kipi-plugins Version: 0.1.5-1 Severity: wishlist Wouldn't it be better, if kipi-plugins depended on imagemagick instead of only suggesting it? I could understand, that you don't want to install all those packages, if a user decides to use digiKam just for it's basic features. But if he

Bug#489243: ppp: -chap + configured chap-secrets -- NAK chap and offer chap at the same time

2008-07-04 Thread Carsten Wolff
Package: ppp Version: 2.4.4rel-10 Severity: normal There's a bug in pppd that appears, if the options -chap, name and remotename are set and there are credentials for name and remotename in the chap-secrets file. In that case, if the peers' ConfReq contains auth chap FOO, pppd correctly

Bug#481465: distccd does not start

2008-05-17 Thread Carsten Wolff
Hi! On Friday 16 May 2008, Folkert van Heusden wrote: distccd does not start: Thanks for reporting. I can not reproduce that error, though. I'll need more info. Is there anything in /var/log/distccd.log? Carsten -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe.

Bug#456419: traverso: unneccessary build conflicts with qt3-dev-tools

2007-12-15 Thread Carsten Wolff
Package: traverso Version: 0.41.0-1 Severity: normal Hi, when I just built traverso from lenny on etch, I noticed, that it unnecessarily build-conflicts with qt3-dev-tools. This makes building the package unneccessarily complicated, when people are building both qt4 and qt3 packages on their

Bug#445834: eGroupWare 1.4.002 still in experimental in Debian

2007-12-09 Thread Carsten Wolff
Hi Ralf, Peter. On Friday 07 December 2007, Peter Eisentraut wrote: Am Montag, 3. Dezember 2007 schrieb Ralf Becker: The releasenotes (www.egroupware.org/wiki/releasenotes1.4) contain a link describing the changes in addressbook (www.egroupware.org/wiki/AddresbookAccountsConcept) which

Bug#401794: php5-auth-pam: does not work properly with libpam-radius-auth

2007-06-29 Thread Carsten Wolff
Hi, sorry for the delay. I experimented with pam_radius and freeradius today. I'm guessing you're using the unix module in freeradius? In that case, what's explained in README.Debian of php5-auth-pam for pam_unix holds true for freeradius' unix module, too. As long as /etc/shadow is not

Bug#398431: mailscanner: new upstream version 4.56.8

2006-11-13 Thread Carsten Wolff
Package: mailscanner Version: 4.41.3-2 Severity: normal Hi, upstream of MailScanner has several new versions with bugfixes and new features. Most importantly, the version in sid lacks support for SpamAssassin's sa-update and it would be nice to get a version of MailScanner into etch, before it is

Bug#383545: [INTL:pt] Portuguese translation for php4-auth-pam (debconf) (Translation Author Correction)

2006-11-07 Thread Carsten Wolff
Hi, the po-file misses at least the charset-part of Content-Type: and the PO-Revision-Date:. You may want to wait with fixing that until the php4-auth-pam package is replaced by php-auth-pam by ftp-master, though. The messages changed slightly there. Greetings Carsten -- To UNSUBSCRIBE,

Bug#378640: libnet-server-perl: [CVE-2005-1127] format string vulnerability in log() function

2006-07-24 Thread Carsten Wolff
Hello Stephen, I sent a suitable security-package with basically the same patch in it to the team in November 2005, immediately got a nice, will do this later today and nothing ever happened. Maybe it's because the patch potentially breaks logs of some servers using the lib, or because it's in

Bug#356811: gosa: please check, if cookies are enabled before login

2006-03-14 Thread Carsten Wolff
Package: gosa Version: 2.4-1 Severity: wishlist Tags: patch Often, users will have disabled cookies for the site in question at some point, or have disabled cookies completely. Therefor Gosa should check, if cookies are enabled and issue a warning at the login-screen, if they aren't. Otherwise,

Bug#336587: phpbb2: phpbb 2.0.18 released with lots of security fixes

2005-10-31 Thread Carsten Wolff
Package: phpbb2 Version: 2.0.13-6sarge1 Severity: grave Tags: security Justification: user security hole The phpbb project has relased version 2.0.18 of it's software, including lots of security fixes. See http://www.phpbb.com/phpBB/viewtopic.php?f=14t=336756 for details. The security related

Bug#317577: libapache-mod-php4: php_value specified in within a virtualhost-section may spread to other v-hosts

2005-07-10 Thread Carsten Wolff
On Sunday 10 July 2005 11:08, Steve Langasek wrote: This bug is 100% unreproducible for me here. Are you sure 123.123.123.123:80 is configured as a NameVirtualHost? Do the auto_prepend_file values from phpinfo() match the SERVER_NAME values? Yes I'm sure, I have about 50 (sub-)domains on

Bug#317577: libapache-mod-php4: php_value specified in within a virtualhost-section may spread to other v-hosts

2005-07-09 Thread Carsten Wolff
Package: libapache-mod-php4 Version: 4:4.3.10-15 Severity: grave Tags: security Justification: user security hole In my sarge installation I experience problems, that are at least related to this upstream bugreport: http://bugs.php.net/bug.php?id=25753 This (closed) report states, that the

Bug#310822: php4-auth-pam: pam_auth.so compiled against wrong PHP version?

2005-05-26 Thread Carsten Wolff
Hi, I don't know, what went wrong in your installation, but as you can see here, there's no such -zts folder in the package anymore: http://packages.debian.org/cgi-bin/search_contents.pl?searchmode=filelistword=php4-auth-pamversion=testingarch=i386 Is there something special about the

Bug#294501: can reproduce this bug

2005-03-09 Thread Carsten Wolff
after upgrading sarge yesterday, wich resulted in a new apache and php4 for me, apache crashes as long as I keep imap.so in php.ini. It's interesting, that apache-ssl does not suffer from that. Only apache. An strace ends right after reading the configuration-files. None of the suggestions in

Bug#297901: bugfix

2005-03-04 Thread Carsten Wolff
On Thursday 03 March 2005 16:03, Cajus Pollmeier wrote: Um. No. It will break normal user handling. The fix has to be placed in the usermanagement plugin. Try the attached one. Of course, you're right. Besides a typo in your patch, your patch seems to work correctly. A new patch without the

Bug#297901: gosa: user-template does not preselect base correctly

2005-03-03 Thread Carsten Wolff
Package: gosa Version: 2.2-1 Severity: normal If gosa is configured with multiple base-DNs and a user-template within one of those is used, the base-selectbox does not preselect the base-DN from the template correctly. -- System Information: Debian Release: 3.1 APT prefers unstable APT

Bug#297901: bugfix

2005-03-03 Thread Carsten Wolff
This patch fixes the problem. diff -ur gosa.dpkg.2.2-credativ.2/plugins/personal/generic/class_user.inc gosa.bugfix/plugins/personal/generic/class_user.inc --- gosa.dpkg.2.2-credativ.2/plugins/personal/generic/class_user.inc Mon Jan 17 18:32:31 2005 +++

Bug#295264: php4-auth-pam: completely broken, crashes apache on start

2005-02-18 Thread Carsten Wolff
On Monday 14 February 2005 20:27, Andrew Suffield wrote: vorlon we rebuilt PHP with ZTS enabled, which changes APIs and ABIs. vorlon php4-auth-pam was rebuilt, but doesn't actually cope properly. vorlon this didn't stop the maintainer from uploading it. infinity asuffield : You're welcome to

Bug#295031: viewcvs: tarball download misinterprets some forbidden settings

2005-02-12 Thread Carsten Wolff
Package: viewcvs Version: 0.9.2+cvs.1.0.dev.2004.07.28-1.4 Severity: normal The tarball download is broken, if one uses exclamation-marks in the forbidden config option like: forbidden = !example1 This would mean, that everything except for example1 is forbidden. The tarball download

Bug#294567: php4-auth-pam sets RPATH

2005-02-11 Thread Carsten Wolff
Hi, where does the strace come from? What did Matt do to get it? I can't reproduce any problem. And can you please point me to an archive of the discussion you talk about? I would like to see, what Matt wrote, too. Thank you, Carsten pgpuLcrrAgzIn.pgp Description: PGP signature