On 19/06/2006 Andrew Pimlott wrote:
Automatically formatting a swap partition is a destructive operation, so
all reasonable checks should be made before doing it. It is currently
not possible to positively identify a swap partition encrypted with a
random key; nor is it possible to negatively
On 20/06/2006 Dick Middleton wrote:
What I don't understand is why it's doing any checks at all when not
requested. It seems to me that checking for the existence of a
filesystem on an arbitrary partition is a bold assumption. That is
properly the business of mount.
why do you see any
On 20/06/2006 Andrew Pimlott wrote:
there may exist situations
where you don't want your device to be marked as 'contains encrypted
data'.
Right, however most users would be happy to put such a mark if it
increased safety. So it would be a nice option.
yes, that's exactly what Michael
On 20/06/2006 Andrew Pimlott wrote:
On Tue, Jun 20, 2006 at 10:10:24PM +0200, Jonas Meurer wrote:
On 20/06/2006 Andrew Pimlott wrote:
I mean _if I explicitly promise so_, we should expect that. So give me
some configuration directive like LuksOnly that I can set.
looks like overkill
Package: cryptsetup
Version: 2:1.0.3-2
Severity: wishlist
cryptdisks should be a wrapper around cryptdisks, comparable to mount.
basicly it should do the same as the current cryptdisks initscript,
except that it can be invoked from the commandline.
* David Härdeman wrote:
Usage examples:
o
On 16/06/2006 Mika Bostrom wrote:
yes, but initially the idea was to only check where we can be absolutely
sure that the check has no corner cases.
I claim that this is impossible. There is no way to be absolutely sure
about non-destructiveness of the operation. I'll try to explain.
Package: splashy
Version: 0.1.8-1
Severity: important
hello,
why does splashy depend on console-tools? what does it use from
console-tools that kbd does not provide? i cannot find any reason to
explicitly depend on console-tools.
...
jonas
-- System Information:
Debian Release:
On 10/06/2006 Joe Wreschnig wrote:
Please reconsider. If you don't integrate that version now, we'll most
probably do the switch to python2.4 in the next days and we'll replace
dh_python calls by dh_python2 calls (integrated for example in the python
package) or we'll remove call to
On 07/06/2006 David Härdeman wrote:
wasn't all suggestions in this bug implemented in the last cryptsetup
upload? If not, what remains?
the features for decrypting keys with openssl/gnupg are not implemented
yet.
...
jonas
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of
On 08/06/2006 David Härdeman wrote:
I suggest that we use the following logic:
1) do vol_id check
2) if fstype is swap, we're done
3) if fstype is known, complain and exit
4) if fstype is unknown, run mkswap
yes, but initially the idea was to only check where we can be absolutely
On 04/06/2006 David Härdeman wrote:
i think that this is the reason why getpass was used before.
david: are you capable of writing a patch that reverts this, and writes
the prompt directly to /dev/tty again?
maybe STDERR just needs to be changed to /dev/proc/self/fd/0?
I've attached a new
On 05/06/2006 General Stone wrote:
also a good idea, but using vol_id from udev seems like a even better
one. still the scripts could use a fallback, if udev is not installed.
I don't use udev but for anybody and in general it is better and finer.
Yes you have right and udev should be
On 04/06/2006 David Härdeman wrote:
On Sun, Jun 04, 2006 at 09:38:28PM +0200, Jonas Meurer wrote:
1) seperate the init-script and the decrypt-scripts so that anybody can
write his own decrypt-script without modify the init-script. The
decrypted key must be in /tmp/cryptdisk.key were
On 04/06/2006 General Stone wrote:
Ups :-(
sorry, but this one is not readable. looks like a gnupg encrypted
attachment. you need to send the patches as plain attachment.
...
jonas
signature.asc
Description: Digital signature
On 04/06/2006 David Härdeman wrote:
2) The swap-check-script use the strings tool which is in /usr/bin
:-/. egrep can work with binarys so that work with strings is
needless.
A better solution would be to use fstype from klibc or libvol from
udev to identify filesystem types.
fstype
Hello General,
thanks for the patches, details below.
On 04/06/2006 General Stone wrote:
In the attachment are patches for a better support on decrypted keys and
to fix some little typing errors.
i didn't find any fixed typos, did you miss them in the patch?
1) seperate the init-script and
On 31/05/2006 David Härdeman wrote:
Tobias Gruetzmacher wrote:
When using the current cryptsetup from unstable with pmount, the
passwort prompt does not show
I think this is due to the patch in #364153.
[...]
Jonas, will you prepare a fix or should I?
ok, i prepared a fix, and
On 02/06/2006 Tobias Gruetzmacher wrote:
On Fri, Jun 02, 2006 at 02:42:52PM +0200, Jonas Meurer wrote:
ok, i prepared a fix, and uploaded i386 packages (1.0.3-2) to
http://people.debian.org/~mejo/cryptsetup/
tobias, could you check if these fix your bug?
No, it does not. I think
tag 369439 +patch
thanks
On 30/05/2006 Christian Perrier wrote:
if i execute 'echo jonas:password | chgpasswd', i get a prompt:
Password:
and after two seconds it terminates with the following error message:
chgpasswd: PAM authentication failed
chgpasswd should not ask anything, as
On 30/05/2006 Tomasz Kłoczko wrote:
Dnia 29-05-2006, pon o godzinie 21:10 +0200, Jonas Meurer napisał(a):
unfortunately, the new chgpasswd tool does not work as expected.
according to docs and it's model 'chpasswd' it reads a string with the
format group_name:password from standard input
On 30/05/2006 Christian Perrier wrote:
I suspect (without checking) that this could be related to the utility
being PAMified. We currently don't use PAM for chpasswd in Debian and
we probably should do so as well for chgpasswd.
absolutely correct. i tried disabling PAM for chgpasswd,
Package: passwd
Version: 1:4.0.15-10
Severity: normal
hello,
unfortunately, the new chgpasswd tool does not work as expected.
according to docs and it's model 'chpasswd' it reads a string with the
format group_name:password from standard input.
obviously, this does not work.
if i execute 'echo
On 27/05/2006 Stefan Huehner wrote:
Package: zope-tinytableplus
Severity: wishlist
Hi,
your package build an dummy package named 'zope-tinytable'.
In sarge there hasn't been a package namend zope-tinytable so
i suspect that this dummy ins't needed for sarge - etch upgrades.
Is this
Package: cupsys-driver-gutenprint
Version: 4.3.99+cvs20060521-1
Severity: important
hello,
At upgrading cupsys-driver-gutenprint, apt-get idles forever after
running '/usr/sbin/cups-genppdconfig.5.0 -u'.
a short look at the postinst script shows, that
'/usr/sbin/cups-genppdconfig.5.0' is
On 22/05/2006 Roger Leigh wrote:
I need to add a build-depends, build-conflict or set DIALOG in
configure, I think. Could you attach a copy of your
/usr/sbin/cups-genppdconfig.5.0 so I can compare? This might be a
peculiarity to the amd64 buildd (but is stil a bug in the packaging
which
On 22/05/2006 Roger Leigh wrote:
Felix C. Stegerman [EMAIL PROTECTED] writes:
* Roger Leigh [EMAIL PROTECTED] [2006-05-22 21:21]:
I've uploaded a new build (at the same location).
It installed just fine.
Super, thanks.
Jonas, if you could verify it fixes the problem for you as
On 13/05/2006 Andres Salomon wrote:
On Sat, 2006-05-13 at 22:40 +0200, Jonas Meurer wrote:
On 13/05/2006 David Härdeman wrote:
i've tested your patch, and it seems to work perfectly well.
but unfortunately this is only the case for the luks* features of
cryptsetup. Plain 'cryptsetup
On 13/05/2006 David Härdeman wrote:
i've tested your patch, and it seems to work perfectly well.
but unfortunately this is only the case for the luks* features of
cryptsetup. Plain 'cryptsetup create' still leaves the terminal in a bad
state after terminating the passphrase prompt.
I can't
On 12/05/2006 David Härdeman wrote:
On Fri, May 12, 2006 at 01:09:33AM +0200, Jonas Meurer wrote:
On 10/05/2006 Andres Salomon wrote:
i've tested your patch, and it seems to work perfectly well.
but unfortunately this is only the case for the luks* features of
cryptsetup. Plain 'cryptsetup
On 10/05/2006 Andres Salomon wrote:
i've tested your patch, and it seems to work perfectly well.
but unfortunately this is only the case for the luks* features of
cryptsetup. Plain 'cryptsetup create' still leaves the terminal in a bad
state after terminating the passphrase prompt.
hello,
the debian technical committee decided to support Rogers request.
you didn't upload fixed devmapper packages yet, even though you uploaded
a new upstream version.
i raised the severity of this bug to 'serious'. i hope that you upload a
fixed version within the next week, otherwise i will
On 03/05/2006 Riku Voipio wrote:
On Tue, May 02, 2006 at 12:21:25AM +0200, Jonas Meurer wrote:
how about this from README.initramfs, also from the svn repository:
5. LUKS support
---
If you are using the LUKS feature of cryptsetup, the above recipe should
still work
On 29/04/2006 Walter Hofmann wrote:
I want to report on an incompatibility in cryptsetup which prevents me
from using the current version. This is possibly related to bug #364529,
but I cannot tell for sure.
I use cryptsetup to create an encrypted mapping with the following
command line
On 30/04/2006 Riku Voipio wrote:
The current svn version iof cryptsetup appears to parse /etc/crypttab
for the essential crypto modules. This does not work fo luks setups.
howabout using cryptsetup status ?
how about this from README.initramfs, also from the svn repository:
5. LUKS support
On 26/04/2006 Kees Cook wrote:
On Wed, Apr 26, 2006 at 11:13:16PM +0200, Jonas Meurer wrote:
can you provide the relevant ltrace output?
Sure! Here's an example. I've attached the ltraces for a
terminal-based stdin read vs a pipe stdin. As you can see from the
hexdumps, the contents
On 22/04/2006 Andres Salomon wrote:
Attached is a patch that fixes this issue. In the process, it also gets
rid of getpass() (which is considered obsolete, and should not be used;
see the manpage). Instead, we use select()+read(), along w/ manually
disabling ECHO in the terminal.
hello
On 23/04/2006 Kees Cook wrote:
When sending a pass-phrase over stdin without a terminal, the input
string is truncated to 32 characters. Using ltrace, it is clearly
visible. This rendered my mounts with long pass-phrases unmountable,
and I had to down-grade.
can you provide the relevant
On 25/04/2006 David Härdeman wrote:
On Mon, Mar 27, 2006 at 07:55:44AM -0800, Andrew Pimlott wrote:
If you run
cryptsetup luksOpen /dev/luks_partition whatever
and mistype the passphrase, the program exits with 0 instead of
indicating an error.
FYI, this seems to be fixed in version
On 12/04/2006 David Härdeman wrote:
I've taken a closer look at the current situation, and it seems likely that
the list can be shortened...
Running ldd /sbin/cryptsetup yields:
linux-gate.so.1 = (0xe000)
libpopt.so.0 = /lib/libpopt.so.0 (0xb7ef5000)
libdevmapper.so.1.02 =
On 11/04/2006 David Härdeman wrote:
This is the latest and greatest version of the script with the previous
fixes applied and a /dev/console redirection also added for the eventual
cryptgetpw script.
I'll reattach this later as a proper patch to cryptsetup instead of just
the two
On 12/04/2006 David Härdeman wrote:
Thanks, I just tried building a deb using the svn sources. And the
hook and script that were installed by it look fine.
However, there are three issues so far:
1) The hook and script should have mode 755, not 644
ok, just fixed that one.
2) I should
On 11/04/2006 Todd Troxell wrote:
Thanks for you report.
no problem.
Security Events
=-=-=-=-=-=-=-=
Mar 16 22:31:56 resivo syslog-ng[6932]: Log statistics;
processed='source(s_all)=2186', processed='destination(df_auth)=407',
processed='destination(df_news_dot_notice)=0',
Package: sa-exim
Version: 4.2.1-1
Severity: minor
hello,
since the upgrade to sa-exim 4.2.1-1, i get the following error messages
every hour:
---snip---
Date: Sat, 25 Mar 2006 20:33:02 +0100
From: Cron Daemon [EMAIL PROTECTED]
Subject: Cron [EMAIL PROTECTED] [ -x /usr/sbin/greylistclean ]
On 24/03/2006 Toni Mueller wrote:
Package: python-mysqldb
Version: 1.2.1c3-5
Severity: normal
Hello,
just trying to upgrade python-mysqldb, but it doesn't work (anymore):
The following packages have unmet dependencies:
python-mysqldb: Depends: python2.3-mysqldb (= 1.2.1c3-6) but
reopen 355070
thanks
hello,
unfortunately chgpasswd is not included in the passwd package. both
debian and upstream changelog claim, that the tool has been added. maybe
it's compiled but not installed, i don't know. anyway it is not
available in the passwd 1:4.0.15-1 package.
...
jonas
--
On 23/03/2006 David Härdeman wrote:
On Thu, Mar 23, 2006 at 01:08:51AM +0100, Jonas Meurer wrote:
the svn trunk of pkg-cryptsetup on alioth already has code to provide a
udeb. it would be great if you could check it. you can also download
the current packages (i386 and amd64) and sources from
On 22/03/2006 David Härdeman wrote:
in order to support setting up dm-crypt (with or without LUKS)
partitions in the debian-installer, a cryptsetup udeb is necessary...it
would be great if one could be created.
hello david,
the svn trunk of pkg-cryptsetup on alioth already has code to provide
On 17/03/2006 Paul Wise wrote:
seems like you gave several options to the lurker/apache_config debconf
question, and seperated them with commas. is this true?
I selected several options in a list of options (well, checkboxes
really). debconf must add the commas since I was not typing in
Package: logcheck
Version: 1.2.43a
Severity: important
hello,
it seems like logcheck always outputs some log lines longer than 503
characters, even if they perfectly well match a given regex.
i have the following entry in /etc/logcheck/ignore.d.server/syslog-ng:
syslog-ng\[.*\]: Log statistics;
hello,
On Thu, Feb 16 you wrote:
but unfortunately i found another bug with encrypted swap support.
first, do you have a swap check in /lib/cryptsetup/prechecks/swap? the
package doesn't provide one, so the 'precheck=swap' option should not
do anything.
It's missing in the debian
On 15/03/2006 Paul Wise wrote:
When I upgraded to the sarge security upgrade, I got this:
(Reading database ... 43784 files and directories currently installed.)
Preparing to replace lurker 1.2-5 (using .../lurker_1.2-5sarge1_i386.deb) ...
Unpacking replacement lurker ...
Setting up lurker
On 09/03/2006 Bastian Kleineidam wrote:
You wrote:
Do you have the image still on disk? Can you try to open it via the
loopback driver?
losetup /dev/loopX image
cryptsetup --readonly /dev/loopX _image
The losetup case works. Everything I do on disk works fine, only on DVD
it fails.
On 12/03/2006 Clemens Fruhwirth wrote:
Execuse me for being not highly verbose on this issue. I mailed
Bastian in private a tarball with a fix. I haven't Cc'ed
bugs.debian.org as I was not sure whether the bug tracking system
handles attachments correctly. (Does it?)
yes, the but tracking
On 06/03/2006 Jonas Meurer wrote:
As far as I remember, the system literally froze. I was running Xorg
(6.9 with the nvidia driver) at the time and I think even the mouse
cursor wouldn't move.
i just tested this now, as i was on the console last time. i can verify
that X freezes
On 03/03/2006 Bastian Kleineidam wrote:
after upgrading cryptsetup I was not able to use luksOpen on a
DVD image file. Downgrading to 2:1.0.1-16 makes it work again,
so something in the upgrade broke things.
Here is the command line log with the old 1.0.1 version:
$ cryptsetup --readonly
On 04/03/2006 Sam Morris wrote:
A few days after running into this bug I upgraded my system, and I now
use swap partitions instead of files.
For the sake of anyone else who runs into this problem, I had 512 MB of
RAM and a 1 GB swap file, /swap.
do you mean, that you cannot reproduce this
On 05/03/2006 Sam Morris wrote:
if this bug still applies for you when using an encrypted swap file,
how exactly does the crash look like? do you get any messages, is the
screen frozen, or are you still able to press enter, but the system
simply doesn't respond.
As far as I remember, the
On 06/03/2006 Steve McIntyre wrote:
Tags were: wontfix
Tags removed: wontfix
Jonas, I'm curious - why are you removing the wontfix tag? That's
normally reserved for use by package maintainers, not submitters...
sorry if this was to hard, but the bug has been tagged wontfix at a time
where
Package: shadow
Severity: normal
Tags: patch
hello,
please include chgpasswd into the shadow package. chpasswd is already
present to change user passwords in batch mode, but an equivalent for
group passwords is missing.
wesley terpstra created a chgpasswd from the chpasswd sources. it is
On 27/02/2006 Andy Dustman wrote:
Fix will appear in 1.2.1, expected 2006-03-08
great, i'm looking forward to package it ;-)
...
jonas
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
On 20/02/2006 Bastian Kleineidam wrote:
the command cryptsetup luksOpen /dev/hdc does not work here. The
/dev/mapper/_image device is not created, but the exit code is still
zero. The /dev/hdc is my DVD-ROM device with a burned LUKS image.
The strace output reveals that this call fails:
Package: console-setup
Version: 1.5
Severity: important
hello,
the last debconf question of console-setup asks to give a space
delimited list of virtual consoles you use.
Unfortunately, this space delimited list is not supported.
if i give more than one argument, for example /dev/tty1
On 02/02/2006 [EMAIL PROTECTED] wrote:
Package: cryptsetup
Version: 2:1.0.1-16
Hi,
I wanted to setup an encrypted swap device as described in
/usr/share/doc/cryptsetup/CryptoSwap.HowTo .
Unfortunately I made a small mistake and wrote the options argument
like
swap precheck=swap
On 04/02/2006 Sam Morris wrote:
When I use cryptsetup to create an encrypted swapfile, the system
freezes sortly after I start doing anything memory-intensive, such as
running 'darcs pull' to pull changes from one darcs archive to another.
can you still reproduce this bug with cryptsetup
Package: postgresql-common
Version: 42
Severity: normal
hello,
the user 'postgres', created by the postinst script, has a
wrong/nonexistant home directory '/var/lib/postgresql'. this should be
changed to '/var/lib/postgres' which exists.
...
jonas
-- System Information:
Debian Release:
Package: rhythmbox
Version: 0.9.3.1-1
Severity: important
hello,
for some reason the cut option has been disabled since 0.9.3, and now
there is no possibility left to remove songs from a playlist. the only
option is to 'move into Trash', what seems to apply not only for the
playlist, but also
there simply is no prechecks/swap script available. the cryptsetup
sources provide a rough idea of one, but it's far from good.
though, a postchecks/swap script exists.
if you've an idea about how to precheck swap devices, or want to improve
the skeleton from the cryptsetup sources, please feel
On 02/02/2006 [EMAIL PROTECTED] wrote:
Quoting Jonas Meurer [EMAIL PROTECTED]:
there simply is no prechecks/swap script available. the cryptsetup
sources provide a rough idea of one, but it's far from good.
though, a postchecks/swap script exists.
That broughts to the question, what's
On 30/01/2006 General Stone wrote:
In the attachment is a patch and a tool.
i believe that the patch is rather ugly. it depends on openssl, and
therefore on a mounted /usr filesystem. what to do when /usr is an
encrypted filesystem?
The patch include support to use encrypted ssl-key/s at the
On 02/02/2006 To [EMAIL PROTECTED] wrote:
Imho it should check if there is _any_ valied filesystem on the
swappartition and refuses to format it if there is any (because swap
is really dangerous in this situation).
no, that is what a postcheck should do. start cryptsetup, check for a
tags 350615 +wontfix
thanks
- Forwarded message from [EMAIL PROTECTED] -
Date: Thu, 02 Feb 2006 19:26:41 +0100
From: [EMAIL PROTECTED]
Subject: Re: [Pkg-cryptsetup-devel] Bug#350615: Add support for encrypted
ssl-keys
To: Jonas Meurer [EMAIL PROTECTED]
Quoting Jonas Meurer
On 02/02/2006 [EMAIL PROTECTED] wrote:
i believe that the patch is rather ugly. it depends on openssl, and
therefore on a mounted /usr filesystem. what to do when /usr is an
encrypted filesystem?
Yes, not really integrateable for generic usage.
i've tagged this patch as wontfix.
Imho
On 02/02/2006 [EMAIL PROTECTED] wrote:
Yes, but what should the script look like?
Imho there are 3 different branches (swap, plain cryptsetup, luks)
For swap:
precheck:
- should check if there is an known filesystem on the partition
(execution of all checks)
postcheck:
- hmm
On 28/01/2006 James Clark wrote:
Closed bug #290017 indicates that mkinitrd does support crypto now,
found from here: /usr/share/doc/cryptsetup/changelog.Debian.gz
Does this mean there's an error in the documentation?
yes, you're correct. i don't know mkinitrd, but i can imagine, that it
On 23/01/2006 James Clark wrote:
Jonas Meurer wrote:
your screenshot includes the following error:
modprobe: FATAL: Could not open \
'/lib/modules/2.6.12-1-k7/kernel/crypto/sha256.ko': \
No such file or directory
this means, that the kernel module sha256 is not available
hello,
i just wanted to ask for the status of the bug. the requested feature
is still a useful one, and i cannot find any objections against wesleys
patch in this bugreport.
or did the discussion take place somewhere else? at least the related
and merged bugs don't give more information.
...
Hello Tuomo,
You mean, that the device should be checked with 'fdisk -l', and only if
the partition is type 'swap', cryptsetup and mkswap should be run over
it?
i believe that this is not a good idea. cryptsetup generally doesn't
check what it overrides, or do you think that it should check for
hello,
i've fixed the type in the shebang, and replaced /usr/local/bin/delay
with /bin/sleep. but i'm not sure about how to replace xor. i even don't
know what it does in the mkinitrd script.
wesley can you help us?
...
jonas
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of
- Forwarded message from Tuomo Valkonen [EMAIL PROTECTED] -
Date: Sun, 22 Jan 2006 19:16:30 +0200
From: Tuomo Valkonen [EMAIL PROTECTED]
Subject: Re: cryptsetup: should check swap partition type
To: Jonas Meurer [EMAIL PROTECTED]
On 2006-01-22 17:05 +0100, Jonas Meurer wrote:
You mean
severity 342079 wishlist
thanks
--- end bts robot comands ---
On 22/01/2006 Tuomo Valkonen wrote:
Well, I'd like some way of ensuring that important data is not accidentally
overwritten by swap setup on boot. Normal swap areas have a signature
indicating that they're swap, and so the system
hello james,
your screenshot includes the following error:
modprobe: FATAL: Could not open \
'/lib/modules/2.6.12-1-k7/kernel/crypto/sha256.ko': \
No such file or directory
this means, that the kernel module sha256 is not available for
linux-image 2.6.12-1-k7 on your machine.
On 22/01/2006 Tuomo Valkonen wrote:
On 2006-01-22 18:33 +0100, Jonas Meurer wrote:
unix systems rely on the responsibility of system admins, /bin/rm or
/bin/dd don't check what they remove/override before doing so too.
The difference is that crypsetup at boot is automated
On 13/01/2006 Mihai Maties wrote:
However these instructions are incorrect. If the ARCHIVE_TO_MBOX setting is
set
to '1' then no archiving of the mail will occur (neither internal
[pipermail] or external). In order for external archiving via lurker to
be done then the ARCHIVE_TO_MBOX setting
Package: sweep
Version: 0.8.4-2
Severity: important
Hello,
recording audio with sweep works quite well, but when i try to record a
second audio stream and sample it over the first one, i need to adjust
the ratio from previous to recorded sound gain in the record box.
this causes a segmentation
On 24/10/2005 Sébastien Desreux wrote:
I installed Lurker as a better front-end for Mailman's archives.
After installing Lurker, my website was down. I had chosen to let
the install script autoconfigure Apache2.
Problem is: mod_rewrite was not enabled on my server, but
On 21/10/2005 Ales Kozumplik wrote:
i've followed the steps and have built the python-mysqldb package myself,
used
2.3 version, but the mysql connection from web still doesn't work and this is
put into the apache log:
[Fri Oct 21 11:38:24 2005] [error] [client 127.0.0.1] (13)Permission
On 20/10/2005 Ales Kozumplik wrote:
Sure, I could give it a try.
I've never done this before - should I rather do that from debian sources or
from the sources on websites of the projects?
best is to do it from the debian sources:
add a deb-src line to /etc/apt/sources.list. for example:
hello,
I'm the maintainer of python-mysqldb, and recently Ales Kozumplik reported
bug #333117: apache2 + python + php + mysql not working.
The bugreport claims that mysql functions provided by python-mysqldb do
not work with mod_python, when apache has both mod_python and mod_php4
loaded, while
hello Tim,
Andy Dustmann, the upstream author of python-mysqldb may have found a
fix for the bug you reported. see the following link, and maybe you can
verify that this fixes the bug. Andy thinks about incorporating the fix
with python-mysqldb.
hello Ales,
Adam Conrad, member of the php maintainer group told me that symbol
versioning got added to mysql libraries recently, and that rebuilding
the packages (python-mysqldb and php) should solve this bug. could you
try to verify this, by rebuilding and testing the packages?
...
jonas
--
On 20/10/2005 Adam Conrad wrote:
Jonas Meurer wrote:
After investigating the bug and conversation with the python-mysqldb
upstream author, I'm quite sure that the problem is the php4 apache
module, or even better, it's mysql extension.
We don't use the internal mysql library, we use one
Package: fonty
Version: 1.0-23
Severity: serious
Justification: Policy 10.7.3
hello,
the latest upgrade of fonty has overwritten my local settings in
/etc/console-tools/config.d/fonty. It would be better to handle this
file as a configuration file as defined in the debian policy.
The upgrade
On 10/10/2005 Ales Kozumplik wrote:
Package: python-mysqldb
Version: 1.2.1c3-2
Description: When both php and python is enabled in apache configuration,
python scripts trying to create a cursor yields segmentation fault.
Everything is okay when run from shell (i.e. not via web/apache).
Package: knocker
Version: 0.7.1-3
Severity: important
hello,
knocker crashes on my amd64 debian/unstable machine with the following
error:
*** glibc detected *** free(): invalid pointer: 0x006c75a7 ***
Aborted
even 'knocker --help' causes this crash.
it seems like this is a bug
On 04/10/2005 Bartosz Fenski aka fEnIo wrote:
On Mon, Oct 03, 2005 at 12:29:38AM +0200, Jonas Meurer wrote:
i just uploaded a NMU to fix that bug into the DELAYED-5 queue on gluck.
the patch is attached.
I doubt it was DELAYED-5 since it's now available in archive.
Anyway thanks
-version to 3.6.2 (no changes needed)
+ * updated fsf address to make lintian happy
+ * change xlibs-dev Build-Depends to x-dev, after searching docs and source
+i believe that only some x headers are needed to build.
+
+ -- Jonas Meurer [EMAIL PROTECTED] Mon, 3 Oct 2005 17:22:37 +0200
hello,
i fixed that bug in an NMU to DELAYED-5 on gluck. if nobody objects, the
packages will reach unstable within 5-6 days.
...
jonas
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
hello,
i just uploaded a NMU to fix that bug into the DELAYED-5 queue on gluck.
the patch is attached.
...
jonas
diff -rNu fuse-2.3.0.orig/debian/fuse-utils.postrm
fuse-2.3.0/debian/fuse-utils.postrm
--- fuse-2.3.0.orig/debian/fuse-utils.postrm2005-10-03 00:13:59.0
+0200
+++
sorry, here is the complete patch (forgot to insert changelog entry last
time).
...
jonas
diff -rNu fuse-2.3.0.orig/config.log fuse-2.3.0/config.log
--- fuse-2.3.0.orig/config.log 1970-01-01 01:00:00.0 +0100
+++ fuse-2.3.0/config.log 2005-10-03 00:34:45.0 +0200
@@ -0,0
-10-03 00:42:04.0 +0200
+++ fuse-2.3.0/debian/changelog 2005-10-03 00:41:39.0 +0200
@@ -1,3 +1,11 @@
+fuse (2.3.0-4.1) unstable; urgency=low
+
+ * Non-maintainer upload.
+ * run 'dpkg-statoverride --remove ...' at remove time (closes:
+#325993)
+
+ -- Jonas Meurer [EMAIL
901 - 1000 of 1042 matches
Mail list logo