Bug#724454: fio reports data errors with 512B blocks on wheezy+xen

2013-09-23 Thread Ken Raeburn
Package: linux-image-3.9-0.bpo.1-amd64 Version: 3.9.6-1~bpo70+1 Other possibly relevant packages: Xen, lvm (2.02.95-7), fio (2.0.8-2), libaio1:amd64 (0.3.109-3). I've been seeing fio (flexible I/O tester) fail to read back the expected data from a storage device when using 512B blocks under a

Bug#563987: /lib/libnss_hesiod.so.2: hesiod users not fully supported

2013-09-23 Thread Ken Raeburn
(Sorry to revisit such an old bug, but we keep running into it now and then...) If this is deemed to be a PAM bug, can this bug report just be re-tagged as a PAM bug and reassigned to the appropriate party? The high-level problem -- cron doesn't work for Kerberos/Hesiod users unless you

Bug#603860: unifdef: /* in string is taken as comment start

2010-11-18 Thread Ken Raeburn
Bob Proulx wrote: The version in Squeeze does not suffer from this problem. As Tony noted it has already been fixed upstream. It has already propagated into Debian Unstable Sid and is only waiting for the release of Squeeze as Stable. That's good to know; thank you. I'll pass that on

Bug#603860: unifdef: /* in string is taken as comment start

2010-11-17 Thread Ken Raeburn
Package: unifdef Version: 1.0+20030701-1 Severity: important Running unifdef -UBARF over the file: char foo[] = rm -rf /*; causes a warning that the file ends within a comment. That's not so bad. However, since the text following up to the next */ will be considered to be in a comment,

Bug#585930: libcrypto++8: sha256 error in large-memory cases

2010-06-14 Thread Ken Raeburn
Package: libcrypto++8 Version: 5.6.0-2 Severity: important The version of libcrypto++ 5.6.0 shipped by Debian includes a bug in the 32-bit x86 assembly code for sha256. Address checks (current pointer vs end-of-message pointer as we process the input block by block) are done with

Bug#571276: pidgin: crashes randomly(?) while signed on

2010-02-24 Thread Ken Raeburn
Package: pidgin Version: 2.4.3-4lenny5 Severity: normal I recently started trying to use pidgin in a new environment, using one Jabber account with password authentication. However, it seems to crash on me almost daily, and usually while I've got the window iconified or buried, or I've wandered

Bug#565223: possible vulnerability in sudo glob processing

2010-01-13 Thread Ken Raeburn
Package: sudo Version: 1.6.9p17-2 Severity: grave Tags: security patch Justification: user security hole I'm investigating #556562 (wildcard * sudoers rules are broken), filed by a co-worker. I discovered it's your basic use-after free problem, fixed by the following patch: --- parse.c

Bug#563987: /lib/libnss_hesiod.so.2: hesiod users not fully supported

2010-01-07 Thread Ken Raeburn
Aurelien Jarno wrote: hesiod is not supposed to be used to provide password. Even if used that way, I don't really see the point of providing a shadow database though hesiod, as the data will anyway be public, as published in the DNS. Certainly not password authentication data, but it can

Bug#563987: /lib/libnss_hesiod.so.2: hesiod users not fully supported

2010-01-07 Thread Ken Raeburn
Aurelien Jarno wrote: Wouldn't it be possible to also use Kerberos for shadow information, as it is actually where the encrypted passwords are stored? Kerberos doesn't necessarily have the information in its database, and the protocol provides no way to pass the information around.

Bug#563987: /lib/libnss_hesiod.so.2: hesiod users not fully supported

2010-01-06 Thread Ken Raeburn
Package: libc6 Version: 2.7-18 Severity: normal File: /lib/libnss_hesiod.so.2 We've found that since updating to lenny, cron jobs for normal, non-local users (who are listed in hesiod) aren't being run. Adding entries to /etc/shadow works around it. The following message gets logged, and the

Bug#477309: [krbdev.mit.edu #5955] krb5kdc and kadmind could drop privileges after binding

2008-04-29 Thread Ken Raeburn
agree with Russ's assessment in his message in the Debian tracking system, that it's probably going to be low-priority for us, but a good patch would be welcome.) -- Ken Raeburn, Senior Programmer MIT Kerberos Consortium -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject

Bug#428732: [krbdev.mit.edu #5593] kadmin crashes during password changes

2007-07-09 Thread Ken Raeburn
On Jul 9, 2007, at 12:01, Russ Allbery wrote: Ken, I assume from the previous bug discussion that this was already fixed in 1.6? It looks like that file now includes k5-int.h and k5-int.h now includes time.h. Yes, that's correct, this shouldn't be a problem in the 1.6 branch. Ken -- To

Bug#428732: [krbdev.mit.edu #5593] kadmin crashes during password changes

2007-07-06 Thread Ken Raeburn
I just tried on our x86_64 etch system (1.4.4-7etch1 kadmind installed), and with a few simple tests, couldn't reproduce the problem. I set up a realm FOOBAR.X with a user principal ken with admin privileges, ran kadmin -p ken -q 'cpw ken' and then kpasswd a few times, sometimes re-using