Package: snmpd
Version: 5.7.3+dfsg-5+deb10u2
When starting snmpd on a non-systemd machine the init script
/etc/init.d/snmpd
fails to source the file
/etc/default/snmpd
which results in SNMPDOPTS specified in the default file
being ignored:
% grep ^SNMPDOPTS /etc/default/snmpd
SNMPDOP
Same issue with linux-image-4.9.0-1-amd64-4.9.6-3 but
slightly different path:
Machine boots but many programs such as 'hostname` do segfault.
Workaround: Remove
from the VM xml
ii linux-base 4.5
ii linux-image-4.7.0-1-amd64 4.7.8-1<-- works fine
ii linux-image-4.8.
This is still an issue with latest kernel in stretch.
KVM/QEMU Guest VM running Debian stretch on top of Host
running Debian jessie with libvirt guest settings:
---snip---
4
---snip---
Processor on Host is:
processor : 0
vendor_id : GenuineIntel
cpu family : 6
mod
This seems to be a duplicate of #86
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=86
I like my systems to have packages from stable and stable security only.
So when I do a dist-upgrade and remove old/outdated/not needed packages
I expect to have all remaining packages to be from stable.
tzdata - although with a newer version - being stuck on oldstable,
is not expected.
It doesn
Package: tzdata
Version: 2016i-0+deb7u1
Severity: critical
Upgrading a fully updated wheezy system (incl. security repo) to
jessie (incl. security repo) results in tzdata not being updated
because the version in wheezy-security is newer than in jessie.
Package tzdata on amd64
wheezy:
Just had a chat in #xfs on freenode and it might be that a
previous xfs_growfs under an older kernel didn't zero enough.
When I recall it correctly the XFS filesystem in question was
resized in the past under then stable Debian Wheezy (might even
have been resized under Debian Squeeze).
Chat for
Package: xfsprogs
Version: 3.2.1
Severity: important
xfs_growfs did corrupt a filesystem on a up2date Debian Jessie system.
Might be a kernel problem and not xfsprogs related.
% pvresize /dev/vda2
% xfs_growfs /dev/mapper/vg0-home
meta-data=/dev/mapper/vg0-home isize=256agcount=109, agsize=
Package: backuppc
Version: 3.3.1-2
Severity: normal
Tags: patch
As of Perl 5.22.0 in some cases curly brackets needs to be escaped.
More info here:
http://perldoc.perl.org/perlre.html#Quantifiers
"If a curly bracket occurs in any other context and does not form
part of a backslashed sequ
Package: backuppc
Version: 3.3.1-2
Severity: normal
when upgrading the server that hosts backuppc from jessie to
(yet unreleased stretch), backuppc will produce HTTP 500 errors
when trying to view the perl-based backuppc dashboard from
a web browser.
The error logged in the webservers logfile is
Hi,
the bug should have been filed with the postfix package
and not os-prober - my mistake.
Please remove/close/invalid this bug. I resent the bug
report with the right package name in it so there is no
need to assign this bug report to the postfix package.
Thanks
Marcel
Package: postfix
Version: 3.0.4-5
Severity: important
when upgrading postfix from jessie to (yet unreleased stretch) postfix
warns that master.cf my contain default value '-' for the chroot
column but the default of that chroot value depends on postfix setting
'compatibility_level'.
Please see
Package: os-prober
Version: 3.0.4-5
Severity: normal
when upgrading postfix from jessie to (yet unreleased stretch) postfix
warns
that master.cf my contain default value '-' for the chroot column but
the default
of that chroot value depends on postfix setting 'compatibility_level'.
Please see
Guys,
you just reopened the SQL injection vuln again!
Have a look at
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=807599#57
where I have described this already.
cacti-0.8.7g-1+squeeze9+deb6u12 is vulnerable now again to SQL
Injection.
Test it:
http://example.com/cacti/graph.php?act
The much better solution to fix this would be keeping the
include block over the input_validate_* calls in graph.php
(which without more modifications would reopen the sql injection vuln)
and then fix this in
/usr/share/cacti/site/include/top_graph_header.php
where you just have to add the lin
Hi,
the build 0.8.7g-1+squeeze9+deb6u11 on Squeeze LTS has the bug fixed -
because now it's broken!
Request the URL
http://example.com/cacti/graph.php?action=view&local_graph_id=3171&rra_id=all
And you'll get the error:
PHP Fatal error: Call to undefined function
input_validate_inpu
Hi,
please see #788062 which just corrupted a fs mounted inside a qemu VM.
On the host (Debian Jessie) grub-mount was available!
thermoman
--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Package: os-prober
Version: 1.65
Severity: critical
update-grub on a vhost running qemu/kvm virtual machines
while grub and os-prober is installed on the host might corrupt
guest virtual machines / guest disks.
Host
% lvs
LV VGAttr LSize
root vg_foobar_
Hi,
this bug is still present in current wheezy release.
It seems Grub has problems with LVM where at least
one PV is on a partition and not on the whole disk.
% fdisk -lu /dev/cciss/c0d?
Disk /dev/cciss/c0d0: 36.4 GB, 36385505280 bytes
255 heads, 32 sectors/track, 8709 cylinders, total 7106544
Hi,
i just installed a Proliant DL380 G5 Server with a
SmartArray 400 controller
from the latest wheezy netboot and can confirm what the
bug is still present in latest wheezy kernel in combination with
hpacucli.
ii linux-image-3.2.0-4-amd64 3.2.41-2
No matter if i use the latest hp
Hi,
Jan Wagner's patch 02_cacherejectmsg.patch from
policyd-weight_0.1.15.2-2.debian.tar.gz
does modify $REJECTMSG instead of $CACHEREJECTMSG.
Original policyd-weight config
==
$REJECTMSG= "550 Mail appeared to be SPAM or forged. Ask your
Mail/DNS-Administra
> What snapshot targets does your kernel contain?
> (run 'dmsetup targets' and check for a line starting 'snapshot-merge')
% dmsetup targets
snapshot-origin v1.7.0
snapshot v1.7.0
striped v1.3.0
linear v1.1.0
errorv1.0.1
% strings /lib/modules/$(uname -r)/k
Severity: important
The PV with it's only 10 MByte is not the problem.
Problem occured on production machine with 500 gig free on VG
which rendered the LV unaccessible.
Recovering was possible with described commands in original bug report.
--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...
Package: lvm2
Version: 2.02.66-5
When i want to restore a logical volume's content from one of it's
snapshots you can use the command:
lvconvert --merge vg/lv-snap
according to manpage:
"lvconvert --merge vg00/lvol1_snap"
merges "vg00/lvol1_snap" into its origin.
Problem:
Can't expan
Thanks for figureing out the problem here :)
Important question not asked by now:
Will there be an upgrade to the current lenny kernel
with this fix applied?
Even though a workaround exists (using e1000), it would be nice to be
able to use virtio even with squeeze almost at the finish line... :)
> You aren't using vde, are you?
Nope. Host has a bridge configured in /etc/network/interfaces
(kvm0) where each guests eth0 is added to.
I do run tagged VLANs on the bridge and so do the guests.
Each guest has to setup VLANs on it's eth0.
> Were you able to reproduce this issue with 2.6.33 gues
Some results playing around with kernel and ethtool in guest.
Same config as above except kernel.
GUEST
=
Lenny Kernel with virtio
% uname -a ; ethtool -k eth0
Linux test 2.6.26-2-amd64 #1 SMP Thu Aug 19 00:37:36 UTC 2010 x86_64
GNU/Linux
Cannot get device rx csum s
HOST
% cat /etc/debian_version
squeeze/sid
% dpkg-query -W | egrep
'linux|kvm|vde|python|libc6|iproute|bridge|adduser|libaio'
adduser 3.112
bridge-utils1.4-5
iproute 20100519-3
kvm 1:0.12.5+dfsg-1
libaio1
Package: qemu-kvm
Version: Version: 0.12.5+dfsg-1
With latest kvm updates in squeeze the bug is still present.
Guest crashes as soon as you generate some traffic on the virtio
interface.
-- System Information:
Debian Release: squeeze/sid
APT prefers testing
APT policy: (500, 'testing')
Arch
Package: qemu-kvm
Version: Version: 0.12.4+dfsg-1
Severity: important
Tags: patch
When using virtio for KVM guest networking the guest will crash as soon as
their network link gets saturated with incoming packets.
/var/log/libvirt/qemu/vm-name.log on host contains:
LC_ALL=C PATH=/usr/local/sbin:
Hi,
contrary to my comment 38 in #526983 the issue seems not to be fixed
with latest kernel.
In fact, r8169 transmit timeout on host occurs the same time
as soft lockup in kvm guest occurs. from this time on the kvm
process runs at 100% on the host and programs such as top can't
be started anymor
> Marcel Meckel
> using unknown hardware
> reported as fixed in 2.6.26-21
06:00.0 Ethernet controller [0200]: Realtek Semiconductor Co., Ltd.
RTL8111/8168B PCI Express Gigabit Ethernet controller [10ec:8168] (rev 02)
as reported in comment 38.
Marcel.
--
To UNSUBSCRIBE, email
Hi Ben,
do you recommend using linux-image-2.6.26-2-amd64-2.6.26-21
for the host OS or for the guest?
I'm asking because with
host:
linux-image-2.6.26-2-amd64 version 2.6.26-21
kvm version 72+dfsg-5~lenny4
guest:
linux-image-2.6.26-2-686 version 2.6.26-19lenny2
the soft lockups still occ
linux-image-2.6.26-2-amd64-2.6.26-21 fixes this r8169 issue for me.
No more problems.
Thanks!
Marcel.
--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Ok now there is 2.6.26-21 ... just booted this kernel and will report
back with details.
Marcel.
--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Package: linux-image-2.6.26-2-amd64
Version: 2.6.26-20
Severity: important
Just installed 2.6.26-20 (there was no -21) from lenny-proposed-updates
and there is the same error:
% dmesg
[20575.258740] CE: hpet increasing min_delta_ns to 15000 nsec
[22731.176203] NETDEV WATCHDOG: eth0: transmit time
Package: linux-image-2.6.26-2-amd64
Version: 2.6.26-19lenny2
Severity: important
I can confirm this problem with latest debian lenny packages.
Error when network load is high:
Jan 12 14:16:17 wtf kernel: [1967737.278889] NETDEV WATCHDOG: eth0: transmit
timed out
Jan 12 14:16:17 wtf kernel: [196
Package: perl
Version: 5.10.0-19
Severity: important
In 5.10 and newer a regex begins to fail if a matching string
is longer than 32767 chars.
Upstream bug: http://rt.perl.org/rt3/Public/Bug/Display.html?id=65372
Script to reproduce:
---
use strict;
use warnings;
parse("x" x 32767
Subject: dovecot-common: dovecot init script sends SIGUSR1 on reload instead of
SIGHUP
Package: dovecot-common
Version: 1:1.0.15-2.3
Severity: minor
Tags: patch
-- System Information:
Debian Release: 5.0
APT prefers stable
APT policy: (500, 'stable')
Architecture: i386 (i686)
Kernel: Linux
39 matches
Mail list logo