devices
X Monitoring 6 ATA/SATA, 0 SCSI/SAS and 0 NVMe devices
On Mon, 20 May 2024 at 20:04, Richard Lewis <
richard.lewis.deb...@googlemail.com> wrote:
> On Sun, 19 May 2024 at 05:06, Stefanos Harhalakis wrote:
>
> > See attached patch for matching NVMe devices
: AppArmor: enabled
>From 33ed5dcd70f0799fa6548a52bd8e0c27734326e7 Mon Sep 17 00:00:00 2001
From: Stefanos Harhalakis
Date: Sat, 9 Mar 2024 21:12:02 +
Subject: [PATCH] smartd: Apply ignores to NVMe too
Signed-off-by: Stefanos Harhalakis
---
rulefiles/linux/ignore.d.server/smartd | 4 ++--
1 f
Package: collectd
Version: 5.12.0-15+b1
Severity: important
Tags: upstream patch
collectd currently fails to write to stackdriver because OAuth fails
because it uses a buffer size of 256 bytes. This makes write_stackdriver
unusable.
It's practically this bug:
I just tested it and the problem is that the dm_cache_smq module is missing
from initramfs. Adding it to "/etc/initramfs-tools/modules" and running
"update-initramfs -u" addresses the problem.
I guess that lvm2 should add dm_cache and dm_cache_smq to
/usr/share/initramfs-tools/hooks/lvm2, just
Package: lvm2
Version: 2.03.02-3
Severity: critical
Justification: breaks the whole system
The system with the latest kernel from testing and the latest lvm2 is
unbootable when the root filesystem is a cached lvm volume.
During boot, it says:
device-mapper: table: 253:3: cache: Error creating
Package: fwupd
Version: 1.2.6-1
Severity: important
This bug: https://github.com/hughsie/fwupd/issues/1139
prevents fwupd from working because the firmware has the unsupported
property. The bug exists in all debian versions and doesn't exist in the
latest upstream version.
The end result is that
Good point. Fixed.
On Sun, Feb 18, 2018 at 12:16 PM, Dominik George <n...@ticdesk.teckids.org>
wrote:
> On Sun, Feb 18, 2018 at 12:03:09PM +, Stefanos Harhalakis wrote:
> > Ended up with a slightly different approach that converts / to _.
> > This should work:
&
Ended up with a slightly different approach that converts / to _.
This should work:
https://github.com/sharhalakis/vbackup/commit/52971d7b5e034f8bb939e2c1b23fbdc6c88b45d7
2018-02-16 20:56 GMT+00:00 Dominik George :
> > Find attached a patch with a simple fix.
>
>
Hi,
Can this be uploaded to jessie?
It would be of great help and, in a sense, having to run containers with
full privileges is a security issue.
Thanks,
Stefanos
Hi there,
As you know, one of the two reasons screen is used is to allow for
things to stay running if you get disconnected. In this spirit, I
personally run long-term things like backups and dist-upgrades under
screen (under X) in order to prevent interrupting them if (e.g.) X
crash. On the
FWIW, I had the exact same issue and it ended up being a problem on
approx's cache
Running approx-gc fixed it.
On 28/02/16 12:17, Mattia Rizzolo wrote:
On Sun, Feb 28, 2016 at 01:58:14AM +, Stefanos Harhalakis wrote:
On 23/02/16 17:45, Mattia Rizzolo wrote:
On Sun, Feb 07, 2016 at 02:06:39PM +, Stefanos Harhalakis wrote:
* please meld the 2 changelog entries, the 1 minute, 14 seconds older
Hi Mattia,
Thanks for the review.
On 23/02/16 17:45, Mattia Rizzolo wrote:
On Sun, Feb 07, 2016 at 02:06:39PM +, Stefanos Harhalakis wrote:
Dear mentors,
I am looking for a sponsor for the 1.0.1-1 release of "vbackup".
This is normally handled by Vincent Bernat but he's curr
Package: sponsorship-requests
Severity: normal
Dear mentors,
I am looking for a sponsor for the 1.0.1-1 release of "vbackup".
This is normally handled by Vincent Bernat but he's currently away.
* Package name: vbackup
Version : 1.0.1-1
Upstream Author : me
* URL
Hi again,
I noticed that you re-added the moreinfo tag. Is there any information
other that what I sent in my previous email that you are looking for?
Thanks,
Stefanos
On Sat, Jan 16, 2016 at 6:09 PM, Geert Stappers wrote:
> Control: merge -1 811198
> Control: tag -1
it's 9p.ko, 9pnet.ko and
9ipnet_virtio.ko. 9p also needs virtio_ring and virtio but these are
already available.
On Wed, Dec 30, 2015 at 10:50 PM, Geert Stappers <stapp...@stappers.nl>
wrote:
> Control: tag -1 Moreinfo
> stop
>
> On Wed, Dec 30, 2015 at 05:13:25PM +, Stefanos Harhalakis w
Package: debian-installer
The debian 8.2. netinst image is missing the 9p FS driver.
It would be great if d-i had that and the ability to mount a virtio 9p
filesystem to fetch the preseed file from. This would make VM preseeding
much easier, as all that an installer will have to do is to expose
reopen 794573
thanks
I'm reopening this as it is now broken in testing. This combination:
ii kwin-x114:5.3.2-3
ii kwin-style-breeze 4:5.3.2-2
Doesn't work and the user cannot login to a KDE5 session.
Hi,
Please correct if I'm missing something here:
Both dname and dname2 have the exact same size:
int8_t dname[100];
#ifndef HAVE_DEV_DLPI
int8_t dname2[100];
#endif
dname is set here:
if (*(l-device) == '/')
{
memset(dname, 0, sizeof(dname));
strncpy(dname,
Hi,
Please correct if I'm missing something here:
Both dname and dname2 have the exact same size:
int8_t dname[100];
#ifndef HAVE_DEV_DLPI
int8_t dname2[100];
#endif
dname is set here:
if (*(l-device) == '/')
{
memset(dname, 0, sizeof(dname));
strncpy(dname,
Hi Fernando,
Thanks for the patch.
The new version should find its way to unstable in the near future.
Thanks,
Stefanos
On Wednesday 11 June 2014 16:09:52 Fernando Seiti Furusato wrote:
Package: src:libnet
Severity: normal
Tags: patch
User: debian-powe...@lists.debian.org
Usertags:
Package: python-crypto
Version: 2.6.1-4
Severity: normal
Tags: patch
Hi,
/usr/lib/python2.7/dist-packages/Crypto/Util/asn1.py has the following
bug twice:
this:
p = DerObject.decode(derEle, noLeftOvers)
should be:
p = DerObject.decode(self, derEle, noLeftOvers)
Right now you
Package: lvm2
Version: 2.02.95-7
Severity: important
Tags: patch
Hi,
I started using bcache and I've experienced two problems in two
different installations, both related to LVM:
Case 1: When using LVM for the root FS and the physical volume is a
bcache device the LVM fails to detect the PV.
Package: libqt4-core
Version: 4:4.8.5+dfsg-2
Severity: important
Hello,
qt 4.8.5 is affected but this bug:
https://bugreports.qt-project.org/browse/QTBUG-30076
which causes akonadi from unstable to break when using the postgresql
backend. The only workaround is to downgrade to 4.8.4, so please
So I had another look at this and something doesn't add up.
I believe that the CVE is for CNs with / in them while the code checks the
textual representation of the whole subject.
For example, when you have C=UK CN=test.v13.gr you end up having a textual
representation of /C=UK/CN=test.v13.gr
Please ignore the previous patch and consider this one.
There's a typo in the previous one.
diff -Nur puppet-2.7.18.orig/lib/puppet/ssl/certificate.rb puppet-2.7.18/lib/puppet/ssl/certificate.rb
--- puppet-2.7.18.orig/lib/puppet/ssl/certificate.rb 2012-07-09 23:08:16.0 +0100
+++
Hi,
I'm changing the severity of this bug since I believe that it is a huge issue
(with a tiny fix).
AFAIK it makes puppet unusable when one uses his own CA since it looks that
puppet server or agents will reject any certificates that include a / in the
textual representation of the subject
And in case it helps more, here's the full patch.
diff -Nur puppet-2.7.18.orig/lib/puppet/ssl/base.rb puppet-2.7.18/lib/puppet/ssl/base.rb
--- puppet-2.7.18.orig/lib/puppet/ssl/base.rb 2012-07-10 00:36:29.0 +0100
+++ puppet-2.7.18/lib/puppet/ssl/base.rb 2013-04-13 23:01:44.245916200 +0100
Gr. It's never easy...
I'll try to find a solution but I don't promise anything.
Adam D. Barratt a...@adam-barratt.org.uk wrote:
On Sat, 2013-04-13 at 23:03 +0100, Stefanos Harhalakis wrote:
And in case it helps more, here's the full patch.
The upstream bug to which this bug is marked
On Thursday 07 March 2013, Daniel Schepler wrote:
The fix is to update libtool using the current sid package (=
2.4.2-1.2). The attached debdiff does this at build time using
dh-autoreconf.
Thanks for the patch.
I'll upload a new package soon.
Cheers,
Stefanos
--
To UNSUBSCRIBE, email to
Package: puppetmaster
Version: 2.7.18-1
Severity: important
Tags: upstream
Dear Maintainer,
Since the latest upgrade I've been bitten by puppet bug #15561
http://projects.puppetlabs.com/issues/15561
The following used to work just fine:
# puppet kick
Triggering
Host failed:
FWIW, the fix is to change /usr/lib/ruby/vendor_ruby/puppet/ssl/base.rb:
- VALID_CERTNAME = /\A[ -.0-~]+\Z/
+ VALID_CERTNAME = /\A[ -.0-~\/]+\Z/
(i.e. add / to permitted characters).
--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe.
Hi,
On Sat, Mar 3, 2012 at 16:44, Cyril Brulebois k...@debian.org wrote:
Julien Cristau jcris...@debian.org (01/01/2012):
On Fri, Jun 3, 2011 at 10:55:08 +0300, V13 wrote:
Thanks for the report. I'll fix it in the next release.
any ETA for this fix?
ping again?
This is now in mentors,
Package: cgroup-bin
Version: 0.37-1
Severity: important
Hello,
The default installation seems to use (in /etc/cgconfig.con):
cpu = /sys/fs/cgroup
cpuacct = /sys/fs/cgroup/cpuacct
etc...
Is will be cleaner to use a small tmfs mount for /sys/fs/cgroup and then change
the above to:
cpu =
Michal,
FWIW, Cyril seems to refer to your version
(7.9.0+git20100903.a5fd0396-0ubuntu0sarvatt)
while you refer to the mesa version (7.9). Perhaps you should fill a bug
report against a valid debian version (e.g. 7.8.2-2), where the wish actually
applies.
He is right because you filled this
Hello Max,
(Yes, two months for a reply is a long time :-)
On Saturday 31 of July 2010, Max Vozeler wrote:
I recently got a iguanaIR USB and would like to have it
supported without the need to rebuild lirc.
Stefanos, are you still interested? Let me know if you
need review and/or
Hello,
On Wednesday 19 of May 2010, Faidon Liambotis wrote:
Ping?
Does the attached patch work?
If not I'd like to have a test case (either a sample program or step-by-step
instructions) in order to reproduce the bug. Just installing heartbeat isn't
enough since IPv6Addr gives:
# ./IPv6addr
While watching this conversation, I've some comments:
a) The kernel only prints a backtrace. It is not an OOPS or a BUG(). It is
just a backtrace because the message mtrr: your BIOS has set up an incorrect
mask, fixing it up. is printed using the WARN_ONCE() macro. Thus, I don't see
how it can
Hello,
Does the patch of message #77 fix your problem?
--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Hello,
On Thursday 21 of January 2010, Julien Cristau wrote:
fsprotect depends on aufs-modules which is not in sid (and soon not in
testing). Besides, to quote one of the kernel maintainers, User-space
packages should never depend on kernel components, because the kernel
might be provided
Thanks for the tip. I never considered fsprotect for NFS. I'll include that in
the next version.
--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Hello,
I also have this problem.
Looking at the source code, proftpd assumes that ssl renegotiation only needs
to be enabled with openssl =0.8.9l (Testing/Unstable have 0.8.9k where it is
enabled). However, upload of 0.8.9k-6 for debian disabled that:
openssl (0.9.8k-6) unstable; urgency=low
On Tuesday 22 of December 2009, Phil Vandry wrote:
On Tue, 22 Dec 2009 16:04:24 +0200, Harhalakis Stefanos wrote:
$ ls -ld /
drwxrwxrwt 7 root root 160 2009-12-18 21:40 .
This does not seem easy to exploit because of the sticky bit. No?
You're right. The problem is less serious
Hello,
This bug will be closed by the next fsprotect version which is currently in
mentors. I've contacted my sponsor so it is a matter of time to be uploaded.
--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact
Hello,
Since you asked, this is the error of a munin-node installation without
python:
dias:/# apt-get install munin-node
Reading package lists... Done
Building dependency tree
Reading state information... Done
The following extra packages will be installed:
gawk libio-multiplex-perl
Hello and sorry for the long-delay. Kmail removed the 'to-do' flag of this
mail after a crash and i forgotten it.
On Friday 14 August 2009, Moritz Muehlenhoff wrote:
On Tue, Dec 16, 2008 at 02:04:45AM +0200, Stefanos Harhalakis wrote:
On Monday 15 December 2008, Moritz Muehlenhoff wrote
Hello,
On Wednesday 16 September 2009, Giacomo Mulas wrote:
Package: fglrx-source
Version: 1:9-9-1
Severity: normal
I just rebooted my laptop with the latest 2.6.31 (vanilla) kernel, built
with make-kpkg, and found out that the fglrx module cannot be loaded
because:
[ 1759.237455]
Hello,
I'm using ATI's fglrx 9.6 driver (not debian's) with some custom patching and
it works for me even with Invalid map handle errors. This probably means
that this message is not fatal and it is not the one that causes the
segmentation fault.
FWIW: The invalid map handle seems to be
Hello,
On Wednesday 08 July 2009, Fabrice Coutadeur wrote:
Applicable packages:
dsniff 2.4b1+debian-18
libnet1 1.1.2.1-4
libc6 2.9-4ubuntu6
Recommended course of action:
libnet-headers.h specifies fields in TCP structures as u_char, u_short and
u_long, which are interpreted as 8-bit,
Hello,
On Friday 26 June 2009, Giuseppe Iuculano wrote:
reassign 534437 libnet 1.1.4-1
retitle 534437 multiple libnet_init() causes libnet 1.1.4-1 to SEGV
I believe I've found the bug. The following patch seems to fix it. I've made a
new version (1.1.4-2) of libnet so test that one when it
Hello,
On Monday 25 May 2009, martin f krafft wrote:
also sprach Stefanos Harhalakis v...@v13.gr [2009.05.23.1432 +0200]:
mount -n -o move ... done.
If it is shown before, it will be helpfull to tell me after which
line. There will be a pause of 3 seconds after the 'done.' message
On Monday 25 May 2009, martin f krafft wrote:
The only fixes that I can think of are:
a) Ask initscripts' authors to add a check for already r/w root
filesystem and leave the root filesystem r/w.
b) On-the-fly change fstab to remove extra options.
I find (b) to be the easiest approach
Package: udev
Version: 0.141-1
Severity: critical
Tags: security
Justification: root security hole
Bug #462655 also affects lenny.
I believe that it should be ported to lenny too since:
a) It is security related
b) Most aacraid-related controllers are on servers which tend to use stable
--
This will be fixed in the next upload.
Thanks!
--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
On Saturday 23 May 2009, martin f krafft wrote:
Package: fsprotect
Version: 1.0.2
Severity: minor
Maybe you could add something like the following to the
documentation:
Thanks a lot. You'll see it in the documentation (README.Debian and the pdf)
of the next upload.
--
To UNSUBSCRIBE,
On Saturday 23 May 2009, martin f krafft wrote:
When I boot with fsprotect protecting my root filesystem, I see the
following message:
Can you please try the following?:
* edit /usr/share/initramfs-tools/scripts/local-bottom/fsprotect and change
DEBUG=no to DEBUG=yes.
* Run: update-initramfs
Package: wnpp
Severity: wishlist
Owner: Stefanos Harhalakis v...@v13.gr
* Package name: iguanair
Version : 0.99
Upstream Author : IguanaWorks Inc.
* URL : http://iguanaworks.net/
* License : GPLv2 and LGPLv2
Programming Lang: C and Python
Description
Package: wnpp
Severity: wishlist
Owner: Stefanos Harhalakis v...@v13.gr
* Package name: katimon
Version : 1.0.2
Upstream Author : Stefanos Harhalakis v...@v13.gr
* URL : http://www.v13.gr/proj/katimon/
* License : GPLv2
Programming Lang: Python
Description
Hello,
On Friday 27 March 2009, David Paleino wrote:
retitle 516222 O: libnet -- library for the construction and handling of
network packets thanks
Hello,
libnet has been in RFA (Request for Adoption) for more than a month now,
and I'm hereby orphaning it.
Someone please pick it up, as
Hello,
On Friday 27 March 2009, Jan Christoph Nordholz wrote:
Hi Stefanos,
if you need help, I could lend a hand now and then. I don't have the
time to maintain the package on my own, but I have a faible for old
and/or undocumented C code and some experience in delving through
networking
On Friday 27 March 2009, David Paleino wrote:
F/up set, please respect it
(I forgot setting it in my first mail, sorry.)
Being a user of kmail I don't really know if it is possible to easily handle
it. Also, I'm not suer I completely understand what you mean. You want to
only send replies to
Package: wnpp
Severity: wishlist
Owner: Stefanos Harhalakis v...@v13.gr
* Package name: fsprotect
Version : 1.0.0
Upstream Author : Stefanos Harhalakis v...@v13.gr
* URL : http://www.v13.gr/ (not available yet)
* License : GPL
Programming Lang: Shell
Package: python-kde4-dev
Version: 4:4.2.0-1
Severity: important
Tags: patch
Using the pykdeuic4 the generated python script doesn't contain a coding
header. When someone uses unicode characters 127 at the qt-designer the
generated python code contains them as-is. This makes it an invalid python
On Friday 02 January 2009, Ana Guerrero wrote:
Anyway, without beeing a DD, as a debian user, I'd like to have this
program available as a package.
So, to conclude, just take a moment to reply with at least a simple go-on
or don't-go-on. I won't argue any more.
You are free to package
Hello Scott,
On Wednesday 31 December 2008, Scott Kitterman wrote:
Since it's too late for Lenny and Squeeze will be a KDE4 release, I think
there is no point in packaging this until it's ported for KDE4.
Krypt only depends on kdelibs. Everything else is HAL and DBUS related, so it
should be
Thanks for the answer,
On Wednesday 31 December 2008, Ana Guerrero wrote:
Hi,
On Wed, Dec 31, 2008 at 09:54:32PM +0200, Stefanos Harhalakis wrote:
Hello there,
I've prepared a debian package for krypt [1] (KDE GUI for managing
volumes encrypted with LUKS) and while looking
Package: wnpp
Severity: wishlist
Owner: Stefanos Harhalakis v...@it.teithe.gr
* Package name: krypt
Version : 0.2
Upstream Author : Jakub Schmidtke sja...@users.berlios.de
* URL : http://krypt.berlios.de/
* License : GPL
Programming Lang: C++
Description
Package: kernel-package
Version: 11.015
Severity: important
Building a kernel package with make-kpkg for kernels =2.6.27 results in
including some files in the package that are put in /lib/firmware. For example:
(2.6.28 .deb contents)
drwxr-xr-x root/root 0 2008-10-12 15:45
On Monday 15 December 2008, Moritz Muehlenhoff wrote:
Does this error still occur with more recent kernel versions?
If you're running Etch, could you try to reproduce this bug
with the 2.6.24 based kernel added in 4.0r4?
http://packages.qa.debian.org/l/linux-2.6.24.html
I'm sorry but I don't
Package: faubackup
Severity: normal
*** Please type your report below this line ***
Hello there,
I'm the author of a backup program named 'vbackup' which was just uploaded to
unstable. I see that faubackup was originally named 'vbackup' but it was
renamed and that it conflicts with 'vbackup'
It seems that dhcbd uses the interface name as part of the dbus request path.
Dbus only accepts the following characters (copy-paste from dbus source code):
#define VALID_NAME_CHARACTER(c) \
( ((c) = '0' (c) = '9') || \
((c) = 'A' (c) = 'Z') ||
Package: libc6
Version: 2.7-13
Severity: normal
Hello there,
Now that lenny is frozen shouldn't glibc depend to a newer (2.6.26) kernel
version? Currently, MIN_KERNEL_SUPPORTED is set to 2.6.9 and (as you know)
leaves out some newer features.
Apologies if this is nonsense.
-- System
Eric,
Try adding this instead:
[ -e /sbin/usplash ] /sbin/usplash -c -v
[ -e /sbin/usplash_write ] /sbin/usplash_write PULSATE
[ -e /sbin/usplash_write ] /sbin/usplash_write VERBOSE true
(notice the -c)
it worked for me in two different configurations. You can find out what
exactly usplash
Package: apache2
Version: 2.2.9-2
Severity: minor
/etc/apache2/envvars contains the lines:
export APACHE_RUN_USER=www-data
export APACHE_RUN_GROUP=www-data
export APACHE_PID_FILE=/var/run/apache2.pid
Correct me if I'm wrong but don't these belong to /etc/default/apache2 ?
Excuse me if this is
On Friday 20 June 2008, Robert Luberda wrote:
The problem that it is world readable lies in the used tool mail,
coming from the mailx package. The information exposure problem is not
limited to logcheck here, it in fact is a more general problem residing
in mailx that it doesn't tighten
Package: logcheck
Version: 1.2.54
Severity: grave
Tags: security
Justification: user security hole
Logcheck can leave a world readable dead.letter that contains parsed
logs.
Steps to reproduce:
* Create a lot of logs that will not be filtered by logcheck. (very
easy). 10MBytes should be
Do you happen to have a wacom device? If so, try unplugging it and restarting
the X server.
I had the same problem and it was solved when i unplugged the wacom volito usb
device. Alternatively you may remove the wacom-related configuration options
from xorg.conf.
--
To UNSUBSCRIBE, email
Package: udev
Version: 0.105-4
Severity: critical
Tags: security
Justification: root security hole
This is a follow-up to closed bug report #404927.
The group problem is not yet fixed. The rule:
SUBSYSTEM==block, ATTRS{removable}==1, \
DRIVERS!=aacraid, GROUP=floppy
On Saturday 26 January 2008, Marco d'Itri wrote:
tag 462655 unreproducible moreinfo
thanks
On Jan 26, Stefanos Harhalakis [EMAIL PROTECTED] wrote:
The group problem is not yet fixed. The rule:
SUBSYSTEM==block, ATTRS{removable}==1, \
DRIVERS!=aacraid, GROUP
More info using xrestop:
USER PID %CPU %MEMVSZ RSS TTY STAT START TIME COMMAND
root 6213 5.2 41.9 876260 871360 tty7RLs+ 02:52 0:56 /usr/bin/X -br
-nolisten tcp :0 vt7 -auth /var/run/xauth/A:0-rOJXrs
while xrestop gives:
xrestop - Display: :0.0
Package: wnpp
Severity: wishlist
Owner: Stefanos Harhalakis [EMAIL PROTECTED]
* Package name: vbackup
Version : 0.1.4
Upstream Author : Stefanos Harhalakis [EMAIL PROTECTED]
* URL : http://www.it.teithe.gr/~v13/vbackup/
* License : GPLv2, may be changed
On Friday 28 December 2007, Julien Cristau wrote:
On Thu, Dec 27, 2007 at 16:47:33 +0200, Stefanos Harhalakis wrote:
X server eats a *lot* of memory. Currently it has a VMsize of 3GB with
RSS 1.5GB. ps output:
USER PID %CPU %MEMVSZ RSS TTY STAT START TIME COMMAND
root
After a X server restart the memory is a lot less:
USER PID %CPU %MEMVSZ RSS TTY STAT START TIME COMMAND
root 27493 5.8 0.9 30336 20488 tty7 SLs+ 16:53
0:05 /usr/bin/X -br -nolisten tcp :0 vt7 -auth /var/run/xauth/A:0-NfXjOZ
Only 204K RSS and 303 VM
--
To
Package: xserver-xorg
Version: 1:7.3+8
Severity: important
X server eats a *lot* of memory. Currently it has a VMsize of 3GB with
RSS 1.5GB. ps output:
USER PID %CPU %MEMVSZ RSS TTY STAT START TIME COMMAND
root 6421 2.6 58.2 3083584 1210180 tty7 SLs+ 11:41 7:49
I'd suggest that osirismd/configs directory should be owned by root, group
osirismd and permissions 1770. This way, default configurations cannot be
changed by the osirismd (This is not a security issue. Just to dissallow
accidental overwrites.) but it will be able to store everything else in
I had the same (or similar) problem. It seems that the problem occurs
because of different versions of beagle and libbeagle0. When I 'synchronized'
those two versions (both testing or unstable) the problem was solved.
I believe that this is a no-bug. Perhaps the beagle package from unstable
Package: sysklogd
Version: 1.4.1-20
Followup-For: Bug #273269
Please consider changing the severity of this bugreport.
There is a remote bug that can freeze the system when using -r:
To reproduce it:
* Set as nameserver 127.0.0.1
* Start syslogd with -r
* Have a remote system log messages (1
I'm using gentleblue splashimage on many of my machines since it is a very
nice one. I've used it on some servers too. Those servers will not boot after
the last upgrade because grub will determine that /boot/grub/splash.xpm.gz
does not exist and it will wait for a keypress. Worst, the
Hi there,
I had the same problem today (again). This was not a debian or an xserver
problem (for me ?). My X server was crashing when using kde and running any
opengl app or xawtv. When starting a new X server with no wm:
X :0 (sleep 5s ; DISPLAY=:0 xterm)
and running the same app in the
Package: udev
Version: 0.103-1
Severity: critical
Tags: security
Justification: root security hole
Hi there,
Just noticed that udev sets the group of the hard disks to 'floppy'
making them r/w to this group (actually, tiger noticed it):
brw-rw 1 root floppy 8, 0 Dec 29 11:25 /dev/sda
It seems that this problem occurred between 27/12/2006 and 29/12/2006. The
only thing that changed was the kernel from 2.6.16-2-686-smp to 2.6.18-3-686.
If I remember correctly, tiger was not updated lately, so it would have
noticed this change:
Here are the last tiger reports:
-rw---
I'm also having this problem because I use loopback devices. On each
shutdown/reboot a partition stays mounted because of:
/mnt/cdtemp/debian-testing-1.iso on /mnt/deb1 type iso9660
(ro,noexec,nosuid,nodev,loop=/dev/loop/0)
I'm having this dvd image on disk and I'm using it as an apt source.
Package: ntpdate
Version: 1:4.2.2+dfsg.2-3
Severity: wishlist
/etc/default/ntpdate tries to read /etc/ntp.conf. I believe that this
should be done from the startup script insted of /etc/default/ntpdate.
The current approach requires most users to update their
/etc/default/ntpdate after some
Package: k3b
Version: 0.12.10-2
Severity: important
When trying to write a cd using a sata drive, k3b fails. A log is
included in the message.
The failed command is:
/usr/bin/cdrecord.mmap -v gracetime=2 dev=1,0,0 speed=4 -dao
driveropts=burnfree -eject -data just.an.iso
This problem has the
Package: tiger
Version: 1:3.2.1-24
Severity: normal
Tiger reports this message:
--CONFIG-- [con010c] Filesystem nfsd used by none is not recognised as a
local filesystem
The fstab entry is:
none/nfsnfsddefaults0 0
mount says:
none on /nfs type nfsd
Package: login
Version: 1:4.0.3-30.7
Severity: critical
Tags: security
Justification: root security hole
It seems that /var/log/btmp is created as a world readable file.
This is insecure (and it is reported by 'tiger') because this file
contains failed logins , including unknown usernames. It is
On Sunday 16 January 2005 22:24, Justin Pryzby wrote:
On Sun, Jan 16, 2005 at 09:51:44PM +0200, Stefanos Harhalakis wrote:
Package: login
Version: 1:4.0.3-30.7
Severity: critical
Tags: security
Justification: root security hole
It seems that /var/log/btmp is created as a world
97 matches
Mail list logo