Package: bpfcc-tools
Version: 0.26.0+ds-1
Severity: normal
Tags: security
X-Debbugs-Cc: i...@valdikss.org.ru
Dear Maintainer,
Last year there was a Debian fix for the upstream issue of bpfcc package
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1028479
The patch was created by Debian mainta
Can confirm that the gcc (4:12.3.0-1) from testing works correctly.
Thanks!
OpenPGP_signature
Description: OpenPGP digital signature
gcc has been updated with the fix for this issue
gcc (4:12.3.0-1) from testing already includes it.
OpenPGP_signature
Description: OpenPGP digital signature
Package: gcc-12
Version: 12.2.0-14
Severity: normal
X-Debbugs-Cc: i...@valdikss.org.ru
Dear Maintainer,
GCC function __builtin_cpu_supports, which is used by Debian's isa-support
package to detect various CPU features, such as SSE2 support, in the current
GCC version fails to detect SSE2 support
Still the issue as of Debian 12.
OpenPGP_signature
Description: OpenPGP digital signature
GCC has fixed __builtin_cpu_supports() function.
Please merge the following patch:
https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=454bf9f4d55058589ac6a76261356cbda599e831
OpenPGP_signature
Description: OpenPGP digital signature
Package: sse2-support
Version: 15
Severity: normal
X-Debbugs-Cc: i...@valdikss.org.ru
Dear Maintainer,
sse2-support package fails to detect SSE2 on VIA Eden Eshter CPU, which
leads to inability to install task-lxqt-desktop on WYSE C10LE machine.
The installation used to work fine on Debian 11,
Package: openssl
Version: 1.1.1n-0+deb11u3
Severity: normal
X-Debbugs-Cc: i...@valdikss.org.ru
Dear Maintainer,
VIA Padlock engine is not encrypting or decrypting properly on VIA
hardware, due to a bug.
Please apply the following upstream patch to OpenSSL:
https://github.com/openssl/openssl/c
Package: openssl
Version: 3.0.7-1
Severity: important
Tags: patch
X-Debbugs-Cc: i...@valdikss.org.ru
Dear Maintainer,
OpenSSL 3.0.7-1 shipped in current Testing has a bug which causes SIGSEGV
in different applications if OpenSSL if configured to use engines.
People on OpenSSL bug tracker reporte
Sorry, this bug report is invalid. I didn't know that this is an
intended debian-installer behavior and is present on all versions.
Package: debian-installer
Severity: normal
Tags: d-i
Dear Maintainer,
Debian 11.0.0 ISO file (debian-11.0.0-amd64-DVD-1.iso) silently
downloads package index and updated .deb files from debian-security
repository upon installation, even when no network mirror option was chosen.
I believe thi
se system
installation is also quite slow, not as slow as the main system due
to much less package count, but still takes much more time than it
should.
I've prepared an automatic patcher script which could be found here:
https://bitbucket.org/ValdikSS/debian-iso-fastinstall/
It ad
Package: calamares
Version: 3.2.36-1
Severity: wishlist
Dear Maintainer,
Upon installation of Debian 10.8.0 using live ISO with Calamares, the
step of live packages removal from target file system may take up to 30
minutes on old HDD due to excessive fsync()'s caused by dpkg.
With eatmydata p
Package: eatmydata-udeb
Version: 105-7
Severity: normal
Tags: d-i
Dear Maintainer,
/usr/lib/finish-install.d/60remove-live-packages file is executed after
disablng eatmydata-udeb on live iso file, which slows down live packages
removing process dramatically.
Consider increasing execution order
Package: eatmydata-udeb
Version: 105-7
Severity: normal
Tags: d-i
Dear Maintainer,
eatmydata-udeb is included in Debian ISO files but can't be used as
eatmydata and libeatmydata1 are missing in ISO pool on any ISO I've
tested (CD/DVD, regular/live).
Without the library eatmydata-udeb does noth
Debootstrap is used in Debian ISO installer (debian-installer, d-i) for
initial target rootfs bootstrapping. With sync enabled, this takes
hundreds of minutes to unpack and configure base system on a HDD.
With eatmydata it takes about a minute.
What could be done to introduce eatmydata into de
rspamd default configuration file contains a set of RBL servers, links
to different phishing/spamming feeds, public ASN lookup server, fuzzy
hashes server, etc.
All the data is refreshed with regular intervals.
https://github.com/rspamd/rspamd/blob/master/conf/modules.d/rbl.conf
https://github
When this will be pushed to testing?
signature.asc
Description: OpenPGP digital signature
Yes, I can confirm, it works fine with this (commit 5eddf30) change.
Thank you for quick fix!
signature.asc
Description: OpenPGP digital signature
Package: sysv-rc
Version: 2.88dsf-57
The latest version has a very silly typo which breaks invoke-rc.d if
upstart is used.
Line 275: inictl should be initctl
signature.asc
Description: OpenPGP digital signature
Please change sites-available/default to fastcgi.conf
signature.asc
Description: OpenPGP digital signature
http://www.linux-support.com/cms-xxx/ubuntu-developers-thomas-ward-nginx-changes-in-debian-causing-default-config-fastcgi-users-issues/
signature.asc
Description: OpenPGP digital signature
No, sorry, this is nginx issue, for sure! Works fine with nginx 1.6.1.
Can somebody confirm? nginx 1.6.2 and php 5.6.0 works on one of my
server, but not on another 15 ones.
signature.asc
Description: OpenPGP digital signature
Can confirm, it's totally broken. No errors in error logs or whatsoever.
signature.asc
Description: OpenPGP digital signature
Package: strongswan
Version: 5.2.0-2
Severity: wishlist
Dear maintainer,
swanctl is a new, portable command line utility to configure, control
and monitor the IKE daemon charon using the vici interface. It has been
introduced with strongSwan 5.2.0.
swanctl works independently from starter, ipsec
If anyone is still interested, here is a fork of OpenVPN's easy-rsa v3
with ipsec support
https://github.com/ValdikSS/easy-rsa-ipsec
signature.asc
Description: OpenPGP digital signature
http://cgit.freedesktop.org/NetworkManager/NetworkManager/commit/?id=06703c1670d0f96834b268920b09792e22fdb4c4
signature.asc
Description: OpenPGP digital signature
I can confirm this bug. This probably happened after networkmanager
update. It seems like networkmanager intercepts route too late.
Here are two workarounds:
1) add "route-delay 1" to your openvpn configuration file.
2) use route-nopull and redirect-gateway (without def1).
signature.asc
Descrip
Sadly, it's not so easy as it seems to be
If you compile strongSwan with --enable-kernel-ipsec, kernel-ipsec would
be enabled by default, which is not what most of the package users expect.
Ubuntu maintainers are thinking of 2 ways of dealing with this issue:
1) Compile kernel-libipsec libraries a
Package: cadaver
Version: 0.23.3-2
Severity: normal
Dear Maintainer,
When accessing an https DAV volume, I get the following message even
if the server cert got signed by a "trusted" CA (ie: provided by the
ca-certificates package).
WARNING: Untrusted server certificate presented for `my.server.
30 matches
Mail list logo