Bug#530400: CVE-2009-137{7,8,9}

2009-05-24 Thread Giuseppe Iuculano
Package: openssl Severity: serious Tags: security patch -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, the following CVE (Common Vulnerabilities & Exposures) ids were published for openssl. CVE-2009-1377[0]: | The dtls1_buffer_record function in ssl/d1_pkt.c in OpenSSL 0.9.8k and | earlier 0

Bug#530271: CVE-2009-1732, CVE-2009-1733

2009-05-23 Thread Giuseppe Iuculano
Package: ipplan Severity: serious Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, the following CVE (Common Vulnerabilities & Exposures) ids were published for ipplan. CVE-2009-1732[0]: | Cross-site scripting (XSS) vulnerability in admin/usermanager in IPlan | 4.91a allows remo

Bug#530255: CVE-2009-1759: Stack-based buffer overflow in the btFiles::BuildFromMI function

2009-05-23 Thread Giuseppe Iuculano
Package: ctorrent Severity: serious Tags: security patch -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, the following CVE (Common Vulnerabilities & Exposures) id was published for ctorrent. CVE-2009-1759[0]: | Stack-based buffer overflow in the btFiles::BuildFromMI function | (trunk/btfiles.c

Bug#528938: CVE-2009-1629: generates session IDs with predictable random numbers

2009-05-16 Thread Giuseppe Iuculano
Package: ajaxterm Version: 0.10-4 Severity: serious Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, the following CVE (Common Vulnerabilities & Exposures) id was published for ajaxterm. CVE-2009-1629[0]: | ajaxterm.js in AjaxTerm 0.10 and earlier generates session IDs with | pre

Bug#528807: FTBFS: applying patch 41_lesstif_cpp to ./ ... failed.

2009-05-15 Thread Giuseppe Iuculano
Package: xpdf-reader Version: 3.02-1.4 Severity: serious Justification: no longer builds from source -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, xpdf failed to build on i386: dpkg-source: info: building xpdf in xpdf_3.02-1.4.dsc debian/rules build dpatch apply-all applying patch 01_manp

Bug#527597: Atmail doesn't flush some user session from the database

2009-05-09 Thread Giuseppe Iuculano
Hi Arthur, Arthur Furlan ha scritto: > I fixed these issues adding a new method in the Auth class (see > Auth.php.patch) that destroys the any session for an user, both in php > *and* database. To fix the issue [1] I added a call of this new method Thank you for your bug report, I've committe

Bug#527597: [ca83c1e] Fix for Bug#527597 committed to git

2009-05-09 Thread Giuseppe Iuculano
tags 527597 +pending thanks Hello, The following change has been committed for this bug by Giuseppe Iuculano on Sat, 9 May 2009 16:14:37 +0200. The fix will be in the next upload. = debian/patches

Bug#527894: CVE-2008-6800: Race condition in the winbind daemon (aka winbindd) in Samba before 3.0.32

2009-05-09 Thread Giuseppe Iuculano
Package: samba Version: 3.0.24-6etch10 Severity: serious Tags: security etch -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, the following CVE (Common Vulnerabilities & Exposures) id was published for samba. CVE-2008-6800[0]: | Race condition in the winbind daemon (aka winbindd) in Samba befor

Bug#527571: CVE-2009-1524: Cross-site scripting (XSS) vulnerability in Mort Bay Jetty

2009-05-08 Thread Giuseppe Iuculano
Package: jetty Severity: serious Tags: security Hi, the following CVE (Common Vulnerabilities & Exposures) id was published for jetty. CVE-2009-1524[0]: | Cross-site scripting (XSS) vulnerability in Mort Bay Jetty before | 6.1.17 allows remote attackers to inject arbitrary web script or HTML | vi

Bug#526084: libmodplug: proposed debdiff to fix CVE-2009-1438 and "PATinst()" Buffer Overflow Vulnerability

2009-05-06 Thread Giuseppe Iuculano
Giuseppe Iuculano ha scritto: > Proposed debdiffs in attachment. Updated oldstable debdiff (do not backport changes in src/libmodplug/stdafx.h, instead include stdint.h) Cheers, Giuseppe. diff -u libmodplug-0.7/debian/changelog libmodplug-0.7/debian/changelog --- libmodplug-0.7/debian/change

Bug#526657: libmodplug: proposed debdiff to fix CVE-2009-1438 and "PATinst()" Buffer Overflow Vulnerability

2009-05-06 Thread Giuseppe Iuculano
Zed Pobre ha scritto: > On Wed, May 06, 2009 at 10:50:00AM +0200, Giuseppe Iuculano wrote: >> Hi, >> >> I've prepared a NMU to fix CVE-2009-1438 and SA34927 in stable and oldstable. > > My plan was to fix this by packaging the new upstream version this > weekend

Bug#526657: libmodplug: proposed debdiff to fix CVE-2009-1438 and "PATinst()" Buffer Overflow Vulnerability

2009-05-06 Thread Giuseppe Iuculano
hangelog +++ libmodplug-0.7/debian/changelog @@ -1,3 +1,11 @@ +libmodplug (1:0.7-5.3) oldstable-security; urgency=high + + * Non-maintainer upload. + * Fixed "CSoundFile::ReadMed()" Integer Overflow in src/load_med.cp +(Closes: #526657) (CVE-2009-1438) + + -- Giuseppe Iuculano

Bug#526434: libwmf: proposed debdiff to fix CVE-2009-1364

2009-05-06 Thread Giuseppe Iuculano
-1,3 +1,11 @@ +libwmf (0.2.8.4-2+etch1) oldstable-security; urgency=high + + * Non-maintainer upload. + * Fixed Use-after-free vulnerability in the embedded GD library +(Closes: #526434) (CVE-2009-1364) + + -- Giuseppe Iuculano Wed, 06 May 2009 09:33:49 +0200 + libwmf (0.2.8.4-2) unstable; ur

Bug#526657: CVE-2009-1438: libmodplug "CSoundFile::ReadMed()" Integer Overflow Vulnerability

2009-05-02 Thread Giuseppe Iuculano
Package: libmodplug Version: 1:0.8.4-5 Severity: grave Tags: security patch Hi, the following CVE (Common Vulnerabilities & Exposures) id was published for libmodplug: CVE-2009-1438[1] Integer overflow in the CSoundFile::ReadMed function (src/load_med.cpp) in libmodplug before 0.8.6, as used in

Bug#524809: xpdf: Proposed NMU to fix CVE-2009-0146,0147,0165,0166,0799,0800,1179-1183

2009-05-02 Thread Giuseppe Iuculano
fted PDF file. +- CVE-2009-1183: The JBIG2 MMR decoder in Xpdf 3.02pl2 and earlier, CUPS + 1.3.9 and earlier, Poppler before 0.10.6, and other products allows remote + attackers to cause a denial of service (infinite loop and hang) via a + crafted PDF file. + + -- Giuseppe Iuculano

Bug#525483: libclamav5: clamd segfault libclamav.so.5.0.4

2009-05-02 Thread Giuseppe Iuculano
Hi, Scott Kitterman wrote: > There is a clamav bug that was fixed in 0.95 or 0.95.1 in which unofficial > signatures caused a crash, so I believe your diagnosis is likely correct. I can confirm this. I was experiencing the same crash with 0.94.dfsg.2-1lenny2 and clamav-unofficial-sigs. Upgrading

Bug#526434: CVE-2009-1364 libwmf: embedded gd use-after-free error

2009-05-01 Thread Giuseppe Iuculano
Package: libwmf Version: 0.2.8.4-6 Severity: serious Tags: security patch Hi, redhat recently patched libwmf. CVE-2009-1364 is still reserved, but is disclosed in RHSA-2009:0457-1[0] A pointer use-after-free flaw was found in the GD graphics library embedded in libwmf. An attacker could create

Bug#526084: [SA34927] libmodplug "PATinst()" Buffer Overflow Vulnerability

2009-04-29 Thread Giuseppe Iuculano
Package: libmodplug Version: 1:0.8.4-5 Severity: serious Tags: security patch Hi, The following SA (Secunia Advisory) id was published for libmodplug: SA34927[1] > DESCRIPTION: > A vulnerability has been reported in libmodplug, which can be > exploited by malicious people to cause a DoS

Bug#524803: ghostscript: proposed NMU to fix CVE-2009-0792 CVE-2009-0196 CVE-2007-6725 CVE-2008-6679

2009-04-22 Thread Giuseppe Iuculano
Giuseppe Iuculano ha scritto: > Hi, > > I've prepared a NMU to fix CVE-2009-0792 CVE-2009-0196 CVE-2007-6725 > CVE-2008-6679 in lenny. > > Proposed debdiff in attachment. Forgot to add 36_CVE-2008-6679.dpatch, resend correct debdiff. Cheers, Giuseppe. diffstat for

Bug#524803: ghostscript: proposed NMU to fix CVE-2009-0792 CVE-2009-0196 CVE-2007-6725 CVE-2008-6679

2009-04-22 Thread Giuseppe Iuculano
eFont writer module in + Ghostscript 8.62, and possibly other versions, allows remote attackers to + cause a denial of service (ps2pdf crash) and possibly execute arbitrary + code via a crafted Postscript file. + (Closes: #524803, #524915) + + -- Giuseppe Iuculano Wed, 22 Apr

Bug#523426: Only available in amd64

2009-04-10 Thread Giuseppe Iuculano
Samuel Thibault ha scritto: > It's written there and I didn't know that indeed: "Non-Free (not > autobuilt)". I'll manage to get other archs built, thanks for the > notice. > > Samuel Hi, you should read this: http://lists.debian.org/debian-devel-announce/2006/11/msg00012.html Cheers, Giuseppe

Bug#523426: Only available in amd64

2009-04-10 Thread Giuseppe Iuculano
Package: mbrola Severity: serious -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, it seems that mbrola is available only in amd64, why? https://buildd.debian.org/~luk/status/package.php?p=mbrola Cheers, Giuseppe - -- System Information: Debian Release: squeeze/sid APT prefers testing-prop

Bug#520994: cowdancer: .ilist size unexpected

2009-03-24 Thread Giuseppe Iuculano
gregor herrmann ha scritto: >> Did you try what this error message says? > > I have the same problem. > > "--update --no-cowdancer-update" works for the update. > But after that I can neither build packages nor login into the > chroot, the errors stays the same: The same for me. Giuseppe. si

Bug#520994: cowdancer: .ilist size unexpected

2009-03-24 Thread Giuseppe Iuculano
set LDFLAGS to default value: dpkg-buildpackage: set FFLAGS to default value: -g -O2 dpkg-buildpackage: set CXXFLAGS to default value: -g -O2 dpkg-buildpackage: source package apf-firewall dpkg-buildpackage: source version 9.7+rev1-1 dpkg-buildpackage: source changed by Giuseppe Iuculano fakeroot

Bug#519801: CVE-2009-0365, CVE-2009-0578

2009-03-15 Thread Giuseppe Iuculano
Package: network-manager-applet Version: 0.6.6-4 Severity: serious Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, the following CVE (Common Vulnerabilities & Exposures) id was published for network-manager-applet: CVE-2009-0365[1]: The dbus request handler in (1) network-manage

Bug#516256: libpng: proposed NMU to fix CVE-2008-5907 and CVE-2009-0040 in lenny

2009-03-14 Thread Giuseppe Iuculano
ead.c, +pngrtans.c, pngset.c and example.c (CVE-2009-0040) (Closes: #516256) + + -- Giuseppe Iuculano Sat, 14 Mar 2009 21:31:31 +0100 + libpng (1.2.27-2) unstable; urgency=medium * Fix CVE-2008-3964: off-by-one error in pngtest.c; closes: #501109 diff -u libpng-1.2.27/debian/patches/series libpng-1

Bug#518481: Missing epoch after devmapper merge

2009-03-06 Thread Giuseppe Iuculano
Bastian Blank ha scritto: > On Fri, Mar 06, 2009 at 02:58:44PM +0100, Giuseppe Iuculano wrote: >> you merged devmapper source, but it had an epoch: > > Please explain. Which version have a bad epoch. When comparing two version numbers, first the epoch of each are compared, s

Bug#518481: Missing epoch after devmapper merge

2009-03-06 Thread Giuseppe Iuculano
Package: lvm2 Version: 2.02.44-2 Severity: serious -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, you merged devmapper source, but it had an epoch: # dpkg --compare-versions 2.02.44-2 gt 2:1.02.30-2; echo $? 1 # rmadison -s unstable dmsetup dmsetup | 2:1.02.27-4 | unstable | arm

Bug#518193: [SA34091] ZABBIX PHP Frontend Multiple Vulnerabilities

2009-03-04 Thread Giuseppe Iuculano
Package: zabbix-frontend-php Severity: serious Tags: security patch -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, The following SA (Secunia Advisory) id was published for zabbix-frontend-php: SA34091[1]: > DESCRIPTION: > Some vulnerabilities have been reported in the ZABBIX PHP frontend, >

Bug#516829: Http double slash request arbitrary file access vulnerability

2009-02-23 Thread Giuseppe Iuculano
Package: mldonkey-server Version: 2.9.5-2 Severity: grave Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, MLdonkey (up to 2.9.7) has a vulnerability that allows remote user to access any file with rights of running Mldonkey daemon by supplying a special-crafted

Bug#516256: [SA33970] libpng Uninitialised Pointer Arrays Vulnerability

2009-02-19 Thread Giuseppe Iuculano
Package: libpng Version: 1.2.33-2 Severity: serious Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, The following SA (Secunia Advisory) id was published for libpng: SA33970[1] > DESCRIPTION: > A vulnerability has been reported in libpng, which can be exploited > by malicious p

Bug#512771: dmraid must not call udevadm trigger --action=add

2009-01-23 Thread Giuseppe Iuculano
Package: dmraid Version: 1.0.0.rc14-6 Severity: grave -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 (Originally reported against dkms on ubuntu, LP #320200) dmraid must not call udevadm trigger --action=add in postinst. This will have utterly dire consequences for the installed machine. Major bu

Bug#512728: [SA33635] Tor Unspecified Memory Corruption Vulnerability

2009-01-22 Thread Giuseppe Iuculano
Package: tor Severity: serious Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, The following SA (Secunia Advisory) id was published for Tor: SA33635[1] > DESCRIPTION: > A vulnerability with an unknown impact has been reported in Tor. > > The vulnerability is caused due to an

Bug#512608: [SA33617] Typo3 Multiple Vulnerabilities

2009-01-21 Thread Giuseppe Iuculano
Package: typo3-src Severity: grave Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, The following SA (Secunia Advisory) id was published for Typo3: SA33617[1] > DESCRIPTION: > Some vulnerabilities have been reported in Typo3, which can be > exploited by malicious people to bypa

Bug#508870: mediawiki: NMU to fix CVE-2008-5249, CVE-2008-5250, CVE-2008-5252

2009-01-18 Thread Giuseppe Iuculano
extension, not from the data. This reduces the XSS attack surface. - Blacklist redirects via Special:Filepath. Such redirects exacerbate any XSS vulnerabilities involving uploads of files containing scripts. Closes: #508869, #508870 -- Giuseppe Iuculano Sun, 18 Jan 2009 11:54:02 +0100

Bug#508026: TPU upload

2009-01-07 Thread Giuseppe Iuculano
Hi, Neil McGovern ha scritto: > Can this patch be backported against the version in testing, and a TPU > upload done? phppgadmin/4.2.2-1 was unblocked by luk. Cheers, Giuseppe. signature.asc Description: OpenPGP digital signature

Bug#508026: register_globals on is not supported

2008-12-23 Thread Giuseppe Iuculano
Hi, Giuseppe Iuculano ha scritto: > Hi, > > Nico Golde ha scritto: >> I take care of sponsoring the upload for unstable. For >> stable security the version looks wrong to me, please use >> 4.0.1-3.1etch1. > > Right, attached the new debdiff. > > Giusep

Bug#508026: register_globals on is not supported

2008-12-23 Thread Giuseppe Iuculano
s (Closes: #508026) + + -- Giuseppe Iuculano Tue, 23 Dec 2008 11:20:56 +0100 + phppgadmin (4.0.1-3.1) unstable; urgency=low * Non-maintainer upload to fix pending l10n issues. only in patch2: unchanged: --- phppgadmin-4.0.1.orig/libraries/lib.inc.php +++ phppgadmin-4.0.1/libraries/lib.inc.php

Bug#508026: register_globals on is not supported

2008-12-23 Thread Giuseppe Iuculano
admin-4.0.1/debian/changelog @@ -1,3 +1,11 @@ +phppgadmin (4.0.1-3.2) stable-security; urgency=high + + * Non-maintainer upload. + * Fix local file inclusion vulnerability: (CVE-2008-5587) +Unset language variable before determine file includes (Closes: #508026) + + -- Giuseppe Iuculano Tue, 23 Dec 20

Bug#508803: SA33136: MPlayer TwinVQ Processing Buffer Overflow Vulnerability

2008-12-15 Thread Giuseppe Iuculano
Subject: SA33136: MPlayer TwinVQ Processing Buffer Overflow Vulnerability Package: mplayer Version: 1.0~rc1-12etch5 Severity: grave Tags: security patch Hi, The following SA (Secunia Advisory) id was published for mplayer: SA33136[1] > Description: > Tobias Klein has reported a vulnerability in

Bug#508026: register_globals on is not supported

2008-12-14 Thread Giuseppe Iuculano
Hi Thijs, Thijs Kinkhorst ha scritto: > As it seems, upstream does already support running in register_globals=0 mode > for a long time (according to their changelog since 2002...). Therefore I Where did you read that? In TODO file I read "* register_globals off support". Cheers, Giuseppe.

Bug#508026: phppgadmin: diff for NMU version 4.2-1.1 (tpu)

2008-12-12 Thread Giuseppe Iuculano
+1,10 @@ +phppgadmin (4.2-1.1) testing-proposed-updates; urgency=low + + * Non-maintainer upload. + * Fix Local File Inclusion Vulnerability (Closes: #508026) + + -- Giuseppe Iuculano Fri, 12 Dec 2008 18:50:16 +0100 + phppgadmin (4.2-1) unstable; urgency=low * New upstream release diff -u phppg

Bug#508026: phppgadmin: diff for NMU version 4.2.1-1.1

2008-12-12 Thread Giuseppe Iuculano
admin (4.2.1-1.1) unstable; urgency=high + + * Non-maintainer upload. + * Fix Local File Inclusion Vulnerability (Closes: #508026) + + -- Giuseppe Iuculano Fri, 12 Dec 2008 17:55:03 +0100 + phppgadmin (4.2.1-1) unstable; urgency=low * New upstream release diff -u phppgadmin-4.2.1/d

Bug#506530: Remote command execution and the possibility of attack with the help of symlinks

2008-11-22 Thread Giuseppe Iuculano
Package: verlihub Severity: grave Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, An exploit[0] has been published for verlihub: > Verlihub does not sanitize user input passed to the shell via its > "trigger" > mechanism. Furthermore, the Verlihub daemon can optionally be

Bug#505565: Mozilla SeaMonkey Multiple Vulnerabilities

2008-11-13 Thread Giuseppe Iuculano
Package: iceape Severity: critical Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, The following SA (Secunia Advisory) id was published for SeaMonkey: SA32714[1] Description: Some vulnerabilities have been reported in Mozilla SeaMonkey, which can be exploited by malicious peop

Bug#505563: Mozilla Thunderbird Multiple Vulnerabilities

2008-11-13 Thread Giuseppe Iuculano
Package: icedove Severity: critical Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, The following SA (Secunia Advisory) id was published for Thunderbird: SA32715[1] Description: Some vulnerabilities have been reported in Mozilla Thunderbird, which can be exploited by malicious

Bug#505558: Mozilla Firefox 2 Multiple Vulnerabilities

2008-11-13 Thread Giuseppe Iuculano
Package: iceweasel Version: 2.0.0.17-0etch1 Severity: critical Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, The following SA (Secunia Advisory) id was published for Firefox 2: SA32693[1] Description: Some vulnerabilities have been reported in Mozilla Firefox, which can be e

Bug#505557: Mozilla Firefox 3 Multiple Vulnerabilities

2008-11-13 Thread Giuseppe Iuculano
Package: iceweasel Version: 3.0.3-3 Severity: critical Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, The following SA (Secunia Advisory) id was published for Firefox 3. SA32713[1] Description: Some vulnerabilities have been reported in Mozilla Firefox, which can be exploite

Bug#505197: [Pkg-trac-devel] Bug#505197: SA32652: Trac Multiple Vulnerabilities

2008-11-11 Thread Giuseppe Iuculano
Hi, [EMAIL PROTECTED] ha scritto: > i think this is the changeset > http://trac.edgewall.org/changeset/7658/branches/0.11-stable > i'll get into this to upload a new package. 2) An unspecified error when processing wiki markup can be exploited to cause a DoS. See also http://trac.edgew

Bug#505197: SA32652: Trac Multiple Vulnerabilities

2008-11-10 Thread Giuseppe Iuculano
Package: trac Severity: serious Tags: security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, The following SA (Secunia Advisory) id was published for trac. SA32652[1] > Description: > Some vulnerabilities have been reported in Trac, which can be > exploited by malicious people to cause a

Bug#504682: NMU patch

2008-11-08 Thread Giuseppe Iuculano
copy shipped with +dokuwiki (SA32559) (Closes: #504682) + + -- Giuseppe Iuculano <[EMAIL PROTECTED]> Sat, 08 Nov 2008 09:48:34 +0100 + dokuwiki (0.0.20080505-3) unstable; urgency=high * High-urgency upload for RC bug fixing. diff -u dokuwiki-0.0.20080505/debian/patches/series do

Bug#502219: IRQ totals are very wrong

2008-10-20 Thread Giuseppe Iuculano
Hi Dominique, Dominique Brazziel ha scritto: > I just saw this update and put it on and, while there is no segfault, > the IRQ totals are way off, 0 is reported many times when it shouldn't > be: Please open a new bug and report it. Giuseppe. signature.asc Description: OpenPGP digital signat

Bug#502219: closed by Giuseppe Iuculano <[EMAIL PROTECTED]> (Re: Bug#502219: procinfo: Segfaults with large number of interrupts.)

2008-10-15 Thread Giuseppe Iuculano
Len Sorensen ha scritto: > Well if it isn't being accepted into Lenny, then that doesn't help and > most likely Lenny will end up with no procinfo at all. > > Wouldn't it be better to make a procinfo 18-3 with the simple fix which > is much more likely to be accepted into Lenny and then get the n

Bug#502219: closed by Giuseppe Iuculano <[EMAIL PROTECTED]> (Re: Bug#502219: procinfo: Segfaults with large number of interrupts.)

2008-10-14 Thread Giuseppe Iuculano
Len Sorensen ha scritto: > I do not consider this closed. You are wrong. Please reopen until it > is fixed. I was actually considering marking it RC for Lenny. > Hi, I understand your point of view, but this bug is marked as "Fixed in version procinfo/1:2.0.208-1". This is correct and this re

Bug#500883: dmraid: boot fails after upgrading to 1.0.0.rc14-4

2008-10-02 Thread Giuseppe Iuculano
severity 500883 normal thanks Peter ha scritto: > Well, it can of course be a controller bug. I'm not that familiar with these > issues. > > I was only thinking it to be an udev bug because as I've read these fakeraid > cards are hard to support under linux because of their proprietary bios >

Bug#500883: dmraid: boot fails after upgrading to 1.0.0.rc14-4

2008-10-02 Thread Giuseppe Iuculano
Peter ha scritto: > Ok, thanks! This is then an udev issue, so I should search there (already Can you elaborate please? Why this is an udev issue and not a bug in your controller/bios ? > found some bug-reports where udev incorrectly read device metadata for raid > devices), Can you link the

Bug#500883: dmraid: boot fails after upgrading to 1.0.0.rc14-4

2008-10-02 Thread Giuseppe Iuculano
Peter ha scritto: > This 2nd partition is one of my raid1 volume, containing the root filesystem. > I see ID_FS_USAGE is not "raid" as it should. Do I have a screwed raid > setup? :) Do you know how could I change that ID_FS_USAGE? ID_FS_USAGE on sdaX isn't important. The real problem is that I

Bug#500883: dmraid: boot fails after upgrading to 1.0.0.rc14-4

2008-10-02 Thread Giuseppe Iuculano
Hi Peter, Peter ha scritto: > I now suspect the ENV{ID_FS_USAGE}=="raid" option in udev rules file. How > should udev supposed to know if a disk is "raid"? Maybe I should rename > something to this "raid"? See below my raid settings: udevadm info --query=all --name=sda udevadm info --query=all

Bug#500883: dmraid: boot fails after upgrading to 1.0.0.rc14-4

2008-10-02 Thread Giuseppe Iuculano
tags 500883 moreinfo thanks Peter Leipold ha scritto: > After the upgrade the boot stops at waiting for the root filesystem. I get a > busybox prompt. I figured out what to type to continue booting up: > $ modprobe dm-mirror > $ dmraid -ay > $ exit I need some debug logs. Extract the attached .ta

Bug#494278: dmraid Intel RAID10 patch breaks some Intel raid1 system

2008-09-29 Thread Giuseppe Iuculano
Chris ha scritto: > I have Intel raid 10, it worked fine up until now, and after this > removal of patch > > 07_isw-raid10-nested.dpatch > > my system fails to boot. dmraid -l does not show intel raid 10 > support. I tracked it down to this. Sorry, but that patch was removed because it breaks

Bug#497110: improved dmraid support in D-I

2008-09-23 Thread Giuseppe Iuculano
Giuseppe Iuculano ha scritto: > Tested, unfortunately root is empty: Hi, attached debdiff fixes the root detection, can you review it please? Giuseppe diff -Nru grub-installer-1.34/debian/changelog grub-installer-1.35/debian/changelog --- grub-installer-1.34/debian/changelog2008

Bug#497110: improved dmraid support in D-I

2008-09-23 Thread Giuseppe Iuculano
Frans Pop ha scritto: > I've not tested os-prober functionality for dmraid. Tested, unfortunately root is empty: # This entry automatically added by the Debian installer for an existing # linux installation on /dev/mapper/sil_aiahbgbgaaaj1. title Debian GNU/Linux, kernel 2.6.26-1-686 (

Bug#499060: dmraid: RAID not detected after upgrading to 1.0.0.rc14-3

2008-09-21 Thread Giuseppe Iuculano
tags 499060 = pending thanks Asier ha scritto: > Magic words: fixed! > > RAID array now is detected and the /dev/mapper/ entry is created. > > Thanks for your support > > Greets Great! :) Giuseppe signature.asc Description: OpenPGP digital signature

Bug#499060: dmraid: RAID not detected after upgrading to 1.0.0.rc14-3

2008-09-21 Thread Giuseppe Iuculano
Asier ha scritto: > Here they go. > > Looks like there's a problem with /usr/bin/basename not present before a full > mount of the filesystem? > Right, another deb for testing: http://sd6.iuculano.it/dmraid-testing/dmraid_1.0.0.rc14-4~unreleased3_amd64.deb Make sure that after .deb installa

Bug#499060: dmraid: RAID not detected after upgrading to 1.0.0.rc14-3

2008-09-21 Thread Giuseppe Iuculano
tags 499060 moreinfo thanks Asier ha scritto: > The problem... remains, attached /etc/udev/rules.d/85_dmraid.rules and the > boot loog :-( I need some debug logs. Extract the attached .tar.gz, and you have a dmraid-debug directory cd dmraid-debug cp -a sbin/* /sbin/ cp -a 85_dmraid.rules /etc/

Bug#499060: dmraid: RAID not detected after upgrading to 1.0.0.rc14-3

2008-09-20 Thread Giuseppe Iuculano
Asier ha scritto: > El Viernes, 19 de Septiembre de 2008, escribió: > >>> As you know, from dmraid 1.0.0.rc14-3 we use an udev rule to allow dmraid >>> arrays to be brought up in the event that the member disks of an array >>> are present. This udev rule runs /sbin/dmraid-activate to activate only

Bug#499060: dmraid: RAID not detected after upgrading to 1.0.0.rc14-3

2008-09-19 Thread Giuseppe Iuculano
severity 499060 normal tags 499060 wontfix retitle 499060 udev rule doesn't work without initramfs thanks Asier ha scritto: > > The same problem. The RAID array isn't detected :( As you know, from dmraid 1.0.0.rc14-3 we use an udev rule to allow dmraid arrays to be brought up in the event tha

Bug#499060: dmraid: RAID not detected after upgrading to 1.0.0.rc14-3

2008-09-19 Thread Giuseppe Iuculano
Giuseppe Iuculano ha scritto: > Asier ha scritto: > >> Thu Sep 18 23:09:34 2008: A maintenance shell will now be started. CONTROL-D >> will terminate this shell and resume system boot. (warning). >> Thu Sep 18 23:09:34 2008: Give root password for maintenance >>

Bug#499060: dmraid: RAID not detected after upgrading to 1.0.0.rc14-3

2008-09-18 Thread Giuseppe Iuculano
Asier ha scritto: > Thu Sep 18 23:09:34 2008: A maintenance shell will now be started. CONTROL-D > will terminate this shell and resume system boot. (warning). > Thu Sep 18 23:09:34 2008: Give root password for maintenance > Thu Sep 18 23:09:34 2008: (or type Control-D to continue): Please, at t

Bug#497110: Bug#498838: Please set link priority to 100 for dmraid devmapper devices

2008-09-13 Thread Giuseppe Iuculano
unblock 497110 by 498838 thanks Hi, Bastian Blank ha scritto: > Please explain. I'm currently not able to oversee the consequences. > > Bastian > # blkid /dev/mapper/sil_aiahbgbgaaaj5: TYPE="swap" /dev/mapper/sil_aiahbgbgaaaj1: UUID="4f4ac281-bb5d-4c34-9437-65df0c203bbb" TYPE="ext3" /dev/hda1:

Bug#497110: improved dmraid support in D-I

2008-09-07 Thread Giuseppe Iuculano
Giuseppe Iuculano ha scritto: > I'm working on this, but it is not very simple for me. > Approximately "dmraid -rD" generates three files, from this we can extrapolate > metadata, and with a hex editor we can add the fake signature to the > qemu/virtualbox drive Ok,t

Bug#497110: improved dmraid support in D-I

2008-09-07 Thread Giuseppe Iuculano
Frans Pop ha scritto: > On Sunday 07 September 2008, Frans Pop wrote: >> I've done some testing using Giuseppe's businesscard image in >> VirtualBox ... > > I was very surprised that you don't actually need BIOS support for dmraid. > Apparently it really only scans the harddisks for some specific

Bug#497110: improved dmraid support in D-I

2008-09-07 Thread Giuseppe Iuculano
Frans Pop ha scritto: > changes merged for Lenny. This means the following actions are needed: > - get an OK for the change in devicemapper from maintainer and RT > - get an OK for the change in parted from RT (and maybe check that the > patch will also get accepted upstream?) > - get updated de

Bug#497110: boot loader installation failed when dmraid=true

2008-09-06 Thread Giuseppe Iuculano
6 18:24:23.0 +0200 @@ -1,3 +1,11 @@ +partman-auto (81+nmu1) unstable; urgency=low + + * Non-maintainer upload. + * lib/auto-shared.sh: Consider device-mapper devices/dmraid arrays with the +sataraid flag set as usable for automatic partitioning. + + -- Giuseppe Iuculano <[EMAIL PR

Bug#497110: boot loader installation failed when dmraid=true

2008-09-06 Thread Giuseppe Iuculano
upload. + * Merge from Ubuntu: debian/patches/parted-dmraid.dpatch: Patch to educate +libparted about dmraid arrays, which use device mapper. Libparted was +naming new partition nodes incorrectly, and not setting the UUIDs for +dmraid device nodes. (Closes: #497110) + + -- Giusep

Bug#497110: boot loader installation failed when dmraid=true

2008-09-06 Thread Giuseppe Iuculano
n-maintainer upload. + * Merge from Ubuntu: debian/patches/parted-dmraid.dpatch: Patch to educate +libparted about dmraid arrays, which use device mapper. Libparted was +naming new partition nodes incorrectly, and not setting the UUIDs for +dmraid device nodes. (Closes: #497110) + + -

Bug#497110: boot loader installation failed when dmraid=true

2008-09-06 Thread Giuseppe Iuculano
+ * Non-maintainer upload. + * lib/auto-shared.sh: Consider device-mapper devices/dmraid arrays with the +sataraid flag set as usable for automatic partitioning. + + -- Giuseppe Iuculano <[EMAIL PROTECTED]> Sat, 06 Sep 2008 18:23:55 +0200 + partman-auto (81) unstable; urgency=low

Bug#497110: boot loader installation failed when dmraid=true

2008-09-06 Thread Giuseppe Iuculano
Frans Pop ha scritto: > On Saturday 06 September 2008, Frans Pop wrote: >> At first glance the patch also needs some cleanup. The .gitignore >> changes look like they are just noise and the actual changes are not >> really consistent regarding whitespace for example. > > Here's a cleaned-up versio

Bug#497110: boot loader installation failed when dmraid=true

2008-09-06 Thread Giuseppe Iuculano
Otavio Salvador ha scritto: > Yes. That is a great news. Sad that Ubuntu hasn't communicated with us > to get this fixed on Debian. I'll take a look and prepare a parted > upload with it. > I merged all relative dmraid Ubuntu changes in: devmapper os-prober parted partman-auto partman-base par

Bug#497110: boot loader installation failed when dmraid=true

2008-09-06 Thread Giuseppe Iuculano
dmraid arrays, which use device mapper. Libparted was +naming new partition nodes incorrectly, and not setting the UUIDs for +dmraid device nodes. (Closes: #497110) + * debian/patches/parted-dmraid.dpatch: Make sure that partition nodes for +dmraid devices are probed + + -- Giuseppe Iuc

Bug#497110: boot loader installation failed when dmraid=true

2008-09-05 Thread Giuseppe Iuculano
Frans Pop ha scritto: > Giuseppe: if you want to work around this bug to test dmraid support, you > can do so by changing /lib/partman/active_partition/25divider/choices > before you start partman: just make that script 'exit 0'. > This would allow you to provide further details on the "p" in creat

Bug#497723: arpack to be removed

2008-09-04 Thread Giuseppe Iuculano
block 497723 by 491794 thanks Hi, Thomas Viehmann wrote: > license is not DFSG-free (see bug #491794). new freemat package is ready, but I prefer to wait #491794 resolution. Giuseppe. signature.asc Description: OpenPGP digital signature

Bug#497110: boot loader installation failed when dmraid=true

2008-09-02 Thread Giuseppe Iuculano
Frans Pop ha scritto: > Unfortunately these don't help very much. What I think we need here is a > full debug log for partman to see what was running at the time of the > OOM. I suspect you somehow get into a loop. > > Please make sure you have started your ssh sessions _before_ starting > par

Bug#497110: boot loader installation failed when dmraid=true

2008-08-30 Thread Giuseppe Iuculano
Frans Pop ha scritto: > But another possibility is that you are just not following the correct > procedure. Support for dmraid is far from perfect and things will *only* > work if you follow the documented procedure. > > How did you do the partitioning? Did you *exactly* follow the instructions >

Bug#497110: boot loader installation failed when dmraid=true

2008-08-30 Thread Giuseppe Iuculano
7 control brw---1 root root 254, 0 Aug 30 11:27 sil_aiahbgbgaaaj brw---1 root root 254, 1 Aug 30 11:27 sil_aiahbgbgaaaj1 brw---1 root root 254, 2 Aug 30 11:27 sil_aiahbgbgaaaj5 Giuseppe Iuculano signature.asc Description: OpenPGP digital signature

Bug#386604: DokuWiki: "TARGET_FN" Directory Traversal Vulnerability

2006-09-08 Thread Giuseppe Iuculano
Package: dokuwiki Version: 0.0.20060309-5 Severity: grave Justification: user security hole From: http://secunia.com/advisories/21819/ Description: rgod has discovered a vulnerability in DokuWiki, which can be exploited by malicious people to compromise a vulnerable system. Input passed to the

Bug#368929: rkhunter --update doesn't work

2006-05-25 Thread Giuseppe Iuculano
Package: rkhunter Version: 1.2.8-4 Severity: grave # rkhunter --update Running updater... /usr/bin/rkhunter: line 4994: /rkhunter/scripts/check_update.sh: No such file or directory Ready. -- System Information: Debian Release: 3.1 APT prefers unstable APT policy: (500, 'unstable'), (500, '

Bug#360231: Horde_Block_turba_tree_menu error (sid)

2006-03-31 Thread Giuseppe Iuculano
Package: horde3 Version: 3.1-1 Severity: grave After last upgrade, when user logged in, in the left columns: A fatal error has occurred Horde_Block_turba_tree_menu non trovato. [line 232 of /usr/share/horde3/services/portal/sidebar.php] Details (also in Horde's logfile): object(pear_error)(8) {

<    1   2   3   4