Package: openssl
Severity: serious
Tags: security patch
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi,
the following CVE (Common Vulnerabilities & Exposures) ids were
published for openssl.
CVE-2009-1377[0]:
| The dtls1_buffer_record function in ssl/d1_pkt.c in OpenSSL 0.9.8k and
| earlier 0
Package: ipplan
Severity: serious
Tags: security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi,
the following CVE (Common Vulnerabilities & Exposures) ids were
published for ipplan.
CVE-2009-1732[0]:
| Cross-site scripting (XSS) vulnerability in admin/usermanager in IPlan
| 4.91a allows remo
Package: ctorrent
Severity: serious
Tags: security patch
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi,
the following CVE (Common Vulnerabilities & Exposures) id was
published for ctorrent.
CVE-2009-1759[0]:
| Stack-based buffer overflow in the btFiles::BuildFromMI function
| (trunk/btfiles.c
Package: ajaxterm
Version: 0.10-4
Severity: serious
Tags: security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi,
the following CVE (Common Vulnerabilities & Exposures) id was
published for ajaxterm.
CVE-2009-1629[0]:
| ajaxterm.js in AjaxTerm 0.10 and earlier generates session IDs with
| pre
Package: xpdf-reader
Version: 3.02-1.4
Severity: serious
Justification: no longer builds from source
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi,
xpdf failed to build on i386:
dpkg-source: info: building xpdf in xpdf_3.02-1.4.dsc
debian/rules build
dpatch apply-all
applying patch 01_manp
Hi Arthur,
Arthur Furlan ha scritto:
> I fixed these issues adding a new method in the Auth class (see
> Auth.php.patch) that destroys the any session for an user, both in php
> *and* database. To fix the issue [1] I added a call of this new method
Thank you for your bug report, I've committe
tags 527597 +pending
thanks
Hello,
The following change has been committed for this bug by
Giuseppe Iuculano on Sat, 9 May 2009 16:14:37 +0200.
The fix will be in the next upload.
=
debian/patches
Package: samba
Version: 3.0.24-6etch10
Severity: serious
Tags: security etch
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi,
the following CVE (Common Vulnerabilities & Exposures) id was
published for samba.
CVE-2008-6800[0]:
| Race condition in the winbind daemon (aka winbindd) in Samba befor
Package: jetty
Severity: serious
Tags: security
Hi,
the following CVE (Common Vulnerabilities & Exposures) id was
published for jetty.
CVE-2009-1524[0]:
| Cross-site scripting (XSS) vulnerability in Mort Bay Jetty before
| 6.1.17 allows remote attackers to inject arbitrary web script or HTML
| vi
Giuseppe Iuculano ha scritto:
> Proposed debdiffs in attachment.
Updated oldstable debdiff (do not backport changes in src/libmodplug/stdafx.h,
instead include stdint.h)
Cheers,
Giuseppe.
diff -u libmodplug-0.7/debian/changelog libmodplug-0.7/debian/changelog
--- libmodplug-0.7/debian/change
Zed Pobre ha scritto:
> On Wed, May 06, 2009 at 10:50:00AM +0200, Giuseppe Iuculano wrote:
>> Hi,
>>
>> I've prepared a NMU to fix CVE-2009-1438 and SA34927 in stable and oldstable.
>
> My plan was to fix this by packaging the new upstream version this
> weekend
hangelog
+++ libmodplug-0.7/debian/changelog
@@ -1,3 +1,11 @@
+libmodplug (1:0.7-5.3) oldstable-security; urgency=high
+
+ * Non-maintainer upload.
+ * Fixed "CSoundFile::ReadMed()" Integer Overflow in src/load_med.cp
+(Closes: #526657) (CVE-2009-1438)
+
+ -- Giuseppe Iuculano
-1,3 +1,11 @@
+libwmf (0.2.8.4-2+etch1) oldstable-security; urgency=high
+
+ * Non-maintainer upload.
+ * Fixed Use-after-free vulnerability in the embedded GD library
+(Closes: #526434) (CVE-2009-1364)
+
+ -- Giuseppe Iuculano Wed, 06 May 2009 09:33:49 +0200
+
libwmf (0.2.8.4-2) unstable; ur
Package: libmodplug
Version: 1:0.8.4-5
Severity: grave
Tags: security patch
Hi,
the following CVE (Common Vulnerabilities & Exposures) id was
published for libmodplug:
CVE-2009-1438[1]
Integer overflow in the CSoundFile::ReadMed function (src/load_med.cpp) in
libmodplug before 0.8.6, as used in
fted PDF file.
+- CVE-2009-1183: The JBIG2 MMR decoder in Xpdf 3.02pl2 and earlier, CUPS
+ 1.3.9 and earlier, Poppler before 0.10.6, and other products allows
remote
+ attackers to cause a denial of service (infinite loop and hang) via a
+ crafted PDF file.
+
+ -- Giuseppe Iuculano
Hi,
Scott Kitterman wrote:
> There is a clamav bug that was fixed in 0.95 or 0.95.1 in which unofficial
> signatures caused a crash, so I believe your diagnosis is likely correct.
I can confirm this. I was experiencing the same crash with 0.94.dfsg.2-1lenny2
and clamav-unofficial-sigs. Upgrading
Package: libwmf
Version: 0.2.8.4-6
Severity: serious
Tags: security patch
Hi,
redhat recently patched libwmf.
CVE-2009-1364 is still reserved, but is disclosed in RHSA-2009:0457-1[0]
A pointer use-after-free flaw was found in the GD graphics library embedded
in libwmf. An attacker could create
Package: libmodplug
Version: 1:0.8.4-5
Severity: serious
Tags: security patch
Hi,
The following SA (Secunia Advisory) id was published for
libmodplug:
SA34927[1]
> DESCRIPTION:
> A vulnerability has been reported in libmodplug, which can be
> exploited by malicious people to cause a DoS
Giuseppe Iuculano ha scritto:
> Hi,
>
> I've prepared a NMU to fix CVE-2009-0792 CVE-2009-0196 CVE-2007-6725
> CVE-2008-6679 in lenny.
>
> Proposed debdiff in attachment.
Forgot to add 36_CVE-2008-6679.dpatch, resend correct debdiff.
Cheers,
Giuseppe.
diffstat for
eFont writer module in
+ Ghostscript 8.62, and possibly other versions, allows remote attackers to
+ cause a denial of service (ps2pdf crash) and possibly execute arbitrary
+ code via a crafted Postscript file.
+ (Closes: #524803, #524915)
+
+ -- Giuseppe Iuculano Wed, 22 Apr
Samuel Thibault ha scritto:
> It's written there and I didn't know that indeed: "Non-Free (not
> autobuilt)". I'll manage to get other archs built, thanks for the
> notice.
>
> Samuel
Hi,
you should read this:
http://lists.debian.org/debian-devel-announce/2006/11/msg00012.html
Cheers,
Giuseppe
Package: mbrola
Severity: serious
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi,
it seems that mbrola is available only in amd64, why?
https://buildd.debian.org/~luk/status/package.php?p=mbrola
Cheers,
Giuseppe
- -- System Information:
Debian Release: squeeze/sid
APT prefers testing-prop
gregor herrmann ha scritto:
>> Did you try what this error message says?
>
> I have the same problem.
>
> "--update --no-cowdancer-update" works for the update.
> But after that I can neither build packages nor login into the
> chroot, the errors stays the same:
The same for me.
Giuseppe.
si
set LDFLAGS to default value:
dpkg-buildpackage: set FFLAGS to default value: -g -O2
dpkg-buildpackage: set CXXFLAGS to default value: -g -O2
dpkg-buildpackage: source package apf-firewall
dpkg-buildpackage: source version 9.7+rev1-1
dpkg-buildpackage: source changed by Giuseppe Iuculano
fakeroot
Package: network-manager-applet
Version: 0.6.6-4
Severity: serious
Tags: security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi,
the following CVE (Common Vulnerabilities & Exposures) id was
published for network-manager-applet:
CVE-2009-0365[1]:
The dbus request handler in (1) network-manage
ead.c,
+pngrtans.c, pngset.c and example.c (CVE-2009-0040) (Closes: #516256)
+
+ -- Giuseppe Iuculano Sat, 14 Mar 2009 21:31:31 +0100
+
libpng (1.2.27-2) unstable; urgency=medium
* Fix CVE-2008-3964: off-by-one error in pngtest.c; closes: #501109
diff -u libpng-1.2.27/debian/patches/series libpng-1
Bastian Blank ha scritto:
> On Fri, Mar 06, 2009 at 02:58:44PM +0100, Giuseppe Iuculano wrote:
>> you merged devmapper source, but it had an epoch:
>
> Please explain. Which version have a bad epoch.
When comparing two version numbers, first the epoch of each are compared, s
Package: lvm2
Version: 2.02.44-2
Severity: serious
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi,
you merged devmapper source, but it had an epoch:
# dpkg --compare-versions 2.02.44-2 gt 2:1.02.30-2; echo $?
1
# rmadison -s unstable dmsetup
dmsetup | 2:1.02.27-4 | unstable | arm
Package: zabbix-frontend-php
Severity: serious
Tags: security patch
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi,
The following SA (Secunia Advisory) id was published for
zabbix-frontend-php:
SA34091[1]:
> DESCRIPTION:
> Some vulnerabilities have been reported in the ZABBIX PHP frontend,
>
Package: mldonkey-server
Version: 2.9.5-2
Severity: grave
Tags: security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi,
MLdonkey (up to 2.9.7) has a vulnerability that allows remote user to
access any
file with rights of running Mldonkey daemon by supplying a
special-crafted
Package: libpng
Version: 1.2.33-2
Severity: serious
Tags: security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi,
The following SA (Secunia Advisory) id was published for libpng:
SA33970[1]
> DESCRIPTION:
> A vulnerability has been reported in libpng, which can be exploited
> by malicious p
Package: dmraid
Version: 1.0.0.rc14-6
Severity: grave
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
(Originally reported against dkms on ubuntu, LP #320200)
dmraid must not call udevadm trigger --action=add in postinst.
This will have utterly dire consequences for the installed machine.
Major bu
Package: tor
Severity: serious
Tags: security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi,
The following SA (Secunia Advisory) id was published for Tor:
SA33635[1]
> DESCRIPTION:
> A vulnerability with an unknown impact has been reported in Tor.
>
> The vulnerability is caused due to an
Package: typo3-src
Severity: grave
Tags: security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi,
The following SA (Secunia Advisory) id was published for Typo3:
SA33617[1]
> DESCRIPTION:
> Some vulnerabilities have been reported in Typo3, which can be
> exploited by malicious people to bypa
extension, not from the data. This reduces the XSS attack surface.
- Blacklist redirects via Special:Filepath. Such redirects exacerbate any
XSS vulnerabilities involving uploads of files containing scripts.
Closes: #508869, #508870
-- Giuseppe Iuculano Sun, 18 Jan 2009 11:54:02 +0100
Hi,
Neil McGovern ha scritto:
> Can this patch be backported against the version in testing, and a TPU
> upload done?
phppgadmin/4.2.2-1 was unblocked by luk.
Cheers,
Giuseppe.
signature.asc
Description: OpenPGP digital signature
Hi,
Giuseppe Iuculano ha scritto:
> Hi,
>
> Nico Golde ha scritto:
>> I take care of sponsoring the upload for unstable. For
>> stable security the version looks wrong to me, please use
>> 4.0.1-3.1etch1.
>
> Right, attached the new debdiff.
>
> Giusep
s (Closes: #508026)
+
+ -- Giuseppe Iuculano Tue, 23 Dec 2008 11:20:56 +0100
+
phppgadmin (4.0.1-3.1) unstable; urgency=low
* Non-maintainer upload to fix pending l10n issues.
only in patch2:
unchanged:
--- phppgadmin-4.0.1.orig/libraries/lib.inc.php
+++ phppgadmin-4.0.1/libraries/lib.inc.php
admin-4.0.1/debian/changelog
@@ -1,3 +1,11 @@
+phppgadmin (4.0.1-3.2) stable-security; urgency=high
+
+ * Non-maintainer upload.
+ * Fix local file inclusion vulnerability: (CVE-2008-5587)
+Unset language variable before determine file includes (Closes: #508026)
+
+ -- Giuseppe Iuculano Tue, 23 Dec 20
Subject: SA33136: MPlayer TwinVQ Processing Buffer Overflow Vulnerability
Package: mplayer
Version: 1.0~rc1-12etch5
Severity: grave
Tags: security patch
Hi,
The following SA (Secunia Advisory) id was published for mplayer:
SA33136[1]
> Description:
> Tobias Klein has reported a vulnerability in
Hi Thijs,
Thijs Kinkhorst ha scritto:
> As it seems, upstream does already support running in register_globals=0 mode
> for a long time (according to their changelog since 2002...). Therefore I
Where did you read that? In TODO file I read "* register_globals off support".
Cheers,
Giuseppe.
+1,10 @@
+phppgadmin (4.2-1.1) testing-proposed-updates; urgency=low
+
+ * Non-maintainer upload.
+ * Fix Local File Inclusion Vulnerability (Closes: #508026)
+
+ -- Giuseppe Iuculano Fri, 12 Dec 2008 18:50:16 +0100
+
phppgadmin (4.2-1) unstable; urgency=low
* New upstream release
diff -u phppg
admin (4.2.1-1.1) unstable; urgency=high
+
+ * Non-maintainer upload.
+ * Fix Local File Inclusion Vulnerability (Closes: #508026)
+
+ -- Giuseppe Iuculano Fri, 12 Dec 2008 17:55:03 +0100
+
phppgadmin (4.2.1-1) unstable; urgency=low
* New upstream release
diff -u phppgadmin-4.2.1/d
Package: verlihub
Severity: grave
Tags: security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi,
An exploit[0] has been published for verlihub:
> Verlihub does not sanitize user input passed to the shell via its
> "trigger"
> mechanism. Furthermore, the Verlihub daemon can optionally be
Package: iceape
Severity: critical
Tags: security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi,
The following SA (Secunia Advisory) id was published for SeaMonkey:
SA32714[1]
Description:
Some vulnerabilities have been reported in Mozilla SeaMonkey, which can
be exploited by malicious peop
Package: icedove
Severity: critical
Tags: security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi,
The following SA (Secunia Advisory) id was published for Thunderbird:
SA32715[1]
Description:
Some vulnerabilities have been reported in Mozilla Thunderbird, which
can be exploited by malicious
Package: iceweasel
Version: 2.0.0.17-0etch1
Severity: critical
Tags: security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi,
The following SA (Secunia Advisory) id was published for Firefox 2:
SA32693[1]
Description:
Some vulnerabilities have been reported in Mozilla Firefox, which can be
e
Package: iceweasel
Version: 3.0.3-3
Severity: critical
Tags: security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi,
The following SA (Secunia Advisory) id was published for Firefox 3.
SA32713[1]
Description:
Some vulnerabilities have been reported in Mozilla Firefox, which can be
exploite
Hi,
[EMAIL PROTECTED] ha scritto:
> i think this is the changeset
> http://trac.edgewall.org/changeset/7658/branches/0.11-stable
> i'll get into this to upload a new package.
2) An unspecified error when processing wiki markup can be exploited
to cause a DoS.
See also http://trac.edgew
Package: trac
Severity: serious
Tags: security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi,
The following SA (Secunia Advisory) id was published for trac.
SA32652[1]
> Description:
> Some vulnerabilities have been reported in Trac, which can be
> exploited by malicious people to cause a
copy shipped with
+dokuwiki (SA32559) (Closes: #504682)
+
+ -- Giuseppe Iuculano <[EMAIL PROTECTED]> Sat, 08 Nov 2008 09:48:34 +0100
+
dokuwiki (0.0.20080505-3) unstable; urgency=high
* High-urgency upload for RC bug fixing.
diff -u dokuwiki-0.0.20080505/debian/patches/series do
Hi Dominique,
Dominique Brazziel ha scritto:
> I just saw this update and put it on and, while there is no segfault,
> the IRQ totals are way off, 0 is reported many times when it shouldn't
> be:
Please open a new bug and report it.
Giuseppe.
signature.asc
Description: OpenPGP digital signat
Len Sorensen ha scritto:
> Well if it isn't being accepted into Lenny, then that doesn't help and
> most likely Lenny will end up with no procinfo at all.
>
> Wouldn't it be better to make a procinfo 18-3 with the simple fix which
> is much more likely to be accepted into Lenny and then get the n
Len Sorensen ha scritto:
> I do not consider this closed. You are wrong. Please reopen until it
> is fixed. I was actually considering marking it RC for Lenny.
>
Hi,
I understand your point of view, but this bug is marked as "Fixed in version
procinfo/1:2.0.208-1". This is correct and this re
severity 500883 normal
thanks
Peter ha scritto:
> Well, it can of course be a controller bug. I'm not that familiar with these
> issues.
>
> I was only thinking it to be an udev bug because as I've read these fakeraid
> cards are hard to support under linux because of their proprietary bios
>
Peter ha scritto:
> Ok, thanks! This is then an udev issue, so I should search there (already
Can you elaborate please? Why this is an udev issue and not a bug in your
controller/bios ?
> found some bug-reports where udev incorrectly read device metadata for raid
> devices),
Can you link the
Peter ha scritto:
> This 2nd partition is one of my raid1 volume, containing the root filesystem.
> I see ID_FS_USAGE is not "raid" as it should. Do I have a screwed raid
> setup? :) Do you know how could I change that ID_FS_USAGE?
ID_FS_USAGE on sdaX isn't important. The real problem is that I
Hi Peter,
Peter ha scritto:
> I now suspect the ENV{ID_FS_USAGE}=="raid" option in udev rules file. How
> should udev supposed to know if a disk is "raid"? Maybe I should rename
> something to this "raid"? See below my raid settings:
udevadm info --query=all --name=sda
udevadm info --query=all
tags 500883 moreinfo
thanks
Peter Leipold ha scritto:
> After the upgrade the boot stops at waiting for the root filesystem. I get a
> busybox prompt. I figured out what to type to continue booting up:
> $ modprobe dm-mirror
> $ dmraid -ay
> $ exit
I need some debug logs.
Extract the attached .ta
Chris ha scritto:
> I have Intel raid 10, it worked fine up until now, and after this
> removal of patch
>
> 07_isw-raid10-nested.dpatch
>
> my system fails to boot. dmraid -l does not show intel raid 10
> support. I tracked it down to this.
Sorry, but that patch was removed because it breaks
Giuseppe Iuculano ha scritto:
> Tested, unfortunately root is empty:
Hi,
attached debdiff fixes the root detection, can you review it please?
Giuseppe
diff -Nru grub-installer-1.34/debian/changelog
grub-installer-1.35/debian/changelog
--- grub-installer-1.34/debian/changelog2008
Frans Pop ha scritto:
> I've not tested os-prober functionality for dmraid.
Tested, unfortunately root is empty:
# This entry automatically added by the Debian installer for an existing
# linux installation on /dev/mapper/sil_aiahbgbgaaaj1.
title Debian GNU/Linux, kernel 2.6.26-1-686 (
tags 499060 = pending
thanks
Asier ha scritto:
> Magic words: fixed!
>
> RAID array now is detected and the /dev/mapper/ entry is created.
>
> Thanks for your support
>
> Greets
Great! :)
Giuseppe
signature.asc
Description: OpenPGP digital signature
Asier ha scritto:
> Here they go.
>
> Looks like there's a problem with /usr/bin/basename not present before a full
> mount of the filesystem?
>
Right, another deb for testing:
http://sd6.iuculano.it/dmraid-testing/dmraid_1.0.0.rc14-4~unreleased3_amd64.deb
Make sure that after .deb installa
tags 499060 moreinfo
thanks
Asier ha scritto:
> The problem... remains, attached /etc/udev/rules.d/85_dmraid.rules and the
> boot loog :-(
I need some debug logs.
Extract the attached .tar.gz, and you have a dmraid-debug directory
cd dmraid-debug
cp -a sbin/* /sbin/
cp -a 85_dmraid.rules /etc/
Asier ha scritto:
> El Viernes, 19 de Septiembre de 2008, escribió:
>
>>> As you know, from dmraid 1.0.0.rc14-3 we use an udev rule to allow dmraid
>>> arrays to be brought up in the event that the member disks of an array
>>> are present. This udev rule runs /sbin/dmraid-activate to activate only
severity 499060 normal
tags 499060 wontfix
retitle 499060 udev rule doesn't work without initramfs
thanks
Asier ha scritto:
>
> The same problem. The RAID array isn't detected :(
As you know, from dmraid 1.0.0.rc14-3 we use an udev rule to allow dmraid arrays
to be brought up in the event tha
Giuseppe Iuculano ha scritto:
> Asier ha scritto:
>
>> Thu Sep 18 23:09:34 2008: A maintenance shell will now be started. CONTROL-D
>> will terminate this shell and resume system boot. (warning).
>> Thu Sep 18 23:09:34 2008: Give root password for maintenance
>>
Asier ha scritto:
> Thu Sep 18 23:09:34 2008: A maintenance shell will now be started. CONTROL-D
> will terminate this shell and resume system boot. (warning).
> Thu Sep 18 23:09:34 2008: Give root password for maintenance
> Thu Sep 18 23:09:34 2008: (or type Control-D to continue):
Please, at t
unblock 497110 by 498838
thanks
Hi,
Bastian Blank ha scritto:
> Please explain. I'm currently not able to oversee the consequences.
>
> Bastian
>
# blkid
/dev/mapper/sil_aiahbgbgaaaj5: TYPE="swap"
/dev/mapper/sil_aiahbgbgaaaj1: UUID="4f4ac281-bb5d-4c34-9437-65df0c203bbb"
TYPE="ext3"
/dev/hda1:
Giuseppe Iuculano ha scritto:
> I'm working on this, but it is not very simple for me.
> Approximately "dmraid -rD" generates three files, from this we can extrapolate
> metadata, and with a hex editor we can add the fake signature to the
> qemu/virtualbox drive
Ok,t
Frans Pop ha scritto:
> On Sunday 07 September 2008, Frans Pop wrote:
>> I've done some testing using Giuseppe's businesscard image in
>> VirtualBox ...
>
> I was very surprised that you don't actually need BIOS support for dmraid.
> Apparently it really only scans the harddisks for some specific
Frans Pop ha scritto:
> changes merged for Lenny. This means the following actions are needed:
> - get an OK for the change in devicemapper from maintainer and RT
> - get an OK for the change in parted from RT (and maybe check that the
> patch will also get accepted upstream?)
> - get updated de
6 18:24:23.0
+0200
@@ -1,3 +1,11 @@
+partman-auto (81+nmu1) unstable; urgency=low
+
+ * Non-maintainer upload.
+ * lib/auto-shared.sh: Consider device-mapper devices/dmraid arrays with the
+sataraid flag set as usable for automatic partitioning.
+
+ -- Giuseppe Iuculano <[EMAIL PR
upload.
+ * Merge from Ubuntu: debian/patches/parted-dmraid.dpatch: Patch to educate
+libparted about dmraid arrays, which use device mapper. Libparted was
+naming new partition nodes incorrectly, and not setting the UUIDs for
+dmraid device nodes. (Closes: #497110)
+
+ -- Giusep
n-maintainer upload.
+ * Merge from Ubuntu: debian/patches/parted-dmraid.dpatch: Patch to educate
+libparted about dmraid arrays, which use device mapper. Libparted was
+naming new partition nodes incorrectly, and not setting the UUIDs for
+dmraid device nodes. (Closes: #497110)
+
+ -
+ * Non-maintainer upload.
+ * lib/auto-shared.sh: Consider device-mapper devices/dmraid arrays with the
+sataraid flag set as usable for automatic partitioning.
+
+ -- Giuseppe Iuculano <[EMAIL PROTECTED]> Sat, 06 Sep 2008 18:23:55 +0200
+
partman-auto (81) unstable; urgency=low
Frans Pop ha scritto:
> On Saturday 06 September 2008, Frans Pop wrote:
>> At first glance the patch also needs some cleanup. The .gitignore
>> changes look like they are just noise and the actual changes are not
>> really consistent regarding whitespace for example.
>
> Here's a cleaned-up versio
Otavio Salvador ha scritto:
> Yes. That is a great news. Sad that Ubuntu hasn't communicated with us
> to get this fixed on Debian. I'll take a look and prepare a parted
> upload with it.
>
I merged all relative dmraid Ubuntu changes in:
devmapper
os-prober
parted
partman-auto
partman-base
par
dmraid arrays, which use device mapper. Libparted was
+naming new partition nodes incorrectly, and not setting the UUIDs for
+dmraid device nodes. (Closes: #497110)
+ * debian/patches/parted-dmraid.dpatch: Make sure that partition nodes for
+dmraid devices are probed
+
+ -- Giuseppe Iuc
Frans Pop ha scritto:
> Giuseppe: if you want to work around this bug to test dmraid support, you
> can do so by changing /lib/partman/active_partition/25divider/choices
> before you start partman: just make that script 'exit 0'.
> This would allow you to provide further details on the "p" in creat
block 497723 by 491794
thanks
Hi,
Thomas Viehmann wrote:
> license is not DFSG-free (see bug #491794).
new freemat package is ready, but I prefer to wait #491794 resolution.
Giuseppe.
signature.asc
Description: OpenPGP digital signature
Frans Pop ha scritto:
> Unfortunately these don't help very much. What I think we need here is a
> full debug log for partman to see what was running at the time of the
> OOM. I suspect you somehow get into a loop.
>
> Please make sure you have started your ssh sessions _before_ starting
> par
Frans Pop ha scritto:
> But another possibility is that you are just not following the correct
> procedure. Support for dmraid is far from perfect and things will *only*
> work if you follow the documented procedure.
>
> How did you do the partitioning? Did you *exactly* follow the instructions
>
7 control
brw---1 root root 254, 0 Aug 30 11:27 sil_aiahbgbgaaaj
brw---1 root root 254, 1 Aug 30 11:27 sil_aiahbgbgaaaj1
brw---1 root root 254, 2 Aug 30 11:27 sil_aiahbgbgaaaj5
Giuseppe Iuculano
signature.asc
Description: OpenPGP digital signature
Package: dokuwiki
Version: 0.0.20060309-5
Severity: grave
Justification: user security hole
From: http://secunia.com/advisories/21819/
Description:
rgod has discovered a vulnerability in DokuWiki, which can be exploited by
malicious people to compromise a vulnerable system.
Input passed to the
Package: rkhunter
Version: 1.2.8-4
Severity: grave
# rkhunter --update
Running updater...
/usr/bin/rkhunter: line 4994: /rkhunter/scripts/check_update.sh: No such
file or directory
Ready.
-- System Information:
Debian Release: 3.1
APT prefers unstable
APT policy: (500, 'unstable'), (500, '
Package: horde3
Version: 3.1-1
Severity: grave
After last upgrade, when user logged in, in the left columns:
A fatal error has occurred
Horde_Block_turba_tree_menu non trovato.
[line 232 of /usr/share/horde3/services/portal/sidebar.php]
Details (also in Horde's logfile):
object(pear_error)(8) {
301 - 388 of 388 matches
Mail list logo