Bug#891956: Your mail

2018-05-14 Thread Rafi Rubin
The dependencies for 3.8.1-11 end up requiring libequinox-osgi-java >= 3.9.1 (through eclipse-rcp), which doesn't have /usr/lib/eclipse/plugins/org.eclipse.osgi_3.8.1.dist.jar Going back to stable, 3.8.1-10 for the eclipse packages at least catches that jar, but fails after an illegal reflection

Bug#769366: zssh won't start: "out of pty's"

2017-12-29 Thread Rafi Rubin
For what its worth, building the package from source results in a functional binary. That makes it a bit harder to debug if its something in the code. On the upside, if this is just some binary/library incompatibility, the solution might just be incrementing the version and forcing the build syste

Bug#557581: Acknowledgement (pidgin-encryption: Key exchange fails rendering this plugin useless.)

2009-11-22 Thread Rafi Rubin
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 The problem seems to be the "***" in the header gets escaped to "*" and doesn't get unescaped later. This patch simply changes the sequence to "---". And it seems to work fine that way. -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.10 (GNU/Linux

Bug#557581: pidgin-encryption: Key exchange fails rendering this plugin useless.

2009-11-22 Thread Rafi Rubin
Package: pidgin-encryption Version: 3.0-4 Severity: grave Justification: renders package unusable For quite a while, encryption has been non-functional. It fails at the key exchange state. No messages are sent until encryption is dissabled. There is an upstream bug report stating that it died a

Bug#530843: watchdog: Does not read config file

2009-05-28 Thread Rafi Rubin
Michael Meskes wrote: > On Thu, May 28, 2009 at 04:06:42AM -0400, Rafi Rubin wrote: >> I suspect this might be related to bug #518096, which was closed without >> identifying the source of the problem. > > Eh? What do you mean? Do you want me to list upstream's progr

Bug#530843: watchdog: Does not read config file

2009-05-28 Thread Rafi Rubin
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Package: watchdog Version: 5.6-2 Justification: breaks the whole system Severity: critical I suspect this might be related to bug #518096, which was closed without identifying the source of the problem. Line 258 of watchdog.c does not initialize "n",

Bug#439150: check upstream version

2007-08-22 Thread Rafi Rubin
From the cvs log: 1 $Id: NEWS,v 1.10 2007/02/06 18:12:08 akorty Exp $ 2 3 Version 1.92 4 5 6 SECURITY FIX: The allow_blank_passphrase option was defeatable simply 7 by entering a random but non-blank passphrase. Thanks to Rob 8 Henderson for the repor

Bug#439150: libpam-ssh permits authentication with arbitrary string if a passphraseless key exists

2007-08-22 Thread Rafi Rubin
Package: libpam-ssh Version: 1.91.0-9.1 Severity: critical If pam-ssh tries to decrypt a key which is not protected by a passphrase, it will succede with any arbitrary string, not just the empty string. As such, dissallowing null does not protect the user. Since it is likely that a user may