Bug#599523: [update-manager-gnome] wants to downgrade packages without any notice

2010-10-08 Thread Zoran Dzelajlija
Package: update-manager-gnome Version: 0.200.4-1 Severity: serious --- Please enter the report below this line. --- update-manager wants to downgrade a package I explicitely installed from experimental without any special notice. This downgrade would break functionality on my machine. apt and

Bug#544729: func: audit.log is mode 0666

2009-09-02 Thread Zoran Dzelajlija
Package: func Version: 0.24-13 Severity: serious Tags: security --- Please enter the report below this line. --- Hi, I just did a _very_ cursory look at func from experimental, I don't think this is supposed to be kept like this: [22:24] /usr/share/doc/func = ls -l /var/log/func total 64

Bug#485480: bootlogd doesn't really mess with fs.file-max!

2008-06-12 Thread Zoran Dzelajlija
close 485480 thanks --- Please enter the report below this line. --- Hi, I must apologize for the false alarm. After trying to get a strace, and looking at bootlogd source, I realized Linux is a multitasking OS and something else might be changing the value at the same time. Turns out the real

Bug#485480: bootlogd messes with fs.file-max

2008-06-09 Thread Zoran Dzelajlija
Package: sysvinit Version: 2.86.ds1-55 Severity: grave --- Please enter the report below this line. --- sysctl -p seemed to have stopped working on my (mostly) lenny installation some time ago. After peppering /lib/lsb/init-functions with lines like [ -d /proc ] echo -n (filemax: `cat

Bug#471670: [bzip2] CVE-2008-1372 buffer over-read via crafted archive file

2008-04-25 Thread Zoran Dzelajlija
Package: bzip2 Version: 1.0.5-0.1 --- Please enter the report below this line. --- Hi. This bug has been quiet for a while... I'm just pinging to see if there's any progress in fixing it in stable (and possibly oldstable). Regards, Zoran --- System information. --- Architecture: i386 Kernel:

Bug#404344: uswsusp: tries to resume even though another kernel was booted in the meantime

2006-12-23 Thread Zoran Dzelajlija
Package: uswsusp Version: 0.3~cvs20060928-6 Severity: critical Justification: causes serious data loss Hi, uswsusp just tried to resume a previous session even though the system was booted and filesystems remounted in the meantime. I usually don't use initrd/initramfs, so I tried to create an

Bug#375417: twinkle: binary linked to a nonexistent library

2006-06-25 Thread Zoran Dzelajlija
Package: twinkle Version: 0.7.1-2+b1 Severity: grave Justification: renders package unusable ldd `which twinkle` [...] libccgnu2-1.3.so.2 = not found [...] apt-file update apt-file search libccgnu2-1.3.so.2 finds nothing. There is however a libcommoncpp2-1.3c2a:

Bug#316447: [php-maint] Bug#316447: packages for sarge?

2005-08-24 Thread Zoran Dzelajlija
Quoting Steve Langasek ([EMAIL PROTECTED]): On Tue, Aug 23, 2005 at 02:20:41PM +0200, Zoran Dzelajlija wrote: Quoting Steve Langasek ([EMAIL PROTECTED]): If you can provide me a direct URL for the Ubuntu security patches, I can probably find time to roll an update for the security team

Bug#316447: [php-maint] Bug#316447: packages for sarge?

2005-08-23 Thread Zoran Dzelajlija
Tags: sarge security Quoting Steve Langasek ([EMAIL PROTECTED]): On Mon, Aug 22, 2005 at 08:11:27PM +0200, Zoran Dzelajlija wrote: Hi, any word of a sarge release to cover CAN-2005-1921 and, to kill two flies, the new XML_RPC bug CAN-2005-2498? I've applied Ubuntu's patches for both

Bug#323366: [php-maint] Bug#323366: SECURITY: XML::RPC remote code injections (CAN-2005-2498)

2005-08-23 Thread Zoran Dzelajlija
Quoting Adam Conrad ([EMAIL PROTECTED]): Zoran Dzelajlija wrote: FWIW, patches from Ubuntu might help: I know, I did the Ubuntu patches. Heh, I (obviously) didn't know that. I need to get the security team in the loop to get my changes into Debian as well. :/ Can I do anything

Bug#323366: SECURITY: XML::RPC remote code injections (CAN-2005-2498)

2005-08-22 Thread Zoran Dzelajlija
Quoting Christian Hammers ([EMAIL PROTECTED]): Package: php4 Version: 4:4.3.10-15 Severity: grave Tags: security Hello A security flaw in XML::RPC has become known. From the version numbers it seems to affect Debian. (I did not check which distributions and packages exactly though).