Bug#529222: initramfs-tools: Should not use obsolete dpkg --print-installation-architecture

2009-05-18 Thread Raphaël Hertzog
Package: initramfs-tools Version: 0.93.2 Severity: normal You should not use dpkg --print-installation-architecture otherwise you will quickly get annoying warnings with dpkg 1.15.1: Paramétrage de linux-image-2.6.29-2-amd64 (2.6.29-5) ... Running depmod. Running update-initramfs. update-initramf

Bug#529261: linux-image-2.6.26-2-686: kernel panic with option selinux=1 in to grub/menu.lst

2009-05-18 Thread Serguei
Package: linux-image-2.6.26-2-686 Version: 2.6.26-15lenny2 Severity: critical Justification: breaks unrelated software After security upgrading linux-image-2.6.26-2-686, system no booting with options selinux=1 in to /boot/grub/menu.lst. I'm get message Kernel panic. Kernel linux-image-2.6.26-2-

Processed: severity of 529261 is important

2009-05-18 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > severity 529261 important Bug#529261: linux-image-2.6.26-2-686: kernel panic with option selinux=1 in to grub/menu.lst Severity set to `important' from `critical' > End of message, stopping processing here. Please contact me if you need assista

Bug#526525: AMD64 kernel - mptbase

2009-05-18 Thread Andrew Robert Nicols
I'm having the same issue as being discussed in this thread with installation of a new Dell R610. i686 installation detects disks properly (output of lsmod attached). amd64 installation doesn't detect disks so I'm unable to install. Output seen in dmesg includes the line: mptbase: ioc0: Error - :

Processed: Re: Bug#529222: initramfs-tools: Should not use obsolete dpkg --print-installation-architecture

2009-05-18 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > tags 529222 pending Bug#529222: initramfs-tools: Should not use obsolete dpkg --print-installation-architecture There were no tags set. Tags added: pending > stop Stopping processing here. Please contact me if you need assistance. Debian bug t

Bug#529222: initramfs-tools: Should not use obsolete dpkg --print-installation-architecture

2009-05-18 Thread maximilian attems
tags 529222 pending stop On Mon, 18 May 2009, Raphaël Hertzog wrote: > Package: initramfs-tools > Version: 0.93.2 > Severity: normal > > You should not use dpkg --print-installation-architecture otherwise you > will quickly get annoying warnings with dpkg 1.15.1: > > Paramétrage de linux-image-

Bug#513695: [pkg-fetchmail-maint] Bug#513695: fetchmail: race in MSG_PEEK

2009-05-18 Thread Ian Zimmerman
Matthias> could you test the patch from Matthias> http://www.spinics.net/lists/netdev/msg96700.html and follow Matthias> up with information if that fixes your problem? It seems to fix it (2 days of fetchmail, no MSG_PEEK warnings yet). -- Ian Zimmerman gpg public key: 1024D/C6FF61AD fingerpr

Bug#529312: linux-image-2.6.26-2-686-bigmem: Does not recognize all CPUs on "summit" SMP machines

2009-05-18 Thread Andreas U. Trottmann
Package: linux-image-2.6.26-2-686-bigmem Version: 2.6.26-15 Hello, The Linux kernel sources upon which linux-image-2.6.26-2-686-bigmem is based are suffering from a bug, which only affects the (relatively rare) "summit" SMP architecture. It is found in IBM xSeries servers such as the x440 or x44

Bug#529318: linux-2.6: CVE-2007-6514 smbfs information disclosure vulnerability

2009-05-18 Thread Michael S. Gilbert
Package: linux-2.6 Severity: important Tags: security Hi, The following CVE (Common Vulnerabilities & Exposures) id was published for linux-2.6. CVE-2007-6514[0]: | Apache HTTP Server, when running on Linux with a document root on a | Windows share mounted using smbfs, allows remote attackers to

Processed: patches

2009-05-18 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > tag 529326 patch Bug#529326: linux-2.6: CVE-2009-0787 information disclosure in ecryptfs Tags were: security Tags added: patch > thank you Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administra

Bug#529326: linux-2.6: CVE-2009-0787 information disclosure in ecryptfs

2009-05-18 Thread Michael S. Gilbert
Package: linux-2.6 Version: 2.6.26-15lenny2 Severity: important Tags: security Hi, The following CVE (Common Vulnerabilities & Exposures) id was published for linux-2.6. CVE-2009-0787[0]: | The ecryptfs_write_metadata_to_contents function in the eCryptfs | functionality in the Linux kernel 2.6.2

Processed: tagging 529165

2009-05-18 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > # Automatically generated email from bts, devscripts version 2.10.35lenny3 > tags 529165 + pending Bug#529165: OOPS in bridging code There were no tags set. Tags added: pending > End of message, stopping processing here. Please contact me if you

Bug#529326: patches

2009-05-18 Thread Michael S. Gilbert
tag 529326 patch thank you note that this affects the lenny and squeeze versions of the kernel (2.6.26). even though the kernel changelog says that this problem only affects 2.6.28, it actually affects any version before 2.6.28.9 that has ecryptfs. patches are available here: http://git.kernel.o

Bug#529326: linux-2.6: CVE-2009-0787 information disclosure in ecryptfs

2009-05-18 Thread dann frazier
On Mon, May 18, 2009 at 01:28:56PM -0400, Michael S. Gilbert wrote: > Package: linux-2.6 > Version: 2.6.26-15lenny2 > Severity: important > Tags: security > > Hi, > > The following CVE (Common Vulnerabilities & Exposures) id was > published for linux-2.6. > > CVE-2009-0787[0]: > | The ecryptfs_w

Bug#529326: linux-2.6: CVE-2009-0787 information disclosure in ecryptfs

2009-05-18 Thread Michael S. Gilbert
On Mon, 18 May 2009 11:52:04 -0600, dann frazier wrote: > On Mon, May 18, 2009 at 01:28:56PM -0400, Michael S. Gilbert wrote: > > Package: linux-2.6 > > Version: 2.6.26-15lenny2 > > Severity: important > > Tags: security > > > > Hi, > > > > The following CVE (Common Vulnerabilities & Exposures) i

Bug#529326: linux-2.6: CVE-2009-0787 information disclosure in ecryptfs

2009-05-18 Thread dann frazier
On Mon, May 18, 2009 at 02:20:20PM -0400, Michael S. Gilbert wrote: > On Mon, 18 May 2009 11:52:04 -0600, dann frazier wrote: > > On Mon, May 18, 2009 at 01:28:56PM -0400, Michael S. Gilbert wrote: > > > Package: linux-2.6 > > > Version: 2.6.26-15lenny2 > > > Severity: important > > > Tags: securit

Bug#523942: linux-image-2.6.26-2-s390 will not boot!

2009-05-18 Thread STEPHEN POWELL
The latest kernel update, revision 2.6.26-15lenny2, still does not contain the fix for this problem. -- To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Bug#529342: linux-2.6: ipv6 potential denial-of-service

2009-05-18 Thread Michael S. Gilbert
Package: linux-2.6 Version: 2.6.26 Severity: important Tags: security patch Hi, The following CVE (Common Vulnerabilities & Exposures) id was published for linux-2.6. CVE-2009-1360[0]: | The __inet6_check_established function in net/ipv6/inet6_hashtables.c | in the Linux kernel before 2.6.29, wh

Bug#529326: marked as done (linux-2.6: CVE-2009-0787 information disclosure in ecryptfs)

2009-05-18 Thread Debian Bug Tracking System
Your message dated Mon, 18 May 2009 15:49:45 -0400 with message-id <20090518154945.67a6100f.michael.s.gilb...@gmail.com> and subject line Re: Bug#529326: linux-2.6: CVE-2009-0787 information disclosure in ecryptfs has caused the Debian Bug report #529326, regarding linux-2.6: CVE-2009-0787 inform

Bug#529342: marked as done (linux-2.6: ipv6 potential denial-of-service)

2009-05-18 Thread Debian Bug Tracking System
Your message dated Mon, 18 May 2009 16:05:46 -0400 with message-id <20090518160546.84ef916f.michael.s.gilb...@gmail.com> and subject line Re: linux-2.6: ipv6 potential denial-of-service has caused the Debian Bug report #529342, regarding linux-2.6: ipv6 potential denial-of-service to be marked as

Bug#521495: cdrom: This disc doesn't have any tracks I recognize!

2009-05-18 Thread Cristian Ionescu-Idbohrn
I see something similar: $ uname -a Linux box 2.6.26-2-686 #1 SMP Thu Mar 26 01:08:11 UTC 2009 i686 GNU/Linux (Debian sid) [ 4655.526396] cdrom: This disc doesn't have any tracks I recognize! [ 4655.577404] attempt to access beyond end of device [ 4655.577404] hda: rw=0, want=68, limit=4 [ 4655.

Bug#523942: linux-image-2.6.26-2-s390 will not boot!

2009-05-18 Thread dann frazier
On Mon, May 18, 2009 at 03:18:38PM -0400, STEPHEN POWELL wrote: > The latest kernel update, revision 2.6.26-15lenny2, still does not > contain the fix for this problem. Yes, 15lenny2 was a security update. This fix is queued for 2.6.26-16 which should be included in Debian 5.0.2. -- dann frazier

Bug#529342: linux-2.6: ipv6 potential denial-of-service

2009-05-18 Thread dann frazier
On Mon, May 18, 2009 at 03:15:59PM -0400, Michael S. Gilbert wrote: > Package: linux-2.6 > Version: 2.6.26 > Severity: important > Tags: security patch > > Hi, > > The following CVE (Common Vulnerabilities & Exposures) id was > published for linux-2.6. > > CVE-2009-1360[0]: > | The __inet6_check

Bug#529326: linux-2.6: CVE-2009-0787 information disclosure in ecryptfs

2009-05-18 Thread Nico Golde
Hi, * dann frazier [2009-05-18 23:19]: > On Mon, May 18, 2009 at 02:20:20PM -0400, Michael S. Gilbert wrote: > > On Mon, 18 May 2009 11:52:04 -0600, dann frazier wrote: > > > On Mon, May 18, 2009 at 01:28:56PM -0400, Michael S. Gilbert wrote: [...] > > > This issue supposedly only affected 2.6.28

Processed: tagging 529312

2009-05-18 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > # Automatically generated email from bts, devscripts version 2.10.35lenny3 > tags 529312 + pending Bug#529312: linux-image-2.6.26-2-686-bigmem: Does not recognize all CPUs on "summit" SMP machines There were no tags set. Tags added: pending > En

Bug#529312: linux-image-2.6.26-2-686-bigmem: Does not recognize all CPUs on "summit" SMP machines

2009-05-18 Thread dann frazier
On Mon, May 18, 2009 at 05:11:41PM +0200, Andreas U. Trottmann wrote: > Package: linux-image-2.6.26-2-686-bigmem > Version: 2.6.26-15 > > Hello, > > The Linux kernel sources upon which > linux-image-2.6.26-2-686-bigmem is based are suffering from a > bug, which only affects the (relatively rare)

Processing of linux-2.6.24_2.6.24-6~etchnhalf.9_ia64.changes

2009-05-18 Thread Archive Administrator
linux-2.6.24_2.6.24-6~etchnhalf.9_ia64.changes uploaded successfully to localhost along with the files: linux-2.6.24_2.6.24-6~etchnhalf.9.dsc linux-2.6.24_2.6.24-6~etchnhalf.9.diff.gz linux-doc-2.6.24_2.6.24-6~etchnhalf.9_all.deb linux-manual-2.6.24_2.6.24-6~etchnhalf.9_all.deb linux-pat

linux-2.6.24_2.6.24-6~etchnhalf.9_ia64.changes ACCEPTED

2009-05-18 Thread Debian Installer
Accepted: linux-2.6.24_2.6.24-6~etchnhalf.9.diff.gz to pool/main/l/linux-2.6.24/linux-2.6.24_2.6.24-6~etchnhalf.9.diff.gz linux-2.6.24_2.6.24-6~etchnhalf.9.dsc to pool/main/l/linux-2.6.24/linux-2.6.24_2.6.24-6~etchnhalf.9.dsc linux-doc-2.6.24_2.6.24-6~etchnhalf.9_all.deb to pool/main/l/linux

Bug#520100: marked as done (linux-2.6: inexistant syscalls return wrong errno on mips/mipsel)

2009-05-18 Thread Debian Bug Tracking System
Your message dated Tue, 19 May 2009 01:54:13 + with message-id and subject line Bug#520100: fixed in linux-2.6.24 2.6.24-6~etchnhalf.9 has caused the Debian Bug report #520100, regarding linux-2.6: inexistant syscalls return wrong errno on mips/mipsel to be marked as done. This means that yo