Package: gnokii-smsd-mysql
Version: 0.6.29.dfsg-1
Severity: important
This is what I have in dmesg:
[7346337.864372] smsd[15073] general protection ip:7fd752f663b3 sp:7fd75002e370
error:0 in libgnokii.so.6.0.0[7fd752f35000+97000]
Running smsd from strace I get this:
[pid 20417] open("/dev/gsmmod
Package: xen-linux-system-2.6-xen-686
Version: 2.6.32+29
Severity: grave
Justification: renders package unusable
After upgrading this machine to squeeze xen is refusing to boot the dom0 and
starts printing IO errors.
It doesn't respond to Magic-Sys Rq any longer and all I can see is this in the
Package: munin-node
Version: 1.4.5-3
Severity: normal
This may be related to http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=488360
because the SMART ouput for an SAS disk looks very similar.
There is not much there but SMART Health Status, temperature, and some of the
other numbers would be u
Package: linux-2.6
Version: 2.6.32-45
Severity: normal
I have my filesystem mounted like this:
/dev/mapper/vg0-lv0 on /var type reiserfs
(rw,noatime,grpjquota=aquota.group,jqfmt=vfsv0)
This was working for a while but has recently stopped working. The machine has
now been up for 58 days and I
Package: linux-2.6
Version: 2.6.32-45
Severity: minor
I have just installed this machine and testing btrfs for 2 drives (each 2TB,
configured with raid1 metadata, raid0 data)
I noticed these kernel oops in dmes
-- Package-specific info:
** Version:
Linux version 2.6.32-5-amd64 (Debian 2.6.32-45
Package: proftpd-basic
Version: 1.3.1-17lenny9
Severity: normal
Tags: squeeze
I think this is the same problem as reported here
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=630091
But happens even without HideFiles pattern set in teh current stable version of
proftpd-basic when accessing a
On Tuesday 08 May 2012 15:43:42 Ben Hutchings wrote:
> On Tue, 2012-05-08 at 13:58 +0100, Michael Moritz wrote:
> > Package: linux-2.6
> > Version: 2.6.32-41squeeze2
> > Severity: minor
> >
> [..]
>
> Looks like this is related to quota initialisation.
Package: linux-2.6
Version: 2.6.32-41squeeze2
Severity: minor
After upgrading the kernel to squeeze/stable I've noticed this kernel oops in
the startup. It may be related to using reiserfs/lvm/raid1:
[ 33.260871] REISERFS (device dm-0): found reiserfs format "3.6" with
standard journal
[ 33
Package: fail2ban
Version: 0.8.4-3
Severity: grave
Tags: security
Justification: user security hole
I have used fail2ban but this is very strange. According to fail2ban log
and the output of iptables some of the iptables commands in the
iptables-multiport action script fail. I can't see any sytem
Package: php5-common
Version: 5.2.17-0.dotdeb.0
Severity: normal
The php5 cronjob evauates the the php.ini files and /usr/lib/php5/maxlifetime
and then (by default) deletes sessions after 24 mins.
In mediawiki and possibly other applications editing a page can easily take
longer than 24 mins
This is not related to the linux-kernel. Thanks to people on the debian-isp
list I found out the problem has to do with partitioning and 4K sector size.
See this thread for more details
http://lists.debian.org/debian-isp/2011/08/msg00011.html
Michael
--
Michael Moritz
GreenNet Systems
Package: linux-2.6
Severity: important
I've set up a raid1 device with one missing device and created a lvm logical
volume on it (pvcreate, vgcreate, lvcreate). Disk IO is significantly slower
than when I do the same set-up using the onde device directly and no raid1.
I've tested this with diff
Package: apt-cacher-ng
Version: 0.5.1-3
Severity: normal
After upgrading to Debian squeeze and enabling the dynamic remapping some (or
all) of the Ubuntu mirrors seems broken and return 404 not found.
Running on the client with Http header debug flag I get:
88% [Working]GET
http://archive.ubu
Package: gnokii
Version: 0.6.26.dfsg-3
Severity: normal
When I put this particular message through gnokii-smsd-mysql it splits it up
into 16 messages each containing a small portion of the original message.
The original message is this:
chekov/RAID status CRITICAL:CRITICALs: md4 is 0.00 (outside
Package: linux-image-2.6.18-6-686-bigmem
Version: 2.6.18.dfsg.1-24etch2
Severity: critical
Tags: security
Justification: root security hole
see
http://blog.cr0.org/2009/08/linux-null-pointer-dereference-due-to.html
and the fix
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a
Package: rkhunter
Version: 1.2.9-2
Severity: minor
-- System Information:
Debian Release: 4.0
APT prefers stable
APT policy: (990, 'stable'), (400, 'testing')
Architecture: i386 (i686)
Shell: /bin/sh linked to /bin/bash
Kernel: Linux 2.6.18-4-686-bigmem
Locale: LANG=en_GB, LC_CTYPE=en_GB (c
16 matches
Mail list logo