Bug#889740: xmotd: crashes when built with hardening

2018-02-13 Thread Christoph Pleger
Hello, so, I suggest the attached patch for a solution. It removes most compile time warnings and makes xmotd to not crash (tested on stretch amd64). Regards ChristophRemove compiler and linker warnings Index: xmotd-1.17.3b/atom.c =

Bug#868283: cups-browsed ignores "DefaultPolicy authenticated" from cupsd.conf

2017-07-13 Thread Christoph Pleger
Package: cups-browsed Version: 1.11.6-3 Severity: critical Dear maintainers, cups-browsed from Debian stretch ignores the "DefaultPolicy authenticated" entry in my cupsd.conf, so that all browsed-imported printers in /etc/cups/printers.conf are listed with "OpPolicy default". That differs fro

Bug#865976: mdadm destroys my LSI Megaraid software raid

2017-06-26 Thread Christoph Pleger
Package: mdadm Version: 3.3.2-5+deb8u2 Severity: critical Dear maintainers, I created a virtual drive in the the RAID-Setup of a computer with LSI Megaraid software raid support. Then I booted from my self-created installation DVD (that has mdadm installed), let it partition the virtual drive

Bug#864423: Software RAID is not activated at boot time

2017-06-08 Thread Christoph Pleger
Package: dmraid Version: 1.0.0.rc16-5 Severity: critical Dear maintainers, dmraid in jessie currently does not activate my software raid. As the boot/root partition is on the raid, my machine does not boot. The reason is that in /usr/share/initramfs-tools/scripts/local-top/dmraid, the call o

Bug#544687: libpam-unix2: forks numerous instances of unix2_chkpwd

2012-05-29 Thread Christoph Pleger
On Sun, 27 May 2012 21:53:59 +0200 Jakub Wilk wrote: > >It seems that this only happens when a user wants to unlock the > >screen, not when logging in. > > Does it happen regardless of whether the entered password was correct > or not? This is always happening, regardless of if the password is

Bug#560333: libc6: getpwnam shows shadow passwords of NIS users

2010-01-18 Thread Christoph Pleger
Hello, > For your information, security uploads for etch and lenny have been > done, so we are close to release a Debian Security Announce (DSA) > with a fix (we are only missing a few builds for etch). > > I have also build the lenny package for i386 and uploaded it here: > http://temp.aurel32.n

Bug#519947: resolvconf destroys /etc/resolv.conf on every boot

2009-03-16 Thread Christoph Pleger
Package: resolvconf Version: 1.42 Severity: critical Justification: breaks unrelated software Hello, after installing resolvconf (because it is recommended by vpnc), my file /etc/resolv.conf was overwritten by only a comment that the file should not be edited by hand. Because it contained no in

Bug#492348: libpam-devperm: Breaks execution of at jobs

2008-07-25 Thread Christoph Pleger
Package: libpam-devperm Version: 1.5-2 Severity: critical Justification: breaks unrelated software Hello, as you can see in the bug description for Debian Bug #418560, at jobs are not executed if I include "session required pam_devperm.so" to my /etc/pam.d/common-session. I do not know if this

Bug#418560: unreproducible

2007-04-16 Thread Christoph Pleger
Hello Mario, > I have the same version installed here and I can't agree that this bug > exists, I tested it here on my local machine in the office: > > [EMAIL PROTECTED]:~$ at 11:40 > warning: commands will be executed using /bin/sh > at> echo test | mail [EMAIL PROTECTED] > at> > job 1 at Mon A

Bug#418675: kdelibs: missing dependency on g++

2007-04-11 Thread Christoph Pleger
Christoph Pleger -- System Information: Debian Release: 4.0 APT prefers stable APT policy: (500, 'stable') Architecture: i386 (i686) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.18-686-irb Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) Versions of packages kdelibs

Bug#418560: at: fails to execute jobs

2007-04-10 Thread Christoph Pleger
running), but it never ends and no mail is sent to me. I also tried other users and other jobs (e.g. executing a shutdown), none of them was completed successfully. Regards Christoph Pleger -- System Information: Debian Release: 4.0 APT prefers stable APT policy: (500, 's