Hi everyone,
I can reproduce the failure and confirmed that tests succeed with the
new upstream release, which I'll upload shortly.
Thanks,
Max
--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian
On Mon, Jan 04, 2010 at 07:10:12AM -0500, Daniel Dickinson wrote:
> Package: aespipe
> Version: 2.3d-2
> Severity: serious
> Justification: required dependences must be listed
>
> aespipe with a Standard system emits warnings that uuencode is missing (line
> 84)
> sharutils supplies uuencode.
I'm
severity 542695 important
thanks
Hello,
On Thu, Aug 20, 2009 at 10:14:46PM +0200, J.M.Roth wrote:
> # aptitude install loop-aes-modules-2.6.26-2-686
> # modprobe loop-aes
> # lsmod | grep loop
> loop 55372 0
> # dmesg | tail -3
> [ 4457.015307] loop: module loaded
> [ 4521.9476
On Tue, Aug 11, 2009 at 09:56:43PM +0200, Frans Pop wrote:
> It looks like busybox also causes a failure on i386.
>
> If I boot a daily mini.iso, the boot hangs when executing the last line
> from /sbin/init:
> exec /usr/sbin/chroot . /bin/busybox init /dev/console 2>&1
I'm seeing this also on a
severity 539228 important
thanks
Hello,
On Thu, Jul 30, 2009 at 12:43:04AM +0200, da jedall wrote:
> When i try to install debian squeeze on usb key (netinstall)
> and when i try to create installation over encrypted fs in partman,partman
> reload and freeze at 52% of loading.
> The installation
severity 515249 normal
clone 515249 -1
retitle -1 manual: Mention console=hvc0 for ppc?
reassign -1 installation-guide
thanks
On Sun, Feb 15, 2009 at 10:49:36AM +, Paul McEnery wrote:
> Comments/Problems:
>
> Initial boot: Maybe not soe much an error, I had to specify the
> cons
unarchive 517231
reassign 520285 debian-installer
forcemerge 517231 520285
archive 517231
thanks
This bug was another instance of the problem described
in #517231 and should no longer occur in current images.
Thanks for your bug report.
Max
--
To UNSUBSCRIBE, email to debian-bugs-rc-
Hi Dmitry,
On Sun, Mar 29, 2009 at 01:41:47PM +0200, Max Vozeler wrote:
> On Sun, Mar 29, 2009 at 02:45:05PM +0400, Dmitry E. Oboukhov wrote:
> > Usually I use the command like as
> >
> > module-assistant -l 2.6.29-1-686 a-i loop-aes-source
> >
> > but with 2.6
reassign linux-2.6 2.6.29-1
merge 521472 521672
thanks
Hi Dmitry,
On Sun, Mar 29, 2009 at 02:45:05PM +0400, Dmitry E. Oboukhov wrote:
> Usually I use the command like as
>
> module-assistant -l 2.6.29-1-686 a-i loop-aes-source
>
> but with 2.6.29 (sid) kernel build has failed.
This is caused b
Hi Jari,
some of our users [in Debian] are starting to expect new
options that have been added to losetup in util-linux-ng to
work with the loop-AES version of losetup as well.
This is starting to cause other packages and scripts to
break when users use loop-AES patched losetup. In particular,
s
Hi Cyril,
On Tue, Aug 19, 2008 at 06:32:54PM +0200, Cyril Brulebois wrote:
> diverting losetup without implementing losetup -f looks quite a serious
> bug to me.
I won't disagree. -f is rather "recent" and hasn't been
picked up by the loop-AES fork so far. Let me check how it
can be enabled, an
tags 470941 - unreproducible
tags 470941 + confirmed pending
thanks
On Fri, Mar 14, 2008 at 11:41:11PM +0100, Marc Lehmann wrote:
> > Just guessing as to what the problem could be -
> >
> > If the mount package is an old version that predates
> > the switch to using mount.nfs, it could be that
tags 470941 + unreproducible
thanks
Hello Marc,
On Fri, Mar 14, 2008 at 06:27:02PM +0100, Marc Lehmann wrote:
> after installing loop-aes-utils, automount failed to be able to mount nfs
> volumes, and indeed, mount no longer is able to do nfs mounts:
>
># mount 10.0.0.5:/ /mnt
>mount: wr
Package: loop-aes
Version: 3.2b-4
Severity: serious
The loop-aes-modules-* binary module packages are no longer
built from loop-aes >= 3.2b-4.
They have been taken over by linux-modules-extra-2.6
starting from version 2.6.24-1.
This is a "dummy" RC bug to make sure the newer loop-aes
doesn't re
tags 400055 + confirmed pending
thanks
On Thu, Nov 23, 2006 at 06:09:24PM +0100, Lucas Nussbaum wrote:
> During a rebuild of all packages in etch, I discovered that your
> package failed to build on i386.
>
> Your package depends on loop-aes-source (>= 3.1d-3), but this package
> was removed from
Hi Rafał,
On Sat, Oct 21, 2006 at 05:13:44PM +0200, [EMAIL PROTECTED] wrote:
> Max Vozeler wrote:
> > Can you please send /var/log/dpkg.log (ideally as bzip2) and tell me
> > roughly at which date you did this upgrade? Perhaps you can determine
> > the relevant entries from d
Hi Rafał,
On Sat, Oct 21, 2006 at 06:01:07AM +0200, [EMAIL PROTECTED] wrote:
> Also, right after doing apt-get upgrade which upgraded the
> loop-aes-utils probably (among other tools), the systeam was left
> without ANY mount at all! there was no file /bin/mount, only file
> /bin/moun.orig which I
tags 390554 + pending
thanks
On Sun, Oct 01, 2006 at 09:21:13PM +0200, Bastian Blank wrote:
> > /usr/bin/make -C /usr/src/linux-headers-2.6.17-2-s390-tape
> > M=/build/buildd/loop-aes-3.1d/debian/build/build_s390_none_s390-tape
> > make: Entering an unknown directory
> > make: *** /usr/src/linux
Hey David,
Thanks for adding the checks.
On Tue, Sep 26, 2006 at 06:37:59PM +0200, David Härdeman wrote:
> This leaves libpopt0 and cdebconf-newt-entropy
cdebconf-newt-entropy is already taken care of through db_capb;
blockdev-keygen will return an error dialog if it needs but cannot
find the p
Hey again,
On Tue, Sep 26, 2006 at 06:37:59PM +0200, David Härdeman wrote:
> This leaves libpopt0 and cdebconf-newt-entropy
>
> I've committed a preliminary test for the presence of those two libs to
> crypto_check_required_tools.
case $1 in
dm-crypt)
- tools="/bin
On Mon, Sep 25, 2006 at 09:53:31PM +0200, Frans Pop wrote:
> /var/log/syslog shows:
> kernel: device-mapper: crypt: Error allocating crypto tfm
> kernel: device-mapper: error adding target to table
> kernel: device-mapper: device doesn't appear to be in the dev hash table.
> partman-crypto: Command
Hi Julien,
Thanks for your report.
On Sat, Aug 12, 2006 at 01:14:59AM +0200, Julien Danjou wrote:
> There was a problem while autobuilding your package:
>
> > Automatic build of loop-aes-modules_3.1d+3+3 on avidan by sbuild/i386 0.49
> > Build started at 20060812-0033
> > **
Hi Michael,
On Mon, Jul 10, 2006 at 03:55:11PM +0200, Michael Ablassmeier wrote:
>Building modules, stage 2.
>MODPOST
> *** Warning: "loop_compute_md5_iv_v3" is undefined!
> *** Warning: "loop_compute_sector_iv" is undefined!
> *** Warning: "md5_transform_CPUbyteorder_C" is undefined!
>
tags 354204 + confirmed pending
thanks
On Fri, Feb 24, 2006 at 10:25:12AM +0100, Daniel Schepler wrote:
> Package: loop-aes-source
> Version: 3.1c-2
> Severity: serious
>
> From my pbuilder build log:
>
> ...
> dh_installdocs
> dh_install
> cp: cannot stat `./debian/patches': No such file or dir
This is CVE-2005-4532.
BTW, did you have a chance to look at this bug yet? I'm considering
to do an NMU for unstable, but I'd prefer if someone who actively uses
scponly and who could test the changes would do the upload.
cheers,
Max
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject
The chroot-fix in 4.2 had a bug that refused to chroot although
directory permissions were OK. This bug was also present in the
previously attached patch. Attached is a fixed version.
cheers,
Max
diff -ur scponly-4.0/scponly.c scponly-4.0-chrootfix/scponly.c
--- scponly-4.0/scponly.c 2005-12
t; rssh v2.3.0 released today!
>
> Important Security Notice:
>
> Max Vozeler has reported a problem whereby rssh can allow users who
> have shell access to systems where rssh is installed (and
> rssh_chroot_helper is installed SUID) to gain root access to the
> system, due to
On Thu, Dec 22, 2005 at 04:56:55PM +0100, Max Vozeler wrote:
> http://lists.ccs.neu.edu/pipermail/scponly/2005-December/001027.html
This should read http_s_
https://lists.ccs.neu.edu/pipermail/scponly/2005-December/001027.html
cheers,
Max
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
wit
found 344418 4.0-1
tags 344418 + patch
thanks
The attached patch is extracted from 4.2 and should apply to 4.0-1 in
stable. I've verified that it builds and fixes the bug.
Note that there is a small change in behaviour that could break existing
(but unsafe) setups. If the home directory is not ow
Package: scponly
Version: 4.1-1
Severity: critical
Hey Thomas,
scponly 4.2 has been released with a fix for the privilege
escalation we've mailed about.
http://lists.ccs.neu.edu/pipermail/scponly/2005-December/001027.html:
> ...
> Problem Description: If ALL the following conditions are true,
>
On Tue, Dec 13, 2005 at 10:54:34AM +1030, Arthur Marsh wrote:
> Package: linux-image-2.6.14-2-686
> Version: 2.6.14-5
> Followup-For: Bug #343048
>
> Same thing happens here. I also had problems trying to install
> loop-aes at the same time as upgrading from 2.6.14-4 to 2.6.14-5. The
> installatio
EGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.7
Date: Fri, 16 Sep 2005 15:12:02 +0200
Source: loop-aes-utils
Binary: loop-aes-utils
Architecture: source i386
Version: 2.12p-4sarge1
Distribution: stable-security
Urgency: high
Maintainer: [EMAIL PROTECTED]
Changed-By: Max Vozeler <[EMAIL PROTE
This bug has been assigned CAN-2005-2876
cheers,
Max
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
tags 328141 +patch
thanks
On Wed, Sep 14, 2005 at 06:22:00AM +1000, Paul Szabo wrote:
> [ .. umount -r drops flags ]
> http://www.securityfocus.com/archive/1/410333
The attached patch is extracted from 2.12r-pre1, it simply
disallows user r/o remounts.
cheers,
Max
--- /home/max/deb/loop-aes-ut
Package: maildrop
Version: 1.5.3-1.1
Severity: critical
Justification: local privilege escalation
Tags: security sarge sid patch
Hi Josip,
I've already tried to contact you about this, but have not heard
from you. I'm filing it now to keep track. Please refer to message
<[EMAIL PROTECTED]> for fu
Package: pstotext
Version: 1.9-1
Severity: grave
Justification: remote code execution
Tags: security woody sarge etch sid patch
Hi Ray,
we've already talked about this, I'm just filing it to keep track.
Please refer to message <[EMAIL PROTECTED]>
(sent to maintainer and security team) for all det
36 matches
Mail list logo