Package: taxbird
Version: 0.14-1
Severity: normal
(Probably) same here. When sending as test case (incompletely filled form, not
exported to Coala XML, no signature, call Geier, do not print transmission
protocol via taxbird-print-helper, do not store protocol to file) I get:
> Program received
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Robert Millan wrote:
> I think the usual thing to find in that output are physical devices instead
> of /dev/dm-X.
>
> What other special things are in your setup that we should know about? Are
> you using LVM / EVMS or something like that?
No LVM
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Robert Millan wrote:
> Please try:
>
> mdadm -D -b /dev/md0
> mdadm -D /dev/md0
> debby:~# mdadm -D -b /dev/md0
> ARRAY /dev/md0 level=raid1 num-devices=1 spares=1
> UUID=b36bed37:7b1ca284:5f985e7d:0ec83b51
> debby:~# mdadm -D /dev/md0
> /dev
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Robert Millan wrote:
> On Sun, Jul 27, 2008 at 03:07:41PM +0200, Moritz Naumann wrote:
>> debby:~# /usr/sbin/grub-probe -t device /boot
>> /dev/md0
>>
>> debby:~# /usr/sbin/grub-probe -t device /
>> /dev/md2
>
&g
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Felix Zielcke wrote:
> Am Sonntag, den 27.07.2008, 15:07 +0200 schrieb Moritz Naumann:
>
>> Unfortunately, it doesn't work with 1.96+20080724-2 either:
>
> I just saw that PATH contains /usr/local before /usr, I always th
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Felix Zielcke wrote:
> Please see the message above in the report, The patch from Robert is in
> 1.96+20080724-2 not -1 which you have installed.
>
Ah, my bad. Thanks for the hint, Felix.
Unfortunately, it doesn't work with 1.96+20080724-2 either:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Robert Millan wrote:
> [..] Simply run from your build dir:
>
> ./grub-probe -t device /
> ./grub-probe -t device /boot
>
> Instead of /dev/dm-X, it should print /dev/md0 or /dev/md2.
While this worked, installing the new grub-common package (
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Robert Millan wrote:
> [..] Simply run from your build dir:
>
> ./grub-probe -t device /
> ./grub-probe -t device /boot
>
> Instead of /dev/dm-X, it should print /dev/md0 or /dev/md2.
It does :-) :
debby:~/grub2-1.96+20080704# ./grub-probe -t
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Felix Zielcke wrote:
> ./configure; make install installs everything to /usr/local not /usr
> and /usr is before /usr/local in PATH
> update-grub is just a bash script which invokes some commands
I realized this, thanks for making me aware though. I
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Robert Millan wrote:
> Does this patch (for grub-common) fix the problem?
While the patch applies fine and I can compile using
"./configure; make", I cannot rebuild the deb using debuild:
> debby:~/grub2-1.96+20080704# export LANG=en_US.UTF-8
> deb
Package: emdebian-tools
Severity: grave
Tags: security
I'm not providing additional technical information or ways to reproduce
this issue since - while a patch is available - I cannot verify whether
or not there are other vulnerable installations out there.
Please feel free to get in touch with
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Sorry for the broken formatting of my last email.
Bart Martens wrote:
> Does this work ?
>
> man update-flashplugin-nonfree
yes
> update-flashplugin-nonfree --install
yes
Unfortunately, I was not aware of the update-flashplugin-nonfree script.
I
<[EMAIL PROTECTED]> <[EMAIL PROTECTED]>
Message-ID: <[EMAIL PROTECTED]>
X-Sender: [EMAIL PROTECTED]
Received: from janus.zertificon.com [213.23.92.1] with HTTP/1.1 (POST); Fri, 11
Apr 2008 09:55:58 +
User-Agent: freeIT.org Webmail
Content-Type: text/plain; charset="UTF-8"
Content-Transf
Package: flashplugin-nonfree
Version: 1:1.4~bpo40+1
Severity: grave
Tags: security
Justification: user security hole
Adobe has released v9.0.124.0 which is supposed to provide fixes for
CVE-2007-5275
CVE-2007-6243
CVE-2007-6637
CVE-2007-6019
CVE-2007-0071
CVE-2008-1655
CVE-2008-1654
http://www.a
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Package: win32-loader
Version: 0.6.0~pre3
Severity: critical
Tags: security
Justification: root security hole
The default boot option used by this package contains the following:
preseed/url=http://goodbye-microsoft.com/runtime/preseed.cfg
As seen
Package: thunderbird
Version: 1.5-4
Severity: grave
Tags: security
Justification: user security hole
SSL v2 encryption is been considered insecure because of design flaws
and weak ciphers [1], as such security.enable_ssl2 = false should be set
by default. However, currently this package accepts S
Did I say "Please mark this a duplicate of 359905 and close."?
Of course, I meant "Please mark this a duplicate of 359906 and close".
I did not *mean to* destroy your day.
/me looking for a good place to hide away.
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". T
I'm sorry for this. Please mark this a duplicate of 359905 and close.
Thanks.
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Package: php5
Version: 5:5.1.2-1
Severity: grave
Tags: security
Justification: user security hole
A security issue in PHP has been reported which may allow for disclosing
partial working memory contents on some PHP applications.
Quoting Stefan Esser:
> The bug is a binary safety issue in html_ent
I'm sorry for this. Please mark this a duplicate of 359906 and close. I
will file a seperate bug against the php5 package. Thanks.
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Package: php4
Version: 5:5.1.2-1
Severity: grave
Tags: security
Justification: user security hole
A security issue in PHP has been reported which may allow for disclosing
partial working memory contents on some PHP applications.
Quoting Stefan Esser:
> The bug is a binary safety issue in html_ent
Package: php4
Version: 4:4.4.2-1
Severity: grave
Tags: security
Justification: user security hole
A security issue in PHP has been reported which may allow for disclosing
partial working memory contents on some PHP applications.
Quoting Stefan Esser:
> The bug is a binary safety issue in html_ent
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Package: php4
Version: 4:4.4.2-1
Severity: grave
Tags: security
Justification: user security hole
A security issue in PHP has been reported which may allow for disclosing
partial working memory contents on some PHP applications.
Quoting Stefan Esser:
Package: gobby
Version: 0.2.2-2
Followup-For: Bug #337047
I'm running into the same problem. Here's the (stripped down) output when
running it under valgrind:
$ valgrind --leak-check=full gobby >valgrind.log 2>&1
[..]
==10948== Using valgrind-2.4.0, a program supervision framework for x86-linux.
24 matches
Mail list logo