Bug#321666: Found bug #321666 again

2005-09-09 Thread Sam Couter
found 321666 0.91-7 found 321666 0.91-8 stop Without details on the bug, I can't be 100% sure, but I'm seeing this same error message with both 0.91-8 and 0.91-7. Device permissions look fine, ptal-printd is running as the hpojlp user, and hpojlp is in the lp group. -- Sam "Eddie" Couter | mail

Bug#321666: iopl() returns EPERM because ptal-mlcd isn't root!

2005-09-10 Thread Sam Couter
The problem is that ptal-mlcd is running as a non-root user and is trying to use iopl() to grant itself permission to directly mess with the parallel IO port. iopl() only works for root. Looks like this bug only affects parallel printers. The iopl() man page says "Permissions are inherited by for

Bug#309615: libapache2-svn: missing Depends

2005-05-18 Thread Sam Couter
Package: libapache2-svn Version: 1.1.4-2 Severity: serious Justification: Breaks apache The libapache2-svn package needs a few extra Depends: on SASL and SSL libraries. [EMAIL PROTECTED]:/var/log/apache2# /etc/init.d/apache2 start Starting web server: Apache2/usr/sbin/apache2: error while loading

Bug#315074: ipkungfu: Renders system inaccessible

2005-06-20 Thread Sam Couter
Package: ipkungfu Version: 0.5.2-3 Severity: critical Justification: renders entire system inaccessible Don't do this: # apt-get install ipkungfu Because then you have to do this: - Grab spare monitor and keyboard - Lug spare monitor and keyboard across the room/city/state/country - Crawl into

Bug#291680: firehol: insecure temporary directory handling

2005-01-22 Thread Sam Couter
Package: firehol Version: 1.214-1 Severity: critical Tags: security sarge Both firehol and firehol-wizard use known temporary file names in a predictably named temporary directory (PID-based). Neither program ensures that those directories are safe before blasting the contents of files within. An

Bug#291680: isn't really fixed yet

2005-01-29 Thread Sam Couter
reopen 291680 stop /sbin/firehol has: --- copy 'n paste --- #set out umask so that nobody could exploit the tempdir umask 077 test -d "${FIREHOL_DIR}" && echo "Tempdir already exists. Please remove it before proceeding" && exit 1 ${MKDIR_CMD} -p "${FIREHOL_DIR}" test $? -gt 0 && exit 1 --- end co