Bug#659174: back-sql segfaults on amd64, but not on i386

2012-12-01 Thread Cédric Dufour
;a=commitdiff;h=0a9f51f58d1e20f92ad2f6a21c70ca04304a7f93 Can you please consider applying this fix in Debian/Squeeze? Note: this bug leads to DoS of the LDAP server as soon as one issues a query involving the SQL backend. Thanks in best regards, Cédric Dufour -- System Information: Debian

Bug#827591: firefox-esr: Cannot install add-on that requires restart (Unable to read add-on manifest / NS_ERROR_XPC_GS_RETURNED_FAILURE)

2016-06-18 Thread Cédric Dufour
Package: firefox-esr Version: 45.2.0esr-1~deb8u1 Severity: normal Dear Maintainer, Since Firefox ESR 45, attempting to install an add-on that requires a browser restart fails with (at the time of restart): addons.xpi ERROR Unable to read add-on manifest from ~cdufour/.mozilla/firefox/cdufour.pro

Bug#827592: icedove: Cannot install add-on that requires restart (Unable to read add-on manifest / NS_ERROR_XPC_GS_RETURNED_FAILURE)

2016-06-18 Thread Cédric Dufour
Package: icedove Version: 1:45.1.0-1~deb8u1 Severity: normal Dear Maintainer, Since Icedove 45, attempting to install an add-on that requires a browser restart fails with (at the time of restart): ERROR: Unable to read add-on manifest / NS_ERROR_XPC_GS_RETURNED_FAILURE The problem is exactly id

Bug#914511: Please enable the "virtio-rng" driver in "cloud" kernels

2019-07-09 Thread Cédric Dufour
-information.en.html#entropy-starvation -- Cédric Dufour - Exoscale (Lausanne, Switzerland)

Bug#914511: Please enable the "virtio-rng" driver in "cloud" kernels

2019-07-09 Thread Cédric Dufour
Workaround: have the hypervisor expose the 'rdrand' CPU feature to the VM (but this is in the hands of the hypervisor's provider, not the VM user)

Bug#966846: Kernel panic (4.19.0-10): RIP __cgroup_bpf_run_filter_skb

2020-08-03 Thread Cédric Dufour
ry 4.19.131-1 It *seems* there is already a patch proposed upstream (although here for kernel 4.9): https://lkml.org/lkml/2020/7/20/883 Best regards, Cédric -- Cédric Dufour

Bug#860225: bind9: CVE-2017-3137: A response packet can cause a resolver to terminate when processing an answer containing a CNAME or DNAME

2017-05-07 Thread Cédric Dufour - Idiap Research Institute
Same here. Multi/redundant DNS servers do not help, the culprit recursive query being sent multiple times by client as each DNS server falls in turn. And multi- firewall/IPS doesn't help catching the faulty packets :-( I may state the obvious, but only workaround so far is (already saved the

Bug#808950: Broken ipvsadm init script (syncid) cont'd

2017-02-22 Thread Cédric Dufour - Idiap Research Institute
best, Cédric Dufour

Bug#793027: Missing QuoVadis "G3" Root CAs (in Wheezy)

2015-07-21 Thread Cédric Dufour - Idiap Research Institute
Hello, On 20/07/15 17:30, Cedric Dufour wrote: > On 07/20/2015 09:57 AM, Cédric Dufour - Idiap Research Institute wrote: >> In Debian/Wheezy (oldstable), QuoVadis three "G3" Root CAs - >> https://www.quovadisglobal.ch/Repository/DownloadRootsAndCRL.aspx - >> are mi

Bug#793027: Missing QuoVadis "G3" Root CAs (in Wheezy)

2015-07-21 Thread Cédric Dufour - Idiap Research Institute
On 21/07/15 15:45, Michael Shuler wrote: > Do you have a wheezy-updates (previously known as 'volatile') apt line > enabled in your sources.list by default? That repo has far less "accidental > upgrade" surface than having jessie in sources.list. That might be the better > spot for an updated p

Bug#793027: Missing QuoVadis "G3" Root CAs (in Wheezy)

2015-07-23 Thread Cédric Dufour - Idiap Research Institute
Hello On 21/07/15 17:54, Michael Shuler wrote: > On 07/21/2015 09:05 AM, Cédric Dufour - Idiap Research Institute wrote: >> Would you plan to push an updated/"backported" ca-certificates in >> wheezy-updates ? >> Would security updates - e.g. removal of a compromis

Bug#793027: Missing QuoVadis "G3" Root CAs (in Wheezy)

2015-07-20 Thread Cédric Dufour - Idiap Research Institute
essie). Would it be possible to add them (as we now receive server certificates that trace back to such "G3" root issuing CAs) ? Thanks and best regards, Cédric -- Cédric Dufour @ Idiap Research Institute -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a sub

Bug#814340: CUPS won't start at boot (systemd)

2016-02-10 Thread Cédric Dufour - Idiap Research Institute
ible workaround/hack: touch /var/sppol/cups/d) CUPS starts at boot as expected. Thank you for considering this report. Best regards, Cédric -- Cédric Dufour @ Idiap Research Institute

Bug#814340: CUPS won't start at boot (systemd)

2016-02-12 Thread Cédric Dufour - Idiap Research Institute
Hello again, The issue at hand does not occur on hosts where 'cups-browsed' is also installed (I guess the cups.service somehow gets "pulled in" by /etc/systemd/system/multi-user.target.wants/cups-browsed.service; I don't understand, however, how /etc/systemd/system/paths.target.wants/cups.path co

Bug#814340: CUPS won't start at boot (systemd)

2016-02-13 Thread Cédric Dufour - Idiap Research Institute
Hello Brian, Thank you for your follow up. There something I don't understand and maybe you can clarifiy it for me (see below) On 13/02/16 00:19, Brian Potkin wrote: > On Wed 10 Feb 2016 at 15:50:53 +0100, Cédric Dufour - Idiap Research > Institute wrote: > > >> I ha

Bug#852436: cups-browsed uses 100% CPU (Stretch)

2017-08-09 Thread Cédric Dufour - Idiap Research Institute
history of CUPS filters/browsed in Debian OldStable/Jessie, it is not something I'm looking forwards to) Can we hope in seeing this issue also fixed in Debian Stable/Stretch ? Thanks for your efforts, Cédric -- Cédric Dufour @ Idiap Research Institute

Bug#852436: cups-browsed uses 100% CPU - SOLVED (patch attached)

2017-08-09 Thread Cédric Dufour - Idiap Research Institute
On 09/08/17 10:02, Cédric Dufour - Idiap Research Institute wrote: > I confirm this issue is still present is current Debian Stable/Stretch and > renders CUPS unusable in network printing environments. > I could backport the packages from testing or experimental, but then I would &

Bug#868501: tinyca2: Fails to retrieve/prefill country/organization/etc. for new certificates/requests

2018-02-12 Thread Cédric Dufour - Idiap Research Institute
This issue prevents tinyca2 to retrieve the CA associated country/organization/etc. and prefill them as default for new certificates/requests. Thanks @ Rob for the patch, which I confirm fixes this issue. Any chance to have this patch included in Stable ? (it definitely should for Testing and f

Bug#886985: Suggestion: make NSCD start "After=network.target" in systemd

2018-01-12 Thread Cédric Dufour - Idiap Research Institute
to cache *networked* NSS queries (the slow ones). Just a suggestion, though. Thank you for your Debian work and best, Cédric -- Cédric Dufour @ Idiap Research Institute

Bug#897897: Kernel security fix (for CVE-2018-1108) -> AutoFS won't start

2018-05-04 Thread Cédric Dufour - Idiap Research Institute
g-tools (along virtio-rng), haveged, etc. I was wondering whether this might/ought not to be fixed in autofs itself ? Best, Cédric PS: the (root) issue (kernel RNG blocking at boot) is already being discussed on LKML: https://lkml.org/lkml/2018/4/29/121 -- Cédric Dufour @ Idiap Research Institute

Bug#897897: Kernel security fix (for CVE-2018-1108) -> AutoFS won't start

2018-05-13 Thread Cédric Dufour - Idiap Research Institute
It seems this problem is adressed more globally as per bug #897599: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=897599 Which led to fix for CVE-2018-1108 being reverted (temporarily ?), as per DSA 2018-4096: https://www.debian.org/security/2018/dsa-4196 -- Cédric Dufour @ Idiap Research

Bug#895360: virsh cpu-stats -> cgroup CPUACCT controller is not mounted

2018-04-10 Thread Cédric Dufour - Idiap Research Institute
Delegate=yes EOF Would you consider adding this setting to the stock (Debian) libvirtd unit file ? Thank you very much and best, Cédric Other ref: https://answers.launchpad.net/ubuntu/+question/665132 -- Cédric Dufour @ Idiap Research Institute

Bug#882672: thunderbird: Disable the AppArmor profile by default

2017-12-12 Thread Cédric Dufour - Idiap Research Institute
apparmor package is installed and kernel-enabled (security=apparmor) - do the /etc/apparmor.d/disable symlink magic in postinst, based on the debconf choice I hope this can be corrected back to Jessie, since this is serious security issue for those who enabled AppArmor knowingly. Thanks and

Bug#884191: Please do not disable AppArmor silently and prevent its re-activation

2017-12-12 Thread Cédric Dufour - Idiap Research Institute
"grave" since it does "introduces a security hole allowing access to the accounts of users who use the package" for those who did rely on AppArmor to control Thunderbird bevahior along attachements. -- Cédric Dufour @ Idiap Research Institute

Bug#884191: Please do not disable AppArmor silently and prevent its re-activation

2017-12-13 Thread Cédric Dufour - Idiap Research Institute
Hello Carsten, On 12/12/17 21:38, Carsten Schoenert wrote: >>> I think we can implement this change by shipping a symlink to the >>> profile in /etc/apparmor.d/disable/. My understanding is that dpkg >>> will treat this removal of a conffile as a change worth preserving on >>> upgrades, i.e. it wo

Bug#884191: Please do not disable AppArmor silently and prevent its re-activation

2017-12-16 Thread Cédric Dufour - Idiap Research Institute
Hello, On 16/12/17 10:02, Carsten Schoenert wrote: There is the AppArmor profile not re-enable? What let you came to that conclusion? As written before two commands are needed. $ sudo rm /etc/apparmor.d/disable/profile.name $ sudo apparmor_parser -r /etc/apparmor.d/profile.name It does

Bug#662960: ssmtp doesn't validate server TLS certificates

2019-01-09 Thread Cédric Dufour - Idiap Research Institute
Any chance seeing this issue addressed or its severity lowered, so we can have the package in Buster ? Given its purpose - "extremely simple MTA [...]" - should this issue really be considered "serious" (and Release Critical) ? PS: ssmtp is extremely handy to forward machine-generated messages

Bug#662960: ssmtp doesn't validate server TLS certificates

2019-01-10 Thread Cédric Dufour - Idiap Research Institute
On 09/01/2019 16:44, Simon Deziel wrote: > On 2019-01-09 10:23 a.m., Cédric Dufour - Idiap Research Institute wrote: > ssmtp seems like abandonware. Have you tried msmtp(-mta)? It works in a > similar way, is well supported and does the right thing when you want TLS. Indeed. mstmp-mta w

Bug#907452: OpenVPN deadlock when adding PKCS#11 provider (fix proposed)

2018-08-28 Thread Cédric Dufour - Idiap Research Institute
The change proposed here should thus not affect too broad an audience. I know the culprit in all this seems to be OpenVPN but since this bug has been along for several years and nobody seems to be willing to address it, would you consider those changes nonetheless ? Thanks and best, Cédri

Bug#772812: openvpn: No password prompt with pkcs11 (fix proposed)

2018-08-28 Thread Cédric Dufour - Idiap Research Institute
sider applying those patches as debian/patches ? Thanks and best, Cédric -- Cédric Dufour @ Idiap Research Institute Description: Fix for OpenVPN bug #538 --- Origin: upstream Bug: https://community.openvpn.net/openvpn/ticket/538 Bug-Debian: https://bugs.debian.org/772812 Last-Update: 2018-

Bug#915381: Shouldn't nvidia-persistenced be daemonized (using Debian standard way to do so) ?

2018-12-03 Thread Cédric Dufour - Idiap Research Institute
the Debian package does not enable this binary as a (sysv+systemd) daemon, along creating the ad-hoc system user (e.g. "nvpd") for it ? If not, could this be looked into (I can provide input based on my own re-packaging of the daemon) ? Thanks for your work and best regards, Cédri

Bug#915381: Shouldn't nvidia-persistenced be daemonized (using Debian standard way to do so) ?

2018-12-03 Thread Cédric Dufour - Idiap Research Institute
On 03/12/2018 11:58, Andreas Beckmann wrote: > Patches welcome! (Or a pull request against the repo on salsa.) Well, maybe even simpler than a patch: sed 's/__USER__/nvpd/g' \ init/systemd/nvidia-persistenced.service.template \ > debian/nvidia-persistenced.service sed 's/__USER__/nvpd/g' \ i

Bug#701704: Please add --enable-filter-aaaa to configure/build options

2013-02-26 Thread Cédric Dufour--smtphost=smtp . idiap . ch
stance(s). This in particular: - fixes '/etc/init.d/bind9 status' to fail because of wrong PIDFILE (because it keeps using its non chroot-ed path) - allows to specify 'rndc' options, allowing to handle multiple chroot-ed instances gracefully I hope this proposal meets your ap