Hi,
I'm not sure if you would like to change this
In devices.c you scan for the device name in /proc/devices using the %as
string.
On bionic this doesn't seem to work and therefore no devices are found and
because of this no ioctl group ever matches.
I changed the code the following way:
@@
/nitrogen/commit/227ea7a82f698807df7ea038f6a0fd4febb77b75.patch
Will add in the next upload. Thanks!
Cheers
Nico
--
Nico Golde - XMPP: n...@jabber.ccc.de - GPG: 0xA0A0
--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact
Author: nion
Date: 2013-05-16 09:30:14 + (Thu, 16 May 2013)
New Revision: 22282
Modified:
data/CVE/list
Log:
yet another keystone issue (CVE-2013-2014)
Modified: data/CVE/list
===
--- data/CVE/list 2013-05-16 09:14:26
/cvename.cgi?name=CVE-2013-2014
http://security-tracker.debian.org/tracker/CVE-2013-2014
--
Nico Golde - XMPP: n...@jabber.ccc.de - GPG: 0xA0A0
pgpXnGMT1X84j.pgp
Description: PGP signature
/cvename.cgi?name=CVE-2013-2014
http://security-tracker.debian.org/tracker/CVE-2013-2014
--
Nico Golde - XMPP: n...@jabber.ccc.de - GPG: 0xA0A0
pgpHdX9ExAZ3O.pgp
Description: PGP signature
Author: nion
Date: 2013-05-14 20:27:46 + (Tue, 14 May 2013)
New Revision: 22261
Modified:
data/CVE/list
Log:
CVE-2013-2596 is not NFU
Modified: data/CVE/list
===
--- data/CVE/list 2013-05-14 20:19:43 UTC (rev 22260)
+++
...@lists.alioth.debian.org
Changed-By: Nico Golde n...@debian.org
Description:
fetchmail - SSL enabled POP3, APOP, IMAP mail gatherer/forwarder
fetchmailconf - fetchmail configurator
Closes: 631781 699425 706045
Changes:
fetchmail (6.3.26-1) unstable; urgency=low
.
* New upstream release.
- Fix
Author: nion
Date: 2013-05-07 14:01:48 + (Tue, 07 May 2013)
New Revision: 22197
Modified:
data/CVE/list
Log:
CVE-2013-2595 is nfu
Modified: data/CVE/list
===
--- data/CVE/list 2013-05-07 13:18:21 UTC (rev 22196)
+++
...
Cheers
Nico
--
Nico Golde - XMPP: n...@jabber.ccc.de - GPG: 0xA0A0
and there are no reverse dependencies.
I therefore suggest removing the package from testing due to it's bad shape.
FWIF, I'm fine with that. The stuff is easy to address, but I lost interest in
doing so.
Cheers
Nico
--
Nico Golde - XMPP: n...@jabber.ccc.de - GPG: 0xA0A0
pgpyfYgwuHJUs.pgp
and there are no reverse dependencies.
I therefore suggest removing the package from testing due to it's bad shape.
FWIF, I'm fine with that. The stuff is easy to address, but I lost interest in
doing so.
Cheers
Nico
--
Nico Golde - XMPP: n...@jabber.ccc.de - GPG: 0xA0A0
pgprEBSyMOkfA.pgp
I'll probably fix it next week. Sorry I'm traveling right
now...
Cheers
Nico
--
Nico Golde - XMPP: n...@jabber.ccc.de - GPG: 0xA0A0
pgpd2a8vm2ykA.pgp
Description: PGP signature
I'll probably fix it next week. Sorry I'm traveling right
now...
Cheers
Nico
--
Nico Golde - XMPP: n...@jabber.ccc.de - GPG: 0xA0A0
pgpp97JFsRRNu.pgp
Description: PGP signature
Package: wnpp
Severity: normal
I intend to orphan the tpp package.
The package description is:
Tpp stands for text presentation program and is an ncurses-based presentation
tool. The presentation can be written with your favorite editor in a simple
description format and then shown on any
Package: wnpp
Severity: normal
I intend to orphan the tpp package.
The package description is:
Tpp stands for text presentation program and is an ncurses-based presentation
tool. The presentation can be written with your favorite editor in a simple
description format and then shown on any
Hi,
* William Giokas 1007...@gmail.com [2013-04-12 03:35]:
On Fri, Apr 12, 2013 at 09:25:25AM +0800, Patrick Haller wrote:
On 2013-04-11 21:17, Carlos Torres wrote:
it was there just a little hidden
http://git.suckless.org/sites/tree/tools.suckless.org/ii/patches/ii-ipv6.diff
i mean
Hi,
* Patrick 201009-suckl...@haller.ws [2013-04-08 12:25]:
Attached is a patch to add IPv6 support to ii, based on where it was as
of 7a99152ce64d7006730006094b333edbecbe505a
Enjoy, scream, whatever...
hmm?
http://tools.suckless.org/ii/patches/ii-1.7-ssl.diff
Cheers
Nico
Author: nion
Date: 2013-04-05 12:12:15 + (Fri, 05 Apr 2013)
New Revision: 21848
Modified:
org/security-frontdesk.2013.txt
Log:
shuffling frontdesk due to traveling :/
Modified: org/security-frontdesk.2013.txt
===
---
to another package, e.g. mpop leads to delivery
of whole message.
Can you show fetchmail -v of such a message fetch?
I can not reproduce this behaviour.
Cheers
Nico
--
Nico Golde - XMPP: n...@jabber.ccc.de - GPG: 0xA0A0
pgpcTSwpzvCIT.pgp
Description: PGP signature
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Wed, 20 Mar 2013 20:28:55 +0100
Source: newsbeuter
Binary: newsbeuter
Architecture: source amd64
Version: 2.6-1
Distribution: unstable
Urgency: low
Maintainer: Nico Golde n...@debian.org
Changed-By: Nico Golde n...@debian.org
Hi,
* Miś Uszatek adres.em...@ymail.com [2013-03-21 17:01]:
Please update the package 'newsbeuter' to version 2.6.
This already happened, even though I just noticed I uploaded the package with
my old key.. Expect an upload to pop up shortly...
Cheers
Nico
--
Nico Golde - XMPP: n
Author: nion
Date: 2013-03-04 16:21:29 + (Mon, 04 Mar 2013)
New Revision: 21505
Modified:
data/CVE/list
Log:
new stunnel issue
Modified: data/CVE/list
===
--- data/CVE/list 2013-03-04 16:07:33 UTC (rev 21504)
+++
changelog entry.
For further information see:
[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1762
http://security-tracker.debian.org/tracker/CVE-2013-1762
Please adjust the affected versions in the BTS as needed.
--
Nico Golde - XMPP: n...@jabber.ccc.de - GPG: 0xA0A0
changelog entry.
For further information see:
[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1762
http://security-tracker.debian.org/tracker/CVE-2013-1762
Please adjust the affected versions in the BTS as needed.
--
Nico Golde - XMPP: n...@jabber.ccc.de - GPG: 0xA0A0
Author: nion
Date: 2013-03-01 11:12:07 + (Fri, 01 Mar 2013)
New Revision: 21465
Modified:
data/CVE/list
Log:
new busybox issue
Modified: data/CVE/list
===
--- data/CVE/list 2013-03-01 07:56:37 UTC (rev 21464)
+++
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- -
Debian Security Advisory DSA-2634-1 secur...@debian.org
http://www.debian.org/security/Nico Golde
February 27, 2013
Author: nion
Date: 2013-02-27 20:23:19 + (Wed, 27 Feb 2013)
New Revision: 21451
Modified:
data/CVE/list
Log:
two new sudo issues
Modified: data/CVE/list
===
--- data/CVE/list 2013-02-27 19:50:30 UTC (rev 21450)
+++
the affected versions in the BTS as needed.
Cheers
Nico
--
Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0
pgpbmpQYgwHAw.pgp
Description: PGP signature
http://security-tracker.debian.org/tracker/CVE-2013-1776
Please adjust the affected versions in the BTS as needed.
--
Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0
pgpc_GnIsaKAh.pgp
Description: PGP signature
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- -
Debian Security Advisory DSA-2634-1 secur...@debian.org
http://www.debian.org/security/Nico Golde
February 27, 2013
the affected versions in the BTS as needed.
Cheers
Nico
--
Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0
pgppbYwtzHCYJ.pgp
Description: PGP signature
Author: nion
Date: 2013-02-26 23:41:37 + (Tue, 26 Feb 2013)
New Revision: 21441
Modified:
data/DSA/list
Log:
DSA-2644-1 (python-django)
Modified: data/DSA/list
===
--- data/DSA/list 2013-02-26 23:25:12 UTC (rev 21440)
Author: nion
Date: 2013-02-26 23:45:27 + (Tue, 26 Feb 2013)
New Revision: 21442
Modified:
data/DSA/list
Log:
fix python-django dsa number
Modified: data/DSA/list
===
--- data/DSA/list 2013-02-26 23:41:37 UTC (rev 21441)
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Tue, 19 Feb 2013 15:39:36 +0100
Source: httping
Binary: httping
Architecture: source amd64
Version: 1.5.8-1
Distribution: unstable
Urgency: low
Maintainer: Nico Golde n...@debian.org
Changed-By: Nico Golde n...@debian.org
Description
. that get added over
time.
Cheers
Nico
--
Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0
pgpB9PZ2wxLCP.pgp
Description: PGP signature
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Sun, 10 Feb 2013 17:21:08 +0100
Source: httping
Binary: httping
Architecture: source amd64
Version: 1.5.7-1
Distribution: unstable
Urgency: low
Maintainer: Nico Golde n...@debian.org
Changed-By: Nico Golde n...@debian.org
Description
Author: nion
Date: 2013-02-09 13:25:08 + (Sat, 09 Feb 2013)
New Revision: 21214
Modified:
data/CVE/list
Log:
CVE-2010-5107 will be fixed via pu
Modified: data/CVE/list
===
--- data/CVE/list 2013-02-09 13:19:54 UTC (rev
Author: nion
Date: 2013-02-08 18:48:59 + (Fri, 08 Feb 2013)
New Revision: 21194
Modified:
data/CVE/list
Log:
bug for CVE-2010-5107
Modified: data/CVE/list
===
--- data/CVE/list 2013-02-08 15:38:54 UTC (rev 21193)
+++
-2010-5107
Please adjust the affected versions in the BTS as needed.
--
Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0
pgpNEP9WHCFGN.pgp
Description: PGP signature
-2010-5107
Please adjust the affected versions in the BTS as needed.
--
Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0
pgp2XJiydxHtU.pgp
Description: PGP signature
Author: nion
Date: 2013-02-07 11:33:02 + (Thu, 07 Feb 2013)
New Revision: 21180
Modified:
data/CVE/list
Log:
CVE-2010-5107 openssh unfixed
Modified: data/CVE/list
===
--- data/CVE/list 2013-02-07 10:29:07 UTC (rev
Author: nion
Date: 2013-02-07 12:33:23 + (Thu, 07 Feb 2013)
New Revision: 21184
Modified:
data/CVE/list
Log:
CVE-2012-588[1-3] fixed in yui 2.9.0.dfsg.0.1-0.1
Modified: data/CVE/list
===
--- data/CVE/list 2013-02-07
the bug in this case.
Hence downgrading.
Cheers
Nico
--
Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0
--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Hi,
* Ivan Kanakarakis ivan.ka...@gmail.com [2013-01-08 23:11]:
On 8 January 2013 23:28, Nico Golde n...@ngolde.de wrote:
* Ivan Kanakarakis ivan.ka...@gmail.com [2013-01-08 14:52]:
[...]
anyway, I hope I did not annoy anyone, I just found cause on what you said
to express my thoughts
Author: nion
Date: 2013-01-08 21:17:17 + (Tue, 08 Jan 2013)
New Revision: 20855
Modified:
data/CVE/list
Log:
yet another rails issue
Modified: data/CVE/list
===
--- data/CVE/list 2013-01-08 21:14:47 UTC (rev 20854)
+++
Author: nion
Date: 2013-01-08 21:40:15 + (Tue, 08 Jan 2013)
New Revision: 20856
Modified:
data/CVE/list
Log:
new nagios issue
Modified: data/CVE/list
===
--- data/CVE/list 2013-01-08 21:17:17 UTC (rev 20855)
+++
on suckless.org though for obvious reasons.
Cheers
Nico
--
Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0
pgpY7W_zPQqht.pgp
Description: PGP signature
Hi,
* Ivan Kanakarakis ivan.ka...@gmail.com [2013-01-08 14:52]:
On 8 January 2013 14:02, Nico Golde n...@ngolde.de wrote:
* Anselm R Garbe garb...@gmail.com [2013-01-08 12:50]:
On 8 January 2013 03:05, Ivan Kanakarakis ivan.ka...@gmail.com wrote:
I've been tweaking ii's code lately, mainly
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- -
Debian Security Advisory DSA-2600-1 secur...@debian.org
http://www.debian.org/security/Nico Golde
January 06, 2013
Package: wnpp
Severity: normal
I intend to orphan the openbox package.
The package description is:
Openbox works with your applications, and makes your desktop easier to manage.
This is because the approach to its development was the opposite of what seems
to be the general case for window
Package: wnpp
Severity: normal
I intend to orphan the openbox package.
The package description is:
Openbox works with your applications, and makes your desktop easier to manage.
This is because the approach to its development was the opposite of what seems
to be the general case for window
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- -
Debian Security Advisory DSA-2597-1 secur...@debian.org
http://www.debian.org/security/Nico Golde
January 04, 2013
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- -
Debian Security Advisory DSA-2600-1 secur...@debian.org
http://www.debian.org/security/Nico Golde
January 06, 2013
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- -
Debian Security Advisory DSA-2597-1 secur...@debian.org
http://www.debian.org/security/Nico Golde
January 04, 2013
Author: nion
Date: 2013-01-06 16:35:08 + (Sun, 06 Jan 2013)
New Revision: 20835
Modified:
data/DSA/list
Log:
DSA-2600-1 cups
Modified: data/DSA/list
===
--- data/DSA/list 2013-01-06 14:55:57 UTC (rev 20834)
+++
Author: nion
Date: 2013-01-06 18:00:53 + (Sun, 06 Jan 2013)
New Revision: 20836
Modified:
data/CVE/list
Log:
add CVE-2013-0157 (mount)
Modified: data/CVE/list
===
--- data/CVE/list 2013-01-06 16:35:08 UTC (rev 20835)
-ncurses upload works
fine.
I expected tpp to respond to user keyboard input with ruby 1.9 as it
does with ruby 1.8.
Can you please tell me the exact steps to reproduce this?
I can't seem to reproduce it with ruby 1.9.3p194 and ruby-ncurses 1.3.1.
Cheers
Nico
--
Nico Golde - http
have been ignoring this for too long. I will fix this with a new upload
soon.
Cheers
Nico
--
Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0
pgpDoNdiVcufk.pgp
Description: PGP signature
* Nico Golde n...@debian.org [2013-01-06 18:40]:
-
Debian Security Advisory DSA-2600-1 secur...@debian.org
http://www.debian.org/security/Nico Golde
January 06, 2013
Author: nion
Date: 2013-01-05 16:44:31 + (Sat, 05 Jan 2013)
New Revision: 20826
Modified:
data/CVE/list
Log:
add mount issue
Modified: data/CVE/list
===
--- data/CVE/list 2013-01-05 13:08:25 UTC (rev 20825)
+++
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Sat, 05 Jan 2013 17:50:18 +0100
Source: ii
Binary: ii
Architecture: source amd64
Version: 1.7-1
Distribution: unstable
Urgency: low
Maintainer: Nico Golde n...@debian.org
Changed-By: Nico Golde n...@debian.org
Description:
ii
Hi,
* Eric Dorland e...@debian.org [2013-01-05 14:02]:
* Thijs Kinkhorst (th...@debian.org) wrote:
On Fri, January 4, 2013 11:39, Thijs Kinkhorst wrote:
On Thu, January 3, 2013 04:19, Christoph Anton Mitterer wrote:
This is a follow up for #697108 and CVE-2012-6085.
Eric,
Hey,
way too late, but I just wrapped up the current git head of ii[0]
to an 1.7 release. The archive is available at [1].
1.7 (2013-01-05)
- -k now specifies an environment variable that contains the
server key. This behaviour has been changed in order to not
expose the password
Hi,
* Eric Dorland e...@debian.org [2013-01-05 14:02]:
* Thijs Kinkhorst (th...@debian.org) wrote:
On Fri, January 4, 2013 11:39, Thijs Kinkhorst wrote:
On Thu, January 3, 2013 04:19, Christoph Anton Mitterer wrote:
This is a follow up for #697108 and CVE-2012-6085.
Eric,
Author: nion
Date: 2013-01-04 21:11:48 + (Fri, 04 Jan 2013)
New Revision: 20808
Added:
org/security-frontdesk.2013.txt
Log:
add security frontdesk for 2013
Added: org/security-frontdesk.2013.txt
===
---
Author: nion
Date: 2013-01-04 21:59:14 + (Fri, 04 Jan 2013)
New Revision: 20810
Modified:
data/DSA/list
Log:
DSA-2597-1 rails
Modified: data/DSA/list
===
--- data/DSA/list 2013-01-04 21:27:00 UTC (rev 20809)
+++
Hi,
* Julien Cristau jcris...@debian.org [2012-12-28 18:12]:
Control: tags -1 moreinfo
On Mon, Dec 17, 2012 at 13:16:13 +0100, Nico Golde wrote:
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: freeze-exception
Hi,
please
Hi,
* Salvatore Bonaccorso car...@debian.org [2012-12-28 19:19]:
On Fri, Dec 28, 2012 at 06:46:40PM +0100, Nico Golde wrote:
Hi,
* Julien Cristau jcris...@debian.org [2012-12-28 18:12]:
Control: tags -1 moreinfo
On Mon, Dec 17, 2012 at 13:16:13 +0100, Nico Golde wrote
Hi,
* Julien Cristau jcris...@debian.org [2012-12-28 18:12]:
Control: tags -1 moreinfo
On Mon, Dec 17, 2012 at 13:16:13 +0100, Nico Golde wrote:
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: freeze-exception
Hi,
please
Hi,
* Salvatore Bonaccorso car...@debian.org [2012-12-28 19:19]:
On Fri, Dec 28, 2012 at 06:46:40PM +0100, Nico Golde wrote:
Hi,
* Julien Cristau jcris...@debian.org [2012-12-28 18:12]:
Control: tags -1 moreinfo
On Mon, Dec 17, 2012 at 13:16:13 +0100, Nico Golde wrote
...@lists.alioth.debian.org
Changed-By: Nico Golde n...@debian.org
Description:
fetchmail - SSL enabled POP3, APOP, IMAP mail gatherer/forwarder
fetchmailconf - fetchmail configurator
Closes: 671294 688015
Changes:
fetchmail (6.3.22-2) unstable; urgency=low
.
* Fix memory leak in OpenSSL's certificate
that did not work as intended (#671294).
unblock: fetchmail/6.3.22-2
Kind regards
Nico
--
Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0
For security reasons, all text in this mail is double-rot13 encrypted.
pgpfnXZfpa52X.pgp
Description: PGP signature
that did not work as intended (#671294).
unblock: fetchmail/6.3.22-2
Kind regards
Nico
--
Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0
For security reasons, all text in this mail is double-rot13 encrypted.
pgpBrbnU2nvCk.pgp
Description: PGP signature
instances running 24/7 since
months with around 6MB RAM being used in daemon mode.
Also what platform is this?
Cheers
Nico
--
Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0
--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe
regards
Nico
--
Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0
For security reasons, all text in this mail is double-rot13 encrypted.
pgpnZQ758B09Z.pgp
Description: PGP signature
regards
Nico
--
Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0
For security reasons, all text in this mail is double-rot13 encrypted.
pgpbMAXzzPHoa.pgp
Description: PGP signature
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Sat, 01 Dec 2012 18:38:41 +0100
Source: openbox
Binary: openbox gnome-panel-control libobt0 libobrender27 openbox-dev
Architecture: source amd64
Version: 3.5.0-6
Distribution: unstable
Urgency: low
Maintainer: Nico Golde n
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- -
Debian Security Advisory DSA-2575-1 secur...@debian.org
http://www.debian.org/security/Nico Golde
November 18, 2012
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- -
Debian Security Advisory DSA-2575-1 secur...@debian.org
http://www.debian.org/security/Nico Golde
November 18, 2012
Author: nion
Date: 2012-11-18 14:11:59 + (Sun, 18 Nov 2012)
New Revision: 20507
Modified:
data/DSA/list
Log:
DSA-2575-1 (tiff)
Modified: data/DSA/list
===
--- data/DSA/list 2012-11-18 06:11:56 UTC (rev 20506)
+++
Author: nion
Date: 2012-11-18 14:21:36 + (Sun, 18 Nov 2012)
New Revision: 20508
Modified:
data/CVE/list
Log:
CVE-2012-5884 does not affect bugzilla in squeeze, removed in unstable
Modified: data/CVE/list
===
--- data/CVE/list
Author: nion
Date: 2012-11-18 14:36:50 + (Sun, 18 Nov 2012)
New Revision: 20509
Modified:
data/CVE/list
Log:
new yui issues
NFUs
Modified: data/CVE/list
===
--- data/CVE/list 2012-11-18 14:21:36 UTC (rev 20508)
+++
-2012-5881
http://security-tracker.debian.org/tracker/CVE-2012-5881
http://yuilibrary.com/support/20121030-vulnerability/
Kind regards
Nico
--
Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0
pgpZwJy8KONTL.pgp
Description: PGP signature
-2012-5881
http://security-tracker.debian.org/tracker/CVE-2012-5881
http://yuilibrary.com/support/20121030-vulnerability/
Kind regards
Nico
--
Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0
pgpYvCJMeGmEF.pgp
Description: PGP signature
-2012-5881
http://security-tracker.debian.org/tracker/CVE-2012-5881
http://yuilibrary.com/support/20121030-vulnerability/
Kind regards
Nico
--
Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0
pgpJzKrqok0MR.pgp
Description: PGP signature
Author: nion
Date: 2012-11-17 22:07:07 + (Sat, 17 Nov 2012)
New Revision: 20503
Modified:
data/CVE/list
Log:
CVE-2012-4564 fixed in tiff 4.0.2-5
Modified: data/CVE/list
===
--- data/CVE/list 2012-11-17 13:30:42 UTC (rev
that the squeeze (security)
version is 4.3.9+dfsg1-1+squeeze6...
What's wrong?
What did I fail to understand?
You didn't fail to understand anything. We are currently investigating the
issue. This certainly shouldn't have happened.
Stay tuned...
Kind regards
Nico
--
Nico Golde - http
Hi,
* Nico Golde debian-security...@ngolde.de [2012-11-17 16:29]:
* Francesco Poli invernom...@paranoici.org [2012-11-17 12:34]:
DSA-2574-1 [1] announced a stable security update for typo3-src on
Thursday, but I still see no trace of the announced
typo3-src/4.3.9+dfsg1-1+squeeze7
Hi,
* Simon Kainz si...@familiekainz.at [2012-11-13 10:13]:
the new Homepage URL is http://tools.suckless.org/ii/
Thanks for noticing. Will be fixed in the next upload.
Cheers
Nico
pgpIYrpSMtvhb.pgp
Description: PGP signature
with that :-). Only thing is I don't want package
to be removed from Wheezy because multiple packages depend on it.
No worries :)
Cheers
Nico
--
Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0
pgp1JWT45gTM7.pgp
Description: PGP signature
Package: suckless-tools
Version: 38-2
Severity: grave
Justification: user security hole
Hey,
this package has not updated any of the tools included since two years.
Please package newer tools, especially but most important slock.
The current version of slock has no indication whatsoever that a
Package: suckless-tools
Version: 38-2
Severity: grave
Justification: user security hole
Hey,
this package has not updated any of the tools included since two years.
Please package newer tools, especially but most important slock.
The current version of slock has no indication whatsoever that a
appear in a remote file.
Sorry, I couldn't parse this sentence. What exactly are the security
implications? So far I don't see how this qualifies for a security bug.
Kind regards
Nico
--
Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0
--
To UNSUBSCRIBE, email to debian
tags 691642 - security
thanks
Hi,
* Vincent Lefevre vinc...@vinc17.net [2012-10-28 13:32]:
On 2012-10-28 11:37:58 +0100, Nico Golde wrote:
[...]
In addition to possible data loss due to the crash, this is a security
problem, because the sequence may appear in a remote file.
Sorry, I
appear in a remote file.
Sorry, I couldn't parse this sentence. What exactly are the security
implications? So far I don't see how this qualifies for a security bug.
Kind regards
Nico
--
Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0
--
To UNSUBSCRIBE, email to debian-x
tags 691642 - security
thanks
Hi,
* Vincent Lefevre vinc...@vinc17.net [2012-10-28 13:32]:
On 2012-10-28 11:37:58 +0100, Nico Golde wrote:
[...]
In addition to possible data loss due to the crash, this is a security
problem, because the sequence may appear in a remote file.
Sorry, I
exim4-dev
Architecture: source amd64 all
Version: 4.72-6+squeeze3
Distribution: stable-security
Urgency: high
Maintainer: Exim4 Maintainers pkg-exim4-maintain...@lists.alioth.debian.org
Changed-By: Nico Golde n...@debian.org
Description:
exim4 - metapackage to ease Exim MTA (v4) installation
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- -
Debian Security Advisory DSA-2566-1 secur...@debian.org
http://www.debian.org/security/Nico Golde
October 25, 2012
Author: nion
Date: 2012-10-26 08:03:48 + (Fri, 26 Oct 2012)
New Revision: 20404
Modified:
data/CVE/list
data/DSA/list
Log:
DSA-2566-1 (exim4)
Modified: data/CVE/list
===
--- data/CVE/list 2012-10-26 07:23:58 UTC (rev
exim4-dev
Architecture: source amd64 all
Version: 4.80-5.1
Distribution: unstable
Urgency: high
Maintainer: Exim4 Maintainers pkg-exim4-maintain...@lists.alioth.debian.org
Changed-By: Nico Golde n...@debian.org
Description:
exim4 - metapackage to ease Exim MTA (v4) installation
exim4-base
101 - 200 of 6266 matches
Mail list logo