#SecurityUploadQueue
Kind regards and thanks for contacting us!
Nico
--
Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0
For security reasons, all text in this mail is double-rot13 encrypted.
pgpDqDxHyVC29.pgp
Description: PGP signature
Author: nion
Date: 2011-09-07 14:25:04 + (Wed, 07 Sep 2011)
New Revision: 17181
Modified:
data/CVE/list
Log:
new masqmail issue
Modified: data/CVE/list
===
--- data/CVE/list 2011-09-07 09:14:18 UTC (rev 17180)
+++
Author: nion
Date: 2011-09-07 14:28:24 + (Wed, 07 Sep 2011)
New Revision: 17182
Modified:
data/spu-candidates.txt
Log:
masqmail is spu candidate
Modified: data/spu-candidates.txt
===
--- data/spu-candidates.txt 2011-09-07
Author: nion
Date: 2011-09-07 20:17:20 + (Wed, 07 Sep 2011)
New Revision: 17187
Modified:
data/DSA/list
Log:
fix DSA-2301-1 entry
Modified: data/DSA/list
===
--- data/DSA/list 2011-09-07 20:14:58 UTC (rev 17186)
+++
Author: nion
Date: 2011-09-07 21:14:00 + (Wed, 07 Sep 2011)
New Revision: 17188
Modified:
data/DSA/list
Log:
DSA-2302-1 (bcfg2)
Modified: data/DSA/list
===
--- data/DSA/list 2011-09-07 20:17:20 UTC (rev 17187)
+++
unfixed
This imho shouldn't be a bug tracked by us. As discussed via PM you have far
worse problems if you can control environment variables. This needs a specific
case but not such a general bug for a bug class.
Cheers
Nico
--
Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG
...@lists.alioth.debian.org
Changed-By: Nico Golde n...@debian.org
Description:
fetchmail - SSL enabled POP3, APOP, IMAP mail gatherer/forwarder
fetchmailconf - fetchmail configurator
Closes: 612179 626100 639807
Changes:
fetchmail (6.3.21-2) unstable; urgency=low
.
* Do not log server certificate message
));
+ report(stdout, GT_(Server certificate:\n));
else {
if (_firstrun) {
_firstrun = 0;
Makes sense to me, Matthias, can you include this patch for the next release?
Cheers
Nico
--
Nico Golde - http://www.ngolde.de - n
if the service should
be restarted/reloaded.
Seems fine either way. Will be fixed in the next upload. Thanks for reopening!
Cheers
Nico
--
Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0
For security reasons, all text in this mail is double-rot13 encrypted
...@lists.alioth.debian.org
Changed-By: Nico Golde n...@debian.org
Description:
fetchmail - SSL enabled POP3, APOP, IMAP mail gatherer/forwarder
fetchmailconf - fetchmail configurator
Closes: 612179 626100 638773
Changes:
fetchmail (6.3.21-1) unstable; urgency=low
.
* New upstream release
- Do
the source, how useful is a package
of this software anyway? I guess most uses will always stick to upstream
sources instead.
Kind regards
Nico
--
Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0
For security reasons, all text in this mail is double-rot13 encrypted
the source, how useful is a package
of this software anyway? I guess most uses will always stick to upstream
sources instead.
Kind regards
Nico
--
Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0
For security reasons, all text in this mail is double-rot13 encrypted
Author: nion
Date: 2011-08-22 09:10:26 + (Mon, 22 Aug 2011)
New Revision: 17105
Modified:
org/security-frontdesk.2011.txt
Log:
move frontdesk shift by one week as jmm replaces me this week
Modified: org/security-frontdesk.2011.txt
and the source package of 3.5.0
updated by me.
Thanks a lot. I will probably update it during the week. Unlikely that I can
make it before wednesday though.
Different topic, are you interested in a co-maintaining this package? The diff
looks good and I'm still on the look for one.
Cheers
Nico
--
Nico
screwed.
Alright makes sense. Thanks for taking the time to explain this!
The user-tag imho is not correct though in this case, but doesn't really
matter either.
Kind regards
Nico
--
Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0
For security reasons, all text in this mail
screwed.
Alright makes sense. Thanks for taking the time to explain this!
The user-tag imho is not correct though in this case, but doesn't really
matter either.
Kind regards
Nico
--
Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0
For security reasons, all text in this mail
sec hole, as it can easily be just this, if
one trusts that certain rules are brought up.
Sorry if I misunderstand, but what exactly is the security hole (not to say
root) here? (Disclaimer: I don't know this software)
Kind regards
Nico
--
Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de
Hi,
* Antonio Radici anto...@dyne.org [2011-04-19 18:30]:
On Tue, Apr 19, 2011 at 05:13:10PM +0200, Nico Golde wrote:
No not exactly. The question is only asked multiple times when it is not
entered correctly and thus not cached. To me the question or the request is
rather getting the old
Author: nion
Date: 2011-07-27 10:38:15 + (Wed, 27 Jul 2011)
New Revision: 17010
Modified:
org/security-frontdesk.2011.txt
Log:
another week of frontdesk for me
Modified: org/security-frontdesk.2011.txt
===
---
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- --
Debian Security Advisory DSA-2285-1secur...@debian.org
http://www.debian.org/security/ Nico Golde
July 26, 2011
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- --
Debian Security Advisory DSA-2285-1secur...@debian.org
http://www.debian.org/security/ Nico Golde
July 26, 2011
Author: nion
Date: 2011-07-25 22:23:32 + (Mon, 25 Jul 2011)
New Revision: 16989
Modified:
data/CVE/list
data/DSA/list
Log:
DSA-2285-1(mapserver) + track issues for unstable (maintainer is aware of the
bugs)
Modified: data/CVE/list
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Sun, 22 May 2011 15:25:57 +
Source: ejabberd
Binary: ejabberd
Architecture: source amd64
Version: 2.0.1-6+lenny3
Distribution: oldstable-security
Urgency: high
Maintainer: Torsten Werner twer...@debian.org
Changed-By: Nico Golde
Author: nion
Date: 2011-07-20 22:29:50 + (Wed, 20 Jul 2011)
New Revision: 16962
Modified:
bin/tracker_service.py
Log:
fix narrative introduction link on tracker website
Modified: bin/tracker_service.py
===
---
Author: nion
Date: 2011-07-12 18:37:34 + (Tue, 12 Jul 2011)
New Revision: 16925
Modified:
data/CVE/list
Log:
new libapache2-mod-auth-external issue
Modified: data/CVE/list
===
--- data/CVE/list 2011-07-12 06:58:25 UTC
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- -
Debian Security Advisory DSA-2277-1 secur...@debian.org
http://www.debian.org/security/Nico Golde
July 10, 2011
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- -
Debian Security Advisory DSA-2277-1 secur...@debian.org
http://www.debian.org/security/Nico Golde
July 10, 2011
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- -
Debian Security Advisory DSA-2275-1 secur...@debian.org
http://www.debian.org/security/Nico Golde
July 7, 2011
Author: nion
Date: 2011-07-10 15:18:40 + (Sun, 10 Jul 2011)
New Revision: 16919
Modified:
data/DSA/list
Log:
DSA-2276-1 (asterisk)
Modified: data/DSA/list
===
--- data/DSA/list 2011-07-10 14:22:17 UTC (rev 16918)
+++
Author: nion
Date: 2011-07-10 16:23:27 + (Sun, 10 Jul 2011)
New Revision: 16920
Modified:
data/DSA/list
Log:
DSA-2277-1 (xml-security-c)
Modified: data/DSA/list
===
--- data/DSA/list 2011-07-10 15:18:40 UTC (rev 16919)
Hi,
* Jonathan Wiltshire j...@debian.org [2011-07-09 20:07]:
On Sat, Jul 09, 2011 at 03:17:39PM +0200, Nico Golde wrote:
Can you produce a backtrace of this? Would be interesting to know what
happens
there during the crash to tell more.
There's one as an attachment to the original
a proper CVE number assigning, and if you or I should do
so;
2. if you want me to update the tracker with this information.
Can you produce a backtrace of this? Would be interesting to know what happens
there during the crash to tell more.
Cheers
Nico
--
Nico Golde - http://www.ngolde.de
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- -
Debian Security Advisory DSA-2275-1 secur...@debian.org
http://www.debian.org/security/Nico Golde
July 7, 2011
Author: nion
Date: 2011-07-08 07:20:34 + (Fri, 08 Jul 2011)
New Revision: 16913
Modified:
data/CVE/list
data/DSA/list
Log:
- DSA-2273-3-DSA-2275-1
- new qemu-kvm issue (CVE-2011-2212)
- xml-security-c bug
Modified: data/CVE/list
Author: nion
Date: 2011-07-06 14:08:00 + (Wed, 06 Jul 2011)
New Revision: 16902
Modified:
data/CVE/list
data/spu-candidates.txt
Log:
no dsa for CVE-2011-2501
Modified: data/CVE/list
===
--- data/CVE/list 2011-07-06
Hi,
* Jonathan Wiltshire j...@debian.org [2011-07-04 23:56]:
On Mon, Jul 04, 2011 at 11:35:29PM +0200, Nico Golde wrote:
* Ian Jackson ijack...@chiark.greenend.org.uk [2011-07-04 13:00]:
Hi, security guys. Would you care to take a look at #550940 ?
I think this is the kind of security
Author: nion
Date: 2011-07-04 21:35:13 + (Mon, 04 Jul 2011)
New Revision: 16890
Modified:
data/CVE/list
Log:
- NFUs
- CVE-2011-2167 fixed in dovecot 1:2.0.13-1, stable not affected
- smarty issue non-issue imho
Modified: data/CVE/list
Author: nion
Date: 2011-07-04 21:39:35 + (Mon, 04 Jul 2011)
New Revision: 16891
Modified:
data/CVE/list
Log:
new pyro issue (#631912)
Modified: data/CVE/list
===
--- data/CVE/list 2011-07-04 21:35:13 UTC (rev 16890)
+++
and therefore wouldn't be fixed in squeeze) seems
very surprising to me.
I don't have a test installation around now to verify this. Can someone verify
if the default permissions on squeeze/lenny might be 666 as well?
If yes, this should get a DSA.
Kind regards
Nico
--
Nico Golde - http
Author: nion
Date: 2011-07-01 15:54:59 + (Fri, 01 Jul 2011)
New Revision: 16870
Modified:
data/CVE/list
Log:
CVE-2011-1498 no-dsa
Modified: data/CVE/list
===
--- data/CVE/list 2011-07-01 05:36:10 UTC (rev 16869)
+++
Author: nion
Date: 2011-06-28 20:06:49 + (Tue, 28 Jun 2011)
New Revision: 16858
Modified:
data/CVE/list
Log:
CVE-2011-2485 fixed in gdk-pixbuf 2.23.3-3.1, lenny affected see RT
Modified: data/CVE/list
===
--- data/CVE/list
: unstable
Urgency: high
Maintainer: Debian GNOME Maintainers
pkg-gnome-maintain...@lists.alioth.debian.org
Changed-By: Nico Golde n...@debian.org
Description:
gir1.2-gdkpixbuf-2.0 - GDK Pixbuf library - GObject-Introspection
libgdk-pixbuf2.0-0 - GDK Pixbuf library
libgdk-pixbuf2.0-0-udeb - GDK
.
For me, this renders newsbeuter unusable unless I downgrade sqlite to
previous version.
Thanks confirmed. Looks like an sqlite bug to me though to be honest. More
information about this also on:
http://svn.haxx.se/dev/archive-2011-06/0866.shtml
Cheers
Nico
--
Nico Golde - http://www.ngolde.de
Author: nion
Date: 2011-06-15 03:35:17 + (Wed, 15 Jun 2011)
New Revision: 16808
Modified:
data/CVE/list
Log:
wireshark fixes
Modified: data/CVE/list
===
--- data/CVE/list 2011-06-14 20:17:53 UTC (rev 16807)
+++
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- -
Debian Security Advisory DSA-2257-1 secur...@debian.org
http://www.debian.org/security/Nico Golde
June 11, 2011
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- -
Debian Security Advisory DSA-2259-1 secur...@debian.org
http://www.debian.org/security/Nico Golde
June 12, 2011
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- -
Debian Security Advisory DSA-2257-1 secur...@debian.org
http://www.debian.org/security/Nico Golde
June 11, 2011
Author: nion
Date: 2011-06-11 16:25:48 + (Sat, 11 Jun 2011)
New Revision: 16796
Modified:
data/CVE/list
Log:
CVE-2011-2194 will be fixed in vlc 1.1.10-1
Modified: data/CVE/list
===
--- data/CVE/list 2011-06-10 20:12:01
Author: nion
Date: 2011-06-11 16:50:41 + (Sat, 11 Jun 2011)
New Revision: 16797
Modified:
data/CVE/list
Log:
filed wireshark bugs
Modified: data/CVE/list
===
--- data/CVE/list 2011-06-11 16:25:48 UTC (rev 16796)
+++
Author: nion
Date: 2011-06-11 16:52:51 + (Sat, 11 Jun 2011)
New Revision: 16798
Modified:
data/DSA/list
Log:
DSA-2258-1 (kolab-cyrus-imapd)
Modified: data/DSA/list
===
--- data/DSA/list 2011-06-11 16:50:41 UTC (rev
Author: nion
Date: 2011-06-11 18:42:22 + (Sat, 11 Jun 2011)
New Revision: 16799
Modified:
data/DSA/list
Log:
fix cve id of DSA-2258-1
Modified: data/DSA/list
===
--- data/DSA/list 2011-06-11 16:52:51 UTC (rev 16798)
+++
/cgi-bin/cvename.cgi?name=CVE-2011-1959
http://security-tracker.debian.org/tracker/CVE-2011-1959
--
Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0
For security reasons, all text in this mail is double-rot13 encrypted.
pgp3uMN1HDqHp.pgp
Description: PGP signature
/cgi-bin/cvename.cgi?name=CVE-2011-1959
http://security-tracker.debian.org/tracker/CVE-2011-1959
--
Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0
For security reasons, all text in this mail is double-rot13 encrypted.
pgpbXneUQkmtR.pgp
Description: PGP signature
Hi,
* Francesco Poli invernom...@paranoici.org [2011-06-11 19:10]:
DSA-2258-1 [1] is about CVE-2011-1926, but the DSA tracker page [2]
refers to CVE-2011-2194.
[...]
Thanks fixed, cp error. CVE-2011-2194 was the previous DSA.
Cheers
Nico
--
Nico Golde - http://www.ngolde.de - n
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- -
Debian Security Advisory DSA-2257-1 secur...@debian.org
http://www.debian.org/security/Nico Golde
June 10, 2011
Author: nion
Date: 2011-06-10 10:16:46 + (Fri, 10 Jun 2011)
New Revision: 16792
Modified:
data/DSA/list
Log:
DSA-2257-1 (vlc)
Modified: data/DSA/list
===
--- data/DSA/list 2011-06-10 08:27:46 UTC (rev 16791)
+++
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- -
Debian Security Advisory DSA-2257-1 secur...@debian.org
http://www.debian.org/security/Nico Golde
June 10, 2011
Author: nion
Date: 2011-06-09 10:02:13 + (Thu, 09 Jun 2011)
New Revision: 16789
Modified:
data/CVE/list
Log:
sun-java6 june round of security bugs fixed in 6.26-1
Modified: data/CVE/list
===
--- data/CVE/list 2011-06-08
CVE-2011-0867 CVE-2011-0869 CVE-2011-0865
Some of the issues seem to be windows specific.
http://www.oracle.com/technetwork/topics/security/javacpujune2011-313339.html
Kind regards
Nico
--
Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0
For security reasons, all text
Author: nion
Date: 2011-06-08 10:19:46 + (Wed, 08 Jun 2011)
New Revision: 16786
Modified:
data/CVE/list
Log:
latest vlc issue doesnt affect lenny, i_track_id was introduced later
Modified: data/CVE/list
===
--- data/CVE/list
Author: nion
Date: 2011-06-08 20:12:04 + (Wed, 08 Jun 2011)
New Revision: 16787
Modified:
data/CVE/list
Log:
vlc cveified
Modified: data/CVE/list
===
--- data/CVE/list 2011-06-08 10:19:46 UTC (rev 16786)
+++
Author: nion
Date: 2011-06-08 21:25:29 + (Wed, 08 Jun 2011)
New Revision: 16788
Modified:
data/CVE/list
Log:
openjdk/sun-jre bug reference
Modified: data/CVE/list
===
--- data/CVE/list 2011-06-08 20:12:04 UTC (rev
CVE-2011-0867 CVE-2011-0869 CVE-2011-0865
Some of the issues seem to be windows specific.
http://www.oracle.com/technetwork/topics/security/javacpujune2011-313339.html
Kind regards
Nico
--
Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0
For security reasons, all text
CVE-2011-0867 CVE-2011-0869 CVE-2011-0865
Some of the issues seem to be windows specific.
http://www.oracle.com/technetwork/topics/security/javacpujune2011-313339.html
Kind regards
Nico
--
Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0
For security reasons, all text
Author: nion
Date: 2011-06-07 23:22:59 + (Tue, 07 Jun 2011)
New Revision: 16784
Modified:
data/CVE/list
Log:
new vlc issue
Modified: data/CVE/list
===
--- data/CVE/list 2011-06-07 09:48:25 UTC (rev 16783)
+++
Urgency: high
Maintainer: Debian Citadel Team pkg-citadel-de...@lists.alioth.debian.org
Changed-By: Nico Golde n...@debian.org
Description:
citadel-client - complete and feature-rich groupware server (command line
client)
citadel-common - complete and feature-rich groupware server
citadel-doc
mig...@miguel.cc
Changed-By: Nico Golde n...@debian.org
Description:
jabber - Transitional package for jabber rename
jabberd14 - Instant messaging server using the Jabber/XMPP protocol
libjabberd2 - Runtime library for the Jabber/XMPP instant messaging server
libjabberd2-dev - Development
-pulse vlc-plugin-sdl vlc-plugin-svg
vlc-plugin-svgalib vlc-plugin-zvbi
Architecture: source all amd64
Version: 1.1.3-1squeeze5
Distribution: stable-security
Urgency: high
Maintainer: Debian multimedia packages maintainers
pkg-multimedia-maintain...@lists.alioth.debian.org
Changed-By: Nico Golde n
Author: nion
Date: 2011-06-03 23:34:15 + (Fri, 03 Jun 2011)
New Revision: 16767
Modified:
data/DSA/list
Log:
DSA-2254-1
Modified: data/DSA/list
===
--- data/DSA/list 2011-06-03 20:13:44 UTC (rev 16766)
+++ data/DSA/list
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- -
Debian Security Advisory DSA-2248-1 secur...@debian.org
http://www.debian.org/security/Nico Golde
March 31, 2011
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- -
Debian Security Advisory DSA-2249-1 secur...@debian.org
http://www.debian.org/security/Nico Golde
March 31, 2011
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- -
Debian Security Advisory DSA-2250-1 secur...@debian.org
http://www.debian.org/security/Nico Golde
March 31, 2011
)
Completely fine, I already told upstream yesterday that it is very unlikely
that we will issue security updates for this.
Cheers
Nico
--
Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0
For security reasons, all text in this mail is double-rot13 encrypted
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- -
Debian Security Advisory DSA-2248-1 secur...@debian.org
http://www.debian.org/security/Nico Golde
March 31, 2011
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- -
Debian Security Advisory DSA-2249-1 secur...@debian.org
http://www.debian.org/security/Nico Golde
March 31, 2011
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- -
Debian Security Advisory DSA-2250-1 secur...@debian.org
http://www.debian.org/security/Nico Golde
March 31, 2011
Author: nion
Date: 2011-05-31 21:08:48 + (Tue, 31 May 2011)
New Revision: 16742
Modified:
data/CVE/list
data/DSA/list
Log:
billion laughs against various jabberds fixed
Modified: data/CVE/list
===
--- data/CVE/list
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Mon, 30 May 2011 23:53:46 +0200
Source: ejabberd
Binary: ejabberd
Architecture: source amd64
Version: 2.1.6-2.1
Distribution: unstable
Urgency: high
Maintainer: Konstantin Khomoutov flatw...@users.sourceforge.net
Changed-By: Nico
...@miguel.cc
Changed-By: Nico Golde n...@debian.org
Description:
jabber - Transitional package for jabber rename
jabberd14 - Instant messaging server using the Jabber/XMPP protocol
libjabberd2 - Runtime library for the Jabber/XMPP instant messaging server
libjabberd2-dev - Development files
-By: Nico Golde n...@debian.org
Description:
jabberd2 - Jabber instant messenger server
Changes:
jabberd2 (2.2.8-2.1) unstable; urgency=high
.
* Non-maintainer upload by the Security Team.
* Prevent entity expansion in order to prevent about
the billion laughs DoS attack (CVE-2011
: Debian Citadel Team pkg-citadel-de...@lists.alioth.debian.org
Changed-By: Nico Golde n...@debian.org
Description:
citadel-client - complete and feature-rich groupware server (command line
client)
citadel-dbg - complete and feature-rich groupware server - debugging symbols
citadel-doc - complete
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Wed, 25 May 2011 16:49:57 +0200
Source: openbox
Binary: openbox gnome-panel-control libobparser21 libobrender21 openbox-dev
Architecture: source amd64
Version: 3.4.11.2-2
Distribution: unstable
Urgency: low
Maintainer: Nico Golde n
session without any session manager
Cheers
Nico
--
Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0
For security reasons, all text in this mail is double-rot13 encrypted.
pgp1sogcvmcY8.pgp
Description: PGP signature
Hi,
* Sergio Cipolla secipo...@gmail.com [2011-05-25 20:16]:
Yes, but why would one want to run it when there's already some desktop
session running?
Good point! Sorry I'm not using these kinds of desktop environments and
understood you wrong as you said the program just displays if a session
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Sun, 22 May 2011 19:27:57 +0200
Source: openbox
Binary: openbox gnome-panel-control libobparser21 libobrender21 openbox-dev
Architecture: source amd64
Version: 3.4.11.2-1
Distribution: unstable
Urgency: low
Maintainer: Nico Golde n
Hi,
* Piotr O??arowski pi...@debian.org [2011-05-08 21:34]:
Please remove XS-Python-Version line from debian/control and thus allow
dh_python2 to create symlinks to all supported Python versions
Will be done in the next upload. Thanks for letting me know.
Kind regards
Nico
--
Nico Golde
or not or discuss it on -devel.
OTOH it makes sense for the build of stfl to check if the library can be
imported.
Thanks for the hint!
Cheers
Nico
--
Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0
For security reasons, all text in this mail is double-rot13 encrypted
not found: 2952'
Are you sure this is an stfl bug? Looking at the source package I have
absolutely no idea what could've caused this.
Kind regards
Nico
--
Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0
For security reasons, all text in this mail is double-rot13 encrypted
are you starting it the first time with --replace?
Looks like debian-menu.xml in /var/lib/openbox is missing.
Cheers
Nico
--
Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0
For security reasons, all text in this mail is double-rot13 encrypted.
pgpeLRqT5F9WJ.pgp
Description
Author: nion
Date: 2011-05-16 17:54:07 + (Mon, 16 May 2011)
New Revision: 16671
Modified:
org/security-frontdesk.2011.txt
Log:
add myself to schedule
Modified: org/security-frontdesk.2011.txt
===
---
are tagged with.
Sounds like a good idea. I've forwarded this request to the upstream bug
tracker.
Cheers
Nico
--
Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0
For security reasons, all text in this mail is double-rot13 encrypted.
--
To UNSUBSCRIBE, email to debian
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Tue, 19 Apr 2011 16:10:43 +0200
Source: tcpxtract
Binary: tcpxtract
Architecture: source amd64
Version: 1.0.1-7
Distribution: unstable
Urgency: low
Maintainer: Nico Golde n...@debian.org
Changed-By: Nico Golde n...@debian.org
Hi,
* Antonio Radici anto...@dyne.org [2011-04-19 13:39]:
On Mon, Apr 18, 2011 at 08:16:57PM +, Antonio Radici wrote:
On Mon, Apr 18, 2011 at 05:41:12PM +0200, Nico Golde wrote:
attached is the gdb backtrace. I anonymized some parts of it
in order not to leak my mails and the imaps
Hi,
* MP t...@centrum.cz [2011-04-19 13:39]:
On 17.4.2011 20:18, Nico Golde wrote:
* MP t...@centrum.cz [2011-04-17 19:47]:
tcpxtract calls sync() after extracting each packet of data to one of the
output files.
This has as a result of huge harddisk activity even when both source
Hi,
* Antonio Radici anto...@dyne.org [2011-04-19 16:24]:
On Tue, Apr 19, 2011 at 04:05:19PM +0200, Nico Golde wrote:
[...]
* Antonio Radici anto...@dyne.org [2011-04-19 13:39]:
(in case you need to cast to the type, it is COLOR_LINE or 'struct
color_line', but you shouldn't need
Hey Antonio,
attached is the gdb backtrace. I anonymized some parts of it
in order not to leak my mails and the imaps server I used,
but this should not matter.
Looking at the backtrace and seeing the pattern match calls
I'm wondering if this is due to:
color quotedcyan
)
eptr-next-prev = eptr-prev;
if (*elist == eptr)
*elist = eptr-next;
+
+sync();
close(eptr-fd);
free(eptr);
}
Cheers
Nico
--
Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0
Author: nion
Date: 2011-04-13 22:11:05 + (Wed, 13 Apr 2011)
New Revision: 16525
Modified:
data/CVE/list
data/DSA/list
Log:
vlc cveified
Modified: data/CVE/list
===
--- data/CVE/list 2011-04-13 21:15:36 UTC (rev
...@lists.alioth.debian.org
Changed-By: Nico Golde n...@debian.org
Description:
fetchmail - SSL enabled POP3, APOP, IMAP mail gatherer/forwarder
fetchmailconf - fetchmail configurator
Closes: 616806 622054
Changes:
fetchmail (6.3.19-1) unstable; urgency=low
.
[Nico Golde]
* New upstream release
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- -
Debian Security Advisory DSA-2218-1 secur...@debian.org
http://www.debian.org/security/Nico Golde
April 12, 2011
601 - 700 of 6266 matches
Mail list logo