Hi,
Il 10/05/2010 22:15, Iker Salmón San Millán ha scritto:
Hi, i didn't know where or how to report this, but i have readed in a
forum that an user has tried |chromium-browser from experimental and
seems that it includes by default those privative codecs. I have tried
by myself and i agree
tags 580947 wontfix
thanks
Hi Ansgar,
Il 10/05/2010 05:52, Ansgar Burchardt ha scritto:
When trying to use the video tag, I get a Aw, Snap! message.
How to reproduce:
Visit http://people.mozilla.com/~prouget/demos/simpleVideo/video.html,
click any of the buttons (Play, Pause, ...).
tags 580695 unreproducible
thanks
Hi,
Il 07/05/2010 22:41, green ha scritto:
I am trying to get chromium to use a polipo caching proxy running locally
(localhost:8123), but it seems to ignore environment variables and options.
I
am not running Gnome or KDE; just awesome wm. I have tried
: experimental
Urgency: low
Maintainer: Debian Chromium Maintainers
pkg-chromium-ma...@lists.alioth.debian.org
Changed-By: Giuseppe Iuculano iucul...@debian.org
Description:
chromium-browser - Chromium browser
chromium-browser-dbg - chromium-browser debug symbols
chromium-browser-inspector - page
Package: glew
Severity: wishlist
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi,
please package the new 1.5.4 upstream version.
Cheers,
Giuseppe
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.10 (GNU/Linux)
iEYEARECAAYFAkvnAWEACgkQNxpp46476aomQgCgjTKiDZshlWaSCUSkG8L31oaz
: experimental
Urgency: low
Maintainer: Debian Chromium Maintainers
pkg-chromium-ma...@lists.alioth.debian.org
Changed-By: Giuseppe Iuculano iucul...@debian.org
Description:
chromium-browser - Chromium browser
chromium-browser-dbg - chromium-browser debug symbols
chromium-browser-inspector - page
Il 08/05/2010 16:31, Julian Andres Klode ha scritto:
Just for reference, this only happens on amd64 (the maintainer's
architecture). You can add debian-multimedia.org to sources.list
until the package is fixed.
Giuseppe: please build the package in a clean chroot consisting
only of packages
Il 08/05/2010 16:31, Julian Andres Klode ha scritto:
Just for reference, this only happens on amd64 (the maintainer's
architecture). You can add debian-multimedia.org to sources.list
until the package is fixed.
Giuseppe: please build the package in a clean chroot consisting
only of packages
Author: derevko-guest
Date: 2010-05-07 10:06:47 + (Fri, 07 May 2010)
New Revision: 14619
Modified:
data/CVE/list
Log:
Get in contact with chromium security team,
except for CVE-2009-2352 all recent CVEs are fixed in chromium
5.0.375.29~r46008-1.
Need to determine CVE-2009-3456
tags 580608 moreinfo unreproducible
thanks
Il 07/05/2010 09:05, Jonny ha scritto:
Hello, it doesn't start at all.
$ /usr/bin/chromium-browser
Illegal instruction
Please paste the output of:
reportbug --template chromium-browser
Cheers,
Giuseppe
signature.asc
Description: OpenPGP
severity 580608 serious
thanks
Hi,
Il 07/05/2010 13:28, michael hatzold ha scritto:
Am 07.05.2010, 12:51 Uhr, schrieb Debian Bug Tracking System
ow...@bugs.debian.org:
$ /usr/bin/chromium-browser
Ungültiger Maschinenbefehl
could you try the previous version please?
tags 580474 unreproducible
thanks
Hi Adrian!
Il 06/05/2010 10:52, Adrian Lang ha scritto:
Package: chromium-browser
Version: 5.0.342.9~r43360-1
Severity: normal
Tags: experimental
Steps to reproduce:
* Open Chromium
* Maximize Chromium
* Move Chromium window from one screen to
tags 580608 moreinfo unreproducible
thanks
Il 07/05/2010 09:05, Jonny ha scritto:
Hello, it doesn't start at all.
$ /usr/bin/chromium-browser
Illegal instruction
Please paste the output of:
reportbug --template chromium-browser
Cheers,
Giuseppe
signature.asc
Description: OpenPGP
severity 580608 serious
thanks
Hi,
Il 07/05/2010 13:28, michael hatzold ha scritto:
Am 07.05.2010, 12:51 Uhr, schrieb Debian Bug Tracking System
ow...@bugs.debian.org:
$ /usr/bin/chromium-browser
Ungültiger Maschinenbefehl
could you try the previous version please?
Author: derevko-guest
Date: 2010-05-06 20:56:54 + (Thu, 06 May 2010)
New Revision: 14618
Modified:
data/CVE/list
Log:
chromium triage
Modified: data/CVE/list
===
--- data/CVE/list 2010-05-06 17:57:23 UTC (rev 14617)
+++
: experimental
Urgency: low
Maintainer: Debian Chromium Maintainers
pkg-chromium-ma...@lists.alioth.debian.org
Changed-By: Giuseppe Iuculano iucul...@debian.org
Description:
chromium-browser - Chromium browser
chromium-browser-dbg - chromium-browser debug symbols
chromium-browser-inspector - page
reopen 580535
tags 580535 moreinfo
thanks
Il 06/05/2010 20:20, Faheem Mitha ha scritto:
I just can't build using
debuild binary
which errors out at the beginning.
Ok, so please send the full error log
Cheers,
Giuseppe.
signature.asc
Description: OpenPGP digital signature
Il 06/05/2010 22:03, Faheem Mitha ha scritto:
fah...@orwell:/usr/local/src/chromium-browser-debian/chromium-browser-5.0.342.9~r43360$
debuild binary
debian/rules:65: unsupported target arch - continuing anyway
/usr/share/cdbs/1/rules/buildcore.mk:72: parsing
reopen 580535
tags 580535 - moreinfo
thanks
Il 06/05/2010 23:15, Faheem Mitha ha scritto:
Policy disagrees. From IRC #debian-devel on oftc...
Right, reopening then.
Cheers,
Giuseppe
signature.asc
Description: OpenPGP digital signature
Package: cdbs
Version: 0.4.83
Severity: normal
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi,
I'm trying to fix #580535, debian/rules binary FTBFS
I think this is a bug in cdbs, in /usr/share/cdbs/1/rules/buildcore.mk there is:
binary: binary-indep binary-arch
IMHO to fix this issue it
Il 05/05/2010 20:59, Raphael Geissert ha scritto:
chromium-browser is now in experimental,
I will check all issues in the next days.
oh dear
:)
Cheers,
Giuseppe.
signature.asc
Description: OpenPGP digital signature
___
Secure-testing-commits
: experimental
Urgency: low
Maintainer: Debain Chromium Maintainers
pkg-chromium-ma...@lists.alioth.debian.org
Changed-By: Giuseppe Iuculano iucul...@debian.org
Description:
chromium-browser - Chromium browser
chromium-browser-dbg - chromium-browser debug symbols
chromium-browser-inspector - page
Author: derevko-guest
Date: 2010-05-02 09:07:09 + (Sun, 02 May 2010)
New Revision: 14581
Modified:
data/CVE/list
Log:
CVE-2010-0297 no-dsa
Modified: data/CVE/list
===
--- data/CVE/list 2010-05-01 21:14:27 UTC (rev
Author: derevko-guest
Date: 2010-05-02 09:39:42 + (Sun, 02 May 2010)
New Revision: 14582
Modified:
data/CVE/list
Log:
filed bug for CVE-2010-1152, severity doesn't seem low to me
Modified: data/CVE/list
===
--- data/CVE/list
Author: derevko-guest
Date: 2010-05-02 10:06:14 + (Sun, 02 May 2010)
New Revision: 14583
Modified:
data/CVE/list
Log:
NFU
dovecot wrong Mail dir permissions fixed
Modified: data/CVE/list
===
--- data/CVE/list
Package: memcached
Severity: grave
Tags: security patch
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi,
the following CVE (Common Vulnerabilities Exposures) id was
published for memcached.
CVE-2010-1152[0]:
| memcached.c in memcached before 1.4.3 allows remote attackers to cause
| a denial
Package: memcached
Severity: grave
Tags: security patch
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi,
the following CVE (Common Vulnerabilities Exposures) id was
published for memcached.
CVE-2010-1152[0]:
| memcached.c in memcached before 1.4.3 allows remote attackers to cause
| a denial
Package: memcached
Severity: grave
Tags: security patch
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi,
the following CVE (Common Vulnerabilities Exposures) id was
published for memcached.
CVE-2010-1152[0]:
| memcached.c in memcached before 1.4.3 allows remote attackers to cause
| a denial
ksvg kdvi kiconedit kfax kfaxview kuickshow kooka
kdegraphics kolourpaint kmrml kgamma kpovmodeler
Architecture: source i386 all
Version: 4:3.5.5-3etch4
Distribution: oldstable-security
Urgency: high
Maintainer: Debian Qt/KDE Maintainers debian-qt-...@lists.debian.org
Changed-By: Giuseppe Iuculano
: 5.0.32-7etch12
Distribution: oldstable-security
Urgency: high
Maintainer: Christian Hammers c...@debian.org
Changed-By: Giuseppe Iuculano iucul...@debian.org
Description:
libmysqlclient15-dev - mysql database development files
libmysqlclient15off - mysql database client library
mysql-client
Author: derevko-guest
Date: 2010-04-30 11:24:00 + (Fri, 30 Apr 2010)
New Revision: 14577
Modified:
data/CVE/list
Log:
Fixed iscsitarget entry for CVE-2010-0743
Modified: data/CVE/list
===
--- data/CVE/list 2010-04-30
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
-
Debian Security Advisory DSA-2021-2 secur...@debian.org
http://www.debian.org/security/Giuseppe Iuculano
April 26, 2010
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
-
Debian Security Advisory DSA-2021-2 secur...@debian.org
http://www.debian.org/security/Giuseppe Iuculano
April 26, 2010
Hi,
Il 23/04/2010 22:55, Stefano Zacchiroli ha scritto:
That's great news guys, I'm really looking forward for chromium browser
in unstable ... and if you need a beta tester, ping me :-)
Preliminary i386/amd64 Debian packages can be found here:
http://people.debian.org/~iuculano/chromium/
Il 26/04/2010 15:58, Stefano Zacchiroli ha scritto:
(You might want to sign the .dsc though, so that people can have a trust
path to the .deb-s.)
Signed, thanks!
Cheers,
Giuseppe.
signature.asc
Description: OpenPGP digital signature
Hi,
Il 23/04/2010 22:55, Stefano Zacchiroli ha scritto:
That's great news guys, I'm really looking forward for chromium browser
in unstable ... and if you need a beta tester, ping me :-)
Preliminary i386/amd64 Debian packages can be found here:
http://people.debian.org/~iuculano/chromium/
Il 26/04/2010 15:58, Stefano Zacchiroli ha scritto:
(You might want to sign the .dsc though, so that people can have a trust
path to the .deb-s.)
Signed, thanks!
Cheers,
Giuseppe.
signature.asc
Description: OpenPGP digital signature
Hi Alexander,
Il 23/04/2010 14:10, Alexander Reichle-Schmehl ha scritto:
I've prepared an NMU for kompozer (versioned as 1:0.8~b3.dfsg.1-0.1) and
uploaded it to DELAYED/7. Please feel free to tell me if I
should delay it longer.
thanks for your NMU!
I'm currently busy, please go ahead, and
Hi Alexander,
Il 23/04/2010 14:10, Alexander Reichle-Schmehl ha scritto:
I've prepared an NMU for kompozer (versioned as 1:0.8~b3.dfsg.1-0.1) and
uploaded it to DELAYED/7. Please feel free to tell me if I
should delay it longer.
thanks for your NMU!
I'm currently busy, please go ahead, and
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Wed, 21 Apr 2010 22:19:59 +0200
Source: gyp
Binary: gyp
Architecture: source all
Version: 0.1~svn805-1
Distribution: unstable
Urgency: low
Maintainer: Giuseppe Iuculano iucul...@debian.org
Changed-By: Giuseppe Iuculano iucul
Package: git-buildpackage
Version: 0.4.65
Severity: normal
File: /usr/bin/git-import-dsc
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi,
It seems git-import-dsc fails with chromium-browser in ubuntu:
# git-import-dsc chromium-browser_5.0.342.9~r43360-0ubuntu2.dsc
No git repository found,
Il 22/04/2010 12:25, Stefano Zacchiroli ha scritto:
Regarding security issues, I duly notice that Giuseppe is a full member
of the Debian security team, so I believe we should trust his judgement
on that.
webkit related security issues are real and I'm well placed to know about
it.
I
Il 22/04/2010 12:25, Stefano Zacchiroli ha scritto:
Regarding security issues, I duly notice that Giuseppe is a full member
of the Debian security team, so I believe we should trust his judgement
on that.
webkit related security issues are real and I'm well placed to know about
it.
I
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Wed, 21 Apr 2010 10:58:20 +0200
Source: gtest
Binary: libgtest0 libgtest-dev
Architecture: source i386
Version: 1.5.0-1
Distribution: unstable
Urgency: low
Maintainer: Steve M. Robbins s...@debian.org
Changed-By: Giuseppe Iuculano
owner 520324 !
thanks
Il 27/03/2010 17:14, Giuseppe Iuculano ha scritto:
Hi Alexander,
Il 26/03/2010 12:24, Alexander Sack ha scritto:
Just pull and build the ubuntu package.
Is there a specific reason why you (Chromium team) uploaded
chromium-browser in Ubuntu two months ago and not yet
owner 520324 !
thanks
Il 27/03/2010 17:14, Giuseppe Iuculano ha scritto:
Hi Alexander,
Il 26/03/2010 12:24, Alexander Sack ha scritto:
Just pull and build the ubuntu package.
Is there a specific reason why you (Chromium team) uploaded
chromium-browser in Ubuntu two months ago and not yet
-threaded-dev apache2-src apache2-dbg
Architecture: source i386 all
Version: 2.2.9-10+lenny7
Distribution: stable-security
Urgency: high
Maintainer: Debian Apache Maintainers debian-apa...@lists.debian.org
Changed-By: Giuseppe Iuculano iucul...@debian.org
Description:
apache2- Apache HTTP Server
Architecture: source all i386
Version: 1.6.dfsg.4~beta1-5lenny3
Distribution: stable-security
Urgency: high
Maintainer: Sam Hartman hartm...@debian.org
Changed-By: Giuseppe Iuculano iucul...@debian.org
Description:
krb5-admin-server - MIT Kerberos master server (kadmind)
krb5-clients - Secure replacements
Salazar ani...@debian.org
Changed-By: Giuseppe Iuculano iucul...@debian.org
Description:
libpng12-0 - PNG library - runtime
libpng12-0-udeb - PNG library - minimal runtime library (udeb)
libpng12-dev - PNG library - development
libpng3- PNG library - runtime
Closes: 533676 572308
Changes
: Andreas Barth a...@not.so.argh.org
Changed-By: Giuseppe Iuculano iucul...@debian.org
Description:
libnetpbm10 - Shared libraries for netpbm
libnetpbm10-dev - Development libraries and header files
libnetpbm9 - Shared libraries for netpbm
libnetpbm9-dev - Development libraries and header files
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Tue, 02 Mar 2010 15:22:43 +0100
Source: sudo
Binary: sudo sudo-ldap
Architecture: source i386
Version: 1.6.9p17-2+lenny1
Distribution: stable-security
Urgency: high
Maintainer: Bdale Garbee bd...@gag.com
Changed-By: Giuseppe Iuculano
Author: derevko-guest
Date: 2010-04-14 08:17:40 + (Wed, 14 Apr 2010)
New Revision: 14476
Modified:
data/CVE/list
Log:
- CVE-2010-1277 and CVE-2010-0743 fixed
Modified: data/CVE/list
===
--- data/CVE/list 2010-04-13
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
-
Debian Security Advisory DSA-2032-1 secur...@debian.org
http://www.debian.org/security/Giuseppe Iuculano
April 11, 2010
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Mon, 12 Apr 2010 14:54:39 +0200
Source: nmon
Binary: nmon
Architecture: source i386
Version: 13g+debian-1
Distribution: unstable
Urgency: low
Maintainer: Giuseppe Iuculano iucul...@debian.org
Changed-By: Giuseppe Iuculano iucul
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
-
Debian Security Advisory DSA-2032-1 secur...@debian.org
http://www.debian.org/security/Giuseppe Iuculano
April 11, 2010
Author: derevko-guest
Date: 2010-04-11 09:12:12 + (Sun, 11 Apr 2010)
New Revision: 14446
Modified:
data/CVE/list
data/DSA/list
Log:
- CVE-2009-2649 fixed
- DSA 2031-1
Modified: data/CVE/list
===
--- data/CVE/list
The failure to start seems to have been fixed (or at least, fixed) by the
0.9.21-1.2+b1 binNMU on amd64.
Yes, the problem was that the touch config.h.in didn't have any effect
probably because it was built in a very fast buildd and ext3 only has a
1 second resolution.
It's a timing/resolution
The failure to start seems to have been fixed (or at least, fixed) by the
0.9.21-1.2+b1 binNMU on amd64.
Yes, the problem was that the touch config.h.in didn't have any effect
probably because it was built in a very fast buildd and ext3 only has a
1 second resolution.
It's a timing/resolution
The failure to start seems to have been fixed (or at least, fixed) by the
0.9.21-1.2+b1 binNMU on amd64.
Yes, the problem was that the touch config.h.in didn't have any effect
probably because it was built in a very fast buildd and ext3 only has a
1 second resolution.
It's a timing/resolution
Author: derevko-guest
Date: 2010-04-09 16:21:17 + (Fri, 09 Apr 2010)
New Revision: 14442
Modified:
data/CVE/list
Log:
two bugs filed
Modified: data/CVE/list
===
--- data/CVE/list 2010-04-09 03:26:15 UTC (rev 14441)
+++
Author: derevko-guest
Date: 2010-04-09 18:43:56 + (Fri, 09 Apr 2010)
New Revision: 14443
Modified:
data/CVE/list
data/NMU/list
Log:
- CVE-2010-0629 only affects lenny
- krb5 NMUed
Modified: data/CVE/list
===
---
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Fri, 09 Apr 2010 17:47:14 +0200
Source: arping
Binary: arping
Architecture: source i386
Version: 2.09-2
Distribution: unstable
Urgency: low
Maintainer: Giuseppe Iuculano iucul...@debian.org
Changed-By: Giuseppe Iuculano iucul
-mit7 libk5crypto3 libkdb5-4
libkrb5support0
Architecture: source all i386
Version: 1.8+dfsg-1.1
Distribution: unstable
Urgency: high
Maintainer: Sam Hartman hartm...@debian.org
Changed-By: Giuseppe Iuculano iucul...@debian.org
Description:
krb5-admin-server - MIT Kerberos master server (kadmind
tags 577002 + pending
thanks
Hello,
The following change has been committed for this bug by
Giuseppe Iuculano iucul...@debian.org on Fri, 9 Apr 2010 11:06:31 +0200.
The fix will be in the next upload.
=
Fix a FTBFS
Package: zabbix
Severity: grave
Tags: security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi,
the following CVE (Common Vulnerabilities Exposures) id was
published for zabbix.
CVE-2010-1277[0]:
| SQL injection vulnerability in the user.authenticate method in the API
| in Zabbix 1.8 before
Package: libnss-db
Severity: important
Tags: security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi,
the following CVE (Common Vulnerabilities Exposures) id was
published for libnss-db.
CVE-2010-0826[0]:
| The Free Software Foundation (FSF) Berkeley DB NSS module (aka
| libnss-db) 2.2.3pre1
. (Closes: 575740)
+ * Makes src/slave/kpropd.c ISO C90 compliant (Closes: #574703)
+
+ -- Giuseppe Iuculano iucul...@debian.org Fri, 09 Apr 2010 19:11:50 +0200
+
krb5 (1.8+dfsg-1) unstable; urgency=low
* New upstream version
diff -u krb5-1.8+dfsg/src/slave/kpropd.c krb5-1.8+dfsg/src/slave/kpropd.c
tags 577002 + pending
thanks
Hello,
The following change has been committed for this bug by
Giuseppe Iuculano iucul...@debian.org on Fri, 9 Apr 2010 11:06:31 +0200.
The fix will be in the next upload.
=
Fix a FTBFS
Package: zabbix
Severity: grave
Tags: security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi,
the following CVE (Common Vulnerabilities Exposures) id was
published for zabbix.
CVE-2010-1277[0]:
| SQL injection vulnerability in the user.authenticate method in the API
| in Zabbix 1.8 before
. (Closes: 575740)
+ * Makes src/slave/kpropd.c ISO C90 compliant (Closes: #574703)
+
+ -- Giuseppe Iuculano iucul...@debian.org Fri, 09 Apr 2010 19:11:50 +0200
+
krb5 (1.8+dfsg-1) unstable; urgency=low
* New upstream version
diff -u krb5-1.8+dfsg/src/slave/kpropd.c krb5-1.8+dfsg/src/slave/kpropd.c
Hi,
a binNMU (pulseaudio_0.9.10-3+lenny2+b1 on amd64) was uploaded some
minutes ago and this now should be fixed.
Could you confirm this please?
Cheers,
Giuseppe.
signature.asc
Description: OpenPGP digital signature
Hi,
a binNMU (pulseaudio_0.9.10-3+lenny2+b1 on amd64) was uploaded some
minutes ago and this now should be fixed.
Could you confirm this please?
Cheers,
Giuseppe.
signature.asc
Description: OpenPGP digital signature
___
Pkg-pulseaudio-devel mailing
Hi,
a binNMU (pulseaudio_0.9.10-3+lenny2+b1 on amd64) was uploaded some
minutes ago and this now should be fixed.
Could you confirm this please?
Cheers,
Giuseppe.
signature.asc
Description: OpenPGP digital signature
: Pulseaudio maintenance team
pkg-pulseaudio-de...@lists.alioth.debian.org
Changed-By: Giuseppe Iuculano iucul...@debian.org
Description:
libpulse-browse0 - PulseAudio client libraries (zeroconf support)
libpulse-browse0-dbg - PulseAudio client libraries (zeroconf support)
debugging symbols
libpulse-dev
) unstable; urgency=high
+
+ * Non-maintainer upload by the Security Team.
+ * Added autoconf, automake, and libtool in Build-Depends to regenerate
+configure and auto* files at build time, and fixed a regression introduced
+in previous NMU (Closes: #576457)
+
+ -- Giuseppe Iuculano iucul
) unstable; urgency=high
+
+ * Non-maintainer upload by the Security Team.
+ * Added autoconf, automake, and libtool in Build-Depends to regenerate
+configure and auto* files at build time, and fixed a regression introduced
+in previous NMU (Closes: #576457)
+
+ -- Giuseppe Iuculano iucul
: Pulseaudio maintenance team
pkg-pulseaudio-devel@lists.alioth.debian.org
Changed-By: Giuseppe Iuculano iucul...@debian.org
Description:
libpulse-browse0 - PulseAudio client libraries (zeroconf support)
libpulse-browse0-dbg - PulseAudio client libraries (zeroconf support)
debugging symbols
libpulse-dev
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
-
Debian Security Advisory DSA-2026-1 secur...@debian.org
http://www.debian.org/security/Giuseppe Iuculano
April 02, 2010
) unstable; urgency=high
+
+ * Non-maintainer upload by the Security Team.
+ * Added autoconf, automake, and libtool in Build-Depends to regenerate
+configure and auto* files at build time, and fixed a regression introduced
+in previous NMU (Closes: #576457)
+
+ -- Giuseppe Iuculano iucul
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Sun, 04 Apr 2010 11:36:04 +0200
Source: arping
Binary: arping
Architecture: source i386
Version: 2.09-1
Distribution: unstable
Urgency: low
Maintainer: Giuseppe Iuculano iucul...@debian.org
Changed-By: Giuseppe Iuculano iucul
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Sun, 04 Apr 2010 11:56:18 +0200
Source: smbind
Binary: smbind
Architecture: source all
Version: 0.4.7-4
Distribution: unstable
Urgency: low
Maintainer: Giuseppe Iuculano iucul...@debian.org
Changed-By: Giuseppe Iuculano iucul
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Sun, 28 Mar 2010 16:51:20 +0200
Source: moin
Binary: python-moinmoin
Architecture: source all
Version: 1.7.1-3+lenny4
Distribution: stable-security
Urgency: high
Maintainer: Jonas Smedegaard d...@jones.dk
Changed-By: Giuseppe
Author: derevko-guest
Date: 2010-04-03 13:20:56 + (Sat, 03 Apr 2010)
New Revision: 14389
Modified:
data/CVE/list
Log:
CVE-2008-1391: glibc is affected
Modified: data/CVE/list
===
--- data/CVE/list 2010-04-03 12:53:25
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Sat, 27 Mar 2010 12:00:40 +0100
Source: nload
Binary: nload
Architecture: source i386
Version: 0.7.2-1
Distribution: unstable
Urgency: low
Maintainer: Giuseppe Iuculano iucul...@debian.org
Changed-By: Giuseppe Iuculano iucul
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Fri, 26 Mar 2010 22:29:25 +0100
Source: nmapsi4
Binary: nmapsi4
Architecture: source i386
Version: 0.2~beta1-1
Distribution: unstable
Urgency: low
Maintainer: Giuseppe Iuculano iucul...@debian.org
Changed-By: Giuseppe Iuculano iucul
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Fri, 26 Mar 2010 22:01:58 +0100
Source: smartmontools
Binary: smartmontools
Architecture: source i386
Version: 5.39.1+svn3077-1
Distribution: unstable
Urgency: low
Maintainer: Giuseppe Iuculano iucul...@debian.org
Changed
tags 575680 + pending
thanks
Hello,
The following change has been committed for this bug by
Giuseppe Iuculano iucul...@debian.org on Sat, 3 Apr 2010 12:54:14 +0200.
The fix will be in the next upload.
=
Updated
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
-
Debian Security Advisory DSA-2026-1 secur...@debian.org
http://www.debian.org/security/Giuseppe Iuculano
April 02, 2010
Author: derevko-guest
Date: 2010-04-02 14:03:25 + (Fri, 02 Apr 2010)
New Revision: 14375
Modified:
bin/dsa2list
Log:
bin/dsa2list: search also the line Debian (release) to determine the release
Modified: bin/dsa2list
===
---
Author: derevko-guest
Date: 2010-04-02 14:45:11 + (Fri, 02 Apr 2010)
New Revision: 14377
Modified:
data/DTSA/list
Log:
DTSA-206-1 netpbm-free - buffer overflow
Modified: data/DTSA/list
===
--- data/DTSA/list 2010-04-02
; urgency=high
+
+ * Non-maintainer upload by the Security Team.
+ * Fixed CVE-2009-4274: Stack-based buffer overflow by processing X PixMap
+image header fields (Closes: #569060)
+
+ -- Giuseppe Iuculano iucul...@debian.org Fri, 02 Apr 2010 11:27:22 +0200
+
netpbm-free (2:10.0-12.1) unstable
Author: derevko-guest
Date: 2010-04-01 09:10:31 + (Thu, 01 Apr 2010)
New Revision: 14372
Modified:
data/CVE/list
Log:
CVE-2010-0308 fixed in squid3 3.1.0.16-1
Modified: data/CVE/list
===
--- data/CVE/list 2010-04-01
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
-
Debian Security Advisory DSA-2024-1 secur...@debian.org
http://www.debian.org/security/Giuseppe Iuculano
March 31, 2010
Author: derevko-guest
Date: 2010-03-31 08:51:01 + (Wed, 31 Mar 2010)
New Revision: 14364
Modified:
data/DSA/list
Log:
DSA-2024-1
Modified: data/DSA/list
===
--- data/DSA/list 2010-03-31 08:42:10 UTC (rev 14363)
+++
tags 574935 patch
tags 576086 patch
thanks
Hi,
this issue got a CVE id, CVE-2010-0743.
If you fix the vulnerability please also make sure to include the
CVE id in your changelog entry.
Patch:
tags 574935 patch
tags 576086 patch
thanks
Hi,
this issue got a CVE id, CVE-2010-0743.
If you fix the vulnerability please also make sure to include the
CVE id in your changelog entry.
Patch:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
-
Debian Security Advisory DSA-2024-1 secur...@debian.org
http://www.debian.org/security/Giuseppe Iuculano
March 31, 2010
tags 574935 patch
tags 576086 patch
thanks
Hi,
this issue got a CVE id, CVE-2010-0743.
If you fix the vulnerability please also make sure to include the
CVE id in your changelog entry.
Patch:
Author: derevko-guest
Date: 2010-03-30 07:37:43 + (Tue, 30 Mar 2010)
New Revision: 14355
Modified:
data/CVE/list
Log:
CVE-2009-4609 and CVE-2009-4610: jetty in Debian is not affected
Modified: data/CVE/list
===
---
Package: jetty
Severity: serious
Tags: security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi,
the following CVE (Common Vulnerabilities Exposures) id was
published for jetty.
CVE-2009-4610[0]:
| Multiple cross-site scripting (XSS) vulnerabilities in Mort Bay Jetty
| 6.x and 7.0.0 allow
901 - 1000 of 3350 matches
Mail list logo