Hi Steve,
I am using a 'universal' symbol file in afflib to simplify the
packaging. I think that it will solve the problems with Ubuntu too.
Please, can you test the current version in experimental? I will
upload this version to unstable in mid-week.
Thanks for your help.
Regards,
Eriberto
Processing commands for cont...@bugs.debian.org:
> severity 802089 important
Bug #802089 [ext4magic] ext4magic: recover or examine on ext4 file system is
impossible
Severity set to 'important' from 'normal'
> thanks
Stopping processing here.
Please contact me if you need assistance.
--
802089:
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Sun, 29 Nov 2015 20:37:40 -0200
Source: volatility
Binary: volatility volatility-tools
Architecture: source all
Version: 2.5-1~bpo8+1
Distribution: jessie-backports
Urgency: medium
Maintainer: Debian Forensics
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Sun, 29 Nov 2015 22:49:23 -0200
Source: ext4magic
Binary: ext4magic
Architecture: source
Version: 0.3.2-3
Distribution: unstable
Urgency: medium
Maintainer: Debian Forensics
Hi Roberto,
Thanks for your report. I tested ext4magic over Debian Unstable now
and the problem also occurs.
I applied your patch and uploaded a new package to unstable. When in
testing (five days), I will upload to Jessie-Backports.
To close this bug, I will wait a final solution.
Thanks a
ext4magic_0.3.2-3_source.changes uploaded successfully to localhost
along with the files:
ext4magic_0.3.2-3.dsc
ext4magic_0.3.2-3.debian.tar.xz
Greetings,
Your Debian queue daemon (running on host franck.debian.org)
___
forensics-devel
volatility_2.5-1~bpo8+1_amd64.changes uploaded successfully to localhost
along with the files:
volatility_2.5-1~bpo8+1.dsc
volatility_2.5-1~bpo8+1.debian.tar.xz
volatility_2.5-1~bpo8+1_all.deb
volatility-tools_2.5-1~bpo8+1_all.deb
Greetings,
Your Debian queue daemon (running on
Hi Henri,
I agree with you.
Regards,
Eriberto
2015-10-15 10:32 GMT-03:00 Henri Salo :
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA1
>
> Package: dc3dd
> Version: 7.2.641-3
> Severity: normal
> Tags: security
>
> Buffer overflow issue was announced in Bugtraq[1] with