Hi Salvatore, hi Holger,

On Thu, 02 Mar 2017 08:12:24 +0100 Salvatore Bonaccorso
<car...@debian.org> wrote:
> Source: munin
> Version: 2.0.25-1+deb8u1
> Severity: serious
> Tags: upstream
> 
> Only after releasing the DSA, I noticed that the update introduced
> another regression, causing to spam the munin logs for
> munin-cgi-graph.log with:
> 
> [...]
> 2017/03/02 06:53:56 [PERL WARNING] Use of uninitialized value $size_x in 
> string eq at /usr/lib/munin/cgi/munin-cgi-graph line 453.
> [...]
> 
> We possibly should release another regression update for
> jessie-security, and have the fix included as well for stretch.

Upstream just released munin 2.0.33 which fixes this regression. The
relevant patch is
https://github.com/munin-monitoring/munin/commit/6373554b1cc8bee886947cee598e86d1d9ea1e4a

Cheers,
 jonas

Attachment: signature.asc
Description: OpenPGP digital signature

Reply via email to