Hi On Fri, Mar 03, 2017 at 01:45:10AM +0100, Jonas Meurer wrote: > Hi Salvatore, hi Holger, > > On Thu, 02 Mar 2017 08:12:24 +0100 Salvatore Bonaccorso > <car...@debian.org> wrote: > > Source: munin > > Version: 2.0.25-1+deb8u1 > > Severity: serious > > Tags: upstream > > > > Only after releasing the DSA, I noticed that the update introduced > > another regression, causing to spam the munin logs for > > munin-cgi-graph.log with: > > > > [...] > > 2017/03/02 06:53:56 [PERL WARNING] Use of uninitialized value $size_x in > > string eq at /usr/lib/munin/cgi/munin-cgi-graph line 453. > > [...] > > > > We possibly should release another regression update for > > jessie-security, and have the fix included as well for stretch. > > Upstream just released munin 2.0.33 which fixes this regression. The > relevant patch is > https://github.com/munin-monitoring/munin/commit/6373554b1cc8bee886947cee598e86d1d9ea1e4a
Thank you. Have seen it and prepared a followup for jessie-security (additionally asked if DSA can test the whole update on the Debian installation). Regards, Salvatore