Re: [SECURITY] [DSA 2351-1] wireshark security update
Dnia 2011-11-21, o godz. 20:48:52 supp...@sistelia.com napisał(a): Can someone remove that person from this list, please? Gracias por contactar con nosotros, -- Regards, Piotr Drozdek -- To UNSUBSCRIBE, email to debian-security-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/2021204706.490e8359@pioruns-LIFEBOOK-S7010
Re: Odp.: [SECURITY] [DSA 2315-1] openoffice.org security update
Dnia 2011-10-05, o godz. 15:35:39 Czarek Wysocki cwyso...@cwysocki.pl napisał(a): Y. http://netykieta.pl/ Zapoznaj się. Wysłano z BlackBerry® w Orange Łał. A mash fotke? BP,NMSP. -- Regards, Piotr Drozdek -- To UNSUBSCRIBE, email to debian-security-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/20111005232417.1e04ed3e@debian
Re: aptitude upgrade vs. apt-get upgrade
Dnia 2011-03-31, o godz. 20:11:40 Thomas Hungenberg th+lists-deb...@demonium.de napisał(a): Piotr Drozdek wrote: Show me results of apt-cache policy tex-common tex-common: Installed: 2.08 Candidate: 2.08.1 Version table: 2.08.1 0 500 http://security.debian.org/ squeeze/updates/main i386 Packages *** 2.08 0 500 http://ftp.de.debian.org/debian/ squeeze/main i386 Packages 100 /var/lib/dpkg/status dpkg --get-selections |grep tex-common tex-common install - Thomas Everything looks fine. Candidate is a new version. Do upgrade by typing: apt-get update aptitude full-upgrade -- Regards, Piotr Drozdek -- To UNSUBSCRIBE, email to debian-security-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/20110401083746.4f1836ff@debian
Re: aptitude upgrade vs. apt-get upgrade
Dnia 2011-04-01, o godz. 10:30:40 Thomas Hungenberg th+lists-deb...@demonium.de napisał(a): Piotr Drozdek wrote: Dnia 2011-03-31, o godz. 20:11:40 Thomas Hungenberg th+lists-deb...@demonium.de napisał(a): Piotr Drozdek wrote: Show me results of apt-cache policy tex-common tex-common: Installed: 2.08 Candidate: 2.08.1 Version table: 2.08.1 0 500 http://security.debian.org/ squeeze/updates/main i386 Packages *** 2.08 0 500 http://ftp.de.debian.org/debian/ squeeze/main i386 Packages 100 /var/lib/dpkg/status dpkg --get-selections |grep tex-common tex-common install - Thomas Everything looks fine. Candidate is a new version. Do upgrade by typing: apt-get update aptitude full-upgrade Interesting... 'aptitude full-upgrade' works: # aptitude -s full-upgrade The following packages will be upgraded: bind9-host dnsutils libbind9-60 libdns69 libisc62 libisccc60 libisccfg62 liblwres60 tex-common 9 packages upgraded, 0 newly installed, 0 to remove and 0 not upgraded. but 'aptitude update' misses the security update for 'tex-common': # aptitude -s upgrade The following packages will be upgraded: bind9-host dnsutils libbind9-60 libdns69 libisc62 libisccc60 libisccfg62 liblwres60 8 packages upgraded, 0 newly installed, 0 to remove and 1 not upgraded. I just noticed that the package 'tex-common' is marked 'id' in aptitude: # aptitude search tex-common id tex-common - common infrastructure for building and installing TeX Maybe this is the reason? There are dozens of other packages marked 'id', like debian-keyring, strace, ... I don't think this was the case before the upgrade from lenny to squeeze. - Thomas I don't have any packages with 'id' status in my system. I don't know what they mean. Maybe somebody can help? But - to resolve your problem: can you just do this upgrade (8 packages) now? And upgrade tex-common manually: aptitude install tex-common=2.08.1 -- Regards, Piotr Drozdek -- To UNSUBSCRIBE, email to debian-security-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/20110401094820.10150dac@debian
Re: aptitude upgrade vs. apt-get upgrade
Dnia 2011-03-31, o godz. 14:49:19 Thomas Hungenberg th+lists-deb...@demonium.de napisał(a): Hi, since upgrading from lenny to squeeze, I've noticed several times that aptitude does not install all available security updates whereas apt-get does. Currently, this looks like: # aptitude -s upgrade The following packages will be upgraded: bind9-host dnsutils libbind9-60 libdns69 libisc62 libisccc60 libisccfg62 liblwres60 8 packages upgraded, 0 newly installed, 0 to remove and 1 not upgraded. # apt-get -s upgrade Reading package lists... Done Building dependency tree Reading state information... Done The following packages will be upgraded: bind9-host dnsutils libbind9-60 libdns69 libisc62 libisccc60 libisccfg62 liblwres60 tex-common 9 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. What's the reason for this? - Thomas Show me results of apt-cache policy tex-common dpkg --get-selections |grep tex-common 8 packages upgraded, 0 newly installed, 0 to remove and 1 not upgraded. aptitude knows about tex-common, but because of some reason it not making an upgrade. You should check maybe you hold the status of that package in aptitude: aptitude unhold tex-common -- Regards, Piotr Drozdek -- To UNSUBSCRIBE, email to debian-security-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/20110331183206.67221641@debian
Re: [SECURITY] [DSA 2205-1] gdm3 security update
Dnia 2011-03-28, o godz. 16:09:09 Ivan Jager aij+nos...@andrew.cmu.edu napisał(a): Is there some reason the updates would not have made it to security.debian.org yet? This is not the first time I've gone to upgrade a package after receiving the DSA only to find out the updates are not available yet. http://www.debian.org/security/faq#archismissing seems to indicate the packages should be built before the advisory is sent. FWIW I'm on amd64. $ uname -m x86_64 $ apt-cache policy gdm3 gdm3: Zainstalowana: 2.30.5-8 Kandydująca: 2.30.5-8 Tabela wersji: *** 2.30.5-8 0 500 ftp://ftp.uk.debian.org/debian/ testing/main amd64 Packages 110 ftp://ftp.uk.debian.org/debian/ unstable/main amd64 Packages 100 /var/lib/dpkg/status 2.30.5-6squeeze2 0 500 http://security.debian.org/ stable/updates/main amd64 Packages 2.30.5-6squeeze1 0 500 ftp://ftp.uk.debian.org/debian/ stable/main amd64 Packages What's the problem? 2.30.5-6squeeze2 with this security patch is already here. -- Regards, Piotr Drozdek -- To UNSUBSCRIBE, email to debian-security-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/20110329052009.04c17301@debian