[Bug 248083] Re: brasero 0.7.91 from Intrepid contains lots of important bugfixes, please backport
** Description changed: - Brasero CD/DVD burner from Ubuntu 8.04 Hardy has lots of bugs, new - version 0.7.91 from Intrepid contains lots of important bugfixes, please + Brasero CD/DVD burner from Ubuntu 8.04 LTS Hardy has lots of bugs, new + version 0.8.0 from Intrepid contains lots of important bugfixes, please backport. I'm pasting Ubuntu changelog: + + brasero (0.8.0-0ubuntu1) intrepid; urgency=low + + * New upstream release (LP: #247609) + - Make brasero.desktop follow freedesktop + - Brasero can't find a proper cd/dvd drive on Solaris + - Build failure againts gtk+ trunk + - Brasero crashes with libburn backend + - Speed is not displayed + - Can't add files from FAT32 partitions + - Not displaying drive speed + - toc image type not autodetected correctly + * debian/patches/010_lpi.patch: + - Refresh for new release + * 013_disable_deprecated.patch: + - Disable DGTK_DISABLE_DEPRECATED to fix FTBFS + * debian/control: + - Suggests gstreamer0.10-plugins-bad for normalize plugin + + -- Pedro Fragoso [EMAIL PROTECTED] Tue, 15 Jul 2008 00:51:52 +0100 brasero (0.7.91-0ubuntu1) intrepid; urgency=low * New upstream release (LP: #239524) - Fixed odd burning speeds (LP: #178482) (LP: #177124) - Cancel dialog buttons' wording is confusing (LP: #195083) - Support for DL DVDs (LP: #202206) - Brasero does not recognize .bin in the same directory when .cue is selected (LP: #202546) - Brasero does not save user settings (LP: #220352) - Can't set tmp dir and can't burn image if size available on /tmp (LP: #226209) - Migrate from GnomeVFS to GIO (LP: #198771) - Preview disabled calls a video window (LP: #198497) - Brasero crashes in strlen () when debug mode is on (LP: #225405) * debian/control.in: - Remove Build depend on libgnomevfs2-dev (= 2.14.2), libnautilus-burn-dev (= 2.16.0), libnotify-dev - Bump Build depend libglib2.0-dev to (= 2.15.6) - Bump Build depend libgstreamer0.10-dev to (= 0.10.15) - Bump Build depend libtotem-plparser-dev to (= 2.22.0) - Add Build depend on gnome-doc-utils (= 0.3.2) and liblaunchpad-integration-dev - Bump Standards-Version to 3.8.0 * debian/patches/007-fix-desktop-file-mime-typo.patch: - Dropped, merged upstream * debian/patches/010_lpi.patch: - Add launchpad-integration * debian/patches/012_gnome-doc-utils.make.patch - Add missing gnome-doc-utils.make to fix FTBFS * debian/rules: - Add --disable-scrollkeeper * Modify Maintainer value to match the DebianMaintainerField specification. -- Pedro Fragoso [EMAIL PROTECTED] Thu, 03 Jul 2008 23:03:40 +0100 You can look at original news file at http://svn.gnome.org/viewvc/brasero/trunk/NEWS?view=markup ** Summary changed: - brasero 0.7.91 from Intrepid contains lots of important bugfixes, please backport + brasero 0.8.0 from Intrepid contains lots of important bugfixes, please backport to 8.04 LTS (Hardy) -- brasero 0.8.0 from Intrepid contains lots of important bugfixes, please backport to 8.04 LTS (Hardy) https://bugs.launchpad.net/bugs/248083 You received this bug notification because you are a member of Ubuntu Backports Testing Team, which is subscribed to Hardy Backports. -- ubuntu-backports mailing list ubuntu-backports@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-backports
[Bug 251174] [NEW] Please backport NetBeans 6.1
Public bug reported: NetBeans 6.1 has been released. ** Affects: hardy-backports Importance: Undecided Status: New -- Please backport NetBeans 6.1 https://bugs.launchpad.net/bugs/251174 You received this bug notification because you are a member of Ubuntu Backports Testing Team, which is subscribed to Hardy Backports. -- ubuntu-backports mailing list ubuntu-backports@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-backports
[Bug 251220] Re: Please backport subversion
*** This bug is a duplicate of bug 247514 *** https://bugs.launchpad.net/bugs/247514 ** This bug has been marked a duplicate of bug 247514 Please backport SVN 1.5 from interpid -- Please backport subversion https://bugs.launchpad.net/bugs/251220 You received this bug notification because you are a member of Ubuntu Backports Testing Team, which is subscribed to Hardy Backports. -- ubuntu-backports mailing list ubuntu-backports@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-backports
[Bug 250523] Re: please backport subversion 1.5 to hardy
*** This bug is a duplicate of bug 247514 *** https://bugs.launchpad.net/bugs/247514 ** This bug has been marked a duplicate of bug 247514 Please backport SVN 1.5 from interpid -- please backport subversion 1.5 to hardy https://bugs.launchpad.net/bugs/250523 You received this bug notification because you are a member of Ubuntu Backports Testing Team, which is subscribed to Hardy Backports. -- ubuntu-backports mailing list ubuntu-backports@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-backports
[Bug 251220] Re: Please backport subversion
*** This bug is a duplicate of bug 247514 *** https://bugs.launchpad.net/bugs/247514 Builds fine under hardy pbuilder. ** Changed in: hardy-backports Status: New = Confirmed -- Please backport subversion https://bugs.launchpad.net/bugs/251220 You received this bug notification because you are a member of Ubuntu Backports Testing Team, which is subscribed to Hardy Backports. -- ubuntu-backports mailing list ubuntu-backports@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-backports
[Bug 227464] Re: Please roll out security fixes from PHP 5.2.6
This bug was fixed in the package php5 - 5.2.4-2ubuntu5.3 --- php5 (5.2.4-2ubuntu5.3) hardy-security; urgency=low [ Tormod Volden ] * Backport security fixes from 5.2.6: (LP: #227464) - debian/patches/SECURITY_CVE-2008-2050.patch + Fixed possible stack buffer overflow in FastCGI SAPI + Fixed sending of uninitialized paddings which may contain some information - debian/patches/SECURITY_CVE-2008-0599.patch + Fixed security issue detailed in CVE-2008-0599 - debian/patches/SECURITY_CVE-2007-4850.patch + Fixed a safe_mode bypass in cURL identified by Maksymilian Arciemowicz - debian/patches/security526-pcre_compile.patch: + avoid stack overflow (fix from pcre 7.6) [ Jamie Strandboge ] * debian/patches/SECURITY_CVE-2008-2051.patch: properly address incomplete multibyte chars inside escapeshellcmd() (thanks Tormod Volden) * Add debian/patches/SECURITY_CVE-2007-5898.patch: don't accept partial utf8 sequences. Backported upstream fixes. * Add debian/patches/SECURITY_CVE-2007-5899.patch: don't send session id to remote forms. Backported upstream fixes. * Add debian/patches/SECURITY_CVE-2008-2829.patch: unsafe usage of deprecated imap functions (patch from Debian) * Add debian/patches/SECURITY_CVE-2008-1384.patch: integer overflow in printf() (patch from Debian) * Add debian/patches/SECURITY_CVE-2008-2107+2108.patch: weak random number seed. Backported upstream patches. * Add debian/patches/SECURITY_CVE-2007-4782.patch: DoS via long string in the fnmatch functions * Add debian/patches/SECURITY_CVE-2008-2371.patch: buffer overflow. Backported upstream patches. * References CVE-2008-2050 CVE-2008-2051 CVE-2008-0599 CVE-2007-4850 CVE-2007-5898 CVE-2007-5899 CVE-2008-2829 CVE-2008-1384 CVE-2008-2107 CVE-2008-2108 CVE-2007-4782 CVE-2008-2371 -- Jamie Strandboge [EMAIL PROTECTED] Fri, 18 Jul 2008 11:50:38 -0400 ** Changed in: php5 (Ubuntu Hardy) Status: Fix Committed = Fix Released ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2007-4782 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2007-4850 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2007-5898 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2007-5899 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2008-1384 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2008-2050 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2008-2051 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2008-2107 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2008-2108 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2008-2371 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2008-2829 ** Changed in: php5 (Ubuntu Gutsy) Status: Fix Committed = Fix Released -- Please roll out security fixes from PHP 5.2.6 https://bugs.launchpad.net/bugs/227464 You received this bug notification because you are a member of Ubuntu Backports Testing Team, which is subscribed to Hardy Backports. -- ubuntu-backports mailing list ubuntu-backports@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-backports