severity 344481 important
block 330197 by 344481
thanks
I see no reason to keep #344481 as serious until there is no known reason
of #330197.
--
Nasz bohater często siada przed komputerem i myśli
recenzja http://czat.zlotemysli.pl/
--
To UNSUBSCRIBE,
Processing commands for [EMAIL PROTECTED]:
severity 344481 important
Bug#344481: php4-rrdtool: Use of RRD extensions (graph only?) causes Apache to
segfault
Severity set to `important' from `serious'
block 330197 by 344481
Bug#330197: php4-rrdtool: Use of RRD extensions (graph only?) causes
apr_1.2.7-3_i386.changes uploaded successfully to localhost
along with the files:
apr_1.2.7-3.dsc
apr_1.2.7-3.diff.gz
libapr1_1.2.7-3_i386.deb
libapr1-dev_1.2.7-3_i386.deb
libapr1-dbg_1.2.7-3_i386.deb
Greetings,
Your Debian queue daemon
--
To UNSUBSCRIBE, email to [EMAIL
Accepted:
apr_1.2.7-3.diff.gz
to pool/main/a/apr/apr_1.2.7-3.diff.gz
apr_1.2.7-3.dsc
to pool/main/a/apr/apr_1.2.7-3.dsc
libapr1-dbg_1.2.7-3_i386.deb
to pool/main/a/apr/libapr1-dbg_1.2.7-3_i386.deb
libapr1-dev_1.2.7-3_i386.deb
to pool/main/a/apr/libapr1-dev_1.2.7-3_i386.deb
Your message dated Thu, 15 Jun 2006 06:17:07 -0700
with message-id [EMAIL PROTECTED]
and subject line Bug#369881: fixed in apr 1.2.7-3
has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your
Package: apache
Version: 1.3.34-2
Severity: normal
Cross-site scripting (XSS) vulnerability in the mod_imap module of
Apache httpd before 1.3.35-dev and Apache httpd 2.0.x before 2.0.56-dev
allows remote attackers to inject arbitrary web script or HTML via the
Referer when using image maps.
Hello,
On Wed, Jun 14, 2006 at 04:41:56PM +0200, Ralf Wildenhues wrote:
It may be possible to reorder macro invocations so the expansion of
APR_PARSE_ARGUMENTS comes before any AC_CANONICAL_*?
... but this is only a temporary workaround, of course, because:
[...] several macros in Autoconf
Hi Stepan,
* Stepan Kasal wrote on Thu, Jun 15, 2006 at 06:12:51PM CEST:
[...] several macros in Autoconf overwrite the positional
parameters, not just AC_CANONICAL_SYSTEM. For example,
AC_CHECK_PROG does, so do some others. [...]
I agree that we should document this limitation. I
8 matches
Mail list logo