Package: dtc-xen
Version: 0.5.13-2
Severity: serious
Tags: squeeze
As per the subject, the symlinks creation breaks the upgrade from Lenny.
This should be removed completely.
Cheers,
Thomas Goirand (zigo)
-- System Information:
Debian Release: squeeze/sid
APT prefers testing
APT policy:
Package: xen-qemu-dm-4.0
Version: 4.0.1-1
Severity: serious
Tags: squeeze
The symlink creation should be removed completely, because it's
preventing upgrades from Lenny.
-- System Information:
Debian Release: squeeze/sid
APT prefers testing
APT policy: (500, 'testing')
Architecture: amd64
forcemerge 552604 60653
thanks
Hi, the issue has already been fixed.
On Fri, Dec 10, 2010 at 12:49:16AM +, techy techtech wrote:
Package: asterisk
Version: 1:1.6.2.0~dfsg~beta3-1
and: 1.6.2.0~dfsg~rc1-1
Those versions are quite old.
Justification: renders package unusable
Hi Modestas
You are right. Grave might be a little bit to excessive. You can feel
free to downgrad
the severity. But for me the package is actually not usable. Because I
can not configure/add
any instant messaging account. An an instant messenger, where you can
not add your
accounts is some kind
Am 10.12.2010 03:10, schrieb Florian Zumbiehl:
Package: mumble-server
Version: 1.1.8-2
Severity: grave
Justification: privilege escalation vulnerability
Tags: security
There was a privilege escalation vulnerability in logrotate that I reported
about four years ago and which finally got fixed in
Package: bacula-common
Version: 2.4.4-1
Severity: grave
Justification: privilege escalation vulnerability
Tags: security
There was a privilege escalation vulnerability in logrotate that I reported
about four years ago and which finally got fixed in testing rouhgly one
year ago (see bug #388608).
(CC'ed debian-devel as this was a not-so-well coordinated MBF without
announcement to debian-devel, dd-list, usertags; so maybe at least further
discussion can happen there)
Hi Florian,
[...]
These lines from this package's maintainer scripts suggest that it likely
is affected by the
Package: binkd
Version: 0.9.9+rel-2
Severity: grave
Justification: privilege escalation vulnerability
Tags: security
There was a privilege escalation vulnerability in logrotate that I reported
about four years ago and which finally got fixed in testing rouhgly one
year ago (see bug #388608). In
Package: mrtg
Version: 2.16.2-4
Severity: grave
Justification: privilege escalation vulnerability
Tags: security
There was a privilege escalation vulnerability in logrotate that I reported
about four years ago and which finally got fixed in testing rouhgly one
year ago (see bug #388608). In lenny
Package: pyicqt
Version: 0.8.1.3-2
Severity: grave
Justification: privilege escalation vulnerability
Tags: security
There was a privilege escalation vulnerability in logrotate that I reported
about four years ago and which finally got fixed in testing rouhgly one
year ago (see bug #388608). In
Package: net-acct
Version: 0.71-8
Severity: grave
Justification: privilege escalation vulnerability
Tags: security
There was a privilege escalation vulnerability in logrotate that I reported
about four years ago and which finally got fixed in testing rouhgly one
year ago (see bug #388608). In
Package: mysql-server-5.0
Version: 5.0.51a-24+lenny1
Severity: grave
Justification: privilege escalation vulnerability
Tags: security
There was a privilege escalation vulnerability in logrotate that I reported
about four years ago and which finally got fixed in testing rouhgly one
year ago (see
Package: lighttpd
Version: 1.4.23-3
Severity: grave
Justification: privilege escalation vulnerability
Tags: security
There was a privilege escalation vulnerability in logrotate that I reported
about four years ago and which finally got fixed in testing rouhgly one
year ago (see bug #388608). In
Package: tinyhoneypot
Version: 0.4.6-8
Severity: grave
Justification: privilege escalation vulnerability
Tags: security
There was a privilege escalation vulnerability in logrotate that I reported
about four years ago and which finally got fixed in testing rouhgly one
year ago (see bug #388608).
On Fri, Dec 10, 2010 at 03:10:19AM +0100, Florian Zumbiehl wrote:
Package: aolserver4
Version: 4.5.0-16.1
Severity: grave
Justification: privilege escalation vulnerability
Tags: security
---
chown -R www-data:www-data
severity 606590 important
thanks
On Fri, Dec 10, 2010 at 03:55:09PM +0800, Thomas Goirand wrote:
Upgrading from Lenny to Squeeze left my box with xen-hypervisor-3.2-1-amd64
installed, and I had to apt-get install xen-hypervisor-4.0-amd64 manually
to have it installed after a dist-upgrade. This
Processing commands for cont...@bugs.debian.org:
severity 606590 important
Bug #606590 [xen-hypervisor-4.0-amd64] Upgrading from Lenny leaves
xen-hypervisor-3.2-1-amd64 in and doesn't install 4.0
Severity set to 'important' from 'serious'
thanks
Stopping processing here.
Please contact me if
Processing commands for cont...@bugs.debian.org:
found 606537 2010.07.24-1
Bug #606537 [youtube-dl] youtube-dl: new upstream version
Bug Marked as found in versions youtube-dl/2010.07.24-1.
thanks
Stopping processing here.
Please contact me if you need assistance.
--
606537:
On Fri, Dec 10, 2010 at 9:43 AM, Michael Tautschnig m...@debian.org wrote:
These lines from this package's maintainer scripts suggest that it likely
is affected by the vulnerability:
---
chmod 640 $FRESHCLAMLOGFILE
chown
Package: sbox-dtc
Version: 1.11.2-3
Severity: grave
Hi,
here is the problem:
Setting up sbox-dtc (1.11.2-3) ...
Group dtcgrp already exists: skiping creation!
User dtc already exists: skiping creation!
sed: can't read /etc/logrotate.d/sbox: No such file or directory
dpkg: error processing
Processing commands for cont...@bugs.debian.org:
tag 606572 lenny
Bug #606572 [speech-dispatcher] speech-dispatcher: affected by privilege
escalation vulnerability in logrotate
Added tag(s) lenny.
End of message, stopping processing here.
Please contact me if you need assistance.
--
606572:
Your message dated Fri, 10 Dec 2010 09:17:15 +
with message-id e1pqz6j-0007hz...@franck.debian.org
and subject line Bug#606591: fixed in dtc-xen 0.5.13-3
has caused the Debian Bug report #606591,
regarding dtc-xen tries to create symlinks in /usr/lib/xen and
Package: squid
Version: 2.7.STABLE6-2
Severity: grave
Justification: privilege escalation vulnerability
Tags: security
There was a privilege escalation vulnerability in logrotate that I reported
about four years ago and which finally got fixed in testing rouhgly one
year ago (see bug #388608). In
Package: icecast2
Version: 2.3.2-3
Severity: grave
Justification: privilege escalation vulnerability
Tags: security
There was a privilege escalation vulnerability in logrotate that I reported
about four years ago and which finally got fixed in testing rouhgly one
year ago (see bug #388608). In
tags 606481 + patch
thanks
On Thu, Dec 09, 2010 at 05:06:55PM +0100, Jakub Wilk wrote:
Source: python-peak.util
Version: 20090610-2
Severity: serious
Justification: Debian Policy 12.5; Squeeze RC Policy 1
debian/copyright doesn't say say where the upstream sources were
obtained.
Argh!
Processing commands for cont...@bugs.debian.org:
severity #606527 grave
Bug #606527 [exim4] root upgrade vulnerability in exim4
Severity set to 'grave' from 'normal'
tags #606527 confirmed security lenny squeeze
Bug #606527 [exim4] root upgrade vulnerability in exim4
Added tag(s) squeeze,
Processing commands for cont...@bugs.debian.org:
tags 606481 + patch
Bug #606481 [src:python-peak.util] python-peak.util: missing pointer to
upstream sources
Added tag(s) patch.
thanks
Stopping processing here.
Please contact me if you need assistance.
--
606481:
severity #606527 grave
tags #606527 confirmed security lenny squeeze
thanks
--
-
Marc Haber | I don't trust Computers. They | Mailadresse im Header
Mannheim, Germany | lose things.Winona Ryder | Fon: *49
forcemerge #388608 #606541 #606543 #606544 #606545 #606547 #606548 #606549
#606551 #606552 #606553 #606554 #606555 #606560
#606561 #606562 #606563 #606566 #606567 #606568 #606569 #606570 #606571 #606572
#606573 #606580 #606581 #606582 #606583
#606584 #606585 #606586 #606587
reassign #388608
Processing commands for cont...@bugs.debian.org:
severity 606558 serious
Bug #606558 [sugar-calculate-activity] sugar-calculate-activity: needs to be
updated for sugar/sucrose-0.88
Severity set to 'serious' from 'normal'
# non installable is serious
thanks
Stopping processing here.
Please
reassign #388608 logrotate
reassign #606541 logrotate
reassign #606543 logrotate
reassign #606544 logrotate
reassign #606545 logrotate
reassign #606547 logrotate
reassign #606548 logrotate
reassign #606549 logrotate
reassign #606551 logrotate
reassign #606552 logrotate
reassign #606553
Processing commands for cont...@bugs.debian.org:
reassign #388608 logrotate
Bug #388608 {Done: Paul Martin p...@debian.org} [logrotate] logrotate:
Creation of files has race condition that could allow unintended file access
Ignoring request to reassign bug #388608 to the same package
reassign
Package: exim4
Version: 4.69-9
Severity: critical
Tags: security
Justification: root security hole
There is a discussion on exim-dev[0] relating to an incident of root-level
compromise owing to a couple of bugs. The first (the remote attack)
appears[1] to be related to a bug already fixed in
Processing commands for cont...@bugs.debian.org:
reassign 606600 logrotate
Bug #606600 [pyicqt] pyicqt: affected by privilege escalation vulnerability in
logrotate
Bug reassigned from package 'pyicqt' to 'logrotate'.
Bug No longer marked as found in versions pyicqt/0.8.1.3-2.
forcemerge 388608
Processing commands for cont...@bugs.debian.org:
# Automatically generated email from bts, devscripts version 2.10.35lenny7
fixed 606612 4.70-1
Bug #606612 [exim4] exim4: Exploitable memory corruption vulnerability
Bug Marked as fixed in versions exim4/4.70-1.
End of message, stopping
Processing commands for cont...@bugs.debian.org:
forcemerge #388608 #606541 #606543 #606544 #606545 #606547 #606548 #606549
Bug#388608: logrotate: Creation of files has race condition that could allow
unintended file access
Bug#606541: zabbix-server-mysql: affected by privilege escalation
Processing commands for cont...@bugs.debian.org:
forcemerge 606527 606612
Bug#606527: root upgrade vulnerability in exim4
Bug#606612: exim4: Exploitable memory corruption vulnerability
Forcibly Merged 606527 606612.
thanks
Stopping processing here.
Please contact me if you need assistance.
--
Processing commands for cont...@bugs.debian.org:
forcemerge 606527 606612
Bug#606527: root upgrade vulnerability in exim4
Bug#606612: exim4: Exploitable memory corruption vulnerability
Forcibly Merged 606527 606612.
thanks
Stopping processing here.
Please contact me if you need assistance.
--
Julien, I just wanted to point out that there are two separate issues
here, and only one of them has been fixed in newer versions. #606527
relating to the root upgrade is AFAIK still an issue.
Dominic.
--
Dominic Hargreaves | http://www.larted.org.uk/~dom/
PGP key 5178E2A5 from the.earth.li
Processing commands for cont...@bugs.debian.org:
# undoing my mess. sorry for the noise
limit package exim4
Limiting to bugs with field 'package' containing at least one of 'exim4'
Limit currently set to 'package':'exim4'
unmerge 606612
Bug#606612: exim4: Exploitable memory corruption
Processing commands for cont...@bugs.debian.org:
severity 606558 normal
Bug #606558 [sugar-calculate-activity] sugar-calculate-activity: needs to be
updated for sugar/sucrose-0.88
Severity set to 'normal' from 'serious'
thanks
Stopping processing here.
Please contact me if you need
On Fri, Dec 10, 2010 at 11:19:24 +, Dominic Hargreaves wrote:
Julien, I just wanted to point out that there are two separate issues
here, and only one of them has been fixed in newer versions. #606527
relating to the root upgrade is AFAIK still an issue.
Yeah sorry about that. I think
Processing commands for cont...@bugs.debian.org:
tags 606612 - squeeze
Bug #606612 [exim4] exim4: Exploitable memory corruption vulnerability
(CVE-2010-4344)
Removed tag(s) squeeze.
thanks
Stopping processing here.
Please contact me if you need assistance.
--
606612:
Processing commands for cont...@bugs.debian.org:
tag 605536 pending
Bug #605536 [dpkg] dpkg: ^C during package install results in broken symlinks
Added tag(s) pending.
thanks
Stopping processing here.
Please contact me if you need assistance.
--
605536:
Processing commands for cont...@bugs.debian.org:
reassign 606410 python-minimal
Bug #606410 [ocrfeeder] ocrfeeder: does not start after fresh install
Bug reassigned from package 'ocrfeeder' to 'python-minimal'.
Bug No longer marked as found in versions ocrfeeder/0.6.6+dfsg1-1.
forcemerge 589349
tag 605536 pending
thanks
Hello,
Bug #605536 reported by you has been fixed in the Git repository. You can
see the changelog below, and you can check the diff of the fix at:
http://git.debian.org/?p=dpkg/dpkg.git;a=commitdiff;h=a766f50
---
commit a766f501f6da46aca070c315e6429e163d188202
Processing commands for cont...@bugs.debian.org:
reassign #606595 logrotate
Bug #606595 [bacula-common] bacula-common: affected by privilege escalation
vulnerability in logrotate
Bug reassigned from package 'bacula-common' to 'logrotate'.
Bug No longer marked as found in versions
Processing commands for cont...@bugs.debian.org:
tags 604983 + pending
Bug #604983 [youtube-dl] youtube-dl: Manpage needs updating for new options
Added tag(s) pending.
tags 606537 + pending
Bug #606537 [youtube-dl] youtube-dl: new upstream version
Added tag(s) pending.
tags 605311 + pending
Processing commands for cont...@bugs.debian.org:
package logrotate
Limiting to bugs with field 'package' containing at least one of 'logrotate'
Limit currently set to 'package':'logrotate'
forcemerge 388608 606595 606596 606597 606598 606599 606601 606602 606608
606609
Bug#388608: logrotate:
reassign vanessa-logger 0.0.10-1
thanks
As the bug was filled against libvanessa-adt-dev (src:src:vanessa-adt)
but fixed with an upload src:vanessa-logger, the bts thinks it sill
affects libvanessa-adt-dev. Reassinging it to vanessa-logger should
solve that issue.
Best Regards,
Alexander
On Fri, 2010-12-10 at 09:08 +0200, Timo Juhani Lindfors wrote:
Ben Hutchings b...@decadent.org.uk writes:
I have no idea what the upstream developers intended, they seem a bit
clueless about distribution. I only just realised that they try to use
libbfd (GPLv3, incompatible) even though
Processing commands for cont...@bugs.debian.org:
reassign 601989 vanessa-logger 0.0.10-1
Bug #601989 {Done: Luca Falavigna dktrkr...@debian.org} [libvanessa-adt-dev]
libvanessa-adt-dev: file conflict when upgrading from lenny
Bug reassigned from package 'libvanessa-adt-dev' to 'vanessa-logger'.
Processing commands for cont...@bugs.debian.org:
fixed 601989 0.0.10-1.1
Bug #601989 {Done: Luca Falavigna dktrkr...@debian.org} [vanessa-logger]
libvanessa-adt-dev: file conflict when upgrading from lenny
There is no source info for the package 'vanessa-logger' at version
'0.0.10-1.1' with
On Thu, Dec 09, 2010 at 11:23:19PM +0100, Konrad Rosenbaum wrote:
The /usr/sbin/exim4 executable can be abused to upgrade from Debian-exim to
root in case of another vulnerability in exim that creates a shell (there
currently seems to be one).
The exim config allows constructs like
Processing commands for cont...@bugs.debian.org:
# This was changed in the merge which was then reversed
severity 606612 critical
Bug #606612 [exim4] exim4: Exploitable memory corruption vulnerability
(CVE-2010-4344)
Severity set to 'critical' from 'grave'
thanks
Stopping processing here.
Package: src:atlas
Version: 3.8.3-29
Severity: serious
Justification: no longer builds from source
Hi!
Your package fails to build from source on the architecures alpha, armel,
ia64, mips, powerpc and s390:
https://buildd.debian.org/fetch.cgi?pkg=atlas;ver=3.8.3-29;arch=alpha;stamp=1290598328
On Fri, 2010-12-10 at 11:42 +0800, David Adam wrote:
libnss-ldapd should be used to replace libnss-ldap on squeeze upgrades. I
am still a touch wary of libnss-ldapd, only in that adding the daemon
introduces an additional point of failure, but have been running it on
our Ubuntu and squeeze
Hi Gregor,
the patch seems good to me. Please, only correct a small typo in
changelog, where you wrote where instead of were.
Bye,
Giuseppe
P.S. Thanks for working on hylafax package
--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble?
Processing commands for cont...@bugs.debian.org:
notfound 599303 0.8.1-4.1
Bug #599303 {Done: Didier 'OdyX' Raboud did...@raboud.com} [ktoon] ktoon:
KToon crashes with Signal 11
Bug No longer marked as found in versions ktoon/0.8.1-4.1.
End of message, stopping processing here.
Please contact
Processing commands for cont...@bugs.debian.org:
reassign 605370 src:atlas 3.8.3-29
Bug #605370 [atlas] atlas: FTBFS on alpha, armel, ia64, mips, powerpc and s390
Bug reassigned from package 'atlas' to 'src:atlas'.
Bug No longer marked as found in versions 3.8.3-29.
Bug #605370 [src:atlas]
Package: binutils-multiarch
Version: 2.21-1
Severity: grave
Justification: renders package unusable
Attempting to install binutils-multiarch 2.21-1 results in the
following error:
dpkg: error processing
/var/cache/apt/archives/binutils-multiarch_2.21-1_i386.deb (--unpack):
trying to overwrite
Your message dated Fri, 10 Dec 2010 14:49:19 +
with message-id e1pr4hf-000773...@franck.debian.org
and subject line Bug#604457: fixed in linux-2.6 2.6.32-29
has caused the Debian Bug report #604457,
regarding linux-image-2.6.26-2-xen-686: Raid10 exporting LV to xen results in
error can't
Your message dated Fri, 10 Dec 2010 14:49:19 +
with message-id e1pr4hf-000773...@franck.debian.org
and subject line Bug#604457: fixed in linux-2.6 2.6.32-29
has caused the Debian Bug report #604457,
regarding linux-image-2.6.18-5-xen-686: Exporting an lvm-on-md LV to Xen as a
disk results in
Your message dated Fri, 10 Dec 2010 14:49:20 +
with message-id e1pr4hg-00077y...@franck.debian.org
and subject line Bug#606050: fixed in linux-2.6 2.6.32-29
has caused the Debian Bug report #606050,
regarding perf (GPLv2-only) linked with libbfd (GPLv3-only), so undistributable
to be marked as
On Fri, 10 Dec 2010 15:13:19 +0100, Giuseppe Sacco wrote:
the patch seems good to me. Please, only correct a small typo in
changelog, where you wrote where instead of were.
He, nice catch (that was directly from the BTS). Fixed locally.
P.S. Thanks for working on hylafax package
Your
Your message dated Fri, 10 Dec 2010 15:56:04 +0100
with message-id 4d023f84.4070...@debian.org
and subject line Re: Bug#606645: binutils-multiarch: uninstallable - ld.bfd
conflict with binutils
has caused the Debian Bug report #606645,
regarding binutils-multiarch: uninstallable - ld.bfd conflict
Hello,
This error is most likely being caused by the prescence of a third-party copy
of the Qt library. (Most likely installed by the Nessus security scanner)
Alteratively, it could also perhaps be a local copy without the qt-copy patches
installed to /usr/share/local or somesuch.
The output
Le vendredi 10 décembre 2010 à 15:31 +0100, Alexander Reichle-Schmehl a
écrit :
Package: src:atlas
Version: 3.8.3-29
Severity: serious
Justification: no longer builds from source
I'm not really sure, if it is the same bug for all archs, but from what
I've seen, something is wrong in the CPU
On 12/10/2010 05:13 PM, Laurent Bonnaud wrote:
Package: sbox-dtc
Version: 1.11.2-3
Severity: grave
Hi,
here is the problem:
Setting up sbox-dtc (1.11.2-3) ...
Group dtcgrp already exists: skiping creation!
User dtc already exists: skiping creation!
sed: can't read
Hi!
* Jon Dowland j...@debian.org [101208 23:36]:
I uploaded an updated sdl-mixer1.2 package to experimental
earlier on. I will re-upload to unstable in 1 or 2 days,
if nobody shouts.
When you've done so, please also reassign this bug to the sdl-mixer1.2
package (probalby the version
Your message dated Fri, 10 Dec 2010 16:31:11 +0100
with message-id 20101210153111.gi2...@patate.is-a-geek.org
and subject line Re: Bug#606612: exim4: Exploitable memory corruption
vulnerability
has caused the Debian Bug report #606612,
regarding exim4: Exploitable memory corruption vulnerability
Your message dated Fri, 10 Dec 2010 15:32:17 +
with message-id e1pr4xf-0007il...@franck.debian.org
and subject line Bug#606603: fixed in sbox-dtc 1.11.2-4
has caused the Debian Bug report #606603,
regarding sbox-dtc: postinst failure (wrong file in /etc/logrotate.d/)
to be marked as done.
severity 606589 important
reassign 606589 xen-hypervisor-4.0-amd64
merge 606590 606589
thanks
At the core this is the same issue as 606590. I think a single report is
enough to allow this to be fixed in the relevant place, if the kernel
ends up being the place to fix then the bug can be
Processing commands for cont...@bugs.debian.org:
severity 606589 important
Bug #606589 [xen-linux-system-2.6.32-5-xen-amd64]
xen-linux-system-2.6.32-5-xen-amd64 doesn't upgrade from
xen-linux-system-2.6.26-2-xen-amd64
Severity set to 'important' from 'serious'
reassign 606589
Package: wordpress
Version: 3.0.2-1
Severity: grave
Tags: security
Justification: user security hole
Another week, another security fix in wordpress.
From http://codex.wordpress.org/Version_3.0.3:
Fixes issues in the XML-RPC remote publishing interface which under certain
circumstances allowed
Hi Peter co!
* Debian Bug Tracking System ow...@bugs.debian.org [090925 01:00]:
Source-Version: 9.8.4-2
[..]
* Force the configure script to use ginstall-info, (Closes: #545625)
Are you aware, that this rc bug is still open in testing? It was fixed
in 9.8.4-2, but testing still has
Package: fast-user-switch-applet
Version: 2.24.0-4
Severity: serious
Hi,
fast-user-switch-applet depends on gdm which is no longer availables
on kfreebsd-* architectures.
Please adjust your Architecture field to not build the package on
kfreebsd-* anymore by using:
Architecture:
On Thu, Dec 09, 2010 at 09:14:02PM +0100, Julien Cristau wrote:
On Thu, Dec 9, 2010 at 19:37:07 +0100, Agustin Martin wrote:
Finally had time to put into this NMU. I am attaching yet another diff with
my last version. pam_rsa.conf file is not touched if exists in normal
upgrades, and I
Your message dated Fri, 10 Dec 2010 16:17:06 +
with message-id e1pr5ec-00089p...@franck.debian.org
and subject line Bug#605866: fixed in php-http-request 1.4.4-3
has caused the Debian Bug report #605866,
regarding php-http-request needs a Pre-Depends: php-pear (= 5.3) to upgrade to
Squeeze
to
Package: nagios-statd-server
Version: 3.12-1
Followup-For: Bug #605784
Hello,
i have tested nagios-statd witch python2.4 and python2.5.
With both of them it works fine, for couple of days without problem.
When running with python2.6, problems arise cca 1 hour after start.
Suggested fix:
tags 603429 + pending
tags 604221 + pending
thanks
Dear maintainer,
I've prepared an NMU for hylafax (versioned as 2:6.0.5-4.1) and
uploaded it to DELAYED/2. Please feel free to tell me if I
should delay it longer.
Regards.
--
.''`. http://info.comodo.priv.at/ -- GPG key IDs: 0x8649AA06,
Processing commands for cont...@bugs.debian.org:
tags 603429 + pending
Bug #603429 [hylafax-server] hylafax-server: prompting due to modified
conffiles which where not modified by the user
Added tag(s) pending.
tags 604221 + pending
Bug #604221 [hylafax-server] hylafax-server: installation
I object to the just upgrade to squeeze and be silent approach.
Squeeze is not the stable distribution yet, and one should not be forced
to go to testing.
If k3b version 2 is sufficiently stable, why isn't it part of the backports?
I kindly ask to take bug reports more seriously.
Peter
And in particular there is a candidate patch at
http://lists.exim.org/lurker/message/20101209.172233.abcba158.en.html#e
xim-dev
(although sadly I can't see how to get it to render in a fixed-width
font).
Check the source to that page; remove a few br tags and replace some
amp;
Hello,
On penktadienis 10 Gruodis 2010 19:07:32 Peter Hombach wrote:
I object to the just upgrade to squeeze and be silent approach.
Squeeze is not the stable distribution yet, and one should not be forced
to go to testing.
If k3b version 2 is sufficiently stable, why isn't it part of the
(although sadly I can't see how to get it to render in a fixed-width
font).
http://bugs.exim.org/show_bug.cgi?id=1044
--
David WoodhouseOpen Source Technology Centre
david.woodho...@intel.com Intel Corporation
--
To UNSUBSCRIBE,
Processing commands for cont...@bugs.debian.org:
tags 606527 + sid
Bug #606527 [exim4] root upgrade vulnerability in exim4 (CVE-2010-4345)
Added tag(s) sid.
thanks
Stopping processing here.
Please contact me if you need assistance.
--
606527:
Processing commands for cont...@bugs.debian.org:
forwarded 606527 http://bugs.exim.org/show_bug.cgi?id=1044
Bug #606527 [exim4] root upgrade vulnerability in exim4 (CVE-2010-4345)
Set Bug forwarded-to-address to 'http://bugs.exim.org/show_bug.cgi?id=1044'.
thanks
Stopping processing here.
Processing commands for cont...@bugs.debian.org:
notfixed 596842 0.3.3-1+b4
Bug #596842 {Done: Ralf Treinen ralf.trei...@pps.jussieu.fr}
[libgettext-ocaml-dev] libgettext-ocaml-dev not installable in sid
Bug No longer marked as fixed in versions 0.3.3-1+b4.
thanks
Stopping processing here.
Processing commands for cont...@bugs.debian.org:
notfixed 586838 1.5.4.cvs.20090603-1+b1
Bug #586838 {Done: Tim Retout dioc...@debian.org} [mgltools-geomutils]
mgltools-geomutils: depends on python ( 2.6)
Bug No longer marked as fixed in versions 1.5.4.cvs.20090603-1+b1.
thanks
Stopping
Processing commands for cont...@bugs.debian.org:
fixed 586838 mgltools-geomutils/1.5.4.cvs.20090603-1
Bug #586838 {Done: Tim Retout dioc...@debian.org} [mgltools-geomutils]
mgltools-geomutils: depends on python ( 2.6)
Bug Marked as fixed in versions mgltools-geomutils/1.5.4.cvs.20090603-1.
On Thu, Dec 09, 2010 at 10:48:46PM -0500, Michael Gilbert wrote:
I've isolated and applied the patches needed to fix CVE-2010-2055 in
ghostscript. See attached debdiff.
Would anyone be so kind to sponsor this? The package is at:
http://mentors.debian.net/debian/pool/main/g/ghostscript/
I
On Fri, 10 Dec 2010 19:45:18 +0100, Moritz Muehlenhoff wrote:
On Thu, Dec 09, 2010 at 10:48:46PM -0500, Michael Gilbert wrote:
I've isolated and applied the patches needed to fix CVE-2010-2055 in
ghostscript. See attached debdiff.
Would anyone be so kind to sponsor this? The package is
Processing commands for cont...@bugs.debian.org:
notfixed 596842 ocaml-gettext/0.3.3-1
Bug #596842 {Done: Ralf Treinen ralf.trei...@pps.jussieu.fr}
[libgettext-ocaml-dev] libgettext-ocaml-dev not installable in sid
Bug No longer marked as fixed in versions ocaml-gettext/0.3.3-1.
thanks
Processing commands for cont...@bugs.debian.org:
notfixed 586838 mgltools-geomutils/1.5.4.cvs.20090603-1
Bug #586838 {Done: Tim Retout dioc...@debian.org} [mgltools-geomutils]
mgltools-geomutils: depends on python ( 2.6)
Bug No longer marked as fixed in versions
Processing commands for cont...@bugs.debian.org:
# actually this is the proper approach. same found and fixed version will be
seen as affecting. binNMU versions aren't seen by BTS, only source versions
are. thus claiming it's a non-bug by no fixed version is the only sensible
approach
* Dmitrijs Ledkovs dmitrij.led...@ubuntu.com, 2010-12-10, 01:25:
I have tested this by running calendarserver with without new patch
and I can add/retrieve calendar events over the network using
thunderbird-lightning.
The new patch looks good. I'll upload Dmitrijs' NMU shortly (with
Your message dated Fri, 10 Dec 2010 19:47:08 +
with message-id e1pr8vs-0001dw...@franck.debian.org
and subject line Bug#605157: fixed in calendarserver 2.4.dfsg-2.1
has caused the Debian Bug report #605157,
regarding calendarserver: Use of PYTHONPATH env var in an insecure way
to be marked as
Your message dated Fri, 10 Dec 2010 19:47:08 +
with message-id e1pr8vs-0001dw...@franck.debian.org
and subject line Bug#605157: fixed in calendarserver 2.4.dfsg-2.1
has caused the Debian Bug report #605157,
regarding calendarserver: Use of PYTHONPATH env var in an insecure way
to be marked as
Your message dated Fri, 10 Dec 2010 19:47:08 +
with message-id e1pr8vs-0001dj...@franck.debian.org
and subject line Bug#605166: fixed in calendarserver 2.4.dfsg-2.1
has caused the Debian Bug report #605166,
regarding calendarserver: Use of PYTHONPATH env var in an insecure way
to be marked as
1 - 100 of 130 matches
Mail list logo