Your message dated Thu, 02 Aug 2012 04:02:31 +
with message-id e1swmcj-00076j...@franck.debian.org
and subject line Bug#680955: fixed in winetricks 0.0+20120606+svn831-3
has caused the Debian Bug report #680955,
regarding winetricks: On amd64 platform, winetricks cannot be installed if
Your message dated Thu, 02 Aug 2012 04:02:31 +
with message-id e1swmcj-00076o...@franck.debian.org
and subject line Bug#682321: fixed in winetricks 0.0+20120606+svn831-3
has caused the Debian Bug report #682321,
regarding winetricks: uninstallable
to be marked as done.
This means that you
Your message dated Thu, 02 Aug 2012 04:02:31 +
with message-id e1swmcj-00076j...@franck.debian.org
and subject line Bug#680955: fixed in winetricks 0.0+20120606+svn831-3
has caused the Debian Bug report #680955,
regarding winetricks: uninstallable
to be marked as done.
This means that you
Your message dated Thu, 02 Aug 2012 04:02:31 +
with message-id e1swmcj-00076o...@franck.debian.org
and subject line Bug#682321: fixed in winetricks 0.0+20120606+svn831-3
has caused the Debian Bug report #682321,
regarding winetricks: On amd64 platform, winetricks cannot be installed if
Your message dated Thu, 02 Aug 2012 04:02:31 +
with message-id e1swmcj-00076o...@franck.debian.org
and subject line Bug#682321: fixed in winetricks 0.0+20120606+svn831-3
has caused the Debian Bug report #682321,
regarding winetricks: Cannot install winetricks if wine 1.4 is installed
to be
CONTROL: patch 683431 patch
diff -ru spamassassin-3.3.2/debian/rules
spamassassin-3.3.2-683431/debian/rules
--- spamassassin-3.3.2/debian/rules 2010-03-02 23:39:16.0 -0800
+++ spamassassin-3.3.2-683431/debian/rules 2012-08-01 21:25:17.818203048
-0700
@@ -109,7 +109,8 @@
# dh_installdocs
Processing commands for cont...@bugs.debian.org:
tag 683431 patch
Bug #683431 [spamassassin] spamassassin: requires GPG.KEY in
/usr/share/doc/spamassassin to function
Added tag(s) patch.
End of message, stopping processing here.
Please contact me if you need assistance.
--
683431:
Package: ganglia
Severity: grave
Tags: security
Justification: user security hole
Hi,
recently released Ganglia Web fixes a remote script execution
vulnerability. It has been allocated CVE-2012-3348.
More info on http://ganglia.info/?p=549 and
https://bugzilla.redhat.com/show_bug.cgi?id=845124
Hi Michael,
About your package freefoam at mentors uploaded there on 2012-08-01 08:37.
If nobody increases the bug severities to at least important then I suggest
that you reduce the changes to what is likely acceptable for an unblock.
Anyhow, my first impression is that you are doing good work
101 - 109 of 109 matches
Mail list logo