On Wed, Apr 29, 2009 at 02:17:44PM +0200, Josselin Mouette wrote:
Package: hotssh
Version: 0.5.2-3
Severity: serious
Hi,
Hi,
currently hotssh Build-Depends on scrollkeeper (= 0.3.14). However, we
are about to remove scrollkeeper from the archive; hence the serious
severity.
Please
On Thu, Apr 30, 2009 at 11:26:11AM +0200, Josselin Mouette wrote:
Le jeudi 30 avril 2009 à 09:28 +0200, Thomas Bläsing a écrit :
Please remove the version requirement, or add rarian-compat as an
alternative. Soon, only rarian-compat will remain.
Let me first check if I can use rarian
Source: classpath
Version: = 0.97.2
Severity: grave
Tags: security
Hi,
the following CVE (Common Vulnerabilities Exposures) id was
published for classpath.
CVE-2008-5659[0]:
| The gnu.java.security.util.PRNG class in GNU Classpath 0.97.2 and
| earlier uses a predictable seed based on the system
Source: vim
Version: 7.2.000-3
Severity: grave
Tags: security patch
Hi,
the following CVE (Common Vulnerabilities Exposures) id was
published for vim.
CVE-2008-4101[0]:
| Vim 3.0 through 7.x before 7.2.010 does not properly escape
| characters, which allows user-assisted attackers to (1)
Package: pdns-server
Version: 2.9.21-6
Severity: serious
Tags: security
Hi,
the following CVE (Common Vulnerabilities Exposures) id was
published for pdns-server.
CVE-2008-3217[0]:
| PowerDNS Recursor before 3.1.6 does not always use the strongest
| random number generator for source port
severity 488523 normal
severity 488525 normal
severity 488527 normal
thanks
Hi,
I change the severity of this bug to normal, because
this is a non-issue. To exploit this, the smarty files
need to be installed in a http daemon accessible directory.
(should be the case for embedded copies),
Source: xen-3
Version: 3.2.1-1
Severity: grave
Tags: security, patch
Hi,
the following CVE (Common Vulnerabilities Exposures) ids were
published for xen-3.
CVE-2008-1943[0]:
| Buffer overflow in the backend of XenSource Xen Para Virtualized Frame
| Buffer (PVFB) 3.0 through 3.1.2 allows local
Source: xen-unstable
Version: 3.3-unstable+hg17602-1
Severity: grave
Tags: security, patch
Hi,
the following CVE (Common Vulnerabilities Exposures) ids were
published for xen-unstable.
CVE-2008-1943[0]:
| Buffer overflow in the backend of XenSource Xen Para Virtualized Frame
| Buffer (PVFB) 3.0
hi,
I'm sorry!
The CVE-2008-1952 doesn't affect you, so please disregard it :)
Kind regards,
Thomas.
signature.asc
Description: Digital signature
On Fri, Apr 25, 2008 at 07:42:29PM +0530, Kumar Appaiah wrote:
tags 477034 + patch
thanks
Hi!
Please find attached a patch to fix this bug. The solution is to just
use the right Python version as given by pyversions -d.
First of all, thanks!
But I am solving some other minor fixes for
On Mon, Jul 30, 2007 at 09:40:58AM -0600, dann frazier wrote:
Package: python-libpcap
Version: 0.6.1+cvs.2007.07.28-1
Severity: serious
From
http://buildd.debian.org/fetch.cgi?pkg=python-libpcapver=0.6.1%2Bcvs.2007.07.28-1arch=ia64stamp=1185757680file=log:
[snip]
running build
running
11 matches
Mail list logo