[EMAIL PROTECTED] (Joshua Kwan) wrote:
Hi,
> So if anyone's up to it, upload away.
I'm going to NMU, and I'll try to fix a few other things at the same
time. I'll also set the Maintainer to QA.
JB.
--
Julien BLACHE <[EMAIL PROTECTED]> | Debian, because code matters more
Debian & GNU/Linu
I'd like to chime and mention that I have orphaned the package on wnpp
because I can't deal with this shit anymore. Especially since I had
nothing to do with this security update, i have no motivation to deal
with it (in addition to being frustrated with mt-daapd's robustness in
general.)
So if an
My patch was for the r1376 debian package, not r1696. To be precise, it
fixed an incomplete backport of a security fix. For those sources, it is
correct.
In r1376, ws_decodepassword returns 0 on success. ws_decodepassword was
changed to return TRUE in r1622.
If the debian package is upgraded to
Package: mt-daapd
Version: 0.9~r1696-1.4
Followup-For: Bug #496217
> Julien BLACHE <[EMAIL PROTECTED]> wrote:
> Even in 0.9~r1696-1.4 still refuses valid credentials for the web
> interface. I haven't been able to track that down further.
The solution proposed by Martijn Plak is not correct, if
Package: mt-daapd
Version: 0.9~r1696-1.4
Followup-For: Bug #496217
Hi,
Even in 0.9~r1696-1.4 still refuses valid credentials for the web interface. I
haven't been able to track that down further.
Anyway, it's still broken.
JB.
-- System Information:
Debian Release: lenny/sid
APT prefers unst
5 matches
Mail list logo