Bug#615995: CVE-2011-1018

2011-03-03 Thread Julien Cristau
On Thu, Mar 3, 2011 at 01:58:54 +0200, he...@nerv.fi wrote: > I am reopening this issue, because there is releases, which hasn't been > patched yet. > That's not an appropriate reason for reopen. The bts has version tracking for a reason. If the bug is fixed in unstable, then this bug should

Bug#615995: CVE-2011-1018

2011-03-02 Thread henri
I am reopening this issue, because there is releases, which hasn't been patched yet. http://security-tracker.debian.org/tracker/CVE-2011-1018 Best regards, Henri Salo -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas

Bug#615995: CVE-2011-1018

2011-03-02 Thread Willi Mann
> Please see https://bugzilla.redhat.com/show_bug.cgi?id=680237 > for references. > > This is http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1018 Thanks for the report. I'll ask my sponsor to upload http://pkg-logwatch.alioth.debian.org/apt/pool/main/l/logwatch/logwatch_7.3.6.cvs2009090

Bug#615995: CVE-2011-1018

2011-03-01 Thread Steve Beattie
Package: logwatch Version: 7.3.6.cvs20090906-1 Severity: normal Tags: patch User: ubuntu-de...@lists.ubuntu.com Usertags: origin-ubuntu natty ubuntu-patch *** /home/steve/tmp/tmpOr5E13 In Ubuntu, we've applied the attached patch to achieve the following: * SECURITY UPDATE: privileged code exe

Bug#615995: CVE-2011-1018

2011-03-01 Thread Moritz Muehlenhoff
Package: logwatch Severity: grave Tags: security Please see https://bugzilla.redhat.com/show_bug.cgi?id=680237 for references. This is http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1018 Cheers, Moritz -- System Information: Debian Release: 5.0.1 Architecture: amd64 (x86_64) She