On Thu, Mar 3, 2011 at 01:58:54 +0200, he...@nerv.fi wrote:
> I am reopening this issue, because there is releases, which hasn't been
> patched yet.
>
That's not an appropriate reason for reopen. The bts has version
tracking for a reason. If the bug is fixed in unstable, then this bug
should
I am reopening this issue, because there is releases, which hasn't been patched
yet.
http://security-tracker.debian.org/tracker/CVE-2011-1018
Best regards,
Henri Salo
--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas
> Please see https://bugzilla.redhat.com/show_bug.cgi?id=680237
> for references.
>
> This is http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1018
Thanks for the report. I'll ask my sponsor to upload
http://pkg-logwatch.alioth.debian.org/apt/pool/main/l/logwatch/logwatch_7.3.6.cvs2009090
Package: logwatch
Version: 7.3.6.cvs20090906-1
Severity: normal
Tags: patch
User: ubuntu-de...@lists.ubuntu.com
Usertags: origin-ubuntu natty ubuntu-patch
*** /home/steve/tmp/tmpOr5E13
In Ubuntu, we've applied the attached patch to achieve the following:
* SECURITY UPDATE: privileged code exe
Package: logwatch
Severity: grave
Tags: security
Please see https://bugzilla.redhat.com/show_bug.cgi?id=680237
for references.
This is http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1018
Cheers,
Moritz
-- System Information:
Debian Release: 5.0.1
Architecture: amd64 (x86_64)
She
5 matches
Mail list logo