Thank you for the additional information you have supplied regarding
this Bug report.
This is an automatically generated reply to let you know your message
has been received.
Your message is being forwarded to the package maintainers and other
interested parties for their attention; they will
I've uploaded a new version of linux to:
https://people.debian.org/~benh/packages/jessie-security/
which I believe will fix this regression (bug #925919). Please let me
know whether it works for you.
I only included the amd64 linux-image package and sources there, but
can add i386 linux-image
On Fri, 2019-03-29 at 11:13 +0100, Pierre Fourès wrote:
> The way I understand it, but I asked for clarification and
> confirmation in my previous message [1], is that all « updates » goes
> into -proposed-updates/, but the one who need to be quickly applied
> into the distribution (but aren't
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Package: pdns
Version: 3.4.1-4+deb8u9
CVE ID : CVE-2019-3871
Debian Bug : 924966
A vulnerability was found in PowerDNS Authoritative Server before
4.0.7 and before 4.1.7. An insufficient validation of data coming from
Hi,
On 18/03/2019 15:56, Sylvain Beucler wrote:
> On Thu, Mar 07, 2019 at 08:02:18PM +0100, Laura Arjona Reina wrote:
>> El 5/3/19 a las 16:07, Markus Koschany escribió:
>>> thank your for your work on our website. Ideally we would like to make
>>> the whole process fully automatic without the
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Fri, 29 Mar 2019 13:27:30 +
Source: pdns
Binary: pdns-server pdns-server-dbg pdns-backend-pipe pdns-backend-ldap
pdns-backend-geo pdns-backend-mysql pdns-backend-pgsql pdns-backend-sqlite3
pdns-backend-lua pdns-backend-lmdb
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Fri, 29 Mar 2019 12:38:40 +0100
Source: dovecot
Binary: dovecot-core dovecot-dev dovecot-imapd dovecot-pop3d dovecot-lmtpd
dovecot-managesieved dovecot-pgsql dovecot-mysql dovecot-sqlite dovecot-ldap
dovecot-gssapi dovecot-sieve
On 27.03.19 11:20, Bernie Elbourn wrote:
I am very grateful for all the work done here. You are all heroes!
Can I gently ask if we can just blank the stretch-updates archive next
time
round please. Otherwise every stable machine out there now will need a
change.
Am 27.03.19 um 12:50 schrieb
Le ven. 29 mars 2019 à 10:11, Matus UHLAR - fantomas
a écrit :
>
> >>On 27.03.19 11:20, Bernie Elbourn wrote:
> >>>If it is possible to wiz up a blank jessie-updates this will save me
> >>>visiting a bunch of systems throwing apt errors in next few days.
>
> >On 2019-03-27 11:50, Matus UHLAR -
There is already a report in the BTS about this as well.
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=925918
smime.p7s
Description: S/MIME Cryptographic Signature
Am 29.03.19 um 10:41 schrieb Bernhard Schmidt:
Hi,
>
> sorry for not setting References correctly, I wasn't subscribed until now.
>
> We're hitting the same issue. Sometimes we see a backtrace in various
> places, most of the times the machine just hangs (the cursor stops
> blinking and it
Hi,
sorry for not setting References correctly, I wasn't subscribed until now.
We're hitting the same issue. Sometimes we see a backtrace in various
places, most of the times the machine just hangs (the cursor stops
blinking and it doesn't respond anymore).
Rebooting into -7 seems to fix it.
Hi
On Friday 29 March 2019 03:03 PM, Matus UHLAR - fantomas wrote:
> Hello,
>
> trying to look at changelog of packages in LTS, it's not available on links
> from packages.debian.org that point to metadata.ftp-master.d.o
>
> e.g.
> https://packages.debian.org/jessie/linux-support-3.16.0-6
>
Hello,
trying to look at changelog of packages in LTS, it's not available on links
from packages.debian.org that point to metadata.ftp-master.d.o
e.g.
https://packages.debian.org/jessie/linux-support-3.16.0-6
https://packages.debian.org/jessie/linux-support-3.16.0-7
On 27.03.19 11:20, Bernie Elbourn wrote:
If it is possible to wiz up a blank jessie-updates this will save me
visiting a bunch of systems throwing apt errors in next few days.
On 2019-03-27 11:50, Matus UHLAR - fantomas wrote:
I wonder if it wasn't blank already. All of its contents was
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Package: ruby2.1
Version: 2.1.5-2+deb8u7
CVE ID : CVE-2019-8320 CVE-2019-8322 CVE-2019-8323 CVE-2019-8324
CVE-2019-8325
Several vulnerabilities have been discovered in rubygems embedded in
ruby2.1, the
Hi,
Our Debian 8 servers have picked up the kernel security update
linux-image-3.16.0-8-amd64 .
Soon after reboot, problems started to appear, mainly various process crashes
with messages like :
Mar 28 11:07:35 server123 kernel: [16203.774877] java: Corrupted page table
at address
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Fri, 29 Mar 2019 11:56:38 +0530
Source: ruby2.1
Binary: ruby2.1 libruby2.1 ruby2.1-dev ruby2.1-doc ruby2.1-tcltk
Architecture: source amd64 all
Version: 2.1.5-2+deb8u7
Distribution: jessie-security
Urgency: medium
Maintainer:
18 matches
Mail list logo