Your objections are interesting, and mostly valid:
> * buggy.
I'd maintain that isn't the case ..
> * no maintainer.
True. I wish somebody would adopt it, rather than having it
be maintainerless.
> * Upstream has stopped development.
True.
> * Plenty of other alternatives
Hi,
Thanks very much for offering to supply a translation of the
debconf strings for Italian users of Debian GNU/Linux.
Unfortunately you didn't actually attach your translation to
the bug report you submitted. If you could mail the file to
the bug number I'll ensure it is applied in the
Please try this patch (works for me, amd64 debian sid):
--- apt-spy-3.1/benchmark.c 2007-08-26 03:54:21.0 +0100
+++ benchmark.c 2007-08-26 03:47:22.0 +0100
@@ -23,6 +23,7 @@
printf("\nSERVER:\t%s\n", current->hostname);
+curl_global_init (CURL_GLOBAL_ALL);
On Sun Jun 17, 2007 at 18:20:01 +0200, Thijs Kinkhorst wrote:
> For stable I've checked whether it's
> vulnerable and I believe it's not: the vulnerability is in the SendmailSend()
> function. That requires for the calling code to actually use the sendmail
> method, which Flyspray does not allo
Package: libapache2-mod-ifier
Version: 0.8-2
Severity: grave
Justification: renders package unusable
This module, when installed and enabled, breaks all processing of
POST requests.
It should be removed from Etch until it can be updated to work
correctly.
-- System Information:
Debian Rel
On Fri, Oct 29, 2004 at 10:12:33PM +0200, Frank Lichtenheld wrote:
> Perhaps someone with a little more experience in identifying security
> problems should take a look, too. I CC'ed debian-security.
Here's a quick summery :
To be clear there are three flaws being discussed in xsok:
CAN-
On Mon, Jan 05, 2004 at 06:17:07PM -0800, Matt Zimmerman wrote:
> Package: libnids
> Severity: grave
>
> "The TCP reassembly functionality in libnids before 1.18 allows remote
> attackers to cause "memory corruption" and possibly execute arbitrary code
> via "overlarge TCP packets."
>
> http://cv
7 matches
Mail list logo