closing as per nack,
bug 982509 for the security update
** Changed in: inspircd (Ubuntu)
Status: New => Won't Fix
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/978206
Title:
FreezeException
Nack on the FFe from the release team, but we definitely want the
security fix before release. Please prepare a merge between the package
in Testing and what's in Precise.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.l
1.1.22+dfsg-4+squeeze1 does not build in precise as-is. It will likely
need -4ubuntu1 to build.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/978206
Title:
FreezeException request-- Sync with Debian
Just looking at the version numbers in the different Ubuntu releases,
the patch you mentioned should at least apply for precise, oneiric,
natty and lucid. For hardy it is less clear.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
http
> You have got to be kidding, ...
If you have something to say, please say it in a respectful way. I'm
sure Kazuhiro Nishiyama had the best intentions when filing this bug
report.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https:
The attachment "patch for the DSA" of this bug report has been
identified as being a patch in the form of a debdiff. The ubuntu-
sponsors team has been subscribed to the bug report so that they can
review and hopefully sponsor the debdiff. In the event that this is in
fact not a patch you can res
The CVE title is "Heap-based buffer overflow in dns.cpp in InspIRCd
2.0.5 might allow remote attackers to execute arbitrary code via a
crafted DNS query that uses compression".
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bu
You have got to be kidding, a major new upstream sync two weeks before
release?
Rather you should prepare a minimal package based on the fix for this
DSA and ask your security team/release team to get it in through the
normal channels.
** Patch added: "patch for the DSA"
https://bugs.launchpa