Hi

On Fri, Mar 03, 2017 at 01:45:10AM +0100, Jonas Meurer wrote:
> Hi Salvatore, hi Holger,
> 
> On Thu, 02 Mar 2017 08:12:24 +0100 Salvatore Bonaccorso
> <car...@debian.org> wrote:
> > Source: munin
> > Version: 2.0.25-1+deb8u1
> > Severity: serious
> > Tags: upstream
> > 
> > Only after releasing the DSA, I noticed that the update introduced
> > another regression, causing to spam the munin logs for
> > munin-cgi-graph.log with:
> > 
> > [...]
> > 2017/03/02 06:53:56 [PERL WARNING] Use of uninitialized value $size_x in 
> > string eq at /usr/lib/munin/cgi/munin-cgi-graph line 453.
> > [...]
> > 
> > We possibly should release another regression update for
> > jessie-security, and have the fix included as well for stretch.
> 
> Upstream just released munin 2.0.33 which fixes this regression. The
> relevant patch is
> https://github.com/munin-monitoring/munin/commit/6373554b1cc8bee886947cee598e86d1d9ea1e4a

Thank you. Have seen it and prepared a followup for jessie-security
(additionally asked if DSA can test the whole update on the Debian
installation).

Regards,
Salvatore

Reply via email to