Your message dated Tue, 19 Sep 2006 08:32:11 -0700
with message-id <[EMAIL PROTECTED]>
and subject line Bug#388237: fixed in tikiwiki 1.9.5+dfsg1-2
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--- Begin Message ---
Package: tikiwiki
Severity: serious
Justification: 7.2

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

hi there,

it was recently brought to my attention that the recommended method
for using dbconfig-common in a package's config and postrm scripts was not
policy compliant as hinted in the subject of this bugreport.  the problem
is that in both the config and the postrm you should test whether the
files/programs in question exist before sourcing/executing them.  more
information is in a link below.

NOTE that this is slightly different from the original posts about
mass-bug filing in which only the postrm was mentioned, but the
config file is too.  so, even if you've fixed your package after i
initially posted about this, you might want to take a second look
to make sure.

this mass bug-filing was announced 2006/08/19, though it seems
there's a problem with the list archives for debian-devel.  fortunately,
i cc'd the dbconfig list:

http://lists.alioth.debian.org/pipermail/dbconfig-common-devel/2006-August/000586.html

and information for how you can fix your package:

http://people.debian.org/~seanius/policy/dbconfig-common.html/ch-develguide.html#s-hooks

fortunately, the fix is pretty simple, though i apologize for
the inconvenience.  feel free to ask if you have any questions.


        sean

- -- System Information:
Debian Release: testing/unstable
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: amd64 (x86_64)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.16-2-amd64-k8
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)

iD8DBQFFD7weynjLPm522B0RAlb7AJsHbYV5lif3TgSokupJAKM1sv/EgQCfbNrS
vWwEm4oblsbAgi6QlxZjjPA=
=JkIB
-----END PGP SIGNATURE-----


--- End Message ---
--- Begin Message ---
Source: tikiwiki
Source-Version: 1.9.5+dfsg1-2

We believe that the bug you reported is fixed in the latest version of
tikiwiki, which is due to be installed in the Debian FTP archive:

tikiwiki_1.9.5+dfsg1-2.diff.gz
  to pool/main/t/tikiwiki/tikiwiki_1.9.5+dfsg1-2.diff.gz
tikiwiki_1.9.5+dfsg1-2.dsc
  to pool/main/t/tikiwiki/tikiwiki_1.9.5+dfsg1-2.dsc
tikiwiki_1.9.5+dfsg1-2_all.deb
  to pool/main/t/tikiwiki/tikiwiki_1.9.5+dfsg1-2_all.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Marcus Better <[EMAIL PROTECTED]> (supplier of updated tikiwiki package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Tue, 19 Sep 2006 13:31:06 +0200
Source: tikiwiki
Binary: tikiwiki
Architecture: source all
Version: 1.9.5+dfsg1-2
Distribution: unstable
Urgency: high
Maintainer: Debian Tikiwiki team <[EMAIL PROTECTED]>
Changed-By: Marcus Better <[EMAIL PROTECTED]>
Description: 
 tikiwiki   - groupware and content management system
Closes: 388122 388237
Changes: 
 tikiwiki (1.9.5+dfsg1-2) unstable; urgency=high
 .
   * lib/Galaxia/src/ProcessManager/ProcessManager.php,
     tiki-g-admin_processes.php, tiki-setup_base.php: Add type checks and
     other minor bugfixes. Note that Tikiwiki 1.9.5 was probably not
     affected by the vulnerability in the original report. (Closes: #388122)
     - Fixed security issue: CVE-2006-4734.
   * debian/config, debian/postrm: Check that scripts exist before sourcing
     them. (Closes: #388237)
Files: 
 95e7ff9e09f7e768bae7a5b941062aa8 669 web optional tikiwiki_1.9.5+dfsg1-2.dsc
 44048be25850f2c38b4a87b0a3db6376 19564 web optional 
tikiwiki_1.9.5+dfsg1-2.diff.gz
 f4e3e1bb9f12ef812f6a0500dd3f5472 6514166 web optional 
tikiwiki_1.9.5+dfsg1-2_all.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)

iD8DBQFFEAoW+C5cwEsrK54RAjsaAKCng8yMGyYuEWbeMpZPqXdkvNc6QwCgm1eu
OgSqGiIMOggfAIvCSEgFFm0=
=StMh
-----END PGP SIGNATURE-----


--- End Message ---

Reply via email to