Bug#696144: 20_head_tests.cf: regex for illegal IP address contains valid network 5/8
Hi Noah, * Alexander Neumann alexan...@debian.org wrote: * Noah Meyerhans no...@debian.org wrote: I'll see about getting a fixed upgraded for squeeze in the next day or two... That would be excellent, thanks! And please let me know if I can help you in any way. Did you find time to prepare an update for Squeeze? Regards, Alex signature.asc Description: Digital signature
Bug#696144: 20_head_tests.cf: regex for illegal IP address contains valid network 5/8
Hi Noah, * Alexander Neumann alexan...@debian.org wrote: * Noah Meyerhans no...@debian.org wrote: I'll see about getting a fixed upgraded for squeeze in the next day or two... That would be excellent, thanks! And please let me know if I can help you in any way. Did you find time to prepare an update for Squeeze? Regards, Alex signature.asc Description: Digital signature
Bug#696144: 20_head_tests.cf: regex for illegal IP address contains valid network 5/8
Hi, * Noah Meyerhans no...@debian.org wrote: On Tue, Jan 22, 2013 at 01:15:39PM +0100, Alexander Neumann wrote: This bug should be fixed ASAP squeeze, for example Hetzner[1] was allocated 5.9.0.0/16, so a lot of mail servers are hit by this bug. A very simple patch is attached. Note that if you're running sa-update regularly, you won't need to worry about this. The updates channels have been carrying the fix for this for years, literally. This is correct, but the cron-job must be manually enabled in /etc/default/spamassassin (CRON=1), so there are probably lots of servers out there still using the rules supplied with the package. I'll see about getting a fixed upgraded for squeeze in the next day or two... That would be excellent, thanks! And please let me know if I can help you in any way. Regards - Alex signature.asc Description: Digital signature
Bug#642480: reopened as cryptographic validation used in apt-key net-update is broken
Hi, I've reopened this bug and set the severity to normal in order to keep track on the code this bug pointed at. The cryptographic verification code used in the function called by apt-key net-update is utterly broken. The situation is not improved by replacing list-sigs to check-sigs, because still the key id strings (which are absurdly short and easy to forge) are used to verify that a key has been signed by another key. This is broken. This bug may be closed either when the code in apt-key has been replaced so that the signatures are checked or the code is removed completely. Regards, - Alex pgpx522azMXmm.pgp Description: PGP signature
Bug#490310: Bug#491560: binutils-avr: downgrading to 2.18-3 works
Hi, * Hakan Ardo [EMAIL PROTECTED] wrote: the build problem of gcc-avr seems to be that a few of the patches I apply has now been applied to the src provided by gcc-src. Ah, I see... To prevent this kind of problems in the future do you think it's a good idea to Build-Depend on an exact version of gcc-4.3-source? I tried something like that some years ago but it messed up the transactions to testing... This solution would complicate the process too much, IMHO. Another solution would be to duplicate the gcc source in gcc-avr. That sounds good to me... BTW: There are some strange files in the source package of gcc-avr, like v, which contains a part of the voting mail for the last DPL vote... Cheers, - fd0 pgpJJCFx3ieXt.pgp Description: PGP signature