Bug#696144: 20_head_tests.cf: regex for illegal IP address contains valid network 5/8

2013-02-12 Thread Alexander Neumann
Hi Noah,

* Alexander Neumann alexan...@debian.org wrote:
 * Noah Meyerhans no...@debian.org wrote:
  I'll see about getting a fixed upgraded for squeeze in the next day or
  two...

 That would be excellent, thanks! And please let me know if I can help you in
 any way.

Did you find time to prepare an update for Squeeze?

Regards,
Alex


signature.asc
Description: Digital signature


Bug#696144: 20_head_tests.cf: regex for illegal IP address contains valid network 5/8

2013-02-04 Thread Alexander Neumann
Hi Noah,

* Alexander Neumann alexan...@debian.org wrote:
 * Noah Meyerhans no...@debian.org wrote:
  I'll see about getting a fixed upgraded for squeeze in the next day or
  two...

 That would be excellent, thanks! And please let me know if I can help you in
 any way.

Did you find time to prepare an update for Squeeze?

Regards,
Alex


signature.asc
Description: Digital signature


Bug#696144: 20_head_tests.cf: regex for illegal IP address contains valid network 5/8

2013-01-23 Thread Alexander Neumann
Hi,

* Noah Meyerhans no...@debian.org wrote:
 On Tue, Jan 22, 2013 at 01:15:39PM +0100, Alexander Neumann wrote:
  This bug should be fixed ASAP squeeze, for example Hetzner[1] was allocated
  5.9.0.0/16, so a lot of mail servers are hit by this bug. A very simple
  patch is attached.
 Note that if you're running sa-update regularly, you won't need to worry
 about this. The updates channels have been carrying the fix for this for
 years, literally.

This is correct, but the cron-job must be manually enabled in
/etc/default/spamassassin (CRON=1), so there are probably lots of servers
out there still using the rules supplied with the package.

 I'll see about getting a fixed upgraded for squeeze in the next day or
 two...

That would be excellent, thanks! And please let me know if I can help you in
any way.

Regards
- Alex


signature.asc
Description: Digital signature


Bug#642480: reopened as cryptographic validation used in apt-key net-update is broken

2011-09-23 Thread Alexander Neumann
Hi,

I've reopened this bug and set the severity to normal in order to keep track
on the code this bug pointed at.

The cryptographic verification code used in the function called by apt-key
net-update is utterly broken.  The situation is not improved by replacing
list-sigs to check-sigs, because still the key id strings (which are
absurdly short and easy to forge) are used to verify that a key has been
signed by another key.  This is broken.

This bug may be closed either when the code in apt-key has been replaced so
that the signatures are checked or the code is removed completely.

Regards,
- Alex


pgpx522azMXmm.pgp
Description: PGP signature


Bug#490310: Bug#491560: binutils-avr: downgrading to 2.18-3 works

2008-07-21 Thread Alexander Neumann
Hi,

* Hakan Ardo [EMAIL PROTECTED] wrote:
 the build problem of gcc-avr seems to be that a few of the patches I
 apply has now been applied to the src provided by gcc-src.

Ah, I see...

 To prevent this kind of problems in the future do you think it's a
 good idea to Build-Depend on an exact version of gcc-4.3-source? I
 tried something like that some years ago but it messed up the
 transactions to testing...

This solution would complicate the process too much, IMHO.

 Another solution would be to duplicate the gcc source in gcc-avr.

That sounds good to me...

BTW: There are some strange files in the source package of gcc-avr, like
v, which contains a part of the voting mail for the last DPL vote...

Cheers,
- fd0


pgpJJCFx3ieXt.pgp
Description: PGP signature