Author: geissert
Date: 2015-08-22 09:50:04 + (Sat, 22 Aug 2015)
New Revision: 36262
Modified:
data/CVE/list
Log:
filed bug for yubiserver
Modified: data/CVE/list
===
--- data/CVE/list 2015-08-22 09:10:13 UTC (rev
Author: geissert
Date: 2015-08-22 09:55:20 + (Sat, 22 Aug 2015)
New Revision: 36263
Modified:
bin/report-vuln
Log:
report-vuln: point to the mitre website over https
Modified: bin/report-vuln
===
--- bin/report-vuln
Author: geissert
Date: 2015-08-22 08:00:08 + (Sat, 22 Aug 2015)
New Revision: 36259
Modified:
data/CVE/list
Log:
NFUs
Modified: data/CVE/list
===
--- data/CVE/list 2015-08-22 07:24:21 UTC (rev 36258)
+++ data/CVE/list
/doc/manuals/developers-reference/pkgs.html#bug-security
Cheers,
--
Raphael Geissert - Debian Developer
www.debian.org - get.debian.net
/doc/manuals/developers-reference/pkgs.html#bug-security
Cheers,
--
Raphael Geissert - Debian Developer
www.debian.org - get.debian.net
Source: linux
Source-Version: 4.1.3-1
Tags: patch
Severity: minor
---
Index: sources-linux/4.1.3-1/drivers/media/dvb-frontends/au8522_dig.c
===
--- sources-linux/4.1.3-1/drivers/media/dvb-frontends/au8522_dig.c
+++
Source: linux
Source-Version: 4.1.3-1
Tags: patch
Severity: minor
---
Index: sources-linux/4.1.3-1/drivers/media/dvb-frontends/au8522_dig.c
===
--- sources-linux/4.1.3-1/drivers/media/dvb-frontends/au8522_dig.c
+++
Hi,
How is this relevant to ftp master?
APT does the right thing in order to cope with those mirrors that
happen to have apache multiviews enabled.
Cheers,
--
Raphael Geissert - Debian Developer
www.debian.org - get.debian.net
,
--
Raphael Geissert - Debian Developer
www.debian.org - get.debian.net
,
--
Raphael Geissert - Debian Developer
www.debian.org - get.debian.net
and have all the jessie-related suites use gzip and xz?
TIA.
Cheers,
--
Raphael Geissert - Debian Developer
www.debian.org - get.debian.net
CVE-2015-5202: RESERVED
CVE-2015-5215: RESERVED
CVE-2015-5216: RESERVED
CVE-2015-5217: RESERVED
CVE-2015-5222: RESERVED
--
The output might be a bit terse, but the above ids are known elsewhere,
check the references in the tracker. The second part indicates the status
of that id in the tracker
for improving the systemd one, but it is of no use having the
package in the archive.
Part of:
http://rgeissert.blogspot.com/2015/08/call-for-release-goal-package.html
Cheers,
--
Raphael Geissert - Debian Developer
www.debian.org - get.debian.net
Package: ca-certificates
Version: 20150426
Severity: important
Just a bug report to track the removal of the SPI CA.
As far as I'm aware of, only the debconf.org websites still use
certificates signed by that CA.
Cheers,
--
Raphael Geissert - Debian Developer
www.debian.org - get.debian.net
Author: geissert
Date: 2015-08-19 18:58:20 + (Wed, 19 Aug 2015)
New Revision: 36189
Modified:
data/CVE/list
Log:
some NFUs
Modified: data/CVE/list
===
--- data/CVE/list 2015-08-19 18:30:17 UTC (rev 36188)
+++
CVE-2015-5202: RESERVED
--
The output might be a bit terse, but the above ids are known elsewhere,
check the references in the tracker. The second part indicates the status
of that id in the tracker at the moment the script was run.
Author: geissert
Date: 2015-08-18 08:59:12 + (Tue, 18 Aug 2015)
New Revision: 36134
Modified:
data/embedded-code-copies
Log:
ksirk and glibc embed libidn
Modified: data/embedded-code-copies
===
--- data/embedded-code-copies
Author: geissert
Date: 2015-08-18 08:54:12 + (Tue, 18 Aug 2015)
New Revision: 36132
Modified:
data/CVE/list
Log:
mark some of the OS X issues as NFUs
Modified: data/CVE/list
===
--- data/CVE/list 2015-08-18 08:48:26
This is an automated email from the git hooks/post-receive script.
geissert pushed a change to branch master
in repository lintian.
from f39fd61 Rename application-in-library-section and
library-package-name-for-application (+ should-not)
new f3e9990 Add another matching
This is an automated email from the git hooks/post-receive script.
geissert pushed a commit to branch master
in repository lintian.
commit f3e9990147fec541b63b2534c7bec7fc5e2922bf
Author: Raphael Geissert geiss...@debian.org
Date: Mon Aug 17 00:06:57 2015 +0200
Add another matching string
CVE-2015-4496: RESERVED
--
The output might be a bit terse, but the above ids are known elsewhere,
check the references in the tracker. The second part indicates the status
of that id in the tracker at the moment the script was run.
Author: atomo64-guest
Date: 2015-08-12 09:58:09 + (Wed, 12 Aug 2015)
New Revision: 36002
Modified:
data/CVE/list
Log:
Flash NFUs
Modified: data/CVE/list
===
--- data/CVE/list 2015-08-12 09:26:47 UTC (rev 36001)
+++
be tailored down to by machine-specific criteria.
I do not believe that the additional lines that were not taken from
cups are subject to copyright.
Please consider this mail to have been sent from
raphael-externe.geissert at edf dot fr, and with that hat on.
Cheers,
--
Raphael Geissert
be tailored down to by machine-specific criteria.
I do not believe that the additional lines that were not taken from
cups are subject to copyright.
Please consider this mail to have been sent from
raphael-externe.geissert at edf dot fr, and with that hat on.
Cheers,
--
Raphael Geissert
CVE-2015-5179: RESERVED
--
The output might be a bit terse, but the above ids are known elsewhere,
check the references in the tracker. The second part indicates the status
of that id in the tracker at the moment the script was run.
--
To UNSUBSCRIBE, email to
CVE-2015-2877: RESERVED
CVE-2015-5160: RESERVED
CVE-2015-5187: RESERVED
--
The output might be a bit terse, but the above ids are known elsewhere,
check the references in the tracker. The second part indicates the status
of that id in the tracker at the moment the script was run.
--
To
CVE-2015-3184: RESERVED
CVE-2015-3187: RESERVED
CVE-2015-5177: RESERVED
--
The output might be a bit terse, but the above ids are known elsewhere,
check the references in the tracker. The second part indicates the status
of that id in the tracker at the moment the script was run.
--
To
-browsed use a TCP socket instead of the unix one.
Attached patch makes cups-browsed check only for read and write
permissions on the unix socket.
What do you think?
Cheers,
--
Raphael Geissert - Debian Developer
www.debian.org - get.debian.net
Index: cups-filters-1.0.71-1/utils/cups-browsed.c
for which it makes more sense to allow the
BrowseInterval to be configurable.
Cheers,
--
Raphael Geissert - Debian Developer
www.debian.org - get.debian.net
Index: cups-filters-1.0.71-1/utils/cups-browsed.c
===
--- cups-filters-1.0.71-1/utils
-browsed use a TCP socket instead of the unix one.
Attached patch makes cups-browsed check only for read and write
permissions on the unix socket.
What do you think?
Cheers,
--
Raphael Geissert - Debian Developer
www.debian.org - get.debian.net
Index: cups-filters-1.0.71-1/utils/cups-browsed.c
for which it makes more sense to allow the
BrowseInterval to be configurable.
Cheers,
--
Raphael Geissert - Debian Developer
www.debian.org - get.debian.net
Index: cups-filters-1.0.71-1/utils/cups-browsed.c
===
--- cups-filters-1.0.71-1/utils
binutils
--
gdk-pixbuf
--
icedove
--
icu
--
libuser
--
netty
--
netty3.1
--
pcre3
--
ruby-jquery-rails
--
sogo
--
xen
--
extplorer/oldstable
--
freetype/oldstable
--
fuseiso/oldstable
--
libstruts1.2-java/oldstable
--
lighttpd/oldstable
--
python-tornado/oldstable
--
qemu/oldstable
--
activemq
--
gdk-pixbuf
--
ghostscript
--
libuser
--
netty
--
netty3.1
--
ruby-jquery-rails
--
ruby-rack
--
sogo
--
xen
--
extplorer/oldstable
--
freetype/oldstable
--
fuseiso/oldstable
--
libstruts1.2-java/oldstable
--
lighttpd/oldstable
--
python-tornado/oldstable
--
quassel/oldstable
--
CVE-2013-1793: RESERVED
--
The output might be a bit terse, but the above ids are known elsewhere,
check the references in the tracker. The second part indicates the status
of that id in the tracker at the moment the script was run.
--
To UNSUBSCRIBE, email to
CVE-2013-1793: RESERVED
CVE-2013-2103: RESERVED
CVE-2013-4280: RESERVED
CVE-2015-5605: TODO: check
--
The output might be a bit terse, but the above ids are known elsewhere,
check the references in the tracker. The second part indicates the status
of that id in the tracker at the moment the
CVE-2014-3576: RESERVED
--
The output might be a bit terse, but the above ids are known elsewhere,
check the references in the tracker. The second part indicates the status
of that id in the tracker at the moment the script was run.
--
To UNSUBSCRIBE, email to
CVE-2015-3276: RESERVED
CVE-2015-3277: RESERVED
CVE-2015-3278: RESERVED
CVE-2015-5152: RESERVED
CVE-2015-5153: RESERVED
--
The output might be a bit terse, but the above ids are known elsewhere,
check the references in the tracker. The second part indicates the status
of that id in the tracker
ipython
--
kdepim
--
netty
--
netty3.1
--
nova
--
policykit-1
--
ruby-jquery-rails
--
ruby-rack
--
sogo
--
squid3
--
tidy
--
yubiserver
--
extplorer/oldstable
--
freetype/oldstable
--
fuseiso/oldstable
--
libstruts1.2-java/oldstable
--
lighttpd/oldstable
--
python-tornado/oldstable
--
CVE-2015-3244: RESERVED
--
The output might be a bit terse, but the above ids are known elsewhere,
check the references in the tracker. The second part indicates the status
of that id in the tracker at the moment the script was run.
--
To UNSUBSCRIBE, email to
CVE-2015-3267: RESERVED
--
The output might be a bit terse, but the above ids are known elsewhere,
check the references in the tracker. The second part indicates the status
of that id in the tracker at the moment the script was run.
--
To UNSUBSCRIBE, email to
CVE-2014-0578: RESERVED
CVE-2015-3114: RESERVED
CVE-2015-3115: RESERVED
CVE-2015-3116: RESERVED
CVE-2015-3117: RESERVED
CVE-2015-3118: RESERVED
CVE-2015-3119: RESERVED
CVE-2015-3120: RESERVED
CVE-2015-3121: RESERVED
CVE-2015-3122: RESERVED
CVE-2015-3123: RESERVED
CVE-2015-3124: RESERVED
CVE-2015-3239: RESERVED
CVE-2015-5146: missing from list
--
The output might be a bit terse, but the above ids are known elsewhere,
check the references in the tracker. The second part indicates the status
of that id in the tracker at the moment the script was run.
--
To UNSUBSCRIBE, email
libmimedir
--
netty
--
netty3.1
--
nova
--
openhpi
--
pure-ftpd
--
ruby-jquery-rails
--
ruby-rack
--
tidy
--
wesnoth-1.10
--
extplorer/oldstable
--
freetype/oldstable
--
fuseiso/oldstable
--
libstruts1.2-java/oldstable
--
mantis/oldstable
--
python-tornado/oldstable
--
quassel/oldstable
--
CVE-2015-3212: RESERVED
--
The output might be a bit terse, but the above ids are known elsewhere,
check the references in the tracker. The second part indicates the status
of that id in the tracker at the moment the script was run.
--
To UNSUBSCRIBE, email to
CVE-2014-8175: RESERVED
CVE-2015-3113: RESERVED
--
The output might be a bit terse, but the above ids are known elsewhere,
check the references in the tracker. The second part indicates the status
of that id in the tracker at the moment the script was run.
--
To UNSUBSCRIBE, email to
cacti
--
jackrabbit
--
libvpx
--
net-snmp
--
netty
--
nova
--
pcre3
--
policykit-1
--
pykerberos
--
tidy
--
wpa
--
clutter-1.0/oldstable
--
extplorer/oldstable
--
freetype/oldstable
--
fuseiso/oldstable
--
libstruts1.2-java/oldstable
--
mongodb/oldstable
--
python-tornado/oldstable
--
that I'd like to
know about. I.e. it has code that explicitly 404s Packages files,
though Sources aren't.
Cheers,
--
Raphael Geissert - Debian Developer
www.debian.org - get.debian.net
--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble
that I'd like to
know about. I.e. it has code that explicitly 404s Packages files,
though Sources aren't.
Cheers,
--
Raphael Geissert - Debian Developer
www.debian.org - get.debian.net
--
To UNSUBSCRIBE, email to debian-security-tracker-requ...@lists.debian.org
with a subject of unsubscribe
CVE-2015-3096: TODO: check
CVE-2015-3098: TODO: check
CVE-2015-3099: TODO: check
CVE-2015-3102: TODO: check
CVE-2015-3108: TODO: check
CVE-2015-4342: RESERVED
--
The output might be a bit terse, but the above ids are known elsewhere,
check the references in the tracker. The second part
jackrabbit
--
libvpx
--
libwmf
--
net-snmp
--
netty
--
pcre3
--
php5
--
policykit-1
--
pykerberos
--
tidy
--
wpa
--
clutter-1.0/oldstable
--
extplorer/oldstable
--
freetype/oldstable
--
fuseiso/oldstable
--
libstruts1.2-java/oldstable
--
mongodb/oldstable
--
python-tornado/oldstable
--
CVE-2015-3100: RESERVED
CVE-2015-3103: RESERVED
CVE-2015-3104: RESERVED
CVE-2015-3105: RESERVED
CVE-2015-3106: RESERVED
CVE-2015-3107: RESERVED
--
The output might be a bit terse, but the above ids are known elsewhere,
check the references in the tracker. The second part indicates the status
jackrabbit
--
libvpx
--
libwmf
--
net-snmp
--
netty
--
pcre3
--
policykit-1
--
pykerberos
--
python-tornado
--
tidy
--
wireshark
--
wpa
--
clutter-1.0/oldstable
--
extplorer/oldstable
--
freetype/oldstable
--
fuseiso/oldstable
--
libstruts1.2-java/oldstable
--
mongodb/oldstable
--
CVE-2015-3211: RESERVED
CVE-2015-3218: RESERVED
--
The output might be a bit terse, but the above ids are known elsewhere,
check the references in the tracker. The second part indicates the status
of that id in the tracker at the moment the script was run.
--
To UNSUBSCRIBE, email to
CVE-2015-3215: RESERVED
--
The output might be a bit terse, but the above ids are known elsewhere,
check the references in the tracker. The second part indicates the status
of that id in the tracker at the moment the script was run.
--
To UNSUBSCRIBE, email to
CVE-2015-3213: RESERVED
CVE-2015-3216: RESERVED
--
The output might be a bit terse, but the above ids are known elsewhere,
check the references in the tracker. The second part indicates the status
of that id in the tracker at the moment the script was run.
--
To UNSUBSCRIBE, email to
CVE-2015-3204: RESERVED
--
The output might be a bit terse, but the above ids are known elsewhere,
check the references in the tracker. The second part indicates the status
of that id in the tracker at the moment the script was run.
--
To UNSUBSCRIBE, email to
Gah, bad magic packages address.
-- Forwarded message --
From: Raphael Geissert geiss...@debian.org
Date: 31 May 2015 at 11:33
Subject: Re: Bug#787277: [ca-certificates] error on upgrade
To: Paride Desimone h...@autistici.org, 787...@bugs.debian.org
Cc: ca-certificates-j
)
at org.debian.security.KeyStoreHandler.load(KeyStoreHandler.java:66)
...3 more
E: /etc/ca-certificates/update.d/jks-keystore exited with code 1.
This looks like a configuration problem, or a bug in the java hook.
Reassigning accordingly.
Cheers,
--
Raphael Geissert - Debian Developer
www.debian.org
Hi,
There's a script on quantz that uses the BTS' SOAP interface, but for the
last few days it has receiving an error 500 response. Is it expected? was
anything changed?
Thanks in advance.
Cheers,
-- Forwarded message -
From: Cron Daemon r...@quantz.debian.org
Date: Fri, 29 May
CVE-2013-7440: RESERVED
--
The output might be a bit terse, but the above ids are known elsewhere,
check the references in the tracker. The second part indicates the status
of that id in the tracker at the moment the script was run.
--
To UNSUBSCRIBE, email to
CVE-2015-3201: RESERVED
--
The output might be a bit terse, but the above ids are known elsewhere,
check the references in the tracker. The second part indicates the status
of that id in the tracker at the moment the script was run.
--
To UNSUBSCRIBE, email to
darktable
--
dcraw
--
dovecot
--
exactimage
--
freeimage
--
horizon
--
libapache-mod-jk
--
libarchive
--
libav
--
libinfinity
--
libksba
--
libraw
--
net-snmp
--
netty
--
pcre3
--
ufraw
--
wireshark
--
wpa
--
xbmc
--
libopensaml2-java/stable
--
pyjwt/stable
--
python3.4/stable
--
realmd/stable
--
CVE-2015-3436: RESERVED
--
The output might be a bit terse, but the above ids are known elsewhere,
check the references in the tracker. The second part indicates the status
of that id in the tracker at the moment the script was run.
--
To UNSUBSCRIBE, email to
CVE-2014-7810: RESERVED
CVE-2015-1831: RESERVED
CVE-2015-3808: RESERVED
CVE-2015-8146: missing from list
CVE-2015-8147: missing from list
--
The output might be a bit terse, but the above ids are known elsewhere,
check the references in the tracker. The second part indicates the status
of that
CVE-2015-3644: TODO: check
--
The output might be a bit terse, but the above ids are known elsewhere,
check the references in the tracker. The second part indicates the status
of that id in the tracker at the moment the script was run.
--
To UNSUBSCRIBE, email to
On 13 May 2015 at 22:35, Josip Rodin j...@debbugs.entuzijast.net wrote:
On Wed, May 13, 2015 at 11:04:59AM +0200, Simon Paillard wrote:
Hi Josip,
On Sun, May 10, 2015 at 10:29:30PM +0200, Josip Rodin wrote:
On Sun, May 10, 2015 at 02:16:44PM +0200, Raphael Geissert wrote:
The Debian
CVE-2013-2095: RESERVED
CVE-2014-3579: RESERVED
CVE-2015-3077: TODO: check
CVE-2015-3078: TODO: check
CVE-2015-3079: TODO: check
CVE-2015-3080: TODO: check
CVE-2015-3082: TODO: check
CVE-2015-3083: TODO: check
CVE-2015-3084: TODO: check
CVE-2015-3085: TODO: check
CVE-2015-3086: TODO: check
darktable
--
dcraw
--
dovecot
--
exactimage
--
freeimage
--
libapache-mod-jk
--
libarchive
--
libav
--
libinfinity
--
libksba
--
libraw
--
net-snmp
--
pcre3
--
phpbb3
--
rawtherapee
--
ufraw
--
wpa
--
xbmc
--
glibc/stable
--
haproxy/stable
--
libopensaml2-java/stable
--
pyjwt/stable
--
CVE-2015-3199: RESERVED
--
The output might be a bit terse, but the above ids are known elsewhere,
check the references in the tracker. The second part indicates the status
of that id in the tracker at the moment the script was run.
--
To UNSUBSCRIBE, email to
Hi,
Joachim Breitner wrote:
will http.debian.net continue to work?
Yes, there's no plan to discontinue the other host name. At some point
the web site (index, demo, etc) is going to redirect to httpredir, but
that's about what's planned.
Cheers,
--
Raphael Geissert - Debian Developer
CVE-2014-8162: RESERVED
--
The output might be a bit terse, but the above ids are known elsewhere,
check the references in the tracker. The second part indicates the status
of that id in the tracker at the moment the script was run.
--
To UNSUBSCRIBE, email to
Oh and it would probably help if I send you the proper colordiffrc...
plain=off
newtext=darkgreen
oldtext=darkred
diffstuff=darkcyan
cvsstuff=white
Cheers,
--
Raphael Geissert - Debian Developer
www.debian.org - get.debian.net
--
To UNSUBSCRIBE, email to debian-bugs-dist-requ
Hi,
On Sun, 26 Apr 2015 16:28:15 +0100 Dave Ewart da...@sungate.co.uk wrote:
On Saturday, 25.04.2015 at 00:32 +0200, Raphael Geissert wrote:
It would be great if you could ship a sample colordiffrc that does
git-like colouring:
[...]
Do you mean you think that git-like colouring should
Source: fai
Source-Version: 4.3.2
Tags: patch
Hi,
The format of the fstab file does not allow comments to be after a
record; they must be on their own line.
This makes create_fstab_line produce at least two lines whenever it
thinks it should add a comment.
Augeas is known to break due to this
-cors.org/
Cheers,
--
Raphael Geissert - Debian Developer
www.debian.org - get.debian.net
--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
-cors.org/
Cheers,
--
Raphael Geissert - Debian Developer
www.debian.org - get.debian.net
--
To UNSUBSCRIBE, email to debian-qa-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive:
https://lists.debian.org/CAA7hUgGOJhgAL1XC+m0J-FnR
Source: packagekit
Source-Version: 1.0.1-2
Tags: patch
Severity: wishlist
It's better to link over https and avoid the redirection.
---
Index: packagekit-1.0.1-2/debian/patches/vendor-debian.diff
===
---
CVE-2015-0192: RESERVED
CVE-2015-1914: RESERVED
CVE-2015-1916: RESERVED
--
The output might be a bit terse, but the above ids are known elsewhere,
check the references in the tracker. The second part indicates the status
of that id in the tracker at the moment the script was run.
--
To
CVE-2015-3170: RESERVED
CVE-2015-3171: RESERVED
--
The output might be a bit terse, but the above ids are known elsewhere,
check the references in the tracker. The second part indicates the status
of that id in the tracker at the moment the script was run.
--
To UNSUBSCRIBE, email to
dovecot
--
keystone
--
libapache-mod-jk
--
libarchive
--
libav
--
libksba
--
libssh
--
net-snmp
--
pcre3
--
quassel
--
wordpress
--
glibc/stable
--
gnutls28/stable
--
haproxy/stable
--
krb5/stable
--
libopensaml2-java/stable
--
libtasn1-6/stable
--
pyjwt/stable
--
python3.4/stable
--
AFTER the description
If it doesn't like your bug number, prefix it with # and report
$ bin/gen-DLA 120-2 xserver-xorg regression
...
Perhaps that's enough?
Cheers,
--
Raphael Geissert - Debian Developer
www.debian.org - get.debian.net
--
To UNSUBSCRIBE, email to debian-bugs-dist-requ
AFTER the description
If it doesn't like your bug number, prefix it with # and report
$ bin/gen-DLA 120-2 xserver-xorg regression
...
Perhaps that's enough?
Cheers,
--
Raphael Geissert - Debian Developer
www.debian.org - get.debian.net
--
To UNSUBSCRIBE, email to debian-security-tracker
CVE-2015-0298: RESERVED
CVE-2015-3146: RESERVED
--
The output might be a bit terse, but the above ids are known elsewhere,
check the references in the tracker. The second part indicates the status
of that id in the tracker at the moment the script was run.
--
To UNSUBSCRIBE, email to
Hi,
Attached patch (with test) fixes AnyEvent::HTTP's parsing of URLs so
that it accepts IPv6 literals.
Please let me know what you think.
Cheers,
--
Raphael Geissert - Debian Developer
www.debian.org - get.debian.net
Index: libanyevent-http-perl-2.21-1/HTTP.pm
CVE-2015-3156: RESERVED
--
The output might be a bit terse, but the above ids are known elsewhere,
check the references in the tracker. The second part indicates the status
of that id in the tracker at the moment the script was run.
--
To UNSUBSCRIBE, email to
CVE-2015-1243: RESERVED
CVE-2015-1250: RESERVED
CVE-2015-3159: RESERVED
--
The output might be a bit terse, but the above ids are known elsewhere,
check the references in the tracker. The second part indicates the status
of that id in the tracker at the moment the script was run.
--
To
CVE-2015-1854: RESERVED
CVE-2015-3155: RESERVED
--
The output might be a bit terse, but the above ids are known elsewhere,
check the references in the tracker. The second part indicates the status
of that id in the tracker at the moment the script was run.
--
To UNSUBSCRIBE, email to
dnsmasq
--
dovecot
--
file
--
krb5
--
libapache-mod-jk
--
libav
--
libksba
--
mercurial
--
net-snmp
--
pcre3
--
sqlite3
--
elasticsearch/stable
--
glibc/stable
--
libopensaml2-java/stable
--
mariadb-10.0/stable
--
openjdk-7/stable
--
opus-tools/stable
--
owncloud/stable
--
pyjwt/stable
--
Package: colordiff
Version: 1.0.10-1
Severity: wishlist
Hi,
It would be great if you could ship a sample colordiffrc that does git-like
colouring:
plain=off
newtext=blue
oldtext=red
diffstuff=darkgreen
cvsstuff=darkmagenta
What do you think?
Thanks in advance!
Cheers,
--
Raphael
CVE-2014-8171: RESERVED
--
The output might be a bit terse, but the above ids are known elsewhere,
check the references in the tracker. The second part indicates the status
of that id in the tracker at the moment the script was run.
--
To UNSUBSCRIBE, email to
CVE-2015-3149: RESERVED
--
The output might be a bit terse, but the above ids are known elsewhere,
check the references in the tracker. The second part indicates the status
of that id in the tracker at the moment the script was run.
--
To UNSUBSCRIBE, email to
CVE-2015-1838: RESERVED
CVE-2015-1839: RESERVED
CVE-2015-2575: TODO: check
CVE-2015-2576: TODO: check
--
The output might be a bit terse, but the above ids are known elsewhere,
check the references in the tracker. The second part indicates the status
of that id in the tracker at the moment the
CVE-2015-0346: TODO: check
CVE-2015-0347: TODO: check
CVE-2015-0348: TODO: check
CVE-2015-0349: TODO: check
CVE-2015-0350: TODO: check
CVE-2015-0351: TODO: check
CVE-2015-0352: TODO: check
CVE-2015-0353: TODO: check
CVE-2015-0354: TODO: check
CVE-2015-0355: TODO: check
CVE-2015-0356: TODO: check
as follows:
/var/lib/dpkg/tmp.ci/preinst: 11: /var/lib/dpkg/tmp.ci/preinst: Bad
substitution
Gah, apologies for that; the colon right after the 2 should not be
there. The code should work once that's been fixed.
Cheers,
--
Raphael Geissert - Debian Developer
www.debian.org
CVE-2014-8111: RESERVED
CVE-2015-0277: RESERVED
CVE-2015-0346: RESERVED
CVE-2015-0347: RESERVED
CVE-2015-0348: RESERVED
CVE-2015-0349: RESERVED
CVE-2015-0350: RESERVED
CVE-2015-0351: RESERVED
CVE-2015-0352: RESERVED
CVE-2015-0353: RESERVED
CVE-2015-0354: RESERVED
CVE-2015-0355: RESERVED
updated the mirrors list last night.
Cheers,
--
Raphael Geissert - Debian Developer
www.debian.org - get.debian.net
--
To UNSUBSCRIBE, email to debian-boot-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive:
https://lists.debian.org
cabextract
--
commons-httpclient
--
fuseiso
--
jruby
--
libksba
--
libmodule-signature-perl
--
libstruts1.2-java
--
mercurial
--
mongodb
--
net-snmp
--
pcre3
--
procmail
--
qt4-x11
--
quassel
--
ruby1.8
--
ruby1.9.1
--
freetype/stable
--
libav/stable
--
ruby-redcarpet/stable
--
Hi,
What do you think about the attached diff?
Granted, it doesn't handle the upgrade in chroot while a
package-installed process is running, case, but it at least should
allow some installation and upgrade scenarios to be done smoothly.
Cheers,
--
Raphael Geissert - Debian Developer
CVE-2014-8111: RESERVED
CVE-2015-0277: RESERVED
CVE-2015-0458: RESERVED
CVE-2015-0459: RESERVED
CVE-2015-0460: RESERVED
CVE-2015-0469: RESERVED
CVE-2015-0470: RESERVED
CVE-2015-0477: RESERVED
CVE-2015-0478: RESERVED
CVE-2015-0480: RESERVED
CVE-2015-0484: RESERVED
CVE-2015-0486: RESERVED
it could be
considered an RC bug.
Cheers,
--
Raphael Geissert - Debian Developer
www.debian.org - get.debian.net
--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
501 - 600 of 7325 matches
Mail list logo