Package: boinc-manager
Version: 6.10.17+dfsg-3
Severity: normal
If I try to add a prject i get the following stackTrace:
==
22:41:28: Error: Memory VFS already contains file 'webexternallink.xpm'!
Package: adduser
(Filing this, to track the TODOs from the discussion that followed
http://lists.debian.org/debian-devel/2010/05/msg00887.html)
Am Wed, 26 May 2010 08:40:26 +0100
schrieb Stephen Gran sg...@debian.org:
This one time, at band camp, Steve Langasek said:
On Tue, May 25, 2010 at
Hi Laurent,
On Mon, May 31, 2010 at 08:08:07PM +0200, Laurent Bigonville wrote:
Package: git-buildpackage
Version: 0.4.65
Severity: wishlist
Hi,
With this gbp.conf:
[DEFAULT]
debian-branch = debian
upstream-branch = upstream
pristine-tar = True
[git-buildpackage]
debian-branch =
Patch will be in 2.6.27.
Paul
--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
On Mon, 31 May 2010, Jon Dowland wrote:
j...@tchicaya:~/wd/web/crm114-spamd$ git rebase --onto origin/master
shift: 426: can't shift that many
You mean just ‘git rebase origin/master’.
(Nonetheless, agreed that it should print a better error message.)
Anders
--
To UNSUBSCRIBE, email to
Package: ftp.debian.org
Severity: normal
Hi,
There are disparities between your recently accepted upload and the
override file for the following file(s):
openoffice.org-l10n-as-in_3.2.1~rc2-2_all.deb: package says section is
localization, override says editors.
Source: eagle
Version: 5.9.0-1
Severity: minor
eagle should recommend extra-xdg-menus not -menu (typo)
--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Package: sudo
PAM modules like pam_umask, limits and pam_env don't work with sudo
because no common-session modules are included in sudo's pam config
file.
/etc/pam.d/sudo should be shipped containing the following line:
@include common-session-noninteracative
If sudo -i would really need it,
found 433779 asterisk/1:1.6.2.7-1
user initscripts-ng-de...@lists.alioth.debian.org
usertag 433779 + missing-dependency
thanks
hi,
it appears that asterisk is incorrectly treating DNS resolution failure
during SIP registration as a 404 not found SIP response.
when my system boots, asterisk is
On Sat, 29.05.10 09:33, Joachim Breitner (nome...@debian.org) wrote:
Dear Christoph, Dear Lennart,
Am Samstag, den 29.05.2010, 00:45 +0200 schrieb Christoph Anton
Mitterer:
May I suggest to map to 127.0.1.1 for IPv4 instead of 127.0.0.2.
This would be more consistent what Debian does
Hi Petter,
On Sun, May 30, 2010 at 12:04:36PM +0200, Petter Reinholdtsen wrote:
Package: krb5-auth-dialog
Version: 0.14-2
User: debian-...@lists.debian.org
Usertags: debian-edu
When leaving krb-auth-dialog running for a few days, a lot of dialogs
with ticket about to expire, ticket
reassign 583956 gsfonts
forcemerge 583964 583956
thanks
On Mon, May 31, 2010 at 10:53:30PM +0200, Francesco Poli (t1000) wrote:
After the following upgrade:
[UPGRADE] gsfonts 1:8.11+urwcyr1.0.7~pre44-4 - 1:8.11+urwcyr1.0.7~pre44-4.1
xmgrace stopped working:
...which is not a bug in
Hi Petter,
On Sun, May 23, 2010 at 01:40:51PM +0200, Petter Reinholdtsen wrote:
Did you try to run the program in valgrind, to try to pinpoint the
leak? I tested a simple run using 'krb5-auth-dialog -A' as root with
no kerberos ticket available, and valgrind reported quite a lot of
I have tried to get the RSS feed from debaday.debian.net since two
week and there is no response.
According to http://lists.debian.org/debian-www/2009/12/msg00141.html
(Dec 2009), the problem seems to be not recent.
--
Stéphane
--
To UNSUBSCRIBE, email to
Package: www.debian.org
http://times.debian.net/ doesn't respond anymore. Does the service
definitively stoppped or failed temporarily?
According the default install of Liferea, an RSS feed was provided at
http://times.debian.net/?format=rss20.xml;.
--
Stéphane
--
To UNSUBSCRIBE, email to
This is probably because of the fundametal problem with the current
boot system in Debian, and the fact that the Linux kernel have become
event based and it is not possible to know in advance when a device
will be available during boot. It is basicly a race condition during
boot because the
Package: ypsilon
Version: 0.9.6.update3-6
Severity: grave
Tags: sid upstream
Justification: renders package unusable
Running ypsilon terminates immediately with message Illegal instruction.
It is this bug:
http://code.google.com/p/ypsilon/issues/detail?id=134
(workaround proposed there works)
One of three things happened:
- You are running a CPU hog
- The cooler is failing
- You moved the laptop and it is no longer cooled properly
No, unfortunately none of this is happening. I let couple of days pass
and keep an eye on what's happening. When I'm compiling, watching a
video
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
severity 583964 normal
thanks
At Mon, 31 May 2010 23:15:58 +0200,
Francesco Poli wrote:
On Mon, 31 May 2010 23:06:08 +0200 Francesco Poli (t1000) wrote:
Upgrading gsfonts to version 1:8.11+urwcyr1.0.7~pre44-4.1 breaks grace,
as detailed in
The server is still online. Is the http service down?
--
Juti Noppornpitak
http://shiroyuki.com
On 2010-05-31, at 6:21 PM, Stéphane Blondon wrote:
Package: www.debian.org
http://times.debian.net/ doesn't respond anymore. Does the service
definitively stoppped or failed temporarily?
Package: wnpp
Severity: wishlist
* Package name: swftools
Version : 0.9.0
Upstream Author : Matthias Kramm, Rainer Böhme, De Clarke. Contact:
swftools-com...@nongnu.org
* URL : http://www.swftools.org/
* License : GPL, LGPL
Programming Lang: C
Description
Package: kopete
Version: 4:4.4.3-2
Severity: important
Tags: squeeze
kopete version 4:4.4.3-2
On the application start it shows the message box with this message: 'The
process for the file protocol died unexpectedly.' -- and proceedes start
normally.
In the chat window it can not show emoticon
2010/6/1 Juti Noppornpitak jnopp...@shiroyuki.com:
The server is still online. Is the http service down?
Yes, it seems the problem is http only:
steph...@degtyarov:~ $ ping -c4 times.debian.net
PING times.debian.net (82.195.75.85) 56(84) bytes of data.
64 bytes from thallo.turmzimmer.net
Package: xmp
Version: FTBFS with audacious 2.3
Severity: serious
Justification: fails to build from source
xmp fails to build with audacious 2.3. The build dependency needs to be updated
from audacious-plugins-dev to audacious-dev. Additional changes are required to
work with audacious 2.3. You
Package: upse
Severity: serious
upse fails to build with audacious 2.3. The build dependency needs to be
updated from audacious-plugins-dev to audacious-dev. Additional changes are
required. You might take 02_audacious_2.3.dpatch from Ubuntu or package the new
upstream release. Here is the
Package: lxpanel
Version: 0.5.5-4
Severity: normal
Tags: patch
User: ubuntu-de...@lists.ubuntu.com
Usertags: origin-ubuntu maverick ubuntu-patch
Hi,
On Ubuntu, we fixed a FTBFS du to a variable name already used in one header.
Patch included.
Regards,
Julien Lavergne
-- System Information:
Hi,
the patch from bug #578213 will fix this FTBFS. Please apply it.
--
Benjamin Drung
Ubuntu Developer (www.ubuntu.com) | Debian Maintainer (www.debian.org)
signature.asc
Description: Dies ist ein digital signierter Nachrichtenteil
At Mon, 31 May 2010 15:04:02 -0700,
Nicholas Breen wrote:
On Mon, May 31, 2010 at 10:53:30PM +0200, Francesco Poli (t1000) wrote:
After the following upgrade:
[UPGRADE] gsfonts 1:8.11+urwcyr1.0.7~pre44-4 -
1:8.11+urwcyr1.0.7~pre44-4.1
xmgrace stopped working:
...which is not a bug
Package: python2.6
Version: 2.6.5+20100529-1
Severity: grave
Tags: sid
Justification: renders package unusable
While trying to upgrade python2.6 to version 2.6.5+20100529-1 there is an error
during the execution of the post-install script:
TypeError: ('compile() expected string without null
directory
`/build/buildd-lwjgl_2.4.2+dfsg-1-i386-LRYqQ6/lwjgl-2.4.2+dfsg'
make: *** [build] Error 2
dpkg-buildpackage: error: debian/rules build gave error exit status 2
Build finished at 20100531-1228
FAILED [dpkg
Am Montag, den 31.05.2010, 22:29 +0200 schrieb Michael Prokop:
* Paul Menzel pm.deb...@googlemail.com [Mon May 31, 2010 at 06:41:45PM
+0200]:
yesterday I upgrade my Debian Sid/unstable system after over a
week. Several core packages were upgraded by doing this as lvm2,
mdadm,
Hello, I'm checking up on the status of putting this in the java
team's maintenance and upgraded to the newest version. I can take care
of it if no one is working on it. I'm the maintainer of arduino, and I
need this package to get arduino into testing.
--
To UNSUBSCRIBE, email to
brian m. carlson wrote:
Package: libxml-commons-resolver1.1-java
Version: 1.2-5
Severity: important
libxml-commons-resolver1.1-java depends on classpath-common |
java1-runtime | java2-runtime. The latter two dependencies bring in
JREs with graphical interfaces. I use this package on my
Dear Bernhard,
Instead of trying to use -P- (which currently does not work
anyway) with all the complexity of guessing where to add it
if the commands are taken from some user config file, it just
changes to an empty directory befor calling gs.
Sounds good... except:
I do not see where
severity 583987 normal
tag 583987 + moreinfo
thanks
please run:
ls -l /usr/lib/python2.6/io.py
md5sum /usr/lib/python2.6/io.py
On 01.06.2010 00:57, Diederik de Haas wrote:
Package: python2.6
Version: 2.6.5+20100529-1
Severity: grave
Tags: sid
Justification: renders package unusable
While
Hi team,
I am looking for a sponsor for my package hessian.
* Package name: hessian
Version : 4.0.6-1
Upstream Author : Caucho Technology, Inc.
* URL : http://hessian.caucho.com/
* License : Apache-1.1
Section : java
It builds these binary packages:
On Tuesday 01 June 2010 01:11:02 Matthias Klose wrote:
please run:
ls -l /usr/lib/python2.6/io.py
md5sum /usr/lib/python2.6/io.py
$ ls -l /usr/lib/python2.6/io.py
-rw-r--r-- 1 root root 65214 May 30 16:25 /usr/lib/python2.6/io.py
$ md5sum /usr/lib/python2.6/io.py
Hi team,
I am looking for a sponsor for my package serp.
* Package name: serp
Version : 1.14.1-1
Upstream Author : A. Abram White awh...@bea.com
* URL : http://serp.sourceforge.net/
* License : BSD
Section : java
It builds these binary packages:
Further gs issues. The gs scripts mentioned below are in /usr/bin:
bdftops dumphint dvipdf eps2eps font2c gsbj gsdj gsdj500 gslj gslp
gsnd pdf2dsc pdf2ps pdfopt pf2afm pfbtopfa printafm ps2ascii ps2epsi
ps2pdf ps2pdf12 ps2pdf13 ps2pdf14 ps2pdfwr ps2ps ps2ps2 wftopfa
(maybe others?).
The
Package: courier
Version: 0.64.2-1
Severity: grave
Upstream has the patch:
http://sourceforge.net/mailarchive/forum.php?thread_name=4BA4F266.3080603%40linuxia.deforum_name=courier-users
Thunderbird chokes on that and requests a login again, claiming a login
failure.
(ditto Evolution. Client
On Mon, 2010-05-31 at 23:58 +0200, Lennart Poettering wrote:
Hmm, I see no reason why 127.0.0.2 should be a better choice than
127.0.1.1, or vice versa. Can you come up with a reason?
No special reason I guess,.. I wanted it just to be aligned with
Debian's standard.
Given that one is as good
tag 572338 -pending
thanks
Net_Whois was released under PHP 2.02 license.
Filed a bug[0] under pear.php.net asking the author to re-license software
under PHP 3.01 license.
[0] http://pear.php.net/bugs/bug.php?id=17443
--
Dario Minnucci mid...@debian.org
Phone: +34 902021030 | Fax: +34
Package: liferea
Version: 1.4.18-1.1
Severity: normal
For about two weeks now my liferea on Debian Lenny crashes everytime I
start it after latest one day (i.e. when I come back from work, it's
always gone).
Running with --debug-all ends with the following lines after only 22
minutes.
UPDATE:
tag 472662 patch
user ubuntu-de...@lists.ubuntu.com
usertag 472662 origin-ubuntu ubuntu-patch maverick
thanks
Here is a patch to fix this (from Ubuntu, but updated)
SR
--
Stefano Rivera
http://tumbleweed.org.za/
H: +27 21 465 6908 C: +27 72 419 8559 UCT: x3127
diff -Nru
Oops..
Previous bug number is wrong, the bug number is:
http://pear.php.net/bugs/bug.php?id=17449
Sorry.
--
Dario Minnucci mid...@debian.org
Phone: +34 902021030 | Fax: +34 902024417
Key fingerprint = BAA1 7AAF B21D 6567 D457 D67D A82F BB83 F3D5 7033
signature.asc
Description: OpenPGP
hi
On Tue, May 25, 2010 at 9:42 PM, Shane Fagan
shanepatrickfa...@ubuntu.com wrote:
Can I volunteer to package this? I want to use this for the Vala
template for Quickly.
If you have a collab accout or a git server somewhere, you can try to
update
On Mon, May 24, 2010 at 9:06 PM, Lucas Nussbaum lu...@debian.org wrote:
retitle 469626 RFP: gstopenmax -- a GStreamer plug-in for OpenMAX IL
noowner 469626
thanks
The package exists in maemo/meego.
I am not sure about usefulness in Debian. Perhaps we should close that
bug if nobody is
reopen 543343
thanks
On Tue, 2010-06-01 at 00:56 +0200, Gerfried Fuchs wrote:
Please be notified that the any .debian.net domain isn't under the
umbrella of the website team, so filing a bugreport against
www.debian.org is wrong for those. I'm closing these bugreports.
#543343 is about
Package: discover-data
Version: 2.2010.04.07
Severity: normal
% discover-pkginstall -l
ipw3945-source
ipw3945 has been superseeded by the iwl drivers.
-- Package-specific info:
lspci:
00:00.0 Host bridge [0600]: Intel Corporation Mobile PM965/GM965/GL960 Memory
Controller Hub [8086:2a00] (rev
Hello,
According to my research, you maintain a package, which installs a DHCP hook
into /etc/dhcp3
The v4 DHCP packages use /etc/dhcp instead, so at the point that I upload
them to unstable, you'll need to modify your package to install its hooks
into /etc/dhcp instead.
I think I'm fairly
Hi Andrew,
could you specify what your exact plan is here and how you want packages to be
changed wrt their hooks they install, do you want them to be symlinked, moved or
copied?
Why don't you just make isc-dhcp-client (and dhcp3-client) read hooks from both
/etc/dhcp *and* /etc/dhcp3.
This way
At Mon, 31 May 2010 15:42:51 +0200,
Agustin Martin wrote:
On Fri, Feb 01, 2008 at 12:50:25PM -0500, Adam C. Emerson wrote:
Package: wdm
Version: 1.28-2.3
Severity: normal
Due to the nonexistence of utmp on my newly installed system, the
-u /var/log/utmp option to sessreg causes
Package: advi
Severity: grave
Tags: security
Justification: user security hole
Please note remote execute-any-code security bugs in ghostscript:
http://bugs.debian.org/583183
This package depends on ghostscript, and may be affected. Please
evaluate the security of this package, and fix if
Package: advi-examples
Severity: grave
Tags: security
Justification: user security hole
Please note remote execute-any-code security bugs in ghostscript:
http://bugs.debian.org/583183
This package depends on ghostscript, and may be affected. Please
evaluate the security of this package, and
Hi,
On 01/06/10 01:46, Axel Beckert wrote:
Package: liferea
Version: 1.4.18-1.1
Severity: normal
For about two weeks now my liferea on Debian Lenny crashes everytime I
start it after latest one day (i.e. when I come back from work, it's
always gone).
I'm pretty sure this is fixed in
Package: asymptote
Severity: grave
Tags: security
Justification: user security hole
Please note remote execute-any-code security bugs in ghostscript:
http://bugs.debian.org/583183
This package depends on ghostscript, and may be affected. Please
evaluate the security of this package, and fix
Package: bmv
Severity: grave
Tags: security
Justification: user security hole
Please note remote execute-any-code security bugs in ghostscript:
http://bugs.debian.org/583183
This package depends on ghostscript, and may be affected. Please
evaluate the security of this package, and fix if
Package: c2050
Severity: grave
Tags: security
Justification: user security hole
Please note remote execute-any-code security bugs in ghostscript:
http://bugs.debian.org/583183
This package depends on ghostscript, and may be affected. Please
evaluate the security of this package, and fix if
Package: twidge
Version: 0.99.4+nmu1
Severity: important
Tags: upstream
When comparing what i see using twidge to what i see using the twitter.com
website,
I noticed a bunch of missing tweets in the twidge version.
It turns out twidge doesn't handle the new style of retweet introduced several
Package: capisuite
Severity: grave
Tags: security
Justification: user security hole
Please note remote execute-any-code security bugs in ghostscript:
http://bugs.debian.org/583183
This package depends on ghostscript, and may be affected. Please
evaluate the security of this package, and fix
Package: courier-faxmail
Severity: grave
Tags: security
Justification: user security hole
Please note remote execute-any-code security bugs in ghostscript:
http://bugs.debian.org/583183
This package depends on ghostscript, and may be affected. Please
evaluate the security of this package,
Package: cups
Severity: grave
Tags: security
Justification: user security hole
Please note remote execute-any-code security bugs in ghostscript:
http://bugs.debian.org/583183
This package depends on ghostscript, and may be affected. Please
evaluate the security of this package, and fix if
Package: cups-pdf
Severity: grave
Tags: security
Justification: user security hole
Please note remote execute-any-code security bugs in ghostscript:
http://bugs.debian.org/583183
This package depends on ghostscript, and may be affected. Please
evaluate the security of this package, and fix
Package: epix1
Severity: grave
Tags: security
Justification: user security hole
Please note remote execute-any-code security bugs in ghostscript:
http://bugs.debian.org/583183
This package depends on ghostscript, and may be affected. Please
evaluate the security of this package, and fix if
Package: fbi
Severity: grave
Tags: security
Justification: user security hole
Please note remote execute-any-code security bugs in ghostscript:
http://bugs.debian.org/583183
This package depends on ghostscript, and may be affected. Please
evaluate the security of this package, and fix if
Package: fig2ps
Severity: grave
Tags: security
Justification: user security hole
Please note remote execute-any-code security bugs in ghostscript:
http://bugs.debian.org/583183
This package depends on ghostscript, and may be affected. Please
evaluate the security of this package, and fix if
Package: epstool
Severity: grave
Tags: security
Justification: user security hole
Please note remote execute-any-code security bugs in ghostscript:
http://bugs.debian.org/583183
This package depends on ghostscript, and may be affected. Please
evaluate the security of this package, and fix if
Package: flpsed
Severity: grave
Tags: security
Justification: user security hole
Please note remote execute-any-code security bugs in ghostscript:
http://bugs.debian.org/583183
This package depends on ghostscript, and may be affected. Please
evaluate the security of this package, and fix if
Package: hevea
Severity: grave
Tags: security
Justification: user security hole
Please note remote execute-any-code security bugs in ghostscript:
http://bugs.debian.org/583183
This package depends on ghostscript, and may be affected. Please
evaluate the security of this package, and fix if
Package: hpijs
Severity: grave
Tags: security
Justification: user security hole
Please note remote execute-any-code security bugs in ghostscript:
http://bugs.debian.org/583183
This package depends on ghostscript, and may be affected. Please
evaluate the security of this package, and fix if
Package: hylafax-client
Severity: grave
Tags: security
Justification: user security hole
Please note remote execute-any-code security bugs in ghostscript:
http://bugs.debian.org/583183
This package depends on ghostscript, and may be affected. Please
evaluate the security of this package, and
Package: hylafax-server
Severity: grave
Tags: security
Justification: user security hole
Please note remote execute-any-code security bugs in ghostscript:
http://bugs.debian.org/583183
This package depends on ghostscript, and may be affected. Please
evaluate the security of this package, and
Package: hyperlatex
Severity: grave
Tags: security
Justification: user security hole
Please note remote execute-any-code security bugs in ghostscript:
http://bugs.debian.org/583183
This package depends on ghostscript, and may be affected. Please
evaluate the security of this package, and fix
Package: ifhp
Severity: grave
Tags: security
Justification: user security hole
Please note remote execute-any-code security bugs in ghostscript:
http://bugs.debian.org/583183
This package depends on ghostscript, and may be affected. Please
evaluate the security of this package, and fix if
Package: ijsgutenprint
Severity: grave
Tags: security
Justification: user security hole
Please note remote execute-any-code security bugs in ghostscript:
http://bugs.debian.org/583183
This package depends on ghostscript, and may be affected. Please
evaluate the security of this package, and
Package: kghostview
Version: 4:3.5.9-3+lenny3
Severity: grave
Tags: security
Justification: user security hole
Please note remote execute-any-code security bugs in ghostscript:
http://bugs.debian.org/583183
This package depends on ghostscript, and may be affected. Please
evaluate the
Package: libgs-dev
Severity: grave
Tags: security
Justification: user security hole
Please note remote execute-any-code security bugs in ghostscript:
http://bugs.debian.org/583183
This package depends on ghostscript, and may be affected. Please
evaluate the security of this package, and fix
Package: logidee-tools
Severity: grave
Tags: security
Justification: user security hole
Please note remote execute-any-code security bugs in ghostscript:
http://bugs.debian.org/583183
This package depends on ghostscript, and may be affected. Please
evaluate the security of this package, and
Package: lsb-printing
Severity: grave
Tags: security
Justification: user security hole
Please note remote execute-any-code security bugs in ghostscript:
http://bugs.debian.org/583183
This package depends on ghostscript, and may be affected. Please
evaluate the security of this package, and
Package: latex-make
Severity: grave
Tags: security
Justification: user security hole
Please note remote execute-any-code security bugs in ghostscript:
http://bugs.debian.org/583183
This package depends on ghostscript, and may be affected. Please
evaluate the security of this package, and fix
Package: mediawiki-math
Severity: grave
Tags: security
Justification: user security hole
Please note remote execute-any-code security bugs in ghostscript:
http://bugs.debian.org/583183
This package depends on ghostscript, and may be affected. Please
evaluate the security of this package, and
Package: page-crunch
Severity: grave
Tags: security
Justification: user security hole
Please note remote execute-any-code security bugs in ghostscript:
http://bugs.debian.org/583183
This package depends on ghostscript, and may be affected. Please
evaluate the security of this package, and
Package: passepartout
Severity: grave
Tags: security
Justification: user security hole
Please note remote execute-any-code security bugs in ghostscript:
http://bugs.debian.org/583183
This package depends on ghostscript, and may be affected. Please
evaluate the security of this package, and
Package: pkpgcounter
Severity: grave
Tags: security
Justification: user security hole
Please note remote execute-any-code security bugs in ghostscript:
http://bugs.debian.org/583183
This package depends on ghostscript, and may be affected. Please
evaluate the security of this package, and
Package: pnm2ppa
Severity: grave
Tags: security
Justification: user security hole
Please note remote execute-any-code security bugs in ghostscript:
http://bugs.debian.org/583183
This package depends on ghostscript, and may be affected. Please
evaluate the security of this package, and fix if
Package: printconf
Severity: grave
Tags: security
Justification: user security hole
Please note remote execute-any-code security bugs in ghostscript:
http://bugs.debian.org/583183
This package depends on ghostscript, and may be affected. Please
evaluate the security of this package, and fix
Package: ps2eps
Version: 1.64-5
Severity: grave
Tags: security
Justification: user security hole
Please note remote execute-any-code security bugs in ghostscript:
http://bugs.debian.org/583183
This package depends on ghostscript, and may be affected. Please
evaluate the security of this
Package: pspresent
Severity: grave
Tags: security
Justification: user security hole
Please note remote execute-any-code security bugs in ghostscript:
http://bugs.debian.org/583183
This package depends on ghostscript, and may be affected. Please
evaluate the security of this package, and fix
Package: pstoedit
Severity: grave
Tags: security
Justification: user security hole
Please note remote execute-any-code security bugs in ghostscript:
http://bugs.debian.org/583183
This package depends on ghostscript, and may be affected. Please
evaluate the security of this package, and fix
Package: pstotext
Severity: grave
Tags: security
Justification: user security hole
Please note remote execute-any-code security bugs in ghostscript:
http://bugs.debian.org/583183
This package depends on ghostscript, and may be affected. Please
evaluate the security of this package, and fix
Package: pyxplot
Severity: grave
Tags: security
Justification: user security hole
Please note remote execute-any-code security bugs in ghostscript:
http://bugs.debian.org/583183
This package depends on ghostscript, and may be affected. Please
evaluate the security of this package, and fix if
Package: scribus-ng
Severity: grave
Tags: security
Justification: user security hole
Please note remote execute-any-code security bugs in ghostscript:
http://bugs.debian.org/583183
This package depends on ghostscript, and may be affected. Please
evaluate the security of this package, and fix
Package: scribus
Severity: grave
Tags: security
Justification: user security hole
Please note remote execute-any-code security bugs in ghostscript:
http://bugs.debian.org/583183
This package depends on ghostscript, and may be affected. Please
evaluate the security of this package, and fix if
Package: texmacs
Version: 1:1.0.6.14-1
Severity: grave
Tags: security
Justification: user security hole
Please note remote execute-any-code security bugs in ghostscript:
http://bugs.debian.org/583183
This package depends on ghostscript, and may be affected. Please
evaluate the security of
Package: xournal
Severity: grave
Tags: security
Justification: user security hole
Please note remote execute-any-code security bugs in ghostscript:
http://bugs.debian.org/583183
This package depends on ghostscript, and may be affected. Please
evaluate the security of this package, and fix if
Package: webmagick
Severity: grave
Tags: security
Justification: user security hole
Please note remote execute-any-code security bugs in ghostscript:
http://bugs.debian.org/583183
This package depends on ghostscript, and may be affected. Please
evaluate the security of this package, and fix
Package: prosper
Version: 1.00.4+cvs.2007.05.01-4
Severity: grave
Tags: security
Justification: user security hole
Please note remote execute-any-code security bugs in ghostscript:
http://bugs.debian.org/583183
This package depends on ghostscript, and may be affected. Please
evaluate the
Package: zope-textindexng3
Severity: grave
Tags: security
Justification: user security hole
Please note remote execute-any-code security bugs in ghostscript:
http://bugs.debian.org/583183
This package depends on ghostscript, and may be affected. Please
evaluate the security of this package,
Package: a2ps
Version: 1:4.14-1
Severity: grave
Tags: security
Justification: user security hole
Subject: Security bugs in ghostscript
Please note remote execute-any-code security bugs in ghostscript:
http://bugs.debian.org/583183
This package suggests ghostscript, and may be affected.
Package: apsfilter
Severity: grave
Tags: security
Justification: user security hole
Subject: Security bugs in ghostscript
Please note remote execute-any-code security bugs in ghostscript:
http://bugs.debian.org/583183
This package suggests ghostscript, and may be affected. Please
evaluate
1 - 100 of 495 matches
Mail list logo