On 03/02/2011 12:17, Andrea Azzini wrote:
Being a newbie, I think I posted my original report to the wrong place,
so here's a link to it:
http://lists.debian.org/debian-release/2011/01/msg00746.html
Summary: the current sudo has (what I view as) a serious regression
which will break stuff, at le
Being a newbie, I think I posted my original report to the wrong place,
so here's a link to it:
http://lists.debian.org/debian-release/2011/01/msg00746.html
Summary: the current sudo has (what I view as) a serious regression
which will break stuff, at least possibly any instance of
sudo (X11 progr
On Wed, Jan 12, 2011 at 22:38:56 +0100, Moritz Muehlenhoff wrote:
> Package: release.debian.org
> Severity: normal
> User: release.debian@packages.debian.org
> Usertags: unblock
>
> Please unblock package sudo. It fixes CVE-2011-0010.
>
> unblock sudo/1.7.4p4-6
>
> There are some non-securi
On Wed, 12 Jan 2011 22:38:56 +0100, Moritz Muehlenhoff wrote:
> Package: release.debian.org
> Severity: normal
> User: release.debian@packages.debian.org
> Usertags: unblock
>
> Please unblock package sudo. It fixes CVE-2011-0010.
>
> unblock sudo/1.7.4p4-6
>
> There are some non-security f
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
Please unblock package sudo. It fixes CVE-2011-0010.
unblock sudo/1.7.4p4-6
There are some non-security fixes since the -2 version in testing,
though.
Cheers,
Moritz
-- System In
5 matches
Mail list logo