On 22 March 2011 21:23, Julien Cristau jcris...@debian.org wrote:
On Tue, Mar 22, 2011 at 12:57:17 +1100, david b wrote:
Package: mutt
Version: 1.5.20-9+squeeze1
Severity: grave
Tags: security
Justification: user security hole
The gnutls implementation of ssl found in mutt, in
That specific grep has no results --
(for the 2nd). However, for the 3rd the results are listed below:
/var/log/dpkg.log.1:2010-12-03 23:55:11 status triggers-pending
python-central 0.6.16+nmu1
/var/log/dpkg.log.1:2010-12-03 23:55:11 trigproc python-central
0.6.16+nmu1 0.6.16+nmu1
well it was 1. reportlab and 2. bzr (gtk).
I am not sure on the exact packages - isn't there an easier way to
simply check for every python package (available).
ii python-central 0.6.16+nmu1
register and build utility for Python
packages
Ok sure - the bug isn't so critical really and really what happens is
that when upgrading there are those damn broken symlinks which should
be cleaned up / ignored.
It would appear that in my case several of the python packages I had
installed but not --purged (in removal) resulted in their
On 28 December 2010 04:32, David Bremner brem...@debian.org wrote:
In your first message, you say 2.6.6-6.
In your second message, there is output showing 2.6.6-3+squeeze4
Was the bug actually reported on the machine where the problem occurs?
Clearly it is 2.6.6-3+squeeze4 - sorry for any
Use 'apt-get autoremove' to remove them.
0 upgraded, 0 newly installed, 0 to remove and 22 not upgraded.
8 not fully installed or removed.
After this operation, 0 B of additional disk space will be used.
Setting up python (2.6.6-3+squeeze4) ...
Linking and byte-compiling packages for runtime
Never-mind, there has already been a potential patch emailed in that
thread (that Soren linked to).
--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
On 8 December 2010 18:39, Alexander Reichle-Schmehl toli...@debian.org wrote:
Hi dave!
* dave b db.pub.m...@gmail.com [101202 05:58]:
Here have a patch!
This obviously will break connecting to hosts which use a self-signed
certificate.
Perhaps some one else can fix this when they want
Um, well I could see if they would accept a patch I could make up soon...
The problem is / was they closed the bug saying it was a python issue,
where they didnt' even attempt to ensure that a https connection would
be secured, through wrapping it in ssl, iirc.
--
To UNSUBSCRIBE, email to
-- Forwarded message --
From: dave b db.pub.m...@gmail.com
Date: 1 December 2010 13:59
Subject: Re: Due offlineimap absence of certificate validation issue
-- Debian BTS#603450
To: John Goerzen jgoer...@complete.org
Cc: Jan Lieskovsky jlies...@redhat.com, Christoph Höger
choe
FWIW, this is a limitation documented on the homepage since 2007:
https://github.com/jgoerzen/offlineimap/wiki
Erh No ... I added that. I didn't see on the homepage erh...?
Also my bug report here links to the 2007 thread post already...
--
To UNSUBSCRIBE, email to
I wish debian let me edit bugs like ubuntu does!
(offlineimap: fails check the remote
servers ssl certificate is valid)
should be
(offlineimap: fails *to* check the remote
server's ssl certificate is valid)
s/servers/server's/
--
To UNSUBSCRIBE, email to
12 matches
Mail list logo