#Dynamic_debian.2F.2A_files
debian/%.install: debian/%.install.in
+ sed 's/@DEB_HOST_MULTIARCH@/$(DEB_HOST_MULTIARCH)/g' $ $@
Best regards,
Daigo
--
Daigo Moriwaki daigo at debian dot org
amd64
Best regards,
Daigo
--
Daigo Moriwaki daigo at debian dot org
This issue has been solved by e2fsprogs (#708307), which I think is the
best way because a way to build fsck.ext3 is the source of the problem.
I'd like to close this bug.
If you find any issues in the libunwind package, please let me know.
--
Daigo Moriwaki daigo at debian dot org
picked up by the ftpmaster cruft-report tool...!?
Do you have any objection to turning this into a removal request?
No. gsl-ruby is superior.
Could you send a removal request?
Thanks in advance.
Regards,
Daigo
--
Daigo Moriwaki beatles at sgtpepper dot net
--
To UNSUBSCRIBE, email to debian
(SMP w/2 CPU cores)
Locale: LANG=ja_JP.eucJP, LC_CTYPE=ja_JP.eucJP (charmap=EUC-JP)
Shell: /bin/sh linked to /bin/bash
--
Daigo Moriwaki
daigo at debian dot org
--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas
.
I will be able to take time tomorrow.
I will check and upload the package.
Regards,
Daigo
--
Daigo Moriwaki
beatles at sgtpepper dot net
--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
fixed 454841 1.5-1
thanks
This issue was fixed by the upstream.
The patch is no longer required.
Thanks to the NMU.
Regards,
Daigo
--
Daigo Moriwaki
daigo at debian dot org
--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact
Package: ruby1.8
Version: 1.8.7.174-3
Severity: grave
Tags: security
Justification: user security hole
The upstream has released a vulnerability fix in WEBrick, a part of Ruby's
standard library. WEBrick lets attackers to inject malicious escap
e sequences to its logs, making it possible for
missing unwind-info.
HP-UX/IA-64: Mostly works but known to have some serious limitations.
Linux/PPC64: Newly added.
So, x86-64 looks reasonable for me. Moreover, the reason why I NMUed is that
google-porftools requires this library for x86-64 (amd64).
Regards,
Daigo
--
Daigo Moriwaki
Matthias,
Matthias Klose wrote:
set the priority to optional
I got you!
Thanks a lot,
Daigo
--
Daigo Moriwaki
daigo at debian dot org
--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Matthias,
Matthias Klose wrote:
I don't say it's not useful, just the high priority is bogus.
So, what do you suggest to resolve that?
Regards,
Daigo
--
Daigo Moriwaki
daigo at debian dot org
--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject
Matthias,
Matthias Klose wrote:
On 26.08.2009 16:38, Daigo Moriwaki wrote:
Could you elaborate the reason of restricting only to ia64?
it's not needed by default on architectures other than ia64. only the
unwinding in gcc on ia64 uses the library by default. it's unused on all
other archs
this ticket.
Regards,
Daigo
--
Daigo Moriwaki
daigo at debian dot org
--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
/1.8/bin/less
So, /usr/bin/less is not overwritten.
Debian's RubyGems is patched to replace the upstream's indiscriminate default
directory.
Regards,
Daigo
--
Daigo Moriwaki
daigo at debian dot org
--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject
Hi Johannes,
Thank you for the report.
I am preparing a new release 1.8.7.173.
Reminder:
CVE-2009-1904
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009-1904
Regards,
Daigo
--
Daigo Moriwaki
daigo at debian dot org
--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
,
Daigo
- --
Daigo Moriwaki
daigo at debian dot org
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (GNU/Linux)
iEYEARECAAYFAki601cACgkQNcPj+ukc0lCgkwCgmAZ280kPdHEp2/m1V4yn23C5
zswAnAlK/SZEGtv6QLoMGdXJLQnrtNPV
=VExu
-END PGP SIGNATURE-
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED
Package: ruby1.9
Version: 1.9.0.2-4
Severity: grave
Tags: security
The upstream has announced that they fixed multiple vulnerabilities[1].
* Several vulnerabilities in safe level
* DoS vulnerability in WEBrick
* Lack of taintness check in dl
* DNS spoofing vulnerability in resolv.rb
Package: ruby1.8
Version: 1.8.7.22-2
Severity: grave
Tags: security
A new version (1.8.7-p71) has been released and fixed multiple
vulnerabilities[1].
* Several vulnerabilities in safe level
* DoS vulnerability in WEBrick
* Lack of taintness check in dl
* DNS spoofing vulnerability in resolv.rb
Package: ruby1.8
Version: 1.8.6.114-2
Severity: grave
Tags: security
Justification: user security hole
The upstream has announced multiple vulnerabilities in Ruby. They may lead
to a denial of service (DoS) condition or allow execution of arbitrary code.
* CVE-2008-2662
* CVE-2008-2663
*
Package: ruby1.9
Version: 1.9.0.1-5
Severity: grave
Tags: security
Justification: user security hole
The upstream has announced multiple vulnerabilities in Ruby. They may lead
to a denial of service (DoS) condition or allow execution of arbitrary code.
* CVE-2008-2662
* CVE-2008-2663
*
tags 466232 fixed
thanks
Thank you for the patch. It will be included in the up-coming release.
Regards,
Daigo
--
Daigo Moriwaki
daigo at debian dot org
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Package: ruby1.8
Version: 1.8.6.111-4
Severity: grave
Tags: security
Justification: user security hole
WEBrick, a standard library of Ruby to implement HTTP servers, has file
access vulnerability[1]. Attackers may access private files. The fixed
versions have been released by the upstream.
Package: ruby1.9
Version: 1.9.0+20071016-1
Severity: grave
Tags: security
Justification: user security hole
WEBrick, a standard library of Ruby to implement HTTP servers, has file
access vulnerability[1]. Attackers may access private files. The fixed
versions have been released by the upstream.
+20060303-5 including the above patch,
which is available at http://www.sgtpepper.net/hyspro/deb/unstable/ .
Can I upload it to unstable?
Thanks,
Daigo
- --
Daigo Moriwaki
daigo at debian dot org
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)
iD8DBQFFqGcbNcPj
to select a different name - say, google-pprof.
Would that seem reasonable ?
Yes, it makes sense. I will change the file name.
Thanks,
Daigo
--
Daigo Moriwaki
daigo at debian dot org
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Package: tdiary
Version: 2.1.4-5
Severity: critical
Tags: security
Justification: root security hole
Vulnerability has been reported in tDiary, which can be exploited by
malicious people to run arbitary commands on web server.
Input passed to unspecified parameters is not properly sanitised
could not been compiled with kernel 2.6.18 about a
month ago and asked the upstream, but have no response yet. I was really in
trouble.
I am glad to get your patch. I will try it. Thanks a lot.
Yours,
Daigo
- --
Daigo Moriwaki
daigo at debian dot org
-BEGIN PGP SIGNATURE-
Version: GnuPG
suggest downgrading this bug.
The security holes were fixed in the previous version, tdiary-2.0.2-1, which I
think
was promoted to the testing, but not. Why is it gone?
Anyway, I make this bug non-critical.
Thanks,
Daigo
- --
Daigo Moriwaki
[EMAIL PROTECTED]
-BEGIN PGP SIGNATURE-
Version
Package: tdiary
Version: 2.0.2+20050720-1
Severity: serious
Justification: unknown
This bug is dummy in order to keep the package from promoting to
testing.
As of this version a few modules have been removed because of a license
issue on the upstream. It might be inconvenient for current
team and do not have
a reply.
Thanks,
Daigo
- --
Daigo Moriwaki
[EMAIL PROTECTED]
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.1 (GNU/Linux)
iD8DBQFC4m2ANcPj+ukc0lARAn/1AJ9MDEZ1B47o3NuWFyixbL0ifr0biQCgxlAq
yr6iJk+vXtKvNi9Ye4Y99AM=
=a8gU
-END PGP SIGNATURE-
--
To UNSUBSCRIBE, email
Package: libzlib-ruby
Version: 0.6.0+ruby1.8.2-1
Severity: grave
Justification: renders package unusable
zlib of Ruby sometimes crashes with segmentation fault.
Please see http://blade.nagaokaut.ac.jp/cgi-bin/scat.rb/ruby/ruby-core/4712.
-- System Information:
Debian Release: 3.1
APT prefers
Package: gnupg
Version: 1.4.0-2
Followup-For: #294196
Tags: patch
Attached a patch to rules.
You feel this patch trivial. I am in the process of New Maintainer and
creating a patch is my task.
Thanks,
Daigo
--
Daigo Moriwaki
[EMAIL PROTECTED]
--- rules.orig 2005-02-14 19:34:17.0 +0900
32 matches
Mail list logo