Public bug reported:
Dear Colleagues,
I would like to request the removal of the ircii-pana (aka bitchx)
package.
Reasons:
1. Upstream seams to be dead
2. Right now 3 CVEs
3. More exploits will be determined in the future (imho).
I filed a removal request against debian...link is attached to
** Attachment removed: "fixed debdiff from latest debian version to new
ubuntu version"
http://launchpadlibrarian.net/10327763/ldtp_0.9.2-2ubuntu1.debdiff
** Attachment added: "debdiff for this merge"
http://launchpadlibrarian.net/10377528/ldtp_0.9.2-2ubuntu1.debdiff
--
[MoM Merge] ldtp
** Attachment removed: "now really fixed debdiff"
http://launchpadlibrarian.net/10375265/xclass_0.9.2-3ubuntu1.debdiff
** Attachment added: "debdiff for this merge (ubuntu maintainer field now in)"
http://launchpadlibrarian.net/10377491/xclass_0.9.2-3ubuntu1.debdiff
--
[MoM Merge] xclass
** Attachment removed: "debdiff for the drupal merge against latest
debian version"
http://launchpadlibrarian.net/10352662/drupal5_5.3-1ubuntu1.debdiff
** Attachment added: "fixed debdiff for drupal5 merge"
http://launchpadlibrarian.net/10375214/drupal5_5.3-1ubuntu1.debdiff
--
[MoM Merge
** Attachment removed: "fixed debdiff against last debian version"
http://launchpadlibrarian.net/10327643/xclass_0.9.2-3ubuntu1.debdiff
** Attachment added: "now really fixed debdiff"
http://launchpadlibrarian.net/10375265/xclass_0.9.2-3ubuntu1.debdiff
--
[MoM Merge] xclass 0.9.2-3ubuntu
** Changed in: drupal5 (Ubuntu)
Assignee: (unassigned) => Stephan Hermann (shermann)
Status: New => In Progress
--
[Security] Several Security Issues for drupal 5.x before 5.3
https://bugs.launchpad.net/bugs/162385
You received this bug notification because you are a member of
not a sync, right?
** Changed in: mindi (Ubuntu)
Assignee: Stephan Hermann (shermann) => Cesare Tirabassi (norsetto)
--
[MoM Merge] mindi 2.24-2ubuntu1
https://bugs.launchpad.net/bugs/161194
You received this bug notification because you are a member of Ubuntu
Bugs, which is the bug c
** Visibility changed to: Public
--
[CVE-2007-5908] Buffer overflow in the (1) sysfs_show_available_clocksources
and (2) sysfs_show_current_clocksources
https://bugs.launchpad.net/bugs/162637
You received this bug notification because you are a member of Ubuntu
Bugs, which is the bug contact for
** Visibility changed to: Public
--
[Security] Several Security Issues for drupal 5.x before 5.3
https://bugs.launchpad.net/bugs/162385
You received this bug notification because you are a member of Ubuntu
Bugs, which is the bug contact for Ubuntu.
--
ubuntu-bugs mailing list
ubuntu-bugs@lists.
** Visibility changed to: Public
--
[CVE-2007-5904] Multiple buffer overflows in CIFS VFS in Linux kernel 2.6.23
and earlier
https://bugs.launchpad.net/bugs/162642
You received this bug notification because you are a member of Ubuntu
Bugs, which is the bug contact for Ubuntu.
--
ubuntu-bugs ma
** Changed in: alogg (Ubuntu)
Assignee: Stephan Hermann (shermann) => (unassigned)
--
[MoM Merge] please merge alogg from debian unstable
https://bugs.launchpad.net/bugs/162366
You received this bug notification because you are a member of Ubuntu
Bugs, which is the bug contact for Ubuntu
*** This bug is a duplicate of bug 137762 ***
https://bugs.launchpad.net/bugs/137762
Bug is a dupe
** Changed in: drupal (Ubuntu)
Status: New => Invalid
** This bug has been marked a duplicate of bug 137762
SECURITY UPDATE: drupal 5.1
--
DRUPAL-SA-2007-017
https://bugs.launchpad
*** This bug is a duplicate of bug 137762 ***
https://bugs.launchpad.net/bugs/137762
** This bug has been marked a duplicate of bug 137762
SECURITY UPDATE: drupal 5.1
--
DRUPAL-SA-2007-018
https://bugs.launchpad.net/bugs/129048
You received this bug notification because you are a member o
ready for review
--
CVE-2007-5740: format string vulnerability
https://bugs.launchpad.net/bugs/162543
You received this bug notification because you are a member of Ubuntu
Bugs, which is the bug contact for Ubuntu.
--
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.co
** Attachment added: "dapper debdiff to fix the security issue"
http://launchpadlibrarian.net/10365624/perdition_1.17-5ubuntu0.1.debdiff
--
CVE-2007-5740: format string vulnerability
https://bugs.launchpad.net/bugs/162543
You received this bug notification because you are a member of Ubuntu
B
** Attachment added: "edgy debdiff to fix this issue"
http://launchpadlibrarian.net/10365622/edgy_perdition_1.17-7ubuntu0.6.10.1.debdiff
--
CVE-2007-5740: format string vulnerability
https://bugs.launchpad.net/bugs/162543
You received this bug notification because you are a member of Ubuntu
** Changed in: cpio (Ubuntu)
Status: New => In Progress
--
[CVE-2007-4476] cpio is affected by this CVE as tar.
https://bugs.launchpad.net/bugs/161173
You received this bug notification because you are a member of Ubuntu
Bugs, which is the bug contact for Ubuntu.
--
ubuntu-bugs mailing l
** Attachment added: "feisty debdiff to fix this issue"
http://launchpadlibrarian.net/10365570/feisty_perdition_1.17-7ubuntu0.7.04.1.debdiff
--
CVE-2007-5740: format string vulnerability
https://bugs.launchpad.net/bugs/162543
You received this bug notification because you are a member of Ubu
** Changed in: perdition (Ubuntu Edgy)
Status: Confirmed => In Progress
** Changed in: perdition (Ubuntu Feisty)
Status: Confirmed => In Progress
** Changed in: perdition (Ubuntu Gutsy)
Status: Confirmed => In Progress
** Attachment added: "gutsy debdiff to fix this issue"
** Changed in: perdition (Ubuntu Edgy)
Assignee: (unassigned) => Stephan Hermann (shermann)
** Changed in: perdition (Ubuntu Dapper)
Assignee: (unassigned) => Stephan Hermann (shermann)
Status: Confirmed => In Progress
--
CVE-2007-5740: format string vulnerabil
** Changed in: perdition (Ubuntu Gutsy)
Assignee: (unassigned) => Stephan Hermann (shermann)
** Changed in: perdition (Ubuntu Feisty)
Assignee: (unassigned) => Stephan Hermann (shermann)
--
CVE-2007-5740: format string vulnerability
https://bugs.launchpad.net/bugs/162543
You re
working on it...
--
CVE-2007-5740: format string vulnerability
https://bugs.launchpad.net/bugs/162543
You received this bug notification because you are a member of Ubuntu
Bugs, which is the bug contact for Ubuntu.
--
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.co
** Attachment added: "gutsy debdiff to fix this issue"
http://launchpadlibrarian.net/10365209/gutsy_hugin_0.7%7Ebeta4-0ubuntu3.1.debdiff
--
[CVE-2007-5200] hugin allows local users to overwrite arbitrary files via a
symlink attack on a temporary file.
https://bugs.launchpad.net/bugs/162602
** Attachment added: "dapper debdiff to fix this issue"
http://launchpadlibrarian.net/10357826/tomboy_0.3.5-1ubuntu3.1.debdiff
** Visibility changed to: Public
--
[CVE-2005-4790] tomboy has an untrusted search path
https://bugs.launchpad.net/bugs/162520
You received this bug notification bec
** Attachment added: "edgy debdiff to fix this issue"
http://launchpadlibrarian.net/10357824/tomboy_0.4.1-0ubuntu3.1.debdiff
--
[CVE-2005-4790] tomboy has an untrusted search path
https://bugs.launchpad.net/bugs/162520
You received this bug notification because you are a member of Ubuntu
Bugs
** Attachment added: "dapper debdiff to fix this issue"
http://launchpadlibrarian.net/10357207/link-grammar_4.1.3-1ubuntu0.1.debdiff
** Visibility changed to: Public
--
[CVE-2007-5395] link-grammar is vulnerable
https://bugs.launchpad.net/bugs/162511
You received this bug notification becaus
** Attachment added: "edgy debdiff to fix this issue"
http://launchpadlibrarian.net/10357204/link-grammar_4.2.2-4ubuntu0.6.10.1.debdiff
--
[CVE-2007-5395] link-grammar is vulnerable
https://bugs.launchpad.net/bugs/162511
You received this bug notification because you are a member of Ubuntu
B
** Attachment added: "feisty debdiff to fix the two CVEs"
http://launchpadlibrarian.net/10356487/ruby1.8_1.8.5-4ubuntu2.1.debdiff
--
Net::HTTPS Vulnerability
https://bugs.launchpad.net/bugs/149616
You received this bug notification because you are a member of Ubuntu
Bugs, which is the bug con
Just for your information:
The patches against 1.8.5 for CVE-2007-5162 you can find here:
http://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=rev&revision=13502
The patches against 1.8.6 for CVE-2007-5162 you can find here:
http://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=rev&revision=13504
For CV
** Attachment added: "gutsy debdiff to fix CVE-2007-5162 and CVE-2007-5770"
http://launchpadlibrarian.net/10355439/ruby1.8_1.8.6.36-1ubuntu3.1.debdiff
--
Net::HTTPS Vulnerability
https://bugs.launchpad.net/bugs/149616
You received this bug notification because you are a member of Ubuntu
Bugs,
** Attachment added: "fixed debdiff for feisty"
http://launchpadlibrarian.net/10353316/feisty_perl_5.8.8-7ubuntu0.1.debdiff
--
[perl] [cve-2007-5116] heap overflow
https://bugs.launchpad.net/bugs/160693
You received this bug notification because you are a member of Ubuntu
Bugs, which is the b
Dear Colleagues,
I'm creating some patches against ruby1.8 and ruby1.9 for gutsy and all
other affected versions in our releases.
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2007-5162
--
Net::HTTPS Vulnerability
https://bugs.launchpad.net/bugs/149616
You received this bug
** Attachment removed: "feisty debdiff to fix this security issue"
http://launchpadlibrarian.net/10344467/feisty_perl_5.8.8-7ubuntu0.1.debdiff
--
[perl] [cve-2007-5116] heap overflow
https://bugs.launchpad.net/bugs/160693
You received this bug notification because you are a member of Ubuntu
Bugs
** Attachment added: "debdiff for the drupal merge against latest debian
version"
http://launchpadlibrarian.net/10352662/drupal5_5.3-1ubuntu1.debdiff
--
[MoM Merge] drupal5 5.3-1ubuntu1
https://bugs.launchpad.net/bugs/162458
You received this bug notification because you are a member of Ubun
Public bug reported:
Binary package hint: drupal5
Dear Colleagues,
please merge drupal5 5.3-1ubuntu1
Find attached the debdiff against latest debian version, with ubuntu
changes remaining.
Regards,
\sh
** Affects: drupal5 (Ubuntu)
Importance: Undecided
Status: New
--
[MoM Mer
** Changed in: xclass (Ubuntu)
Assignee: Stephan Hermann (shermann) => (unassigned)
--
[MoM Merge] xclass 0.9.2-3ubuntu1
https://bugs.launchpad.net/bugs/161193
You received this bug notification because you are a member of Ubuntu
Bugs, which is the bug contact for Ubuntu.
--
ubuntu-b
** Changed in: ldtp (Ubuntu)
Assignee: Stephan Hermann (shermann) => (unassigned)
--
[MoM Merge] ldtp 0.9.2-2ubuntu1
https://bugs.launchpad.net/bugs/161201
You received this bug notification because you are a member of Ubuntu
Bugs, which is the bug contact for Ubuntu.
--
ubuntu-b
hardy cpio was merged by mvo
** Attachment removed: "Hardy Merge .dsc"
http://launchpadlibrarian.net/10318484/cpio_2.9-4ubuntu1.dsc
** Attachment removed: "Hardy Merge .diff.gz"
http://launchpadlibrarian.net/10318485/cpio_2.9-4ubuntu1.diff.gz
** Attachment removed: "Hardy Merge .orig.ta
Public bug reported:
Dear Colleagues,
please sync
source: alogg
version: 1.3.3-5
from: debian unstable
Ubuntu Changes can be dropped, it's compiling now, without the build-dep
tweak
Regards,
\sh
** Affects: alogg (Ubuntu)
Importance: Undecided
Status: New
** Tags: sync
** T
Chris,
what about a plain 16 color palette for it?
The good thing is, a complete color style is provided in the docs directory.
So the user just adds it and good.
I agree here, that 4 or 5 colors are just to less for a professional
application.
Regards,
\sh
--
More default colors should be pr
hi Kees,
could it be that you accidently forgot to upload dapper, edgy and feisty after
I fixed feisty?
dapper and edgy are still functional...
Regards,
\sh
--
CVE-2007-5300 remote denial of service
https://bugs.launchpad.net/bugs/151946
You received this bug notification because you are a me
** Attachment added: "dapper debdiff to fix this security issue"
http://launchpadlibrarian.net/10344487/dapper_perl_5.8.7-10ubuntu1.1.debdiff
--
[perl] [cve-2007-5116] heap overflow
https://bugs.launchpad.net/bugs/160693
You received this bug notification because you are a member of Ubuntu
Bu
debdiff of feisty version.
after perl will compile again on feisty it works as expected :)
** Attachment added: "feisty debdiff to fix this security issue"
http://launchpadlibrarian.net/10344467/feisty_perl_5.8.8-7ubuntu0.1.debdiff
--
[perl] [cve-2007-5116] heap overflow
https://bugs.launchp
Thx to blueyed,
he can see the same error
../miniperl -I../lib enc2xs.PL
Extracting enc2xs (with variable substitutions)
../miniperl -I../lib xsubpp.PL
Extracting xsubpp (with variable substitutions)
make[2]: Leaving directory `/tmp/buildd/perl-5.8.8/utils'
** Attachment removed: "edgy debdiff to fix this security issue"
http://launchpadlibrarian.net/10340480/edgy_perl_5.8.8-6ubuntu0.1.debdiff
** Attachment added: "fixed debdiff (-p1 now) for gutsy"
http://launchpadlibrarian.net/10344212/gutsy_perl_5.8.8-7ubuntu3.1.debdiff
--
[perl] [cve-2007-
** Attachment added: "fixed debdiff (-p1 now) for edgy"
http://launchpadlibrarian.net/10344249/edgy_perl_5.8.8-6ubuntu0.1.debdiff
--
[perl] [cve-2007-5116] heap overflow
https://bugs.launchpad.net/bugs/160693
You received this bug notification because you are a member of Ubuntu
Bugs, which is
** Attachment removed: "gutsy debdiff to fix this issue"
http://launchpadlibrarian.net/10340088/gutsy_perl_5.8.8-7ubuntu3.1.debdiff
--
[perl] [cve-2007-5116] heap overflow
https://bugs.launchpad.net/bugs/160693
You received this bug notification because you are a member of Ubuntu
Bugs, which is
hi Chris,
right, it's
https://bugs.edge.launchpad.net/ubuntu/+source/ipe/+bug/161191
I Included now all colors from colors.xml which is delivered in
/usr/share/doc/ipe/doc/colors.xml.gz
Regards,
\sh
--
More default colors should be provided (simple patch)
https://bugs.launchpad.net/bugs/1622
hi,
fixed .desktop file,
added patch for the colors...
** Attachment added: "fixed debdiff against last debian version"
http://launchpadlibrarian.net/10344097/ipe_6.0pre28-4ubuntu1.debdiff
--
[MoM Merge] 6.0pre28-4ubuntu1
https://bugs.launchpad.net/bugs/161191
You received this bug notifica
Hi Chris, Andrea,
I'm working right now on the ipe merge (I fixed some things the last time).
I'll provide some default colours like OOFice..
Add the patch to the merge bug.
Regards,
\sh
--
More default colors should be provided (simple patch)
https://bugs.launchpad.net/bugs/162213
You recei
Well,
there is a problem with the feisty version of perl.
I can't rebuild even the archive version in a clean feisty chroot with updates
and security archives enabled.
If anyone can reproduce this bug, please update this bug, thx.
\sh
--
[perl] [cve-2007-5116] heap overflow
https://bugs.launc
** Attachment added: "dapper debdiff to fix the security issue"
http://launchpadlibrarian.net/10340733/dapper_perl_5.8.7-10ubuntu1.1.debdiff
** Attachment removed: "dapper debdiff to fix the security issue"
http://launchpadlibrarian.net/10340733/dapper_perl_5.8.7-10ubuntu1.1.debdiff
--
[per
** Attachment added: "dapper debdiff to fix the security issue"
http://launchpadlibrarian.net/10340748/dapper_perl_5.8.7-10ubuntu1.1.debdiff
** Attachment removed: "dapper debdiff to fix the security issue"
http://launchpadlibrarian.net/10340748/dapper_perl_5.8.7-10ubuntu1.1.debdiff
--
[per
** Attachment added: "edgy debdiff to fix this security issue"
http://launchpadlibrarian.net/10340480/edgy_perl_5.8.8-6ubuntu0.1.debdiff
--
[perl] [cve-2007-5116] heap overflow
https://bugs.launchpad.net/bugs/160693
You received this bug notification because you are a member of Ubuntu
Bugs, w
** Attachment added: "edgy debdiff to fix this issue"
http://launchpadlibrarian.net/10340466/edgy_perl_5.8.8-6ubuntu0.1.debdiff
** Attachment removed: "edgy debdiff to fix this issue"
http://launchpadlibrarian.net/10340466/edgy_perl_5.8.8-6ubuntu0.1.debdiff
--
[perl] [cve-2007-5116] heap ov
** Attachment added: "gutsy debdiff to fix this issue"
http://launchpadlibrarian.net/10340088/gutsy_perl_5.8.8-7ubuntu3.1.debdiff
--
[perl] [cve-2007-5116] heap overflow
https://bugs.launchpad.net/bugs/160693
You received this bug notification because you are a member of Ubuntu
Bugs, which is
* SECURITY UPDATE:
- CVE-2007-4352: Array index error in the
DCTStream::readProgressiveDataUnit i
method in xpdf/Stream.cc in Xpdf 3.02 with xpdf-3.02pl1.patch allows
remote attackers to trigger memory corruption and execute arbitrary code
via a crafted PDF file.
- CVE-2007
Preparing debdiff for gutsy and hopefully all other supported ubuntu
release
--
[perl] [cve-2007-5116] heap overflow
https://bugs.launchpad.net/bugs/160693
You received this bug notification because you are a member of Ubuntu
Bugs, which is the bug contact for Ubuntu.
--
ubuntu-bugs mailing lis
** Attachment added: "edgy debdiff to fix this security issue"
http://launchpadlibrarian.net/10339339/edgy_openssh_4.3p2-5ubuntu1.1.debdiff
** Visibility changed to: Public
--
[CVE-2007-4752] ssh in OpenSSH before 4.7 does not properly handle...
https://bugs.launchpad.net/bugs/162171
You rec
** Attachment added: "dapper debdiff to fix the security issue"
http://launchpadlibrarian.net/10339338/dapper_openssh_4.2p1-7ubuntu3.2.debdiff
--
[CVE-2007-4752] ssh in OpenSSH before 4.7 does not properly handle...
https://bugs.launchpad.net/bugs/162171
You received this bug notification be
** Attachment added: "gutsy debdiff to fix this issue"
http://launchpadlibrarian.net/10339068/gutsy_openldap2.3_2.3.35-1ubuntu0.1.debdiff
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2007-5708
** Visibility changed to: Public
--
[CVE-2007-5708] openldap 2.3
https://bugs
** Attachment added: "feisty debdiff to fix this security issue"
http://launchpadlibrarian.net/10339065/feisty_openldap2.3_2.3.30-2ubuntu0.1.debdiff
--
[CVE-2007-5708] openldap 2.3
https://bugs.launchpad.net/bugs/162162
You received this bug notification because you are a member of Ubuntu
Bu
Public bug reported:
Binary package hint: authbind
Dear Colleagues,
please sync:
source: authbind
version: 1.2.0
from: debian unstable
Ubuntu changes can be dropped, everything is fixed upstream.
Regards,
\sh
** Affects: authbind (Ubuntu)
Importance: Undecided
Status: New
--
** Attachment added: "fixed debdiff from latest debian version to new ubuntu
version"
http://launchpadlibrarian.net/10327763/ldtp_0.9.2-2ubuntu1.debdiff
--
[MoM Merge] ldtp 0.9.2-2ubuntu1
https://bugs.launchpad.net/bugs/161201
You received this bug notification because you are a member of Ub
** Attachment removed: "debdiff againsts last debian version to new
ubuntu version"
http://launchpadlibrarian.net/10327560/ipe_6.0pre28-4ubuntu1.debdiff
** Attachment added: "fixed debdiff from latest debian version to new ubuntu
version"
http://launchpadlibrarian.net/10327709/ipe_6.0pre2
** Attachment removed: "debdiff from ldtp 0.8.0-3ubuntu1 to
0.9.2-2ubuntu1"
http://launchpadlibrarian.net/10319250/ldtp_0.9.2-2ubuntu1.debdiff
--
[MoM Merge] ldtp 0.9.2-2ubuntu1
https://bugs.launchpad.net/bugs/161201
You received this bug notification because you are a member of Ubuntu
Bugs,
** Attachment removed: "fixed debdiff from latest debian version to new
ubuntu version"
http://launchpadlibrarian.net/10327604/mindi_2.24-2ubuntu1.debdiff
** Attachment added: "fixed debdiff from latest debian version to new ubuntu
version"
http://launchpadlibrarian.net/10327674/mindi_2.2
** Attachment removed: "debdiff from xclass 0.9.2-2ubuntu1 to
0.9.2-3ubuntu1"
http://launchpadlibrarian.net/10319086/xclass_0.9.2-3ubuntu1.debdiff
** Attachment added: "fixed debdiff against last debian version"
http://launchpadlibrarian.net/10327643/xclass_0.9.2-3ubuntu1.debdiff
--
[MoM
** Attachment added: "fixed debdiff from latest debian version to new ubuntu
version"
http://launchpadlibrarian.net/10327604/mindi_2.24-2ubuntu1.debdiff
--
[MoM Merge] mindi 2.24-2ubuntu1
https://bugs.launchpad.net/bugs/161194
You received this bug notification because you are a member of Ub
** Attachment removed: "debdiff from ipe 6.0pre28-3ubuntu1 to
6.0pre28-4ubuntu1"
http://launchpadlibrarian.net/10318891/ipe_6.0pre28-4ubuntu1.debdiff
** Attachment added: "debdiff againsts last debian version to new ubuntu
version"
http://launchpadlibrarian.net/10327560/ipe_6.0pre28-4ubun
** Attachment removed: "debdiff from mindi 2.22-1ubuntu1 to
2.24-2ubuntu1"
http://launchpadlibrarian.net/10319089/mindi_2.24-2ubuntu1.debdiff
--
[MoM Merge] mindi 2.24-2ubuntu1
https://bugs.launchpad.net/bugs/161194
You received this bug notification because you are a member of Ubuntu
Bugs, w
** Attachment removed: "debdiff from ldtp 0.8.0-3ubuntu1 to
0.9.2-2ubuntu1"
http://launchpadlibrarian.net/10319175/ldtp_0.9.2-2ubuntu1.debdiff
** Attachment added: "debdiff from ldtp 0.8.0-3ubuntu1 to 0.9.2-2ubuntu1"
http://launchpadlibrarian.net/10319250/ldtp_0.9.2-2ubuntu1.debdiff
** Ta
** Attachment added: "debdiff from ldtp 0.8.0-3ubuntu1 to 0.9.2-2ubuntu1"
http://launchpadlibrarian.net/10319175/ldtp_0.9.2-2ubuntu1.debdiff
--
[MoM Merge] ldtp 0.9.2-2ubuntu1
https://bugs.launchpad.net/bugs/161201
You received this bug notification because you are a member of Ubuntu
Bugs, wh
match Ubuntu Maintainer Policy
+ debian/python-ldtp.install: (LP: #137280)
- Changed pathname to python2.5 to fix FTBFS
-- Stephan Hermann <[EMAIL PROTECTED]> Fri, 09 Nov 2007 15:24:42 +0100
ldtp (0.9.2-2) unstable; urgency=low
* debian/python-ldtp.install: added missing l
match Debian-Maintainer-Field Spec
- debian/control: changed Recommends to recomment linux-image and not the
other kernel flavours
-- Stephan Hermann <[EMAIL PROTECTED]> Fri, 09 Nov 2007 15:14:51 +0100
mindi (2.24-2) unstable; urgency=low
* Removed unused rootfs/var/log/mondo-
** Attachment added: "debdiff from mindi 2.22-1ubuntu1 to 2.24-2ubuntu1"
http://launchpadlibrarian.net/10319089/mindi_2.24-2ubuntu1.debdiff
--
[MoM Merge] mindi 2.24-2ubuntu1
https://bugs.launchpad.net/bugs/161194
You received this bug notification because you are a member of Ubuntu
Bugs, whi
** Attachment added: "debdiff from xclass 0.9.2-2ubuntu1 to 0.9.2-3ubuntu1"
http://launchpadlibrarian.net/10319086/xclass_0.9.2-3ubuntu1.debdiff
** Tags added: shermann-merges
--
[MoM Merge] xclass 0.9.2-3ubuntu1
https://bugs.launchpad.net/bugs/161193
You received this bug notification becau
ntrol:
- updated Conflicts/Replaces to match our old c2a packages
-- Stephan Hermann <[EMAIL PROTECTED]> Fri, 09 Nov 2007 14:57:41 +0100
xclass (0.9.2-3) unstable; urgency=low
* QA upload, orphaning this package.
-- Bart Martens <[EMAIL PROTECTED]> Mon, 15 Oct 2007 07:33
** Attachment added: "debdiff to fix cve-2007-4476 for gutsy cpio"
http://launchpadlibrarian.net/10318934/cpio_2.8-1ubuntu2.1.debdiff
--
[CVE-2007-4476] cpio is affected by this CVE as tar.
https://bugs.launchpad.net/bugs/161173
You received this bug notification because you are a member of U
Please find attached a debdiff from last ubuntu version to the new
upstream.
** Attachment added: "debdiff from ipe 6.0pre28-3ubuntu1 to 6.0pre28-4ubuntu1"
http://launchpadlibrarian.net/10318891/ipe_6.0pre28-4ubuntu1.debdiff
--
[MoM Merge] 6.0pre28-4ubuntu1
https://bugs.launchpad.net/bugs/16
pe1c2a
- Added Build-Dep for sharutils
+ debian/rules:
- Added lines to install desktop and png file.
-- Stephan Hermann <[EMAIL PROTECTED]> Fri, 09 Nov 2007 11:08:00 +0100
ipe (6.0pre28-4) unstable; urgency=low
* debian/control: Update depends and conflicts to new freet
** Attachment added: "debdiff to fix cve-2007-4476 for feisty cpio"
http://launchpadlibrarian.net/10318804/cpio_2.6-17ubuntu0.6.10.1.debdiff
--
[CVE-2007-4476] cpio is affected by this CVE as tar.
https://bugs.launchpad.net/bugs/161173
You received this bug notification because you are a memb
** Attachment removed: "debdiff to fix cve-2007-4476 for dapper cpio"
http://launchpadlibrarian.net/10318760/cpio_2.6-10ubuntu0.3.debdiff
** Attachment added: "debdiff to fix cve-2007-4476 for dapper cpio"
http://launchpadlibrarian.net/10318786/cpio_2.6-10ubuntu0.3.debdiff
--
[CVE-2007-4
** Attachment added: "debdiff to fix cve-2007-4476 for edgy cpio"
http://launchpadlibrarian.net/10318793/cpio_2.6-17ubuntu0.6.10.1.debdiff
--
[CVE-2007-4476] cpio is affected by this CVE as tar.
https://bugs.launchpad.net/bugs/161173
You received this bug notification because you are a member
Sorry Daniel, it wasn't you, p.u.c. bugged me, fabbione was the last one
;)
--
[CVE-2007-4476] cpio is affected by this CVE as tar.
https://bugs.launchpad.net/bugs/161173
You received this bug notification because you are a member of Ubuntu
Bugs, which is the bug contact for Ubuntu.
--
ubuntu-b
** Attachment added: "debdiff to fix cve-2007-4476 for dapper cpio"
http://launchpadlibrarian.net/10318760/cpio_2.6-10ubuntu0.3.debdiff
--
[CVE-2007-4476] cpio is affected by this CVE as tar.
https://bugs.launchpad.net/bugs/161173
You received this bug notification because you are a member of
** Attachment added: "Hardy Merge .orig.tar.gz for cpio 2.9"
http://launchpadlibrarian.net/10318486/cpio_2.9.orig.tar.gz
--
[CVE-2007-4476] cpio is affected by this CVE as tar.
https://bugs.launchpad.net/bugs/161173
You received this bug notification because you are a member of Ubuntu
Bugs, w
** Attachment added: "Hardy Merge .dsc"
http://launchpadlibrarian.net/10318484/cpio_2.9-4ubuntu1.dsc
--
[CVE-2007-4476] cpio is affected by this CVE as tar.
https://bugs.launchpad.net/bugs/161173
You received this bug notification because you are a member of Ubuntu
Bugs, which is the bug cont
** Attachment added: "Hardy Merge .diff.gz"
http://launchpadlibrarian.net/10318485/cpio_2.9-4ubuntu1.diff.gz
--
[CVE-2007-4476] cpio is affected by this CVE as tar.
https://bugs.launchpad.net/bugs/161173
You received this bug notification because you are a member of Ubuntu
Bugs, which is the
@Daniel:
You were the last uploader, so it's normally your duty to do the next
merge ;)
Please don't work on it, I'm doing the merge and fixing this issue.
Thx,
\sh
--
[CVE-2007-4476] cpio is affected by this CVE as tar.
https://bugs.launchpad.net/bugs/161173
You received this bug notificatio
Public bug reported:
Binary package hint: cpio
Dear Colleagues,
cpio has the same security issue like tar, as explained in
CVE-2007-4476.
Buffer overflow in the safer_name_suffix function in GNU tar has
unspecified attack vectors and impact, resulting in a "crashing stack."
I'll provide some s
Reason was wrong, why is LP so slow..
Reason is: Ubuntu changes can be dropped, because they are applied
upstream now.
Regards,
\sh
--
[MoM Sync] please sync mydms from debian unstable
https://bugs.launchpad.net/bugs/161147
You received this bug notification because you are a member of Ubuntu
Public bug reported:
Binary package hint: unicode
Dear Colleagues,
please sync
source: unicode
version: 0.9
from: debian unstable
There are no ubuntu changes, wrong merge last time.
Regards,
\sh
** Affects: unicode (Ubuntu)
Importance: Undecided
Status: New
** Tags: sync
**
Thx to launchpad which is slow, this is a dupe...
Closing.
** Changed in: mrename (Ubuntu)
Status: New => Invalid
--
[MoM Sync] please sync mrename from debian unstable
https://bugs.launchpad.net/bugs/161141
You received this bug notification because you are a member of Ubuntu
Bugs, whi
Public bug reported:
Binary package hint: mydms
Dear Colleagues,
please sync
source: mydms
version: 1.7.0-1
from: debian unstable
No Ubuntu Changes, was a wrong merge last time.
Regards,
\sh
** Affects: mydms (Ubuntu)
Importance: Undecided
Status: New
** Tags: sync
** Tags
Public bug reported:
Binary package hint: unicode
Dear Colleagues,
please sync
source: mydms
version: 1.7.0-1
from: debian unstable
No Ubuntu Changes, was a wrong merge last time.
Regards,
\sh
** Affects: unicode (Ubuntu)
Importance: Undecided
Status: Invalid
** Tags: sync
** Tags added: sync
--
[MoM Sync] please sync mrename from debian unstable
https://bugs.launchpad.net/bugs/161143
You received this bug notification because you are a member of Ubuntu
Bugs, which is the bug contact for Ubuntu.
--
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lis
Public bug reported:
Binary package hint: mrename
Dear Colleagues,
please sync
source: mrename
version: 1.2-12
from: debian unstable
Ubuntu changes can be dropped, they are applied upstream.
Regards,
\sh
** Affects: mrename (Ubuntu)
Importance: Undecided
Status: New
--
[MoM
Public bug reported:
Binary package hint: mrename
Dear Colleagues,
please sync
source: mrename
version: 1.2-12
from: debian unstable
Ubuntu changes can be dropped, they are applied upstream.
Regards,
\sh
** Affects: mrename (Ubuntu)
Importance: Undecided
Status: New
--
[MoM
Public bug reported:
Binary package hint: kazehakase
Dear Colleagues,
please sync
source: kazehakase
version: 0.4.3-1.1
from: debian unstable
Ubuntu changes can be dropped, they are applied upstream.
Regards,
\sh
** Affects: kazehakase (Ubuntu)
Importance: Undecided
Status: Ne
801 - 900 of 1564 matches
Mail list logo