-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Howdy all,
I have prepared an update to dapper's cacti 0.8.6h to fix some remote security vulnerability, based on the patch to 0.8.6i in debian sid I know a few people who have been hacked through this so I thought I'd prepare an update. I was hoping for a few people to test it, it seems to work fine here. You can download the source files here: http://lathiat.net/files/cacti-0.8.6h-1ubuntu3.1/cacti_0.8.6h-1ubuntu3.1.diff.gz http://lathiat.net/files/cacti-0.8.6h-1ubuntu3.1/cacti_0.8.6h-1ubuntu3.1.dsc http://lathiat.net/files/cacti-0.8.6h-1ubuntu3.1/cacti_0.8.6h-1ubuntu3.1_source.changes http://lathiat.net/files/cacti-0.8.6h-1ubuntu3.1/cacti_0.8.6h.orig.tar.gz 79dcd0f5499e794df06965b04321cf0a cacti_0.8.6h-1ubuntu3.1.diff.gz 5526187b0027aa7f7cecb6d81e47f2a6 cacti_0.8.6h-1ubuntu3.1.dsc d87581c1a5a58db188202907081c44fb cacti_0.8.6h-1ubuntu3.1_source.changes 5f6100b525b5b29e81f43cc7c55f4000 cacti_0.8.6h.orig.tar.gz Pre-compiled version: http://lathiat.net/files/cacti-0.8.6h-1ubuntu3.1/cacti_0.8.6h-1ubuntu3.1_all.deb 83742a2766181d8e2e7f9583cbee1821 cacti_0.8.6h-1ubuntu3.1_all.deb Changelog: cacti (0.8.6h-1ubuntu3.1) dapper-security; urgency=low . * Thanks to sean finney <[EMAIL PROTECTED]> for most of this imported from sid's 0.8.6i package. * Security references: CVE-2006-6799 * Patches: - 07_official_dec06-vulnerability-scripts-0.8.6i.dpatch - 07_official_dec06-vulnerability-poller-0.8.6i.dpatch - 07_official_poller_output_remainder-ubuntu.dpatch - 07_official_import_template_argument_space_removal.dpatch - 08_svn_timespan_breakage_fix-ubuntu.dpatch Cheers, Trent -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.6 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iD8DBQFGIOnlyCndSd/FVZcRAqokAJ4swEmULzwAf00unHWsX16ocsDqYACbBg7k dEdiZMa9kHboPQEX5HYxifU= =8xQT -----END PGP SIGNATURE----- -- Ubuntu-motu mailing list [EMAIL PROTECTED] Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-motu
