Hi Salvatore, hi Holger, On Thu, 02 Mar 2017 08:12:24 +0100 Salvatore Bonaccorso <car...@debian.org> wrote: > Source: munin > Version: 2.0.25-1+deb8u1 > Severity: serious > Tags: upstream > > Only after releasing the DSA, I noticed that the update introduced > another regression, causing to spam the munin logs for > munin-cgi-graph.log with: > > [...] > 2017/03/02 06:53:56 [PERL WARNING] Use of uninitialized value $size_x in > string eq at /usr/lib/munin/cgi/munin-cgi-graph line 453. > [...] > > We possibly should release another regression update for > jessie-security, and have the fix included as well for stretch.
Upstream just released munin 2.0.33 which fixes this regression. The relevant patch is https://github.com/munin-monitoring/munin/commit/6373554b1cc8bee886947cee598e86d1d9ea1e4a Cheers, jonas
signature.asc
Description: OpenPGP digital signature