Bug#706101: Bug #706101: DFSG-violation reappeared in 0.22-1

2013-11-22 Thread Michael Banck
n-0.22/debian/changelog 2013-07-01 16:36:42.0 +0200 +++ qpid-python-0.22+dfsg/debian/changelog 2013-11-22 23:32:47.0 +0100 @@ -1,3 +1,10 @@ +qpid-python (0.22+dfsg-1) unstable; urgency=low + + * QA upload. + * Strip specs/amqp.0-10.dtd from upstream tarball. (Closes: #7

Bug#158637: [dendler@idefense.com: iDEFENSE Security Advisory: Linuxconf locally exploitable buffer overflow]

2002-09-21 Thread Michael Banck
tags 158637 + patch thanks As I stated, debian's linuxconf package should not be vulnerable, as it is not installed setuid root. Nevertheless, I've backported the patch from the latest upstream version, which makes the exploit[1] fail even if you happen to set linuxconf setuid root. cheers, Mic