Publieke parkings, het nieuwe goud.
Click here to see a web copy of this email http://creadomus.acemlnc.com/lt.php?s=a61aa80772cfc559a4991bd6af37e5a1&i=73A179A46A362 Beste, U weet al langer dan vandaag dat de spaarrente quasi nul is. Wie weet zelfs binnenkort negatief. Veel mensen overwegen dan wel een investering in vastgoed, maar zien op tegen de zorgen omtrent verhuur, leegstand, huurschade of wanbetaling. Hierdoor komt het er niet van, en blijft het spaargeld staan, en waarde verliezen. Een vastgoedinvestering in publieke parkeerplaatsen is een ongekend, maar bijzonder interessant alternatief. Parkings kennen heel wat minder onderhoud, de huurprijzen ervan stijgen sneller dan de inflatie en brengen flink wat op. De uitbating gebeurt in samenwerking met wereldspeler INDIGO , het vroegere VINCI Park. Als eigenaar-investeerder hoeft u zelf niets te doen, en ontvangt u elk trimester uw huurinkomsten. Makkelijk toch? Meer weten? Ik help je graag verder. Katrien VRAAG HIER VRIJBLIJVEND MEER INFORMATIE PS: wie deze maand investeert, ontvangt een cadeaubon om eens met z'n twee te gaan dineren in één van de restaurants naar keuze van Sergio Herman ! http://creadomus.acemlnc.com/lt.php?s=a61aa80772cfc559a4991bd6af37e5a1&i=73A179A46A363 http://creadomus.acemlnc.com/lt.php?s=a61aa80772cfc559a4991bd6af37e5a1&i=73A179A46A364 http://creadomus.acemlnc.com/lt.php?s=a61aa80772cfc559a4991bd6af37e5a1&i=73A179A46A365 http://creadomus.acemlnc.com/lt.php?s=a61aa80772cfc559a4991bd6af37e5a1&i=73A179A46A366 Dit is geen aanbod in kader van de prospectusplicht. Investeren vanaf 100.000 euro. SVVC Creaparking - Kortrijksesteenweg 1041 - 9051 Gent Creadomus , Kortrijksesteenweg 1041, 9051 Gent, Belgium | unsubscribe
Bug#939885: dpkg: unrecoverable fatal error: unknown system group 'smmsp' in statoverride file
Package: sendmail-bin Version: 8.15.2-14~deb10u1 Severity: normal Dear Maintainer, Given the following commands are run on a fresh buster install: apt install sendmail apt install postfix apt autoremove --purge When I try to install any package, e.g. apt install mutt Then I get an error: dpkg: unrecoverable fatal error, aborting: unknown system group 'smmsp' in statoverride file; the system group got removed before the override, which is most probably a packaging bug, to recover you can remove the override manually with dpkg-statoverride E: Sub-process /usr/bin/dpkg returned an error code (2) This error effectively blocks the installation of any further package. When in this state, the package sendmail-bin is removed, but not purged. The problem goes away after running the following command: apt purge sendmail-bin -- System Information: Debian Release: 10.1 APT prefers stable-updates APT policy: (500, 'stable-updates'), (500, 'stable') Architecture: amd64 (x86_64) Kernel: Linux 4.19.0-6-cloud-amd64 (SMP w/1 CPU core) Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), LANGUAGE=en_US.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /usr/bin/dash Init: systemd (via /run/systemd/system) LSM: AppArmor: enabled Versions of packages sendmail-bin depends on: ii debconf1.5.71 ii libc6 2.28-10 ii libdb5.3 5.3.28+dfsg1-0.5 ii libldap-2.4-2 2.4.47+dfsg-3+deb10u1 pn liblockfile1 ii libsasl2-2 2.1.27+dfsg-1 ii libssl1.1 1.1.1c-1 ii libwrap0 7.6.q-28 ii lsb-base 10.2019051400 ii procps 2:3.3.15-2 pn sendmail-base pn sendmail-cf sendmail-bin recommends no packages. Versions of packages sendmail-bin suggests: ii libsasl2-modules 2.1.27+dfsg-1 ii openssl 1.1.1c-1 pn sasl2-bin pn sendmail-doc
Processed: severity of 933407 is important, severity of 933408 is important, severity of 933411 is important ...
Processing commands for cont...@bugs.debian.org: > severity 933407 important Bug #933407 [codeblocks] codeblocks: Please rebuild against wxWidgets GTK 3 package Severity set to 'important' from 'normal' > severity 933408 important Bug #933408 [usbprog] usbprog: Please rebuild against wxWidgets GTK 3 package Severity set to 'important' from 'normal' > severity 933411 important Bug #933411 [fwknop-gui] fwknop-gui: Please rebuild against wxWidgets GTK 3 package Severity set to 'important' from 'normal' > severity 933412 important Bug #933412 {Done: Christoph Berg } [limesuite] limesuite: Please rebuild against wxWidgets GTK 3 package Severity set to 'important' from 'normal' > severity 933415 important Bug #933415 [openbabel] openbabel: Please rebuild against wxWidgets GTK 3 package Severity set to 'important' from 'normal' > severity 933416 important Bug #933416 [filezilla] filezilla: Please rebuild against wxWidgets GTK 3 package Severity set to 'important' from 'normal' > severity 933417 important Bug #933417 [xchm] xchm: Please rebuild against wxWidgets GTK 3 package Severity set to 'important' from 'normal' > severity 933419 important Bug #933419 [darkradiant] darkradiant: Please rebuild against wxWidgets GTK 3 package Severity set to 'important' from 'normal' > severity 933424 important Bug #933424 [sitplus] sitplus: Please rebuild against wxWidgets GTK 3 package Severity set to 'important' from 'normal' > severity 933425 important Bug #933425 [sooperlooper] sooperlooper: Please rebuild against wxWidgets GTK 3 package Severity set to 'important' from 'normal' > severity 933426 important Bug #933426 [mediainfo] mediainfo: Please rebuild against wxWidgets GTK 3 package Severity set to 'important' from 'normal' > severity 933427 important Bug #933427 [delaboratory] delaboratory: Please rebuild against wxWidgets GTK 3 package Severity set to 'important' from 'normal' > severity 933429 important Bug #933429 [wxmaxima] wxmaxima: Please rebuild against wxWidgets GTK 3 package Severity set to 'important' from 'normal' > severity 933431 important Bug #933431 [gnuplot] gnuplot: Please rebuild against wxWidgets GTK 3 package Severity set to 'important' from 'normal' > severity 933433 important Bug #933433 [chipw] chipw: Please rebuild against wxWidgets GTK 3 package Severity set to 'important' from 'normal' > severity 933434 important Bug #933434 [cba] cba: Please rebuild against wxWidgets GTK 3 package Severity set to 'important' from 'normal' > severity 933435 important Bug #933435 [freedink-dfarc] freedink-dfarc: Please rebuild against wxWidgets GTK 3 package Severity set to 'important' from 'normal' > severity 933438 important Bug #933438 [spek] spek: Please rebuild against wxWidgets GTK 3 package Severity set to 'important' from 'normal' > severity 933440 important Bug #933440 [munipack] munipack: Please rebuild against wxWidgets GTK 3 package Severity set to 'important' from 'normal' > severity 933441 important Bug #933441 [pcsx2] pcsx2: Please rebuild against wxWidgets GTK 3 package Severity set to 'important' from 'normal' > severity 933442 important Bug #933442 [ebook2cwgui] ebook2cwgui: Please rebuild against wxWidgets GTK 3 package Severity set to 'important' from 'normal' > severity 933445 important Bug #933445 [sandboxgamemaker] sandboxgamemaker: Please rebuild against wxWidgets GTK 3 package Severity set to 'important' from 'normal' > severity 933450 important Bug #933450 {Done: Stuart Prescott } [fityk] fityk: Please rebuild against wxWidgets GTK 3 package Severity set to 'important' from 'normal' > severity 933451 important Bug #933451 [pgn2web] pgn2web: Please rebuild against wxWidgets GTK 3 package Severity set to 'important' from 'normal' > severity 933455 important Bug #933455 [aegisub] aegisub: Please rebuild against wxWidgets GTK 3 package Severity set to 'important' from 'normal' > severity 933457 important Bug #933457 [gspiceui] gspiceui: Please rebuild against wxWidgets GTK 3 package Severity set to 'important' from 'normal' > severity 933459 important Bug #933459 [pgadmin3] pgadmin3: Please rebuild against wxWidgets GTK 3 package Severity set to 'important' from 'normal' > severity 933462 important Bug #933462 [wxsvg] wxsvg: Please rebuild against wxWidgets GTK 3 package Severity set to 'important' from 'normal' > severity 933463 important Bug #933463 [treesheets] treesheets: Please rebuild against wxWidgets GTK 3 package Severity set to 'important' from 'normal' > severity 933465 important Bug #933465 [freespace2-launcher-wxlauncher] freespace2-launcher-wxlauncher: Please rebuild against wxWidgets GTK 3 package Severity set to 'important' from 'normal' > severity 933466 important Bug #933466 [rapidsvn] rapidsvn: Please rebuild against wxWidgets GTK 3 package Severity set to 'important' from 'normal' > severity 933469 important Bug #933469 [mrpt] mrpt: Please rebuild against wxWidgets GTK 3 package Severity set to 'important' from 'normal' > severity 933473 important Bug #
Processed: clfow: CVE-2019-16165
Processing control commands: > found -1 1:1.6-1 Bug #939915 [src:cflow] clfow: CVE-2019-16165 Marked as found in versions cflow/1:1.6-1. -- 939915: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=939915 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems
Bug#939915: clfow: CVE-2019-16165
Source: cflow Version: 1:1.6-4 Severity: important Tags: security upstream Forwarded: https://lists.gnu.org/archive/html/bug-cflow/2019-04/msg1.html Control: found -1 1:1.6-1 Hi, The following vulnerability was published for cflow. CVE-2019-16165[0]: | GNU cflow through 1.6 has a use-after-free in the reference function | in parser.c. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2019-16165 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16165 [1] https://lists.gnu.org/archive/html/bug-cflow/2019-04/msg1.html Please adjust the affected versions in the BTS as needed. Regards, Salvatore -- System Information: Debian Release: bullseye/sid APT prefers unstable APT policy: (500, 'unstable'), (1, 'experimental') Architecture: amd64 (x86_64) Kernel: Linux 4.19.0-6-amd64 (SMP w/8 CPU cores) Locale: LANG=C, LC_CTYPE=C.UTF-8 (charmap=UTF-8), LANGUAGE=C (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Init: sysvinit (via /sbin/init)
Processed: clfow: CVE-2019-16166
Processing control commands: > found -1 1:1.6-1 Bug #939916 [src:cflow] clfow: CVE-2019-16166 Marked as found in versions cflow/1:1.6-1. -- 939916: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=939916 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems
Bug#939916: clfow: CVE-2019-16166
Source: cflow Version: 1:1.6-4 Severity: important Tags: security upstream Forwarded: https://lists.gnu.org/archive/html/bug-cflow/2019-04/msg0.html Control: found -1 1:1.6-1 Hi, The following vulnerability was published for cflow. CVE-2019-16166[0]: | GNU cflow through 1.6 has a heap-based buffer over-read in the | nexttoken function in parser.c. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2019-16166 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16166 [1] https://lists.gnu.org/archive/html/bug-cflow/2019-04/msg0.html Please adjust the affected versions in the BTS as needed. Regards, Salvatore -- System Information: Debian Release: bullseye/sid APT prefers unstable APT policy: (500, 'unstable'), (1, 'experimental') Architecture: amd64 (x86_64) Kernel: Linux 4.19.0-6-amd64 (SMP w/8 CPU cores) Locale: LANG=C, LC_CTYPE=C.UTF-8 (charmap=UTF-8), LANGUAGE=C (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Init: sysvinit (via /sbin/init)