Publieke parkings, het nieuwe goud.

2019-09-09 Thread Katrien
Click here to see a web copy of this email 

http://creadomus.acemlnc.com/lt.php?s=a61aa80772cfc559a4991bd6af37e5a1&i=73A179A46A362
 

Beste,

U weet al langer dan vandaag dat de spaarrente quasi nul is. Wie weet
zelfs binnenkort negatief. Veel mensen overwegen dan wel een investering
in vastgoed, maar zien op tegen de zorgen omtrent verhuur, leegstand,
huurschade of wanbetaling. Hierdoor komt het er niet van, en blijft het
spaargeld staan, en waarde verliezen.

Een vastgoedinvestering in publieke parkeerplaatsen
is een ongekend, maar bijzonder
interessant alternatief. Parkings kennen heel wat minder onderhoud, de
huurprijzen ervan stijgen sneller dan de inflatie en brengen flink wat
op. 

De uitbating gebeurt in samenwerking met wereldspeler INDIGO
, het vroegere VINCI Park. Als
eigenaar-investeerder hoeft u zelf niets te doen, en ontvangt u elk
trimester uw huurinkomsten. Makkelijk toch? 

Meer weten? Ik help je graag verder.

Katrien

 

VRAAG HIER VRIJBLIJVEND MEER INFORMATIE

PS: wie deze maand investeert, ontvangt een cadeaubon om eens met z'n
twee te gaan dineren in één van de restaurants naar keuze van Sergio
Herman !

http://creadomus.acemlnc.com/lt.php?s=a61aa80772cfc559a4991bd6af37e5a1&i=73A179A46A363
 

 

http://creadomus.acemlnc.com/lt.php?s=a61aa80772cfc559a4991bd6af37e5a1&i=73A179A46A364
 

 

http://creadomus.acemlnc.com/lt.php?s=a61aa80772cfc559a4991bd6af37e5a1&i=73A179A46A365
 

 

http://creadomus.acemlnc.com/lt.php?s=a61aa80772cfc559a4991bd6af37e5a1&i=73A179A46A366
 

Dit is geen aanbod in kader van de prospectusplicht. Investeren vanaf
100.000 euro.

SVVC Creaparking - Kortrijksesteenweg 1041 - 9051 Gent

Creadomus , Kortrijksesteenweg 1041, 9051 Gent, Belgium | unsubscribe

Bug#939885: dpkg: unrecoverable fatal error: unknown system group 'smmsp' in statoverride file

2019-09-09 Thread Sebastien Duthil
Package: sendmail-bin
Version: 8.15.2-14~deb10u1
Severity: normal

Dear Maintainer,

Given the following commands are run on a fresh buster install:

apt install sendmail
apt install postfix
apt autoremove --purge

When I try to install any package, e.g. apt install mutt
Then I get an error:

dpkg: unrecoverable fatal error, aborting:
 unknown system group 'smmsp' in statoverride file; the system group got removed
before the override, which is most probably a packaging bug, to recover you
can remove the override manually with dpkg-statoverride
E: Sub-process /usr/bin/dpkg returned an error code (2)

This error effectively blocks the installation of any further package.

When in this state, the package sendmail-bin is removed, but not purged.

The problem goes away after running the following command:

apt purge sendmail-bin


-- System Information:
Debian Release: 10.1
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'stable')
Architecture: amd64 (x86_64)

Kernel: Linux 4.19.0-6-cloud-amd64 (SMP w/1 CPU core)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages sendmail-bin depends on:
ii  debconf1.5.71
ii  libc6  2.28-10
ii  libdb5.3   5.3.28+dfsg1-0.5
ii  libldap-2.4-2  2.4.47+dfsg-3+deb10u1
pn  liblockfile1   
ii  libsasl2-2 2.1.27+dfsg-1
ii  libssl1.1  1.1.1c-1
ii  libwrap0   7.6.q-28
ii  lsb-base   10.2019051400
ii  procps 2:3.3.15-2
pn  sendmail-base  
pn  sendmail-cf

sendmail-bin recommends no packages.

Versions of packages sendmail-bin suggests:
ii  libsasl2-modules  2.1.27+dfsg-1
ii  openssl   1.1.1c-1
pn  sasl2-bin 
pn  sendmail-doc  



Processed: severity of 933407 is important, severity of 933408 is important, severity of 933411 is important ...

2019-09-09 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> severity 933407 important
Bug #933407 [codeblocks] codeblocks: Please rebuild against wxWidgets GTK 3 
package
Severity set to 'important' from 'normal'
> severity 933408 important
Bug #933408 [usbprog] usbprog: Please rebuild against wxWidgets GTK 3 package
Severity set to 'important' from 'normal'
> severity 933411 important
Bug #933411 [fwknop-gui] fwknop-gui: Please rebuild against wxWidgets GTK 3 
package
Severity set to 'important' from 'normal'
> severity 933412 important
Bug #933412 {Done: Christoph Berg } [limesuite] limesuite: 
Please rebuild against wxWidgets GTK 3 package
Severity set to 'important' from 'normal'
> severity 933415 important
Bug #933415 [openbabel] openbabel: Please rebuild against wxWidgets GTK 3 
package
Severity set to 'important' from 'normal'
> severity 933416 important
Bug #933416 [filezilla] filezilla: Please rebuild against wxWidgets GTK 3 
package
Severity set to 'important' from 'normal'
> severity 933417 important
Bug #933417 [xchm] xchm: Please rebuild against wxWidgets GTK 3 package
Severity set to 'important' from 'normal'
> severity 933419 important
Bug #933419 [darkradiant] darkradiant: Please rebuild against wxWidgets GTK 3 
package
Severity set to 'important' from 'normal'
> severity 933424 important
Bug #933424 [sitplus] sitplus: Please rebuild against wxWidgets GTK 3 package
Severity set to 'important' from 'normal'
> severity 933425 important
Bug #933425 [sooperlooper] sooperlooper: Please rebuild against wxWidgets GTK 3 
package
Severity set to 'important' from 'normal'
> severity 933426 important
Bug #933426 [mediainfo] mediainfo: Please rebuild against wxWidgets GTK 3 
package
Severity set to 'important' from 'normal'
> severity 933427 important
Bug #933427 [delaboratory] delaboratory: Please rebuild against wxWidgets GTK 3 
package
Severity set to 'important' from 'normal'
> severity 933429 important
Bug #933429 [wxmaxima] wxmaxima: Please rebuild against wxWidgets GTK 3 package
Severity set to 'important' from 'normal'
> severity 933431 important
Bug #933431 [gnuplot] gnuplot: Please rebuild against wxWidgets GTK 3 package
Severity set to 'important' from 'normal'
> severity 933433 important
Bug #933433 [chipw] chipw: Please rebuild against wxWidgets GTK 3 package
Severity set to 'important' from 'normal'
> severity 933434 important
Bug #933434 [cba] cba: Please rebuild against wxWidgets GTK 3 package
Severity set to 'important' from 'normal'
> severity 933435 important
Bug #933435 [freedink-dfarc] freedink-dfarc: Please rebuild against wxWidgets 
GTK 3 package
Severity set to 'important' from 'normal'
> severity 933438 important
Bug #933438 [spek] spek: Please rebuild against wxWidgets GTK 3 package
Severity set to 'important' from 'normal'
> severity 933440 important
Bug #933440 [munipack] munipack: Please rebuild against wxWidgets GTK 3 package
Severity set to 'important' from 'normal'
> severity 933441 important
Bug #933441 [pcsx2] pcsx2: Please rebuild against wxWidgets GTK 3 package
Severity set to 'important' from 'normal'
> severity 933442 important
Bug #933442 [ebook2cwgui] ebook2cwgui: Please rebuild against wxWidgets GTK 3 
package
Severity set to 'important' from 'normal'
> severity 933445 important
Bug #933445 [sandboxgamemaker] sandboxgamemaker: Please rebuild against 
wxWidgets GTK 3 package
Severity set to 'important' from 'normal'
> severity 933450 important
Bug #933450 {Done: Stuart Prescott } [fityk] fityk: Please 
rebuild against wxWidgets GTK 3 package
Severity set to 'important' from 'normal'
> severity 933451 important
Bug #933451 [pgn2web] pgn2web: Please rebuild against wxWidgets GTK 3 package
Severity set to 'important' from 'normal'
> severity 933455 important
Bug #933455 [aegisub] aegisub: Please rebuild against wxWidgets GTK 3 package
Severity set to 'important' from 'normal'
> severity 933457 important
Bug #933457 [gspiceui] gspiceui: Please rebuild against wxWidgets GTK 3 package
Severity set to 'important' from 'normal'
> severity 933459 important
Bug #933459 [pgadmin3] pgadmin3: Please rebuild against wxWidgets GTK 3 package
Severity set to 'important' from 'normal'
> severity 933462 important
Bug #933462 [wxsvg] wxsvg: Please rebuild against wxWidgets GTK 3 package
Severity set to 'important' from 'normal'
> severity 933463 important
Bug #933463 [treesheets] treesheets: Please rebuild against wxWidgets GTK 3 
package
Severity set to 'important' from 'normal'
> severity 933465 important
Bug #933465 [freespace2-launcher-wxlauncher] freespace2-launcher-wxlauncher: 
Please rebuild against wxWidgets GTK 3 package
Severity set to 'important' from 'normal'
> severity 933466 important
Bug #933466 [rapidsvn] rapidsvn: Please rebuild against wxWidgets GTK 3 package
Severity set to 'important' from 'normal'
> severity 933469 important
Bug #933469 [mrpt] mrpt: Please rebuild against wxWidgets GTK 3 package
Severity set to 'important' from 'normal'
> severity 933473 important
Bug #

Processed: clfow: CVE-2019-16165

2019-09-09 Thread Debian Bug Tracking System
Processing control commands:

> found -1 1:1.6-1
Bug #939915 [src:cflow] clfow: CVE-2019-16165
Marked as found in versions cflow/1:1.6-1.

-- 
939915: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=939915
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#939915: clfow: CVE-2019-16165

2019-09-09 Thread Salvatore Bonaccorso
Source: cflow
Version: 1:1.6-4
Severity: important
Tags: security upstream
Forwarded: https://lists.gnu.org/archive/html/bug-cflow/2019-04/msg1.html
Control: found -1 1:1.6-1

Hi,

The following vulnerability was published for cflow.

CVE-2019-16165[0]:
| GNU cflow through 1.6 has a use-after-free in the reference function
| in parser.c.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2019-16165
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16165
[1] https://lists.gnu.org/archive/html/bug-cflow/2019-04/msg1.html

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

-- System Information:
Debian Release: bullseye/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 4.19.0-6-amd64 (SMP w/8 CPU cores)
Locale: LANG=C, LC_CTYPE=C.UTF-8 (charmap=UTF-8), LANGUAGE=C (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: sysvinit (via /sbin/init)



Processed: clfow: CVE-2019-16166

2019-09-09 Thread Debian Bug Tracking System
Processing control commands:

> found -1 1:1.6-1
Bug #939916 [src:cflow] clfow: CVE-2019-16166
Marked as found in versions cflow/1:1.6-1.

-- 
939916: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=939916
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#939916: clfow: CVE-2019-16166

2019-09-09 Thread Salvatore Bonaccorso
Source: cflow
Version: 1:1.6-4
Severity: important
Tags: security upstream
Forwarded: https://lists.gnu.org/archive/html/bug-cflow/2019-04/msg0.html
Control: found -1 1:1.6-1

Hi,

The following vulnerability was published for cflow.

CVE-2019-16166[0]:
| GNU cflow through 1.6 has a heap-based buffer over-read in the
| nexttoken function in parser.c.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2019-16166
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16166
[1] https://lists.gnu.org/archive/html/bug-cflow/2019-04/msg0.html

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

-- System Information:
Debian Release: bullseye/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 4.19.0-6-amd64 (SMP w/8 CPU cores)
Locale: LANG=C, LC_CTYPE=C.UTF-8 (charmap=UTF-8), LANGUAGE=C (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: sysvinit (via /sbin/init)