Bastian Germann wrote:
> Hi,
>
> I am uploading a NMU to fix this. The debdiff is attached.
>
> Sincerely,
> Bastian
Thank you so much for fixing this. I am planing to review build
dependences to removed those no needed.
Sincerely,
Jose
in Eterm,
Jose
Matthew Vernon wrote:
> Hi,
>
> On 14/02/2023 18:36, Jose Antonio Jimenez Madrid wrote:
>
>> I will test this patch and let you to know whether the bug is fixed.
>
> Any joy? We're approaching the time that eterm is going to be
> autoremoved from bookworm...
>
> Thanks,
>
> Matthew
Thanks Matthew for the links.
I will test this patch and let you to know whether the bug is fixed.
Sincerely,
Jose
Matthew Vernon wrote:
> Hi,
>
> Do you have plans to fix this before the bookworm freeze, please?
>
> I think netbsd at least have patched eterm to work with the newer
> imlib; at l
Thank you so much Utkarsh for the patch,
Please, upload it to unstable, as I have to upload it by Debian Mentors
so it will reach testing faster if you upload it to fix this security bug.
Also, you can upload it to buster-pu, the package version is the same
than in Stretch, so it just to upload
Thank you Salvatore for submitting this important bug.
I have sent this information to upstream and I have read the information
you provided.
It is the first time I have to deal with a security bug, so I do not
know the right procedure to follow.
I suppose there is a script or procedure to check
Hi,
Andy, I have tested a couple of solutions and I think the easiest way
for you is just to
download the Eterm package for Stretch (testing) and install it in your
system manually with:
dpkg -i eterm_0.9.6-4_amd64.deb
I have just installed the Eterm version in testing and no new packages
a
(I am writing to bugs #737491 and #770369 as the fix is the same)
Dear Andy,
I think this bug is the same than bug #770369.
This bug is close in stretch (testing). As it is expected the release
stretch occurs soon, the easiest way is:
1. To wait for the release of stretch to get this problem
7 matches
Mail list logo