reopen 487432
notfixed 487432 1.9.0.2-2
close 488432 1.9.0.2-2
thanks
On 11/07/08 at 06:38 +, Debian Bug Tracking System wrote:
>
> This is an automatic notification regarding your Bug report
> which was filed against the texpower package:
>
> #487432: Missing files to build the examples
Ga
Processing commands for [EMAIL PROTECTED]:
> reopen 487432
Bug#487432: Missing files to build the examples
'reopen' may be inappropriate when a bug has been closed with a version;
you may need to use 'found' to remove fixed versions.
Bug reopened, originator not changed.
> notfixed 487432 1.9.0.2
Am 2008-07-04 08:34:03, schrieb timdau:
> 15 days later, still no patch.
END OF REPLIED MESSAGE
What about writing and submiting one?
Thanks, Greetings and nice Day/Evening
Michelle Konzack
Systemadministrator
24V Electronic Engineer
15 days later, still no patch.
Is there a plan to resolve this security problem in Etch, or should I
start looking for alternative solutions? I would like to "aptitude
update && aptitude upgrade" and make this problem go aways, but if that
is not going to happen then I would like to know this so I can start
looking for a di
On 28/06/08 at 22:54 +0200, Lucas Nussbaum wrote:
> 1.8.5-4etch1 (in etch) is still not fixed. I don't think that a patch
> that only fixes this issue exists.
Mmmh, Ubuntu has a fixed package, which can be downloaded from
https://launchpad.net/ubuntu/+source/ruby1.8/1.8.5-4ubuntu2.2 . But
someone
clone 487238 -1
reassign -1 ruby1.9 1.9.0.1-1
thanks
On 20/06/08 at 22:52 +0900, Daigo Moriwaki wrote:
> The upstream has announced multiple vulnerabilities in Ruby. They may lead
> to a denial of service (DoS) condition or allow execution of arbitrary code.
> * CVE-2008-2662
> * CVE-2008-2663
Processing commands for [EMAIL PROTECTED]:
> clone 487238 -1
Bug#487238: ruby1.8: Arbitrary code execution vulnerability and so on
Bug 487238 cloned as bug 488432.
> reassign -1 ruby1.9 1.9.0.1-1
Bug#488432: ruby1.8: Arbitrary code execution vulnerability and so on
Bug reassigned from p
On 25/06/08 at 19:14 +0200, Laurent Bonnaud wrote:
> Hi,
>
> this bug has been fixed by an upload for amd64. But for other
> architectures (including i386) the fixed version is not available yet
> and systems remain vulnerable. Could somebody please fix this?
It was built everywhere except alph
Hi,
this bug has been fixed by an upload for amd64. But for other
architectures (including i386) the fixed version is not available yet
and systems remain vulnerable. Could somebody please fix this?
--
Laurent Bonnaud.
http://www.lis.inpg.fr/pages_perso/bonnaud/
--
To UNSUBSCRIBE, email
Processing commands for [EMAIL PROTECTED]:
> tags 487238 + etch
Bug#487238: ruby1.8: Arbitrary code execution vulnerability and so on
Tags were: security
Tags added: etch
> thanks
Stopping processing here.
Please contact me if you need assistance.
Debian bug tracking system adminis
Package: ruby1.8
Version: 1.8.6.114-2
Severity: grave
Tags: security
Justification: user security hole
The upstream has announced multiple vulnerabilities in Ruby. They may lead
to a denial of service (DoS) condition or allow execution of arbitrary code.
* CVE-2008-2662
* CVE-2008-2663
* CV
12 matches
Mail list logo