cuneiform 1.1.0+dfsg-5 is marked for autoremoval from testing on 2015-07-25
It is affected by these RC bugs:
781354: cuneiform: [cuneiform] Buffer overflow triggered by user supplied image
--
To UNSUBSCRIBE, email to debian-qa-packages-requ...@lists.debian.org
with a subject of "unsubscribe". T
> "AB" == Andreas Beckmann writes:
AB> Is this still occurring with the libmilter from jessie, stretch, sid, or
AB> experimental? I.e. version 8.14.4-8 or newer.
Yes, sid still shows this.
And since the last two updates to opendkim, it crashes daily again.
Some days multiple times per day.
No idea sorry.
Moved away from sendmail because of it - went to postfix.
Thanks for checking but.
> -Original Message-
> From: Andreas Beckmann [mailto:a...@debian.org]
> Sent: Saturday, 11 July 2015 3:07 AM
> To: 622...@bugs.debian.org; Tim Warnock; Bartosz Feński; Albrecht Dreß
> Subje
Processing control commands:
> tag -1 moreinfo
Bug #748972 [libmilter1.0.1] libmilter1.0.1: Opendkim and opendmarc milters
have allocation leaks; libmilter is common element
Added tag(s) moreinfo.
--
748972: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=748972
Debian Bug Tracking System
Cont
Control: tag -1 moreinfo
Hi James,
On 2014-05-22 20:25, James Cloos wrote:
> The bug is socket-type agnostic. It occurs with unix domain and with tcp
> sockets.
>
> Every milter event allocates ram which is not free(2)d. (It shows up in
> VmData in
> /proc/$pid/status.) I estimate that the
Processing control commands:
> tag -1 moreinfo
Bug #690034 [libmilter1.0.1] libmilter1.0.1: milters crash when under high load
Added tag(s) moreinfo.
--
690034: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=690034
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--
To
Control: tag -1 moreinfo
Hi Scott,
On Tue, 9 Oct 2012 10:57:09 +0100 (BST) Scott Ashcroft
wrote:
> I've got serveral milters when crash when under high load.
> The problem seems to be that a signal is caught in poll but the handler
> doesn't do the right thing.
> I think the problem is that the
Package: xdemorse
Version: 2.9-2
Severity: serious
Justification: fails to build from source (but built successfully in the past)
User: reproducible-bui...@lists.alioth.debian.org
Usertags: ftbfs
The package depends on automake, but it checks up to automake 1.14, while now
the default is 1.15.
Ple
Processing control commands:
> tag -1 moreinfo
Bug #622822 [libmilter1.0.1] libmilter1.0.1: segfault / error 4 in
libmilter.so.1.0.1 causing any running app to die
Added tag(s) moreinfo.
--
622822: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=622822
Debian Bug Tracking System
Contact ow...@
Control: tag -1 moreinfo
Hi all,
On Fri, 15 Apr 2011 07:53:31 +1000 Tim Warnock wrote:
> Apr 15 03:53:09 mx01 kernel: [2953367.914567] milter-greylist[1275]: segfault
> at 130 ip 7f2ed9253760 sp 7f2ed70c3e80 error 4
> Apr 15 03:53:09 mx01 kernel: [2953367.914675] spamass-milter[1236]: s
Your message dated Fri, 10 Jul 2015 15:38:22 +
with message-id
and subject line Bug#354055: fixed in sendmail 8.14.9-3
has caused the Debian Bug report #354055,
regarding sendmail.mc: sendmail
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not
Your message dated Fri, 10 Jul 2015 15:38:22 +
with message-id
and subject line Bug#293017: fixed in sendmail 8.14.9-3
has caused the Debian Bug report #293017,
regarding sendmail.mc is not built correctly by sendmailconfig
to be marked as done.
This means that you claim that the problem has
Your message dated Fri, 10 Jul 2015 15:38:22 +
with message-id
and subject line Bug#293017: fixed in sendmail 8.14.9-3
has caused the Debian Bug report #293017,
regarding MAILER before FEATURE in sendmail.mc generated by sendmailconfig
to be marked as done.
This means that you claim that the
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Fri, 10 Jul 2015 15:37:14 +0200
Source: sendmail
Binary: sendmail-bin rmail sensible-mda libmilter1.0.1 libmilter1.0.1-dbg
libmilter-dev sendmail-doc sendmail sendmail-base sendmail-cf
Architecture: source all
Version:
Your message dated Fri, 10 Jul 2015 15:38:22 +
with message-id
and subject line Bug#354055: fixed in sendmail 8.14.9-3
has caused the Debian Bug report #354055,
regarding sendmail provides bad default config file
to be marked as done.
This means that you claim that the problem has been dealt
Your message dated Fri, 10 Jul 2015 15:38:22 +
with message-id
and subject line Bug#790968: fixed in sendmail 8.14.9-3
has caused the Debian Bug report #790968,
regarding readcf: DontBlameSendmail option: GroupReadableaDefaultAuthInfoFile
unrecognized
to be marked as done.
This means that yo
Your message dated Fri, 10 Jul 2015 15:38:22 +
with message-id
and subject line Bug#293017: fixed in sendmail 8.14.9-3
has caused the Debian Bug report #293017,
regarding sendmail fails to install
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is
sendmail_8.14.9-3_amd64.changes uploaded successfully to localhost
along with the files:
sendmail_8.14.9-3.dsc
sendmail_8.14.9-3.debian.tar.xz
sendmail-base_8.14.9-3_all.deb
sendmail-cf_8.14.9-3_all.deb
sendmail-doc_8.14.9-3_all.deb
sendmail_8.14.9-3_all.deb
Greetings,
Your De
Your message dated Fri, 10 Jul 2015 14:01:09 +0200
with message-id <559fb405.3090...@debian.org>
and subject line Re: sendmail-bin: does not load all signature algorithms for
TLS
has caused the Debian Bug report #579563,
regarding sendmail-bin: does not load all signature algorithms for TLS
to be
Your message dated Fri, 10 Jul 2015 09:36:40 +
with message-id
and subject line Bug#752528: fixed in wxmaxima 15.04.0-1
has caused the Debian Bug report #752528,
regarding [wxmaxima] segfault when entering parentheses in a dialog
to be marked as done.
This means that you claim that the proble
Your message dated Fri, 10 Jul 2015 09:36:39 +
with message-id
and subject line Bug#617355: fixed in wxmaxima 15.04.0-1
has caused the Debian Bug report #617355,
regarding [wxmaxima] hangs on UTF8 characters like µ
to be marked as done.
This means that you claim that the problem has been dea
Processing control commands:
> tags -1 + security
Bug #781354 [cuneiform] [cuneiform] Buffer overflow triggered by user supplied
image
Added tag(s) security.
> severity -1 grave
Bug #781354 [cuneiform] [cuneiform] Buffer overflow triggered by user supplied
image
Severity set to 'grave' from 'nor
Control: tags -1 + security
Control: severity -1 grave
The buffer overflow maybe has the potential to introduce a security problem.
This is especially a problem because cuneiform is used by remote users in
different document archiving software/document management system servers.
--
To UNSUBSC
23 matches
Mail list logo