Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Sun, 14 May 2017 22:57:20 +0200
Source: fwsnort
Binary: fwsnort
Architecture: source all
Version: 1.6.5-4
Distribution: unstable
Urgency: medium
Maintainer: Debian QA Group
Changed-By: Axel Beckert
Description:
fwsno
fwsnort_1.6.5-4_amd64.changes uploaded successfully to localhost
along with the files:
fwsnort_1.6.5-4.dsc
fwsnort_1.6.5-4.debian.tar.xz
fwsnort_1.6.5-4_all.deb
fwsnort_1.6.5-4_amd64.buildinfo
Greetings,
Your Debian queue daemon (running on host usper.debian.org)
Your message dated Sun, 14 May 2017 21:18:36 +
with message-id
and subject line Bug#862485: fixed in fwsnort 1.6.5-4
has caused the Debian Bug report #862485,
regarding fwsnort mustn't set iptables rules when purged
to be marked as done.
This means that you claim that the problem has been dea
Processing commands for cont...@bugs.debian.org:
> tags 862485 + pending
Bug #862485 [fwsnort] fwsnort mustn't set iptables rules when purged
Added tag(s) pending.
> thanks
Stopping processing here.
Please contact me if you need assistance.
--
862485: http://bugs.debian.org/cgi-bin/bugreport.cgi
Axel Beckert wrote:
> Point taken. Will move that line (or an "fwsnort --ipt-flush") into a
> (to be created) prerm and do another QA upload. (Unless you're already
> onto it. Feel free to do that.)
Unfortunately "fwsnort --ipt-flush" only flushes the chains but does
not remove the chains:
# ip
Processing commands for cont...@bugs.debian.org:
> found 862556 1.5-6
Bug #862556 [libytnef] heap-buffer-overflow vulnerability in the SIZECHCK
There is no source info for the package 'libytnef' at version '1.5-6' with
architecture ''
Unable to make a source version for version '1.5-6'
Marked as
Package: libytnef
Version: 1.5-6+deb8u1
Severity: normal
Tags: security
Hi,
We found a heap-buffer-overflow vulnerability in the libytnef.
This affects both 1.5-6+deb8u1 and 1.9.1 .
The cause is an incorrect boundary checking in SIZECHCK macro in
lib/ytnef.c:39
-- #define SIZECHE
Processing commands for cont...@bugs.debian.org:
> retitle 784682 systemd unable to boot when snoopy is enabled
Bug #784682 [snoopy] "Please backport new version to jessie"
Changed Bug title to 'systemd unable to boot when snoopy is enabled' from
'"Please backport new version to jessie"'.
> sever
8 matches
Mail list logo