We believe that the bug you reported is now fixed; the following
package(s) have been removed from unstable:
volatility |2.6.1-2 | source, all
volatility-tools |2.6.1-2 | all
--- Reason ---
NBS; Purely Python2 based
-
Version: 2.6.1-2+rm
Dear submitter,
as the package volatility has just been removed from the Debian archive
unstable we hereby close the associated bug reports. We are sorry
that we couldn't deal with your issue properly.
For details on the removal, please see https://bugs.debian.org/951171
Th
Your message dated Sun, 16 Feb 2020 00:22:29 +
with message-id
and subject line Bug#951171: Removed package(s) from unstable
has caused the Debian Bug report #938797,
regarding volatility: Python2 removal in sid/bullseye
to be marked as done.
This means that you claim that the problem has bee
Your message dated Sun, 16 Feb 2020 00:22:29 +
with message-id
and subject line Bug#951171: Removed package(s) from unstable
has caused the Debian Bug report #950340,
regarding volatility: keep out of testing (for now)
to be marked as done.
This means that you claim that the problem has been
Your message dated Sun, 16 Feb 2020 00:22:29 +
with message-id
and subject line Bug#951171: Removed package(s) from unstable
has caused the Debian Bug report #839754,
regarding volatility: Incompatible with Kernel 4.7
to be marked as done.
This means that you claim that the problem has been d
Source: libpam-radius-auth
Version: 1.4.0-2
Severity: important
Tags: security upstream
Hi,
The following vulnerability was published for libpam-radius-auth.
CVE-2015-9542[0]:
|buffer overflow in password field
If you fix the vulnerability please also make sure to include the
CVE (Common Vulner
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Sat, 15 Feb 2020 14:07:15 -0500
Source: boxbackup
Architecture: source
Version: 0.13~~git20190527.g039c4a1-4
Distribution: unstable
Urgency: medium
Maintainer: Debian QA Group
Changed-By: Reinhard Tartler
Closes: 907
Your message dated Sat, 15 Feb 2020 20:36:31 +
with message-id
and subject line Bug#943517: fixed in boxbackup 0.13~~git20190527.g039c4a1-4
has caused the Debian Bug report #943517,
regarding boxbackup: FTBFS with test failures
to be marked as done.
This means that you claim that the problem
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Sun, 09 Feb 2020 11:50:59 +0100
Source: openresolv
Architecture: source
Version: 3.10.0-1
Distribution: unstable
Urgency: medium
Maintainer: Debian QA Group
Changed-By: Reiner Herrmann
Changes:
openresolv (3.10.0-1)
openresolv_3.10.0-1_source.changes uploaded successfully to localhost
along with the files:
openresolv_3.10.0-1.dsc
openresolv_3.10.0.orig.tar.xz
openresolv_3.10.0-1.debian.tar.xz
openresolv_3.10.0-1_amd64.buildinfo
Greetings,
Your Debian queue daemon (running on host usper.debian
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Sat, 15 Feb 2020 15:02:29 +0100
Source: gkremldk
Architecture: source
Version: 0.9.7-4
Distribution: unstable
Urgency: medium
Maintainer: Debian QA Group
Changed-By: Tobias Frost
Closes: 437043 929761
Changes:
gkrem
gkremldk_0.9.7-4_source.changes uploaded successfully to localhost
along with the files:
gkremldk_0.9.7-4.dsc
gkremldk_0.9.7-4.tar.gz
gkremldk_0.9.7-4_source.buildinfo
Greetings,
Your Debian queue daemon (running on host usper.debian.org)
12 matches
Mail list logo