Hi,
I have just re-assigned #663971 to you. You should either coordinate
with the insserv maintainers to get pdnsd added to /etc/insserv.conf
or change your /etc/insserv.conf.d/pdnsd to contain a + (for
optional).
Cheers,
Stefan
--
To UNSUBSCRIBE, email to debian-qa-packages-requ...@lists.d
Hi,
we have decided to postpone the transition to apache2 2.4. The main blocker is
that mod_perl needs a major new upstream release which very likely won't be
ready in time for Wheezy and we don't want to release Wheezy without mod_perl.
The transition will probably happen shortly after the rel
Hi,
we have decided to postpone the transition to apache2 2.4. The main blocker is
that mod_perl needs a major new upstream release which very likely won't be
ready in time for Wheezy and we don't want to release Wheezy without mod_perl.
The transition will probably happen shortly after the rel
Package: imlib11
Version: 1.9.15-2
Severity: important
Tags: security
>From CVE-2007-3568:
"The _LoadBMP function in imlib 1.9.15 and earlier allows
context-dependent attackers to cause a denial of service (infinite
loop) via a BMP image with a Bits Per Page (BPP) value of 0."
See http://www.sec
This should be fixed in 1:3.6.2-4, though it will probably take some
time for this version to enter testing because of the glibc
transition.
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
On Montag, 7. Mai 2007, Sanjoy Mahajan wrote:
> Thanks for the fix. Your fix seems correct, whereas the one I
> posted in the bug report would fail for triply (or more deeply)
> nested ps files.
I intended to preserve the "Skip the EPS without handling its content"
logic, because I didn't know w
Maybe this should be removed? According to popcon, it has practically
no users [1].
Mandriva seems to have a version for php5 [2], so it should be
possible to convert the package to php5. But I doubt it is worth the
effort.
[1] http://qa.debian.org/popcon.php?package=php4-tclink
[2]
http://c
package: wv
severity: grave
tags: security
Some vulnerabilities have been found in wvware and are fixed in 1.2.3
See
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=434
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=433
for details.
Please mention the
Package: cscope
Severity: grave
Tags: security patch
Justification: user security hole
Some vulnerabilities have been found in cscope:
Multiple buffer overflows in cscope 15.5 and earlier allow
user-assisted attackers to cause a denial of service (crash) and
possibly execute arbitrary code via m
package: libmusicbrainz-2.1
severity: grave
tags: security
Some buffer overflows have been found in libmusicbrainz up to 2.1.2.
See
http://aluigi.altervista.org/adv/brainzbof-adv.txt
http://secunia.com/advisories/21404/
for details.
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subje
10 matches
Mail list logo