Bug#793086: me too

2016-10-18 Thread Thomas Arendsen Hein
Hi! I just wanted to add that I just noticed the same problem on a machine with arpalert monitoring four network interfaces. arpalert 2.0.11-7.1 (Debian jessie, amd64) Regards, Thomas Arendsen Hein -- tho...@intevation.de - http://intevation.de/~thomas/ - OpenPGP key: 0x5816791A Intevation Gmb

Bug#841162: quagga: CVE-2016-1245: zebra: stack overrun in IPv6 RA receive code

2016-10-18 Thread Salvatore Bonaccorso
Source: quagga Version: 0.99.23.1-1 Severity: grave Tags: security upstream patch Hi, the following vulnerability was published for quagga. CVE-2016-1245[0]: zebra: stack overrun in IPv6 RA receive code If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilitie

Vier de Kerst met de nieuwste Rituals giftsets

2016-10-18 Thread Daniƫlle | Brandhouse
Deze email nieuwsbrief werd in grafisch HTML formaat verzonden. Als u deze tekstversie ziet, verkiest uw email programma "gewone tekst" emails. U kan de originele nieuwsbrief online bekijken: http://ymlp17.com/zk4op8 -

Bug#841192: mozplugger: mplayer2 has gone away

2016-10-18 Thread James Cowgill
Package: mozplugger Version: 1.14.5-2 Severity: minor Hi, mplayer2 no longer exists in stretch, please can you remove it from the suggested packages. Thanks, James signature.asc Description: OpenPGP digital signature

Bug#819567: marked as done (extlinux: please sort kernels by version)

2016-10-18 Thread Debian Bug Tracking System
Your message dated Tue, 18 Oct 2016 13:43:37 + with message-id <20161018134337.ga23...@kos.to> and subject line update-extlinux is no longer has caused the Debian Bug report #819567, regarding extlinux: please sort kernels by version to be marked as done. This means that you claim that the pro

Bug#841207: apt-rdepends: When multiple versions of a package exists, apt-rdepends uses the oldest

2016-10-18 Thread spike . sp
Package: apt-rdepends Version: 1.3.0-3 Severity: important Tags: patch Dear Maintainer, I was using apt-rdepends to build a package dependencies when I noticed that the dependencies were incorrect. For instance, here is an extract of "apt-cache show ansible" (ansible has 2 versions availabl

Processing of quagga_1.0.20160315-3_amd64.changes

2016-10-18 Thread Debian FTP Masters
quagga_1.0.20160315-3_amd64.changes uploaded successfully to ftp-master.debian.org along with the files: quagga_1.0.20160315-3.dsc quagga_1.0.20160315-3.debian.tar.xz quagga-dbg_1.0.20160315-3_amd64.deb quagga-doc_1.0.20160315-3_all.deb quagga_1.0.20160315-3_amd64.deb Greetings,

Processing of quagga_1.0.20160315-3_amd64.changes

2016-10-18 Thread Debian FTP Masters
quagga_1.0.20160315-3_amd64.changes uploaded successfully to localhost along with the files: quagga_1.0.20160315-3.dsc quagga_1.0.20160315-3.debian.tar.xz quagga-dbg_1.0.20160315-3_amd64.deb quagga-doc_1.0.20160315-3_all.deb quagga_1.0.20160315-3_amd64.deb Greetings, Your Debian

Bug#841162: marked as done (quagga: CVE-2016-1245: zebra: stack overrun in IPv6 RA receive code)

2016-10-18 Thread Debian Bug Tracking System
Your message dated Tue, 18 Oct 2016 22:48:59 + with message-id and subject line Bug#841162: fixed in quagga 1.0.20160315-3 has caused the Debian Bug report #841162, regarding quagga: CVE-2016-1245: zebra: stack overrun in IPv6 RA receive code to be marked as done. This means that you claim th

quagga_1.0.20160315-3_amd64.changes ACCEPTED into unstable

2016-10-18 Thread Debian FTP Masters
Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Tue, 18 Oct 2016 22:06:18 +0200 Source: quagga Binary: quagga quagga-dbg quagga-doc Architecture: source amd64 all Version: 1.0.20160315-3 Distribution: unstable Urgency: high Maintainer: Debian QA Group Changed-By: Flor

Bug#841257: sendmail: Privilege escalation from group smmsp to (user) root

2016-10-18 Thread Paul Szabo
Package: sendmail Version: 8.14.4-8+deb8u1 Severity: grave Tags: patch security Justification: user security hole Supposing that due to some bug in sendmail, we were able to execute commands as group smmsp, then that might be leveraged to cause root to create any (empty) file. The directory /var

Bug#841257: sendmail: Privilege escalation from group smmsp to (user) root

2016-10-18 Thread paul . szabo
Hmm... you may also need to (once) do: chown smmsp /var/run/sendmail/stampdir/reload when adopting my patch. Cheers, Paul

Bug#841257: sendmail: Privilege escalation from group smmsp to (user) root

2016-10-18 Thread paul . szabo
Hmm (again) ... Maybe file /usr/share/sendmail/sendmail needs updating also? It is almost identical to /etc/init.d/sendmail, and in file /etc/cron.daily/sendmail I notice the lines: ... #-- # Every so often, give sendmail