Processing commands for cont...@bugs.debian.org:
> # Split bug so we can properly track issues
> clone 828519 -1
Bug #828519 [src:qca2] qca2: FTBFS with openssl 1.1.0
Bug 828519 cloned as bug 850897
827061 was blocked by: 828262 845016 828620 828486 828259 828263 828507 828416
828301 828453 82857
Processing commands for cont...@bugs.debian.org:
> # This time with less copy-waste fail
> retitle 850888 kdelibs4support: Please migrate to openssl1.1 in buster
Bug #850888 [src:kdelibs4support] ruby2.3: Please migrate to openssl1.1 in
buster
Changed Bug title to 'kdelibs4support: Please migrate
Processing commands for cont...@bugs.debian.org:
> # Split bug so we can properly track issues
> clone 828364 -1
Bug #828364 [src:kdelibs4support] kdelibs4support: FTBFS with openssl 1.1.0
Bug 828364 cloned as bug 850888
827061 was blocked by: 828395 828478 844366 828554 828374 828563 828318 82859
Source: ark
Version: 4:16.08.3-1
Severity: grave
Tags: upstream patch security fixed-upstream
Justification: user security hole
Forwarded: https://bugs.kde.org/show_bug.cgi?id=374572
Hi,
the following vulnerability was published for ark.
CVE-2017-5330[0]:
unintended execution of scripts and exec
Processing commands for cont...@bugs.debian.org:
> reassign 850746 qt5-gtk-platformtheme 5.7.1+dfsg-2
Bug #850746 [retext] retext segfaults when attempting to open 'open file'
dialogue
Bug reassigned from package 'retext' to 'qt5-gtk-platformtheme'.
No longer marked as found in versions retext/6.
On Wed, 08 Jan 2014 19:00:54 -0800 Russ Allbery wrote:
Hi,
> It would be better for any application that uses the kernel keyring
> if pam_keyinit were run by default in the PAM session stack. Without
> this module, users are placed in a default UID-based user session,
> which doesn't isolate ea
6 matches
Mail list logo