Arjan,
On Sat, May 06, 2006 at 09:40:18PM +0200, Arjan Oosting wrote:
> I was wondering if you are still working on the packages for Haskell
> Crypto and Haskell NewBinary.
I haven't been actively working on the packages since I'm about to move
to a new job and have been busy interviewing and ge
Package: vim-scripts
Version: 6-3
Followup-For: Bug #307544
I propose changing spellcheck's ss to sS and sl to sL. At least that's
the change I've made locally.
peace,
core
-- System Information:
Debian Release: testing/unstable
APT prefers testing
APT policy: (500, 'testing')
Architecture
Package: wnpp
Severity: wishlist
Owner: Charles Stevenson <[EMAIL PROTECTED]>
* Package name: mindy
Version : 2.4.1
Upstream Author : Gwydion Dylan Hackers
* URL : http://www.gwydiondylan.org/
* License : CMU
Description : A Dylan interpreter.
Mi
Package: wnpp
Severity: wishlist
Owner: Charles Stevenson <[EMAIL PROTECTED]>
* Package name: gwydion-dylan-dev
Version : 2.4.1
Upstream Author : Gwydion Dylan Hackers
* URL : http://www.gwydiondylan.org/
* License : CMU
Description : Gwydion
Package: wnpp
Severity: wishlist
Owner: Charles Stevenson <[EMAIL PROTECTED]>
* Package name: gwydion-dylan
Version : x.y.z
Upstream Author : Name <[EMAIL PROTECTED]>
* URL : http://www.gwydiondylan.org/
* License : CMU
Description : The G
Package: wnpp
Severity: wishlist
Owner: Charles Stevenson <[EMAIL PROTECTED]>
* Package name: libghc6-http-dev
Version : x.y.z
Upstream Author : Name <[EMAIL PROTECTED]>
* URL : http://www.example.org/
* License : (GPL, LGPL, BSD, MIT/X, etc.)
Package: wnpp
Severity: wishlist
Owner: Charles Stevenson <[EMAIL PROTECTED]>
* Package name: libghc6-crypto-dev
Version : x.y.z
Upstream Author : Name <[EMAIL PROTECTED]>
* URL : http://www.example.org/
* License : (GPL, LGPL, BSD, MIT/X, etc.)
Package: wnpp
Severity: wishlist
Owner: Charles Stevenson <[EMAIL PROTECTED]>
* Package name: libghc6-newbinary-dev
Version : x.y.z
Upstream Author : Name <[EMAIL PROTECTED]>
* URL : http://www.example.org/
* License : (GPL, LGPL, BSD
Package: tagtool
Version: 0.12.2-1+b1
Severity: minor
In the process of pasting in lines into the tag titles from Mozilla and
apparently missing a few cases where a newline was in the paste buffer
and then renaming the files based on the tags I created some files which
scp and xmms really did not
Package: perl
Version: 5.8.7-7
Followup-For: Bug #341542
[EMAIL PROTECTED]:~$ perl -e 'printf("%2918905856\$vs")'
Segmentation fault
I haven't had time yet but I imagine it might be possible to gain root
through perl-suid.
peace,
core
-- System Information:
Debian Release: testing/unstable
A
Package: tiger
Version: 1:3.2.1-28
Severity: important
I've got postfix setup on my laptop rather than exim. Apparently the
package installation fails if there isn't a Debian-exim group. I added
a group to appease the package to workaround it.
dpkg: syntax error: unknown group `Debian-exim' in
Package: dillo
Version: 0.8.5-2
Severity: important
In previous versions of Dillo, one could open a URL by keying Ctrl-L or
clicking the file menu and selecting "Open URL". In either case a small
dialog was displayed wherein one could type the URL. This box no longer
appears on the screen from
://pulltheplug.org/users/core/files/x_osh3.sh
Kind Regards,
Charles Stevenson
-- System Information:
Debian Release: testing/unstable
APT prefers testing
APT policy: (500, 'testing')
Architecture: i386 (i686)
Shell: /bin/sh linked to /bin/bash
Kernel: Linux 2.6.14-corezion
Locale:
Package: luasocket
Version: 2.0-alpha-2
Followup-For: Bug #257256
Pretty please package the latest version. Or should I move on to
greener pastures. I've only been using lua a few weeks and it seems a
bit odd. Suggestions, flames, hints?
peace,
core
-- System Information:
Debian Release: te
Package: osh
Version: 1.7-13
Severity: critical
Tags: security
Justification: root security hole
http://lists.grok.org.uk/pipermail/full-disclosure/2005-August/036123.html
Fully functional exploit works on debian and ubuntu:
http://bokeoa.com/~core/x_osh2.pl
Kind Regards,
Charlie
-- System In
Apparently I'm too tired to be sending bug reports ;-) It appears that
suexec is not involved. My Qube2 finally finished running configure. I
think the solution is in apache2.conf to use www-data for User and
Group. Fixed the problems here :) Sorry for the bother. I think it has
to do with "don't u
Package: apache2-common
Version: 2.0.53-5
Severity: grave
Justification: user security hole
I'm fairly certain this is specific to the MIPS port. I looked at the
source and did some tests and am a bit perplexed. I thought it was a
signedness issue, integer overflow I think they call it. In any
17 matches
Mail list logo