Package: ejabberd
Version: 14.05-1~experimental2
Severity: grave
Hi folks,
when upgrading from 2.1.x to 14.05 the configuration of the Mnesia database
is not properly updated. While older versions used ejabberd@$(hostname) for
the EJABBERD_NODE it is ejabberd@localhost for the most recent one. Th
libssh2-php and upgrade works more smoothly.
Kind regards,
Benny Baumann
-- System Information:
Debian Release: jessie/sid
APT prefers testing
APT policy: (900, 'testing'), (800, 'stable'), (750, 'experimental'), (700,
'unstable'), (500, 'oldstable'
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Hi Daniel,
Am 21.05.2014 12:55, schrieb Daniel Baumann:
> On 05/19/2014 09:40 AM, Benny Baumann wrote:
>> Even then you should make sure you are recommending the correct
>> version (python3 >= 3.3) which currently is not the cas
package unuseable for many
people - despite this only appearing in one sub-command.
Kind regards,
Benny Baumann
-BEGIN PGP SIGNATURE-
Version: GnuPG v1
iQIcBAEBCgAGBQJTebVpAAoJEPHTXLno4S6t4soP/RyyKSxgAWnt0FrDsn7wPl2T
FdtoDUi1x9lVVAxgH51a8sjE5x5P+oiHLU2m82Hvs+JMpuzuJZ0uWkLO
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Hi,
The issue seems to go away when python3.3 or newer is installed.
Thus having python3 (>= 3.3) as a dependency (and not only
recommendation) should fix those issues.
Kind regards,
Benny Baumann.
-BEGIN PGP SIGNATURE-
Version: GnuPG
Even after pulling those additional dependencies I run into [1].
Kind regards,
Benny Baumann
[1] https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=745418
-- System Information:
Debian Release: wheezy/stable
APT prefers stable
APT policy: (900, 'stable'), (800, 'testing
configuration can be configured to use strong
cryptography, using non-broken primitives and does so by default.
Kind regards,
Benny Baumann
P.S.: By courtesy of #747453.
-- System Information:
Debian Release: jessie/sid
APT prefers testing
APT policy: (900, 'testing'), (800, '
regards,
Benny Baumann
-- System Information:
Debian Release: jessie/sid
APT prefers testing
APT policy: (900, 'testing'), (800, 'stable'), (750, 'experimental'), (700,
'unstable'), (500, 'oldstable')
Architecture: amd64 (x86_64)
Kernel: Linux 3.13-
than 4096 bit for RSA or similarly for DSA and ECDSA.
Kind regards,
Benny Baumann
-- System Information:
Debian Release: jessie/sid
APT prefers testing
APT policy: (900, 'testing'), (800, 'stable'), (750, 'experimental'), (700,
'unstable'), (500,
are to be expected in casually-paranoid setups.
Please apply both patches ASAP and forward them to be included upstream.
Kind regards,
Benny Baumann
-- System Information:
Debian Release: jessie/sid
APT prefers testing
APT policy: (900, 'testing'), (800, 'stable'), (750,
Package: linux-headers-3.8-trunk-amd64
Severity: grave
Try installing the linux-headers-3.8-trunk-all package which fails due
to this unmet dependency. Please build it properly as creation of
custom kernel modules isn't possible otherwise.
Regards,
BenBE.
-- System Information:
Debian Release: 7
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi
I can confirm this. Haven't noticed any issues recently with the current
versions.
Regards,
BenBE.
Am 07.01.2013 20:24, schrieb gregor herrmann:
> On Tue, 01 Jan 2013 14:48:02 -0500, Yaroslav Halchenko wrote:
>
>> I haven't heard any bad report
Dear Steven,
Am 20.08.2012 05:12, schrieb Steven Chamberlain:
> tags 685324 + moreinfo unreproducible
> tags 685323 + moreinfo unreproducible
> merge 685324 685323
> severity 685326 wishlist
> merge 685326 584251
> thanks
>
> Hi,
>
> Were these reports of security issues supposed to be genuine?
Ye
Package: php-geshi
Version: 1.0.8.4-1
Severity: serious
Tags: upstream
Despite being asked for about two years ago this package hasn't been updated
by the responsible maintainers. Also direct contact to the maintainers at
several
points in time and occasions achieved no response which would lead
Package: php-geshi
Version: 1.0.8.4-1
Severity: serious
Tags: security upstream
GeSHi 1.0.8.11 closes a local file inclusion vulnerability present in one
of the contrib scripts provided in the GeSHi distribution. The bug has been
present for at least 1.0.8.4 (and maybe even longer).
Please upgrad
Package: php-geshi
Version: 1.0.8.4-1
Severity: serious
Tags: security upstream
GeSHi 1.0.8.11 closes non-persistent XSS vulnerability in a contrib script
provided in
the GeSHi distribution. The vulnerability can be triggered by an attacker using
a
specially crafted URL when calling a vulnerable
Package: libgamin0
Version: 0.1.10-4
Severity: critical
Justification: breaks unrelated software
Dear Maintainer,
* What led up to the situation?
I've been running a Courier IMAP and POP3 server on my system for quite some
time which worked
just fine except for some mail clients reporting "f
Package: arduino-mk
Version: 0.8-1
Severity: grave
Justification: renders package unusable
When compiling a custom project using the Arduino.mk file of this package
you automatically get a line
#include
at the beginning of the internally compiled file of your project. As this
file is no longer
Package: arduino-mk
Version: 0.8-1
Severity: grave
Justification: renders package unusable
In the included file /usr/share/arduino/ard-parse-boards script, line 12,
there's a hardcoded path to some weird MacOSX application directory
which is guaranteed to not exist on any sane Debian system by FHS
Am 01.12.2009 22:18, schrieb Iustin Pop:
> On Wed, Nov 18, 2009 at 11:54:31AM +0100, Benny Baumann wrote:
>
>> Package: mc
>> Version: 2:4.6.2~git20080311-4
>> Severity: critical
>> Justification: breaks the whole system
>>
>> When running mc inside a
Package: mc
Version: 2:4.6.2~git20080311-4
Severity: critical
Justification: breaks the whole system
When running mc inside a screen session via SSH mc crashes as soon as you resize
the window in which mc is displayed. When this error occures mc freezes and
allocates memory in an endless loop in t
21 matches
Mail list logo