fixed -1 1.1.1-1
close -1
thanks
Looking at the package, it seems like this bug has been fixed in version
1.1.1-1 - I can find no more references to unversioned python in that version.
I marked the bug as fixed. Please re-open if I am mistaken.
Best,
Jann
On Tue, 04 Aug 2020 09:28:33 +
:18:23.0 +0200
+++ libiptcdata-1.0.5/debian/changelog 2020-08-20 16:36:58.0 +0200
@@ -1,3 +1,10 @@
+libiptcdata (1.0.5-2.3) unstable; urgency=medium
+
+ * Non-maintainer upload.
+ * Drop binary package python-iptcdata. Closes: #936880.
+
+ -- Jann Haber Thu, 20 Aug 2020 16:36:58
The package still depends on python2, so this bug is not yet fixed.
Wouldn't the easiest fix for this bug and also #937062, #966763 and #967043 be
to just drop the binary package libapache2-mod-wsgi and only keeping the py3
version around?
There seem to be no more rdeps in testing, so no other packages are blocking
the removal (right?). This would help the pyth
On 8/17/20 12:50 AM, Ben Finney wrote:
> Control: forcemerge -1 967200
> Control: block -1 by 933750
> Control: outlook -1 0
>
> The updated package is ready, and waiting for reverse-dependencies (as
> described in bug reports blocking this one) to drop Python 2 support.
>
&
It seems like, there are no more rdeps of python-coverage now. Not sure about
pypy-coverage.
Dropping python-coverage would also fix #967200, which currently blocks
migration to testing. :)
On Mon, 11 Nov 2019 05:48:22 +1100 Ben Finney wrote:
> Control: reopen -1
> Control: tags -1 + pending
>
file
tests/reinit_types/DownstreamReinitTypesTest-3e32260cc0788418d241e6134893e7f2/metadata),
not sure if this is intentional. When building again, these need to be removed
in any case.
Best Regards,
Jann
On Fri, 30 Aug 2019 07:48:18 + Matthias Klose wrote:
> Package: src:python-ve
Package: netfilter-persistent
Version: 1.0.3
Severity: grave
Tags: security
Justification: user security hole
If netfilter-persistent or one of its dependencies fails to load,
system boot continues normally with a wide-open netfilter
configuration. IMO, this should fail secure: If the firewall can
openssl (1.0.1e-2+deb7u5) ...
It restarted OpenSSH... and only OpenSSH. I then ran this command:
root@thejh:/home/jann# for pid in $(grep -F
'/usr/lib/x86_64-linux-gnu/libssl.so.1.0.0 (deleted)' /proc/*/maps | cut -d/
-f3 | sort -u); do cat /proc/$pid/cmdline | tr '\0'
Package: mount
Version: 2.20.1-5.3
Severity: critical
Tags: security
Justification: root security hole
mount discloses information about folders not accessible for a user:
$ ls -ld /root/.ssh
ls: cannot access /root/.ssh: Permission denied
$ ls -ld /root/.foo
ls: cannot access /root/.foo: Permiss
Package: gatling
Version: 0.12cvs20120114-2
Severity: grave
Tags: upstream security
Justification: user security hole
gatling 0.12 has two directory traversal vulns (one in the handling of Host
headers, one
in the ftp code) that have been fixed in Gatling 0.13.
-- System Information:
Debian Rele
11 matches
Mail list logo