Thank you for your reply.
Understood. I will wait for the next release.
2022年5月5日(木) 17:14 Barak A. Pearlmutter :
>
> Yes.
>
> I patched over the issue for now by just using the internal sqlite3
> library, so I think it can wait until the next official release to
> pick up the proper bug fix and
Dear Maintainer,
This is a bug in the fossil configure tool, and fixed in upstream:
commit: https://fossil-scm.org/home/info/8af827342f4c4a77
forum: https://fossil-scm.org/forum/info/549da79dd9
cf. https://www.sqlite.org/src/info/4cbb3e3efeb40cc4
Regards,
Nobuhiro Ban
t invoke uim-el-agent."))
;; don't ask kill
-(process-kill-without-query proc)
+(set-process-query-on-exit-flag proc nil)
;; wait "OK"
(let ((patience uim-startup-timeout) (ok nil))
- End
Regards,
Nobuhiro Ban
-- System Information:
Debian Rele
.0-1 (built against coq 8.12.0-3) + coq 8.12.0-3+b1.
Regards,
Nobuhiro Ban
-- System Information:
Debian Release: bullseye/sid
APT prefers testing-debug
APT policy: (500, 'testing-debug'), (500, 'stable-debug'), (500,
'testing'), (500, 'stable')
Arch
Package: wordwarvi
Version: 1.00+dfsg1-3
Severity: grave
Tags: patch
Justification: renders package unusable
Dear Maintainer,
Wordwarvi cannot start game.
>$ LANG=C gdb -q wordwarvi
>Reading symbols from wordwarvi...(no debugging symbols found)...done.
>(gdb) r
>Starting program: /usr/games/word
Package: jenkins
Version: 1.565.2-2
Severity: grave
Tags: security
Dear Maintainer,
The upstream vendor announced a security advisory.
In this advisory, some vulnerabilities are rated critical severity.
https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2014-10-01
>SECURITY-8
Package: libnkf-perl
Version: 2.13-3+b1
Severity: grave
Dear Maintainer,
NKF module for perl doesn't work on i386 arch:
>% perl -e 'use NKF'
>Can't use an undefined value as a subroutine reference at
>/usr/lib/i386-linux-gnu/perl/5.20/DynaLoader.pm line 210.
>END failed--call queue aborted at /u
Hi all,
2014-06-16 20:27 GMT+09:00 Emmanuel Bourg :
>I got confirmation from the Struts developers that a new release using
>commons-beanutils 1.9.2 is planned soon. So I'm going to prepare the
>backport of commons-beanutils 1.9.2 in stable and wait for the new
>release of Struts 1.x.
Security fi
2014-06-15 15:35 GMT+09:00 Hideki Yamane :
>> This pattern will match to words other than "class", eg. "fooClass".
> Any class should be accepted, maybe it'd cause some
> trouble but non-class should not named as *class, IMHO.
That might be the case. This issue might be a very small problem.
Act
'm not IT-security proofessional, so I can't say that this works
perfect, sorry.
Regards,
Nobuhiro
2014-06-01 15:40 GMT+09:00 Hideki Yamane :
> Hi,
>
> On Sun, 1 Jun 2014 15:03:20 +0900
> Nobuhiro Ban wrote:
>> It's very strange regexp. Because we know (P1|.*|P2) ==
Hi,
>- add struts-1.2.9-CVE-2014-0114.patch from Red Hat to fix CVE-2014-0114
http://sources.debian.net/src/libstruts1.2-java/1.2.9-9/debian/patches/struts-1.2.9-CVE-2014-0114.patch
>+protected static final Pattern CLASS_ACCESS_PATTERN = Pattern
>+.compile("(.*\\.|^|.*|\\[('|\
Package: libstruts1.2-java
Version: 1.2.9-8
Severity: grave
Tags: security
Dear Maintainer,
In https://security-tracker.debian.org/tracker/CVE-2014-0094 :
>Notes
>- libstruts1.2-java (Affects Struts 2.0.0 - Struts 2.3.16)
But CVE-2014-0094 is known to affect Struts 1.x.
Regards,
Nobuhiro
-
Package: jenkins
Version: 1.509.2+dfsg-2
Severity: grave
Tags: security
Dear Maintainer,
The upstream vendor announced a security advisory.
In this advisory, some vulnerabilities are rated high severity.
https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2014-02-14
> SECURITY
Package: jenkins
Version: 1.447.2+dfsg-3, 1.480.3+dfsg-1~exp2
Severity: grave
Tags: security
Dear Maintainer,
The upstream vendor announced a security advisory.
In this advisory, one vulnerability is rated critical severity,
two are high and one is medium.
https://wiki.jenkins-ci.org/display/SEC
Package: jenkins
Version: 1.447.2+dfsg-3
Severity: grave
Tags: security
Dear Maintainer,
The upstream vendor announced a security advisory.
In this advisory, three vulnerabilities are rated high severity,
one is medium and one is low.
See:
https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Se
Package: jenkins
Version: 1.447.2+dfsg-2
Severity: grave
Tags: security
Dear Maintainer,
The upstream vendor announced a security advisory, that is rated
critical severity.
See:
https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2013-01-04
Regards,
Nobuhiro
--
To UNSUBS
clone 696816 -1
reassign -1 jenkins-winstone 0.9.10-jenkins-37+dfsg-1
thanks
Dear Maintainer,
I found upstream "SECURITY-44" (aka CVE-2012-6072) was from Winstone,
and it might be fixed in 0.9.10-jenkins-40.
https://github.com/jenkinsci/jenkins/commit/ad084edb571555e7c5a9bc5b27aba09aac8da98d
>[
Package: jenkins
Version: 1.447.2+dfsg-2
Severity: grave
Tags: security
Dear Maintainer,
The upstream vendor announced a security advisory, that is rated high severity.
See:
https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2012-11-20
Regards,
Nobuhiro
--
To UNSUBSCRIB
18 matches
Mail list logo