Bug#1008354: fossil: FTBFS: ./conftest__.c:3: undefined reference to `sqlite3_open'

2022-05-05 Thread Nobuhiro Ban
Thank you for your reply. Understood. I will wait for the next release. 2022年5月5日(木) 17:14 Barak A. Pearlmutter : > > Yes. > > I patched over the issue for now by just using the internal sqlite3 > library, so I think it can wait until the next official release to > pick up the proper bug fix and

Bug#1008354: fossil: FTBFS: ./conftest__.c:3: undefined reference to `sqlite3_open'

2022-05-04 Thread Nobuhiro Ban
Dear Maintainer, This is a bug in the fossil configure tool, and fixed in upstream: commit: https://fossil-scm.org/home/info/8af827342f4c4a77 forum: https://fossil-scm.org/forum/info/549da79dd9 cf. https://www.sqlite.org/src/info/4cbb3e3efeb40cc4 Regards, Nobuhiro Ban

Bug#977397: uim-el: missing *-uim in input-method-alist on Emacs 27

2020-12-14 Thread Nobuhiro Ban
t invoke uim-el-agent.")) ;; don't ask kill -(process-kill-without-query proc) +(set-process-query-on-exit-flag proc nil) ;; wait "OK" (let ((patience uim-startup-timeout) (ok nil)) - End Regards, Nobuhiro Ban -- System Information: Debian Rele

Bug#977258: libssreflect-coq: ABI break by coq binNMU

2020-12-13 Thread Nobuhiro Ban
.0-1 (built against coq 8.12.0-3) + coq 8.12.0-3+b1. Regards, Nobuhiro Ban -- System Information: Debian Release: bullseye/sid APT prefers testing-debug APT policy: (500, 'testing-debug'), (500, 'stable-debug'), (500, 'testing'), (500, 'stable') Arch

Bug#764118: wordwarvi: cannot start game (GTK+/GLib mutex problem)

2014-10-05 Thread Nobuhiro Ban
Package: wordwarvi Version: 1.00+dfsg1-3 Severity: grave Tags: patch Justification: renders package unusable Dear Maintainer, Wordwarvi cannot start game. >$ LANG=C gdb -q wordwarvi >Reading symbols from wordwarvi...(no debugging symbols found)...done. >(gdb) r >Starting program: /usr/games/word

Bug#763899: jenkins: multiple security vulnerabilities

2014-10-03 Thread Nobuhiro Ban
Package: jenkins Version: 1.565.2-2 Severity: grave Tags: security Dear Maintainer, The upstream vendor announced a security advisory. In this advisory, some vulnerabilities are rated critical severity. https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2014-10-01 >SECURITY-8

Bug#759766: libnkf-perl: cannot load module on i386 arch

2014-08-29 Thread Nobuhiro Ban
Package: libnkf-perl Version: 2.13-3+b1 Severity: grave Dear Maintainer, NKF module for perl doesn't work on i386 arch: >% perl -e 'use NKF' >Can't use an undefined value as a subroutine reference at >/usr/lib/i386-linux-gnu/perl/5.20/DynaLoader.pm line 210. >END failed--call queue aborted at /u

Bug#745897: closed by Hideki Yamane (Bug#745897: fixed in libstruts1.2-java 1.2.9-9)

2014-07-21 Thread Nobuhiro Ban
Hi all, 2014-06-16 20:27 GMT+09:00 Emmanuel Bourg : >I got confirmation from the Struts developers that a new release using >commons-beanutils 1.9.2 is planned soon. So I'm going to prepare the >backport of commons-beanutils 1.9.2 in stable and wait for the new >release of Struts 1.x. Security fi

Bug#745897: fixed in libstruts1.2-java 1.2.9-9

2014-06-21 Thread Nobuhiro Ban
2014-06-15 15:35 GMT+09:00 Hideki Yamane : >> This pattern will match to words other than "class", eg. "fooClass". > Any class should be accepted, maybe it'd cause some > trouble but non-class should not named as *class, IMHO. That might be the case. This issue might be a very small problem. Act

Bug#745897: closed by Hideki Yamane (Bug#745897: fixed in libstruts1.2-java 1.2.9-9)

2014-06-01 Thread Nobuhiro Ban
'm not IT-security proofessional, so I can't say that this works perfect, sorry. Regards, Nobuhiro 2014-06-01 15:40 GMT+09:00 Hideki Yamane : > Hi, > > On Sun, 1 Jun 2014 15:03:20 +0900 > Nobuhiro Ban wrote: >> It's very strange regexp. Because we know (P1|.*|P2) ==

Bug#745897: closed by Hideki Yamane (Bug#745897: fixed in libstruts1.2-java 1.2.9-9)

2014-05-31 Thread Nobuhiro Ban
Hi, >- add struts-1.2.9-CVE-2014-0114.patch from Red Hat to fix CVE-2014-0114 http://sources.debian.net/src/libstruts1.2-java/1.2.9-9/debian/patches/struts-1.2.9-CVE-2014-0114.patch >+protected static final Pattern CLASS_ACCESS_PATTERN = Pattern >+.compile("(.*\\.|^|.*|\\[('|\

Bug#745897: libstruts1.2-java: CVE-2014-0094 affects Struts 1.x

2014-04-26 Thread Nobuhiro Ban
Package: libstruts1.2-java Version: 1.2.9-8 Severity: grave Tags: security Dear Maintainer, In https://security-tracker.debian.org/tracker/CVE-2014-0094 : >Notes >- libstruts1.2-java (Affects Struts 2.0.0 - Struts 2.3.16) But CVE-2014-0094 is known to affect Struts 1.x. Regards, Nobuhiro -

Bug#739067: jenkins: multiple security vulnerabilities

2014-02-15 Thread Nobuhiro Ban
Package: jenkins Version: 1.509.2+dfsg-2 Severity: grave Tags: security Dear Maintainer, The upstream vendor announced a security advisory. In this advisory, some vulnerabilities are rated high severity. https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2014-02-14 > SECURITY

Bug#706725: jenkins: multiple security vulnerabilities

2013-05-03 Thread Nobuhiro Ban
Package: jenkins Version: 1.447.2+dfsg-3, 1.480.3+dfsg-1~exp2 Severity: grave Tags: security Dear Maintainer, The upstream vendor announced a security advisory. In this advisory, one vulnerability is rated critical severity, two are high and one is medium. https://wiki.jenkins-ci.org/display/SEC

Bug#700761: jenkins: multiple security vulnerabilities

2013-02-16 Thread Nobuhiro Ban
Package: jenkins Version: 1.447.2+dfsg-3 Severity: grave Tags: security Dear Maintainer, The upstream vendor announced a security advisory. In this advisory, three vulnerabilities are rated high severity, one is medium and one is low. See: https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Se

Bug#697617: jenkins: remote code execution vulnerability

2013-01-07 Thread Nobuhiro Ban
Package: jenkins Version: 1.447.2+dfsg-2 Severity: grave Tags: security Dear Maintainer, The upstream vendor announced a security advisory, that is rated critical severity. See: https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2013-01-04 Regards, Nobuhiro -- To UNSUBS

Bug#696816: jenkins: Security issues were found in Jenkins core

2012-12-29 Thread Nobuhiro Ban
clone 696816 -1 reassign -1 jenkins-winstone 0.9.10-jenkins-37+dfsg-1 thanks Dear Maintainer, I found upstream "SECURITY-44" (aka CVE-2012-6072) was from Winstone, and it might be fixed in 0.9.10-jenkins-40. https://github.com/jenkinsci/jenkins/commit/ad084edb571555e7c5a9bc5b27aba09aac8da98d >[

Bug#696816: jenkins: Security issues were found in Jenkins core

2012-12-27 Thread Nobuhiro Ban
Package: jenkins Version: 1.447.2+dfsg-2 Severity: grave Tags: security Dear Maintainer, The upstream vendor announced a security advisory, that is rated high severity. See: https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2012-11-20 Regards, Nobuhiro -- To UNSUBSCRIB