o you mean this patch?
http://dtucker.freeshell.org/openntpd/patches/openntpd-3.6.1p1-linux-adjtimex.patch
What is the problem with it?
Regards,
Robbert
--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
.
Can't we just exclude kfreebsd-* from the Architecture field in
debian/control so that we don't build the package for kfreebsd (pending
the kfreebsd bug getting fixed)?
Regards,
Robbert
--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of &q
mportant' as I am still able to use the
package with apache 2.2.3-2, and would not like it to disappear while
there's no mod_authn_pam package yet.
Regards,
Robbert
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
ssage is caused by the fact that you didn't include
the 'authn_file' module (which enables you to use 'AuthUserFile'
statements in your Apache config).
This is breakage from the apache2 -> apache2.2 upgrade.
Can you try if a 'a2enmod authn_file' (and an apache
Package: xsupplicant
Version: 1.2.4.dfsg.1-2
Severity: critical
Tags: security
Justification: root security hole
Hi,
The upstream website mentions a new version which fixes a remote root exploit
possibility:
http://open1x.sourceforge.net/
Regards,
Robbert
-- System Information:
Debian
a working
substitute in Debian.
Regards,
Robbert
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
ition in place.
regards
Robbert
-- Package-specific info:
-- /etc/udev/rules.d/:
/etc/udev/rules.d/:
total 0
lrwxr-xr-x 1 root root 20 Jul 27 10:23 020_permissions.rules ->
../permissions.rules
lrwxrwxrwx 1 root root 19 Oct 19 15:32 025_libgphoto2.rules ->
../libgphoto2.rules
lrwxrwxrwx
7 matches
Mail list logo