And another patch, prompted by Martin Michlmayr's posting in debian-devel
about gcc 4.1 being the default for etch. Changelog entry addition:
* Kill some pointer<->int casting warnings on 64-bit architectures.
(All three fixes are in CVS HEAD; I've just committed two of them.)
--
| Darren Sal
On Tue, Jun 06, 2006 at 11:04:40PM +0100, Darren Salt wrote:
> I demand that Reinhard Tartler may or may not have written...
>
> [snip]
> > I prepared an upload here:
> > http://siretart.tauware.de/upload-queue/xine-lib_1.1.1-2.dsc
>
> It needs the attached patch (committed to CVS by Matthias Hop
I demand that Reinhard Tartler may or may not have written...
[snip]
> I prepared an upload here:
> http://siretart.tauware.de/upload-queue/xine-lib_1.1.1-2.dsc
It needs the attached patch (committed to CVS by Matthias Hopf).
--
| Darren Salt| linux or ds at | nr. Ashington, |
On Sat, Jun 03, 2006 at 02:37:47PM +0100, Darren Salt wrote:
> > I took your source package and gave it the version 1.1.1-2. I sucessfully
> > built it on amd64, but got no sound at all (but might be chroot related, so
> > I'm not sure).
>
> Bind-mounting /dev should fix that :-)
>
> (I can test
I demand that Reinhard Tartler may or may not have written...
> On Fri, Jun 02, 2006 at 10:10:01PM +0100, Darren Salt wrote:
>> The .diff.gz, .dsc etc. for 1.1.1-1.2 are at
>> http://zap.tartarus.org/~ds/debian/>
> Btw, why aren't you in Uploaders: and prepare a new maintainer upload?
Siggi -
I demand that Adeodato Simó may or may not have written...
> * Reinhard Tartler [Fri, 02 Jun 2006 21:41:02 +0200]:
>> On Fri, Jun 02, 2006 at 07:14:05PM +0100, Darren Salt wrote:
>>> I demand that Reinhard Tartler may or may not have written...
How about uploading it to experimental first, a
* Reinhard Tartler [Fri, 02 Jun 2006 21:41:02 +0200]:
Hey,
> On Fri, Jun 02, 2006 at 07:14:05PM +0100, Darren Salt wrote:
> > I demand that Reinhard Tartler may or may not have written...
> > > How about uploading it to experimental first, and give more ppl the chance
> > > of actually testing i
I demand that Reinhard Tartler may or may not have written...
> On Fri, Jun 02, 2006 at 07:14:05PM +0100, Darren Salt wrote:
[snip]
>> On mips, the problem in the buildd log is too-early use of inline
>> functions; you should find that my VDR-patched version is buildable there,
>> or at least fail
On Fri, Jun 02, 2006 at 07:14:05PM +0100, Darren Salt wrote:
> I demand that Reinhard Tartler may or may not have written...
>
> >> I'm going to prepare an NMU (sponsored by Adeodato Simó) which may or may
> >> not fix this bug (but will fix various others, particularly the build
> >> failure on s
I demand that Reinhard Tartler may or may not have written...
> On Thu, Jun 01, 2006 at 11:17:48PM +0100, Darren Salt wrote:
>> I'm going to prepare an NMU (sponsored by Adeodato Simó) which may or may
>> not fix this bug (but will fix various others, particularly the build
>> failure on sparc, wh
On Thu, Jun 01, 2006 at 11:17:48PM +0100, Darren Salt wrote:
> I'm going to prepare an NMU (sponsored by Adeodato Simó) which may or may
> not fix this bug (but will fix various others, particularly the build failure
> on sparc, which is due to a missing "-I "). It should also fix the
> "sorry, uni
I'm going to prepare an NMU (sponsored by Adeodato Simó) which may or may
not fix this bug (but will fix various others, particularly the build failure
on sparc, which is due to a missing "-I "). It should also fix the
"sorry, unimplemented" failures on some other architectures, which is due to
use
No, I didn't test the exploit when I filed the bug. I can't reproduce
the crash now, neither with xine nor gxine (gxine is in a separate
package).
The file seems to be asf, and normally the xine in debian can play
(or at least demux) asf. Either Debian's xine is not vulnerable
because some fea
Stefan Fritsch wrote:
> Package: libxine1
> Version: 1.1.1-1
> Severity: grave
> Tags: security
> Justification: user security hole
>
>
>
> According to CVE-2006-1664, there is a "buffer overflow in
> xine_list_delete_current in libxine 1.14 and earlier, as distributed
> in xine-lib 1.1.1 and ea
Package: libxine1
Version: 1.1.1-1
Severity: grave
Tags: security
Justification: user security hole
According to CVE-2006-1664, there is a "buffer overflow in
xine_list_delete_current in libxine 1.14 and earlier, as distributed
in xine-lib 1.1.1 and earlier, allows remote attackers to execute
ar
15 matches
Mail list logo