William Grant wrote:
> ** Changed in: egroupware (Ubuntu)
>Status: Confirmed => Fix Released
Thanks for releasing a fix for this security issue, William.
Shall we open a new bug report for a request for the 1.4.x version to be
packaged? That was part of this original bug report, but I r
** Changed in: egroupware (Ubuntu)
Status: Confirmed => Fix Released
--
[CVE-2007-5091] egroupware: new upstream version 1.4.002
https://bugs.launchpad.net/bugs/151492
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
--
ubuntu-bug
CVE-2007-5091 is fixed in both Gutsy and Hardy (version 1.2.107-2.dfsg-2
contains the fix).
--
[CVE-2007-5091] egroupware: new upstream version 1.4.002
https://bugs.launchpad.net/bugs/151492
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
+1 for eGW 1.4 in Hardy!
Moreover Hardy is a LTS release and eGW will be likely used in server
(which preferentially go with LTS releases!)!
--
[CVE-2007-5091] egroupware: new upstream version 1.4.002
https://bugs.launchpad.net/bugs/151492
You received this bug notification because you are a mem
Hi Mark,
I'm well aware of this being a volunteer effort (I contribute myself to
different such efforts), my comment was just a confirmation that this
bug also affects hardy.
Sorry for the noise.
--
[CVE-2007-5091] egroupware: new upstream version 1.4.002
https://bugs.launchpad.net/bugs/151492
Jonathan,
It's not done yet because this a volunteer effort and no one has
volunteered. You are free to do the work yourself, or persuade or pay
something to do it for you.
Mark
--
[CVE-2007-5091] egroupware: new upstream version 1.4.002
https://bugs.launchpad.net/bugs/151492
You received t
This is still not fixed in hardy...
--
[CVE-2007-5091] egroupware: new upstream version 1.4.002
https://bugs.launchpad.net/bugs/151492
You received this bug notification because you are a member of Ubuntu
Bugs, which is the bug contact for Ubuntu.
--
ubuntu-bugs mailing list
ubuntu-bugs@lists.u
I checked to see what happened in Debian that made them make this
"Fix/Released". They applied the security patches to 1.2, rather than
moving forward with a full 1.4 release.
--
[CVE-2007-5091] egroupware: new upstream version 1.4.002
https://bugs.launchpad.net/bugs/151492
You received this bug
The debdiffs are needed for the security updates, where Ubuntu keeps the
same version and backports fixes.
Packaging a new upstream requires more work, and while a debdiff (or in
this case interdiff) is needed, the full debianized source package will
also need to be provided. Here a couple of pla
** Changed in: egroupware (Debian)
Status: Unknown => Fix Released
--
[CVE-2007-5091] egroupware: new upstream version 1.4.002
https://bugs.launchpad.net/bugs/151492
You received this bug notification because you are a member of Ubuntu
Bugs, which is the bug contact for Ubuntu.
--
ubuntu
I followed the steps here tonight to build a debdiff:
https://wiki.ubuntu.com/PackagingGuide/Recipes/PackageUpdate
It ultimately failed because of the relationship of the "egw-pear"
package, which I don't follow understand.
The final error when I ran " sudo pbuilder build egroupware_1.4.002
.dfs
Hi Mark,
thanks :-)
Ralf
Mark Stosberg schrieb:
> I'm going to try to make the requested 'debdiff' tonight. I've never
> done that before, so I'll see how it goes... However, I already did a
> manual install of eGroupware 1.4 on Ubuntu, and it went very smoothly.
>
> Mark
>
> ** Changed in:
I'm going to try to make the requested 'debdiff' tonight. I've never
done that before, so I'll see how it goes... However, I already did a
manual install of eGroupware 1.4 on Ubuntu, and it went very smoothly.
Mark
** Changed in: egroupware (Ubuntu)
Assignee: (unassigned) => Mark Stosberg
13 matches
Mail list logo