[Bug 557346] Re: Sync barnowl 1.5.1-1 (universe) from Debian unstable (main)
Anders Kaseorg
andersk at mit.edu
Wed Apr 7 18:06:54 BST 2010
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-0793
** Description changed:
Please sync barnowl 1.5.1-1 (universe) from Debian unstable (main)
- NUV does not introduce new features, see http://sprunge.us/geOD.
+ NUV does not introduce new features, see
+ http://barnowl.mit.edu/browser/ChangeLog?rev=barnowl-1.5.1 .
Changelog entries since current lucid version 1.5-1:
barnowl (1.5.1-1) unstable; urgency=low
- * New upstream release, including solution to cve-2010-0793, Closes:
- #574418
+ * New upstream release, including solution to cve-2010-0793, Closes:
+ #574418
- -- Sam Hartman <hartmans at debian.org> Mon, 05 Apr 2010 16:33:43 -0400
-
- owl (2.1.8-2.1) unstable; urgency=low
-
- * Non-maintainer upload.
- * Include a patch from Andreas Jochens to fix compilation with gcc-4.0.
- Closes: #287891
- * Add some prototypes to perlglue.xs to avoid the implicit conversion of
- return pointers from owl_zephyr_get_realm() & owl_zephyr_get_sender().
- Closes: #326106
-
- -- dann frazier <dannf at debian.org> Tue, 11 Oct 2005 20:47:51 -0600
-
- owl (2.1.8-2) unstable; urgency=low
-
- * zcrypt.c: use kerberosIV/des.h, not the openafs one. Closes: #189108.
- * configure.in: change it in the test, too.
-
- -- Mark W. Eichin <eichin at thok.org> Sun, 29 Aug 2004 16:25:03 -0400
-
- owl (2.1.8-1) unstable; urgency=low
-
- * New upstream release. Kept debian/*, dropped all old patches
- (everything that mattered was already upstream.)
- * debian/copyright: new upstream location and mailing lists
- * configure.in: don't look for libdes, it breaks kerberized zephyr.
- * zephyr.c: actually record error_message in owl_function_error calls.
-
- -- Mark W. Eichin <eichin at thok.org> Sun, 29 Aug 2004 13:21:53 -0400
+ -- Sam Hartman <hartmans at debian.org> Mon, 05 Apr 2010 16:33:43 -0400
--
Sync barnowl 1.5.1-1 (universe) from Debian unstable (main)
https://bugs.launchpad.net/bugs/557346
You received this bug notification because you are a member of Ubuntu
Sponsors for universe, which is a direct subscriber.
More information about the Ubuntu-universe-sponsors
mailing list