Your message dated Fri, 19 Oct 2012 17:12:43 +0200
with message-id <[email protected]>
and subject line Re: Bug#686079: unblock: letodms-3.3.9+dfsg-1
has caused the Debian Bug report #686079,
regarding unblock: letodms/3.3.7+dfsg-1
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
686079: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686079
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: release.debian.org
Severity: normal
User: [email protected]
Usertags: unblock

Please unblock package letodms

The current letodms version in testing (3.3.4+dfsg-1) has some
important security vulnerabilities. Current version 3.3.6+dfsg-1 in
unstable is vulnerable too.

These issues are fixed in new upstream version 3.3.7.


unblock letodms/3.3.7+dfsg-1


Thank you.

Regards,
Francisco.

[1] http://security-tracker.debian.org/tracker/source-package/letodms

--- End Message ---
--- Begin Message ---
On 2012-10-05 10:06, Francisco Manuel Garcia Claramonte wrote:
> Hi,
> 
> The security issues are definitively fixed in packages:
> letodms-3.3.9+dfsg-1 and php-letodms-core-3.3.9-1 (bug #689691 [1]). 
> 
> Most changes in these packages are related with the security issues.
> Please, consider to unblock these two packages. In other case, 
> letodms must be removed from testing, because letodms-3.3.7+dfsg-1 is not 
> valid
> for Debian stable.
> 
> This bug is related with bug #689664 [2].
> 
> Thank you your support.
> 
> Regards,
> Francisco.
> 
> [1] http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=689691
> [2] http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=689664
> 
> 

Unblocked, thanks.

~Niels

--- End Message ---

Reply via email to