Processing of eglibc_2.11.3-4+deb6u4_amd64.changes

2015-01-27 Thread Debian FTP Masters
eglibc_2.11.3-4+deb6u4_amd64.changes uploaded successfully to ftp-master.debian.org along with the files: eglibc_2.11.3-4+deb6u4.dsc eglibc_2.11.3-4+deb6u4.diff.gz glibc-doc_2.11.3-4+deb6u4_all.deb eglibc-source_2.11.3-4+deb6u4_all.deb locales_2.11.3-4+deb6u4_all.deb

Processing of eglibc_2.11.3-4+deb6u4_amd64.changes

2015-01-27 Thread Debian FTP Masters
eglibc_2.11.3-4+deb6u4_amd64.changes uploaded successfully to localhost along with the files: eglibc_2.11.3-4+deb6u4.dsc eglibc_2.11.3-4+deb6u4.diff.gz glibc-doc_2.11.3-4+deb6u4_all.deb eglibc-source_2.11.3-4+deb6u4_all.deb locales_2.11.3-4+deb6u4_all.deb

eglibc_2.11.3-4+deb6u4_amd64.changes ACCEPTED into squeeze-lts

2015-01-27 Thread Debian FTP Masters
Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Tue, 27 Jan 2015 23:57:55 +0100 Source: eglibc Binary: libc-bin libc-dev-bin glibc-doc eglibc-source locales locales-all nscd libc6 libc6-dev libc6-dbg libc6-prof libc6-pic libc6-udeb libc6.1 libc6.1-dev libc6.1-dbg

Restarting services / rebooting after security update?

2015-01-27 Thread Olaf van der Spek
Hi, It seems no services were restarted after the recent update. Shouldn't this be done to ensure the updated code is picked up? Gr, Olaf $ sudo apt-get update Get:1 http://security.debian.org wheezy/updates Release.gpg [836 B] Get:2 http://security.debian.org wheezy/updates Release [102 kB]

eglibc_2.13-38+deb7u7_amd64.changes ACCEPTED into proposed-updates-stable-new

2015-01-27 Thread Debian FTP Masters
Mapping stable-security to proposed-updates. Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Tue, 27 Jan 2015 00:38:49 +0100 Source: eglibc Binary: libc-bin libc-dev-bin glibc-doc eglibc-source locales locales-all nscd multiarch-support libc6 libc6-dev libc6-dbg

Processed: reassign 776391 to eglibc

2015-01-27 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: # Fixed in glibc in sid/testing, reassigning to eglibc # Assuming oldstable to be affected reassign 776391 eglibc 2.11.3-4 Bug #776391 {Done: Florian Weimer f...@deneb.enyo.de} [libc6] [CVE-2015-0235]: heap-based buffer overflow in

Bug#776391: [CVE-2015-0235]: heap-based buffer overflow in __nss_hostname_digits_dots()

2015-01-27 Thread Ondřej Surý
Package: libc6 Version: 2.19-13 Severity: grave Tags: security upstream Justification: user security hole -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Hi, as this has been made public, let's fix it quickly (it might even be a critical as this is remote): From:

Processed: reopening 776391, found 776391 in 2.13-38+deb7u6

2015-01-27 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: # Reopen and add stable as oldstable and stable diverged reopen 776391 Bug #776391 {Done: Florian Weimer f...@deneb.enyo.de} [eglibc] [CVE-2015-0235]: heap-based buffer overflow in __nss_hostname_digits_dots() Bug reopened Ignoring request to

Bug#776391: marked as done ([CVE-2015-0235]: heap-based buffer overflow in __nss_hostname_digits_dots())

2015-01-27 Thread Debian Bug Tracking System
Your message dated Tue, 27 Jan 2015 16:40:15 +0100 with message-id 877fw81bc0@mid.deneb.enyo.de and subject line Re: Bug#776391: [CVE-2015-0235]: heap-based buffer overflow in __nss_hostname_digits_dots() has caused the Debian Bug report #776391, regarding [CVE-2015-0235]: heap-based buffer

Processing of eglibc_2.13-38+deb7u7_amd64.changes

2015-01-27 Thread Debian FTP Masters
eglibc_2.13-38+deb7u7_amd64.changes uploaded successfully to localhost along with the files: eglibc_2.13-38+deb7u7.dsc eglibc_2.13-38+deb7u7.diff.gz glibc-doc_2.13-38+deb7u7_all.deb eglibc-source_2.13-38+deb7u7_all.deb locales_2.13-38+deb7u7_all.deb libc6_2.13-38+deb7u7_amd64.deb

Processed: fixed 776391 in 2.18-1

2015-01-27 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: fixed 776391 2.18-1 Bug #776391 [eglibc] [CVE-2015-0235]: heap-based buffer overflow in __nss_hostname_digits_dots() There is no source info for the package 'eglibc' at version '2.18-1' with architecture '' Unable to make a source version for

Processed: fixed 776391 in 2.13-38+deb7u7

2015-01-27 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: fixed 776391 2.13-38+deb7u7 Bug #776391 [eglibc] [CVE-2015-0235]: heap-based buffer overflow in __nss_hostname_digits_dots() There is no source info for the package 'eglibc' at version '2.13-38+deb7u7' with architecture '' Unable to make a