Re: Redundant emails - front desk

2016-07-20 Thread Chris Lamb
> I tried to help with front desk work today May I ask why? There is a frontdesk "rota" to avoid duplicate work of this sort and, as you have now noticed, there was not a significant backlog if any, especially with respect to issues that have no resolution and still need checking.. Regards, --

Redundant emails - front desk

2016-07-20 Thread Lucas Kanashiro
Hi, I tried to help with front desk work today, but unfortunately I sent some redundant emails because I did not realize that they had already been sent. Sorry, I'll take more care before start to send these kind of emails. Regards. -- Lucas Kanashiro 8ED6 C3F8 BAC9 DB7F C130 A870 F823 A272

Re: Wheezy update of libjgroups-java?

2016-07-20 Thread Emmanuel Bourg
Le 20/07/2016 à 22:43, Lucas Kanashiro a écrit : > the Debian LTS team would like to fix the security issues which are > currently open in the Wheezy version of shadow: > https://security-tracker.debian.org/tracker/CVE-2016-2141 > > Would you like to take care of this yourself? Hi Lucas, I

Wheezy update of libjgroups-java?

2016-07-20 Thread Lucas Kanashiro
Hello dear maintainer(s), the Debian LTS team would like to fix the security issues which are currently open in the Wheezy version of shadow: https://security-tracker.debian.org/tracker/CVE-2016-2141 Would you like to take care of this yourself? If yes, please follow the workflow we have

Wheezy update of kde4libs?

2016-07-20 Thread Lucas Kanashiro
Hello dear maintainer(s), the Debian LTS team would like to fix the security issues which are currently open in the Wheezy version of shadow: https://security-tracker.debian.org/tracker/CVE-2016-6232 Would you like to take care of this yourself? If yes, please follow the workflow we have

Wheezy update of pdns?

2016-07-20 Thread Lucas Kanashiro
Hello dear maintainer(s), the Debian LTS team would like to fix the security issues which are currently open in the Wheezy version of pdns: https://security-tracker.debian.org/tracker/CVE-2016-6172 Would you like to take care of this yourself? If yes, please follow the workflow we have defined

Wheezy update of shadow?

2016-07-20 Thread Chris Lamb
Hello dear maintainer(s), the Debian LTS team would like to fix the security issues which are currently open in the Wheezy version of shadow: https://security-tracker.debian.org/tracker/CVE-2016-6251 https://security-tracker.debian.org/tracker/CVE-2016-6252 Would you like to take care of this

Re: Wheezy update of roundcube

2016-07-20 Thread Lucas Kanashiro
On 07/20/2016 02:23 PM, Markus Koschany wrote: > Hi, > > Feel free to work on everything you like. Fixing CVE-2014-9587 together > with CVE-2016-4069 isn't strictly required but you could probably reuse > some of your work if you try to tackle these issue. In any case the > whole CSRF complex

Re: Wheezy update of roundcube

2016-07-20 Thread Lucas Kanashiro
Hi Markus, On 07/20/2016 01:12 PM, Markus Koschany wrote: > Hello Lucas, > > I have prepared the last update of roundcube and just had a look at your > patch. Unfortunately a proper fix for CVE-2016-4069 in Wheezy isn't as > simple as it looks like on first glance. The whole foundation to

Wheezy update of roundcube

2016-07-20 Thread Lucas Kanashiro
Hello dear maintainer(s), the Debian LTS team would like to fix the security issues which are currently open in the Wheezy version of roundcube: https://security-tracker.debian.org/tracker/CVE-2016-4069 I missed the first contact where I should answer if you want to do it or leave it to us,

[SECURITY] [DLA 553-1] apache2 security update

2016-07-20 Thread Salvatore Bonaccorso
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Package: apache2 Version: 2.2.22-13+deb7u7 CVE ID : CVE-2016-5387 Scott Geary of VendHQ discovered that the Apache HTTPD server used the value of the Proxy header from HTTP requests to initialize the HTTP_PROXY environment