python-django LTS

2024-02-26 Thread Sean Whitton
Hello Chris, Do you have WIP for python-django LTS fixes? Can I work on it without duplicating effort? Thought I'd check, since you're the maintainer. -- Sean Whitton signature.asc Description: PGP signature

imagemagick LTS

2024-02-26 Thread Sean Whitton
Hello Bastien, Is there someway I could help with imagemagick under LTS? It looks like the status has been unchanged for some months. I'm not an expert but I can review things. Thanks! -- Sean Whitton

Re: CVE-2023-6918: removal of unused evp functions & types

2024-02-26 Thread Sean Whitton
Hello, On Mon 26 Feb 2024 at 09:38am +01, Jakub Jelen wrote: > This CVE is about checking return code from the crypto library API > calls, which could fail and cause some unexpected behavior such as > usage of uninitialized memory, DoS, ... Our analysis did not show any > important exploitable

[SECURITY] [DLA 3741-1] engrampa security update

2024-02-26 Thread Thorsten Alteholz
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 - - Debian LTS Advisory DLA-3741-1debian-...@lists.debian.org https://www.debian.org/lts/security/Thorsten Alteholz February 26, 2024

Accepted engrampa 1.20.2-1+deb10u1 (source) into oldoldstable

2024-02-26 Thread Debian FTP Masters
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Sun, 25 Feb 2024 16:03:02 +0100 Source: engrampa Architecture: source Version: 1.20.2-1+deb10u1 Distribution: buster-security Urgency: high Maintainer: Debian+Ubuntu MATE Packaging Team Changed-By: Thorsten Alteholz Changes:

[SECURITY] [DLA 3740-1] gnutls28 security update

2024-02-26 Thread Guilhem Moulin
- Debian LTS Advisory DLA-3740-1debian-...@lists.debian.org https://www.debian.org/lts/security/ Guilhem Moulin February 26, 2024 https://wiki.debian.org/LTS

Re: CVE-2023-6918: removal of unused evp functions & types

2024-02-26 Thread Jakub Jelen
Hi, This CVE is about checking return code from the crypto library API calls, which could fail and cause some unexpected behavior such as usage of uninitialized memory, DoS, ... Our analysis did not show any important exploitable code path (but it was in supported libssh versions -- this might not