Re: MediaWiki on buster

2023-11-28 Thread Chris Frey
Just noticed that mediawiki hit the announcement list thank you! The peasants rejoice! :-) - Chris On Mon, Nov 20, 2023 at 09:20:37AM +0100, Guilhem Moulin wrote: > Hi, > > On Sat, 18 Nov 2023 at 03:39:33 -0500, Chris Frey wrote: > > I noticed that MediaWiki has suffered fro

MediaWiki on buster

2023-11-18 Thread Chris Frey
I noticed that MediaWiki has suffered from the following CVE's for a while: CVE-2023-45363 CVE-2023-45362 CVE-2023-45360 Is the work-in-progress available via git somewhere? Is there something I can do to help? Thanks, - Chris

Re: Backporting mutt patches to Debian Buster

2023-09-20 Thread Chris Frey
On Wed, Sep 20, 2023 at 02:35:30PM -0300, Santiago Ruano Rincón wrote: > I kept the original From, tagged the Origin as backport, and kept your > name as Author. > Hope that makes sense for you. > > Thanks a lot for your work! I saw it percolate through the updates today. Thanks very much! -

Re: Backporting mutt patches to Debian Buster

2023-09-17 Thread Chris Frey
On Sun, Sep 17, 2023 at 08:34:57PM +0300, Santiago Ruano Rincón wrote: > Chris, thanks for preparing the patches. Much appreciated. I have a > question though: Why are you placing those two patches in > debian-specific, and not in upstream/? They come from the upstream repo. I only put them there

Backporting mutt patches to Debian Buster

2023-09-15 Thread Chris Frey
.patch new file mode 100644 index 000..33f5cb5 --- /dev/null +++ b/debian/patches/debian-specific/Check-for-NULL-userhdrs.patch @@ -0,0 +1,56 @@ +From: Chris Frey +Date: Fri, 15 Sep 2023 08:41:00 -0400 +Subject: Check for NULL userhdrs. +Bug-Debian: https://bugs.debian.org/1051563 +Bug-Debian-Secur

Re: firefox on buster

2023-09-02 Thread Chris Frey
On Sun, Sep 03, 2023 at 01:34:07AM +0530, Utkarsh Gupta wrote: > Hey, > > On Fri, Sep 1, 2023 at 5:49 AM Chris Frey wrote: > > I see firefox esr 102.15.x has been released on bullseye. > > > > Do I dare hope that buster will be blessed with a similar update? >

Re: firefox on buster

2023-08-31 Thread Chris Frey
I see firefox esr 102.15.x has been released on bullseye. Do I dare hope that buster will be blessed with a similar update? Thanks! - Chris On Tue, Aug 08, 2023 at 12:24:17PM +0200, Emilio Pozuelo Monfort wrote: > Hi Chris, > > On 07/08/2023 23:57, Chris Frey wrote: > > I

Re: bullseye / libgdbm6:amd64 is a catastrophgy

2023-08-25 Thread Chris Frey
On Fri, Aug 25, 2023 at 07:02:07AM -0400, Roberto C. Sánchez wrote: > To claim that "because this bug affects me, it *must* be > fixed, even when it does not meet the criteria for a normal security bug > and when the maintainer thinks there is a risk of breaking working > configurations for other

Re: firefox on buster

2023-08-08 Thread Chris Frey
On Tue, Aug 08, 2023 at 11:10:11AM -0400, Roberto C. Sánchez wrote: > Emilio probably meant that the choices were: > > - delay the buster update to do a bunch of toolchain updates (could take > quite a long time) > - grab the latest 102.x.x from git, which wouldn't be quite as quick as > a

Re: firefox on buster

2023-08-08 Thread Chris Frey
On Tue, Aug 08, 2023 at 12:24:17PM +0200, Emilio Pozuelo Monfort wrote: > Given that the package is no longer in sid, I had a little trouble preparing > the backport from the git repository. That's sorted now, and the update > should go out today or tomorrow, once testing on my part has been done.

firefox on buster

2023-08-07 Thread Chris Frey
I noticed firefox security updates for 102.14.x have been released for bullseye and bookworm, but not for buster (still on 102.13.x) Anything that an outsider can do to help with that? Thanks, - Chris

Re: nvidia-cuda-toolkit for buster

2023-06-09 Thread Chris Frey
On Fri, Jun 09, 2023 at 05:51:20PM +0200, Andreas Beckmann wrote: > PS: due to popular demand, I keep applying patches to the (long EoL) 340 > series in sid for supporting building against the latest kernels Thanks for that, btw, as I still have that old hardware. The official drivers have

Re: Bug 1035537 - split -n k/N gives incorrect data on blocks after the first

2023-05-19 Thread Chris Frey
On Fri, May 19, 2023 at 08:45:23PM +0200, Sylvain Beucler wrote: > On 05/05/2023 05:14, Chris Frey wrote: > > https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1035537 > > At first glance, it looks like this could lead to data corruption, and hence > warrant a 'grave' s

Bug 1035537 - split -n k/N gives incorrect data on blocks after the first

2023-05-04 Thread Chris Frey
I'd like to give a gentle nudge to the following bug, which affects both Bullseye and Buster: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1035537 If it can be fixed in LTS, that would be great. Thanks! - Chris

seabios buggy in Buster

2023-03-30 Thread Chris Frey
I recently tried getting the latest FreeDOS running in qemu. I had a rough time getting it going, with the drives being rather unreliable, both C: and the cdrom. Even general reboot behaviour was not consistent. I tracked it down to seabios, from this post:

Re: Bug#961654: buster-pu: package bzip2/1.0.6-9.2~deb10u1

2022-09-14 Thread Chris Frey
On Wed, Sep 14, 2022 at 01:54:40PM +0200, Emilio Pozuelo Monfort wrote: > Your top-commit looks very similar to the one from Santiago on [1]. I'd > rather use that to give him credit as he proposed the fix first (plus using > CPPFLAGS seems more correct for this flag). In addition to that, the

Re: Bug#961654: buster-pu: package bzip2/1.0.6-9.2~deb10u1

2022-09-13 Thread Chris Frey
On the other hand, the fix has been known since 2019 and looks like a prime problem for an LTS newbie volunteer like me. I have created the fix based on the Debian/bzip2 repo, the fix is in the debian/buster branch. git clone http://digon.foursquare.net/debian-buster-bzip2/.git I have

Re: mysql and systemd

2016-08-04 Thread Chris Frey
My apologies, this is incorrect. This is PEBKAC error. Sorry for the noise! - Chris On Thu, Aug 04, 2016 at 04:05:06PM -0400, Chris Frey wrote: > Hi, > > I noticed in the recent security updates that mysql-client-5.5 and > mysql-server-5.5 have a new dependenc

Re: [SECURITY] [DLA 465-1] debian-security-support update

2016-05-10 Thread Chris Frey
When I recently upgraded, there was a bug in the script, I think. I didn't spend a lot of time debugging it, since uninstall/reinstall fix it. Below is what happened, from the command line. - Chris root@oldoldvictory:~# apt-get upgrade Reading package lists... Done Building dependency tree