Accepted xdelta3 0y.dfsg-1+deb6u1 (source amd64) into squeeze-lts

2016-02-16 Thread Chris Lamb
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Tue, 16 Feb 2016 11:21:13 +0100 Source: xdelta3 Binary: xdelta3 python-xdelta3 Architecture: source amd64 Version: 0y.dfsg-1+deb6u1 Distribution: squeeze-lts Urgency: high Maintainer: A Mennucc1 Changed-By:

Accepted wordpress 3.6.1+dfsg-1~deb6u9 (source all) into squeeze-lts

2016-02-16 Thread Markus Koschany
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Tue, 16 Feb 2016 16:25:44 +0100 Source: wordpress Binary: wordpress wordpress-l10n Architecture: source all Version: 3.6.1+dfsg-1~deb6u9 Distribution: squeeze-lts Urgency: high Maintainer: Giuseppe Iuculano

Re: Glibc CVE-2015-7547

2016-02-16 Thread Antoine Beaupré
On 2016-02-16 11:15:12, Dolecek, Martin wrote: > Hi, > > glibc has bug (CVE-2015-7547). Now we have an exploit, so can LTS team > prepare fix? > > https://googleonlinesecurity.blogspot.ch/2016/02/cve-2015-7547-glibc-getaddrinfo-stack.html I believe this was done already:

Glibc CVE-2015-7547

2016-02-16 Thread Dolecek, Martin
Hi, glibc has bug (CVE-2015-7547). Now we have an exploit, so can LTS team prepare fix? https://googleonlinesecurity.blogspot.ch/2016/02/cve-2015-7547-glibc-getaddrinfo-stack.html Best regards, Martin Dolecek, Seznam.cz, Czech Republic