end user to recover from it. Now ignore a download error in this case
+(similar handling as for other guesses), assuming that permanent 404ing
+for other reasons than removal of remote content can be considered
+unlikely.
+
+ -- Eduard Bloch Wed, 22 Jan 2020 20:53:50 +0100
+
apt-cach
Control: tag -1 -moreinfo
Hallo Everyone,
so here comes the additional info:
the CVE-2020-5202 fix was applied to Sid/Bullseye and reached Testing
without any bugreports. I had to reupload once in the meantime due to a
glitch in the Debian package (yeas, I f*ed it up, right in the great
Hallo,
* Andreas Beckmann [Mon, Jan 13 2020, 11:20:25AM]:
> Package: release.debian.org
> Severity: normal
> Tags: buster
> User: release.debian@packages.debian.org
> Usertags: pu
>
> Hi,
>
> let's make apt-cacher-ng in stable usable for sid and bullseye, again,
> by increasing some
nt
+ 404ing for other reasons than removal of remote content can be considered
+ unlikely (closes: #928957)
+
+ -- Eduard Bloch Fri, 17 May 2019 22:59:21 +0200
+
apt-cacher-ng (3.2-1) unstable; urgency=low
* New upstream version
diff --git a/source/expiration.cc b/source/expiration
way to
+recover from it. Now ignoring a download error in this case since
+permanent 404ing for other reasons than loss of remote content (on any
+mirror) can be considered unlikely.
+
+ -- Eduard Bloch Wed, 15 May 2019 20:32:44 +0200
+
apt-cacher-ng (3.2) MY-NAME-IS-ANYBODY; urgency
ng efforts; a smarter
+ solution is found in upstream version 3; closes: #856635)
++ handle a corner case of bad TLS handshake with invalid certificate
+ (related to #839751)
+
+ -- Eduard Bloch <bl...@debian.org> Thu, 13 Apr 2017 18:11:17 +0200
+
apt-cacher-ng (2-1) unsta
d CVE-2017-7443)
+Author: Eduard Bloch <bl...@debian.org>
Regards,
Eduard.
--
Das gestern und das heute unterscheiden sich nur durch das hier.
diff -Nru apt-cacher-ng-0.8.0/debian/changelog apt-cacher-ng-0.8.0/debian/changelog
--- apt-cacher-ng-0.8.0/debian/changelog 2014-11-28 21:09:34.000
TTP status line
* FIX: typo/wording in manual, iptables examples
* Database update
-- Eduard Bloch <bl...@debian.org> Tue, 14 Mar 2017 16:23:20 +0100
CMakeLists.txt | 123 +-
COPYING | 62 ++
Package: release.debian.org
User: release.debian@packages.debian.org
Usertags: unblock
Severity: normal
Please unblock the package encfs. The testing version contains a change
that might trigger a security flaw, i.e. it changes the visible behavior
in a way not expected by "optimistically"
(es) from upstream's SCM to solve handling of target file names with
+the -N option (CVE-2015-1191, closes: #774978)
+
+ -- Eduard Bloch bl...@debian.org Sun, 18 Jan 2015 23:58:51 +0100
+
pigz (2.3.1-1) unstable; urgency=medium
* New upstream version 2.3.1
diff --git a/debian/gbp.conf b
=medium
+
+ * Restored build-dependency on libsystemd-daemond-dev since upstream source
+didn't cope with that change (yet)
+
+ -- Eduard Bloch bl...@debian.org Fri, 28 Nov 2014 21:05:16 +0100
+
+apt-cacher-ng (0.8.0-2) unstable; urgency=medium
+
+ * Send SIGUSR1 properly to reopen the logs
Package: release.debian.org
Severity: normal
Please reduce the freeze time for the package cloop.
The rationale behind this is following:
* the binary packages are harmless, i.e. no suid binaries inside, no
systemd killing init scripts or other potential trouble makers
* the package was
Hallo,
* Julien Cristau [Thu, Feb 28 2013, 05:14:08PM]:
On Wed, Feb 27, 2013 at 21:05:45 +0100, Eduard Bloch wrote:
Hallo,
* Thijs Kinkhorst [Wed, Feb 27 2013, 06:52:05PM]:
Package pigz/2.2.4-2 was uploaded to sid fixing CVE-2013-0296 (#700608).
The maintainer also added
Hallo,
* Thijs Kinkhorst [Wed, Feb 27 2013, 06:52:05PM]:
Package pigz/2.2.4-2 was uploaded to sid fixing CVE-2013-0296 (#700608).
The maintainer also added hardening flags. This may be on the border of
acceptable/unacceptable for an unblock. Please let me know either way.
Thanks for
Hallo,
* intrigeri [Sat, Jan 26 2013, 10:33:35PM]:
Hi Eduard,
intrigeri wrote (27 Nov 2012 10:58:28 GMT) :
Eduard, given the apparent brokenness of the version currently in
testing, the size of the delta, and the fact we've been frozen for
months, have you considered preparing a minimal
Hallo,
* intrigeri [Sun, Jan 27 2013, 03:41:49PM]:
Well, (no offense implied) I am often puzzled at how people ask for
just the minimal fix WRT complex software.
I acknowledge it is sometimes the case that a minimal fix is hard to
extract, but it's also, quite often, pretty easy. I don't
Hallo,
* Gabriele Stilli [Tue, Dec 25 2012, 10:10:36PM]:
any chance of having this fix backported to Wheezy? It's quite annoying
not being able to do proper upgrades when using http.debian.net with
(what will become) stable.
#694378 is there to get an answer to this question, apparently RM
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
Please unblock package apt-cacher-ng
it solves #683803 and #677983 (*) since version 0.7.8. These changes are
especially required to support http.debian.net redirection properly and
to
Package: release.debian.org
Severity: important
User: release.debian@packages.debian.org
Usertags: freeze-exception
Please unblock package apt-cacher-ng. insert your favorite
I-know-it's-late phrase here.
The background of this request is mainly task #598469 which originally
got RC severity
Hello,
I uploaded encfs 1.7.2-1 about one week ago and there are now new bugs
reported so far in our BTS and no relevant bugs in the upstream BTS.
This is a new upstream version but the changeset is small enough for a
review (see [1]) and it contains fixes for potential security problems
in
#include hallo.h
* Adam D. Barratt [Sat, Sep 25 2010, 04:22:55PM]:
On Sat, 2010-09-25 at 12:22 +0200, Eduard Bloch wrote:
This is a new upstream version but the changeset is small enough for a
review (see [1]) and it contains fixes for potential security problems
in future (see [2
#include hallo.h
* Marc Haber [Tue, Dec 02 2008, 01:15:15PM]:
Okay, simple question: how many RC bugs do you need to allow the push of
the Unstable version at the moment? I have one RC candidate (#506273),
I am sure that a minimal patch against the version currently in lenny,
Wow, so
#include hallo.h
* Neil McGovern [Sun, Nov 30 2008, 10:14:23AM]:
With the number of changes in this, I'm afraid it cannot be reviewed for
the lenny release.
Actually that's the point, I dislike that kind of conclusions in some
cases. There are upstream authors that happily release known shit
#include hallo.h
* Adeodato Simó [Sun, Oct 05 2008, 06:04:03PM]:
Package: sl-modem
Binary: sl-modem-source, sl-modem-daemon
Version: 2.9.9d+e-pre2-12
Priority: optional
Section: non-free/misc
Maintainer: Debian QA Group [EMAIL PROTECTED]
Unblocked.
You'll need to get i386
Dear release team,
please consider readding the package sl-modem to Lenny. AFAICS it has
been removed because of having a bug which I personally don't even
consider RC, and the update would fix that one and also update some
translations.
New version:
Package: sl-modem
Binary: sl-modem-source,
#include hallo.h
* Frans Pop [Fri, Mar 23 2007, 07:15:40PM]:
There are quite a few proposed methods in that mail, which were you
referring to? Note that I'm not a fan of Osamu's suggestions as they
don't work for desktop installs.
The new procedure goes as follows:
- aptitude update (/me
Hi people,
please unblock the unp package, version 1.0.11. It has a one-line fix
which avoids a pretty nasty memory bomb, AFAICS without side effects.
Thanks,
Eduard.
--
Kluge halten das Gewöhnliche, Dumme das Ungewöhnliche für toll.
-- Jean Paul
--
To UNSUBSCRIBE, email to
#include hallo.h
Please let mail-expire 0.7 go into Etch, since... 0.6 is completely
broken because of a change in a suplementary module and the only change
in 0.7 is one simple condition modification to fix it.
Eduard.
--
Schade, ich hatte gehofft, der Job fällt jetzt nebenbei
von meinem
#include hallo.h
* Christian Perrier [Tue, Mar 06 2007, 06:08:18AM]:
I was so bold and uploaded the version 2.9.9d+e-pre2-7etch1 to t-p-u
based on 2.9.9d+e-pre2-7 built with just the new translation.
Hmmm, this one ?
* t-p-u upload only
* de.po updates by Helge Kreutzmann
*
#include hallo.h
* Christian Perrier [Mon, Mar 05 2007, 07:28:40AM]:
I hereby request for the permission to upload a fixed
2.9.9d+e-pre2-7etch1 version in t-p-u with translations grabbed from
unstable.
Of course, if Eduard, the maintainer, prefers doing it himself, I will
let him do it
#include hallo.h
* Steve Langasek [Wed, Jan 24 2007, 11:10:04PM]:
On Tue, Jan 23, 2007 at 08:08:54PM -0700, Wesley J. Landaker wrote:
On Tuesday 23 January 2007 17:56, Steve Langasek wrote:
Personally, I'm not sure this is warranted; svn-upgrade is an optional
feature of svn-buildpackage,
)
* add depends on file (Closes: #397611)
* add support for origUrl (adds also a dependency on wget)
(Closes: #377880)
[ Gonéri Le Bouder ]
* add --svn-noninteractive to turn off interactive mode (Closes: #349979)
[ Eduard Bloch ]
* svn_load_dir replacement implemented (closes: #399661
severity 387783 serious
thanks
#include hallo.h
* Andreas Barth [Thu, Oct 19 2006, 11:27:36AM]:
* Markus Laire ([EMAIL PROTECTED]) [061019 10:49]:
ps. Since the decision to downgrade[2] this bug was done by Andreas
Barth, I don't think I have the authority to restore the severity to
#include hallo.h
* Roberto C. Sanchez [Tue, Aug 30 2005, 01:06:39AM]:
Why?
Becuase I roll my own kernel. If I upgrade the kernel with gcc-3.3
(currently the Sarge default) and then upgrade to Etch (which will have
gcc-4.0 for a default) I will run into problems if I decide to add new
#include hallo.h
* Thomas Hood [Fri, Jul 08 2005, 04:16:01PM]:
If Debian continues to use the Release When Ready strategy then I would
suggest that the number of the next release be its ordinal in the
historical sequence of releases, which is 9 by my reckoning (buzz, rex,
bo, hamm, slink,
dpkg has been started
* added more visible advisories to run apt-cacher-format-transition.pl in
NEWS.Debian and README.Debian
* commented out the allowed_locations example in apt-cacher.conf, it should
not restrict by default
-- Eduard Bloch [EMAIL PROTECTED] Fri, 27 May 2005 18:20:49
Hello,
please consider adding apt-cacher 0.9 to Sarge. It's not an easy
decission but I would do that. The current version had following
problems (summary):
- for many it is not useable well with apache2: seems to leave many
zombies with Apache2 in with popular configuration (#310566,
-assistant (0.9) unstable; urgency=high
* correcting description of the -i option in the manpage
* added a rescan method to detect new override files installed by package.
Important for the future upgrades when Sarge will be stable.
* a nicer version number ;-)
-- Eduard Bloch [EMAIL
-assistant (0.9) unstable; urgency=high
* correcting description of the -i option in the manpage
* added a rescan method to detect new override files installed by package.
Important for the future upgrades when Sarge will be stable.
* a nicer version number ;-)
-- Eduard Bloch [EMAIL
.
Regards,
Eduard.
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.7
Date: Thu, 05 May 2005 19:39:05 +0200
Source: vpnc
Binary: vpnc
Architecture: source i386
Version: 0.3.2+SVN20050326-2
Distribution: unstable
Urgency: high
Maintainer: Eduard Bloch [EMAIL PROTECTED]
Changed-By: Eduard
translation, typo fixes by Sven
+Dreyer sven.AT.dreyer-net.de (closes: #306100)
+ * removed a redundant dialog call
+
+ -- Eduard Bloch [EMAIL PROTECTED] Sat, 30 Apr 2005 18:56:22 +0200
+
pppoeconf (1.6) unstable; urgency=high
* replaced -p with -o in the iptables call (stupid typo, closes
Hullo guys,
please migrate pppoeconf version 1.6 into testing. It fixes the really
nasty bug #304219 (messing up the iptables).
Regards,
Eduard.
signature.asc
Description: Digital signature
#include hallo.h
Outdated like hell and fixed many weeks ago. Sarge should really include
the current version from Debian unstable (1.0.9). Forwarding to -release now.
A fix for one of the bugs was not quite correct. Please add the new
version 1.0.11 of pppoeconf to Sarge.
Eduard.
PS: Once it
Moin Bastian!
Bastian Venthur schrieb am Freitag, den 01. Oktober 2004:
Package: pppoeconf
Version: 1.0.4
Severity: grave
Justification: renders package unusable
Outdated like hell and fixed many weeks ago. Sarge should really include
the current version from Debian unstable (1.0.9).
Hello,
could you please remove the packages for Mono from Sarge (and only
Sarge)? Or manually force the current versions into Sarge? The current
versions there are completely outdated and buggy and the newer ones do
not get into Sarge because s390 buildd ignores them for unknown reason
and ARM is
#include hallo.h
David Kimdon wrote on Thu Mar 28, 2002 um 10:17:53AM:
b-f bugs : 139595, more bugs should be fixed, no more bugs should be
introduced
Done. Not nice, I had to drop two languages, but we should have language
packs on the CD now.
Addition: I have a (hopefully) final
46 matches
Mail list logo