Processing changes file: linux-latest_80+deb9u11_mipsel.changes
ACCEPT
"Adam D. Barratt" writes:
> Please go ahead, bearing in mind that the window for getting fixes into
> the final stretch point release closes this weekend.
Thanks, uploaded.
--
Feri
Control: tags -1 + confirmed
On 2020-06-26 09:07:54 +0200, László Böszörményi wrote:
> Package: release.debian.org
> Severity: normal
> User: release.debian@packages.debian.org
> Usertags: transition
>
> Hi RMs,
>
> The new soname release of Protobuf is available in experimental for
> some
Processing control commands:
> tags -1 + confirmed
Bug #963728 [release.debian.org] transition: protobuf
Added tag(s) confirmed.
--
963728: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=963728
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
Your message dated Wed, 8 Jul 2020 00:35:09 +0200
with message-id <20200707223509.ga1320...@ramacher.at>
and subject line Re: Bug#963988: transition: zimlib and libkiwix
has caused the Debian Bug report #963988,
regarding transition: zimlib and libkiwix
to be marked as done.
This means that you
On Tue, 2020-07-07 at 22:21 +0200, Hans van Kranenburg wrote:
> On 7/7/20 9:51 PM, Adam D. Barratt wrote:
> > Control: tags -1 + moreinfo
> >
> > On Tue, 2020-07-07 at 21:16 +0200, Hans van Kranenburg wrote:
> > > I'd like to update the xen packages in buster to
> > >
On 7/7/20 9:51 PM, Adam D. Barratt wrote:
> Control: tags -1 + moreinfo
>
> On Tue, 2020-07-07 at 21:16 +0200, Hans van Kranenburg wrote:
>> I'd like to update the xen packages in buster to
>> 4.11.4+24-gddaaccbbab-1~deb10u1 for the 10.5 point release. This is
>> an update to keep following the
Control: tags -1 + moreinfo
On Tue, 2020-07-07 at 21:16 +0200, Hans van Kranenburg wrote:
> I'd like to update the xen packages in buster to
> 4.11.4+24-gddaaccbbab-1~deb10u1 for the 10.5 point release. This is
> an update to keep following the stable-4.11 upstream Xen code, which
> mainly
Processing control commands:
> tags -1 + moreinfo
Bug #964482 [release.debian.org] buster-pu: package
xen/4.11.4+24-gddaaccbbab-1~deb10u1
Added tag(s) moreinfo.
--
964482: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=964482
Debian Bug Tracking System
Contact ow...@bugs.debian.org with
On Tue, 2020-07-07 at 20:37 +0200, Andreas Ronnquist wrote:
> On Tue, 07 Jul 2020 18:49:38 +0100,
> Adam D. Barratt wrote:
>
> > Control: tags -1 + confirmed
> >
> > On Thu, 2020-05-14 at 14:25 +0200, Andreas Ronnquist wrote:
> > > The cddb service freedb,org has been closed down, and I would
>
Processing commands for cont...@bugs.debian.org:
> retitle 964482 buster-pu: package xen/4.11.4+24-gddaaccbbab-1~deb10u1
Bug #964482 [release.debian.org] buster-pu: xen/4.11.4+24-gddaaccbbab-1~deb10u1
Changed Bug title to 'buster-pu: package xen/4.11.4+24-gddaaccbbab-1~deb10u1'
from 'buster-pu:
Thank you
On Tue, Jul 7, 2020, 1:24 PM Samuel Henrique wrote:
> > Please go ahead.
>
> Thank you Adam,
>
> nmap_7.70+dfsg1-6+deb10u1_source.changes ACCEPTED into
> proposed-updates->stable-new
>
> Regards,
>
> --
> Samuel Henrique
>
>
Package: release.debian.org
Severity: normal
Tags: buster
User: release.debian@packages.debian.org
Usertags: pu
Hi,
I'd like to update the xen packages in buster to
4.11.4+24-gddaaccbbab-1~deb10u1 for the 10.5 point release. This is an
update to keep following the stable-4.11 upstream Xen
On Tue, 07 Jul 2020 18:49:38 +0100,
Adam D. Barratt wrote:
>Control: tags -1 + confirmed
>
>On Thu, 2020-05-14 at 14:25 +0200, Andreas Ronnquist wrote:
>> The cddb service freedb,org has been closed down, and I would like to
>> update asunder so that it uses gnudb.org by default instead. I
>>
Sorry, the changelog is wrong, it was actually not removed, just
changed location:
--- a/debian/libmariadb-dev.install
+++ b/debian/libmariadb-dev.install
@@ -8,4 +8,4 @@ usr/lib/*/libmysqlservices.a
usr/share/aclocal/mysql.m4
usr/share/man/man1/mysql_config.1
usr/lib/pkgconfig/libmariadb.pc
> Please go ahead.
Thank you Adam,
nmap_7.70+dfsg1-6+deb10u1_source.changes ACCEPTED into
proposed-updates->stable-new
Regards,
--
Samuel Henrique
On Sun, 2020-07-05 at 22:41 +0300, Otto Kekäläinen wrote:
> mariadb-10.3 (1:10.3.23-0+deb10u1) buster; urgency=high
>
> * SECURITY UPDATE: New upstream version 10.3.23. Includes fixes for
> the
> following security vulnerabilities (Closes: #961849):
> - CVE-2020-2752
> -
Processing control commands:
> tags -1 -pending +confirmed
Bug #947758 [release.debian.org] buster-pu: package
node-handlebars/3:4.1.0-1+deb10u1
Removed tag(s) pending.
Bug #947758 [release.debian.org] buster-pu: package
node-handlebars/3:4.1.0-1+deb10u1
Added tag(s) confirmed.
--
947758:
Control: tags -1 -pending +confirmed
On Mon, 2020-05-04 at 22:02 +0200, Xavier wrote:
> Le 04/05/2020 à 18:53, Mattia Rizzolo a écrit :
> > Hi,
> >
> > let me reply before adsb has a chance ;)
> >
> > On Mon, May 04, 2020 at 02:24:20PM +0200, Xavier wrote:
> > > Finally I found a way to fix CVE
Processing control commands:
> tags -1 + confirmed
Bug #948653 [release.debian.org] stretch-pu: package mod-gnutls/0.8.2-3+deb9u2
Added tag(s) confirmed.
--
948653: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=948653
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
Control: tags -1 + confirmed
On Tue, 2020-07-07 at 01:01 +0300, Adrian Bunk wrote:
> Control: retitle -1 stretch-pu: package mod-gnutls/0.8.2-3+deb9u2
> Control: tags -1 - pending
>
> On Fri, Jul 03, 2020 at 06:57:55AM +0100, Adam D. Barratt wrote:
> > Hi,
>
> Hi Adam,
>
> > On Fri, 2020-01-31
Processing control commands:
> tags -1 + confirmed
Bug #964417 [release.debian.org] buster-pu: package mod-gnutls/0.9.0-1.1~deb10u1
Added tag(s) confirmed.
--
964417: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=964417
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
Control: tags -1 + confirmed
On Tue, 2020-07-07 at 01:07 +0300, Adrian Bunk wrote:
> On Tue, Jul 07, 2020 at 12:58:41AM +0300, Adrian Bunk wrote:
> > Package: release.debian.org
> > Severity: normal
> > Tags: buster
> > User: release.debian@packages.debian.org
> > Usertags: pu
> >
> > *
Control: tags -1 + confirmed
On Thu, 2020-05-14 at 14:25 +0200, Andreas Ronnquist wrote:
> The cddb service freedb,org has been closed down, and I would like to
> update asunder so that it uses gnudb.org by default instead. I
> mention it in a NEWS item too, so that others get a warning and
>
Processing control commands:
> tags -1 + confirmed
Bug #960600 [release.debian.org] buster-pu: package asunder/2.9.3-3+deb10u1
Added tag(s) confirmed.
--
960600: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=960600
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
Processing control commands:
> tags -1 + confirmed
Bug #964244 [release.debian.org] stretch-pu: package
xml-security-c/1.7.3-4+deb9u2
Added tag(s) confirmed.
--
964244: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=964244
Debian Bug Tracking System
Contact ow...@bugs.debian.org with
Control: tags -1 + confirmed
On Sat, 2020-07-04 at 13:00 +0200, Ferenc Wágner wrote:
> There's an old bug reported against xml-security-c (#922984), which
> was fixed in the 2.0 branch in buster but still lingers around in 1.7
> in stretch. I'm ready to upload with the following debdiff:
>
> $
Processing control commands:
> tags -1 + confirmed
Bug #964228 [release.debian.org] buster-pu: package nmap/7.70+dfsg1-6+deb10u1
Added tag(s) confirmed.
--
964228: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=964228
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
Control: tags -1 + confirmed
On Fri, 2020-07-03 at 22:19 +0100, Samuel Henrique wrote:
> A backported upstream patch [0] is required to fix #940284 [1] on
> nmap;
> Bug title: autogeneration of ssl key in ssl server mode of ncat is
> broken
>
> The issue itself is well described in both BTS [1]
Processing changes file: linux_4.9.228-1_mipsel.changes
ACCEPT
On Tue, 07 Jul 2020 at 17:31:01 +0100, Adam D. Barratt wrote:
>> The security team gave the green light for an upload of
>> 1.3.14+dfsg.1-1~deb10u1 to buster-security, but suggested to target
>> old-p-u for stretch. stretch currently has 1.2.3+dfsg.1-4+deb9u3
>> wwhile stretch-security and
Processing control commands:
> tags -1 + confirmed
Bug #964456 [release.debian.org] stretch-pu: package
roundcube/1.2.3+dfsg.1-4+deb9u6
Added tag(s) confirmed.
--
964456: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=964456
Debian Bug Tracking System
Contact ow...@bugs.debian.org with
Control: tags -1 + confirmed
On Tue, 2020-07-07 at 16:00 +0200, Guilhem Moulin wrote:
> In a recent post roundcube webmail upstream has announced the
> following security fix:
>
> CVE-2020-15562: Prevent cross-site scripting (XSS) via HTML
> messages with malicious svg/namespace.
>
>
Hi,
On Mon, 2020-07-06 at 19:02 -0500, Gunnar Wolf wrote:
> Back in March, I uploaded to Buster version 1.20190215-1+deb10u3 of
> raspi3-firmware, stating it fixed "unbootableness" on several
> systems. I assumed it was all done, and went on with my life.
>
> Some time later (kernel / firmware
Processing changes file: linux-latest_80+deb9u11_mips64el.changes
ACCEPT
Processing control commands:
> tags -1 + moreinfo
Bug #964435 [release.debian.org] buster-pu: package
glib-networking/2.58.0-2+deb10u1
Added tag(s) moreinfo.
--
964435: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=964435
Debian Bug Tracking System
Contact ow...@bugs.debian.org with
Control: tags -1 + moreinfo
On Tue, 07 Jul 2020 at 16:50:36 +0200, Emilio Pozuelo Monfort wrote:
> On 07/07/2020 11:04, Simon McVittie wrote:
> > The only application that was believed to be vulnerable to this
> > in practice is balsa, which only became vulnerable in post-buster
> > versions;
On 07/07/2020 11:04, Simon McVittie wrote:
> Package: release.debian.org
> Severity: normal
> Tags: buster
> User: release.debian@packages.debian.org
> Usertags: pu
>
> Older versions of glib-networking's TLS implementation have a security
> issue (CVE-2020-13645): according to the
Package: release.debian.org
Severity: normal
Tags: stretch
User: release.debian@packages.debian.org
Usertags: pu
Hi there,
In a recent post roundcube webmail upstream has announced the following
security fix:
CVE-2020-15562: Prevent cross-site scripting (XSS) via HTML messages
with
Processing changes file: linux_4.9.228-1_mips64el.changes
ACCEPT
Processing control commands:
> retitle -1 stretch-pu: package wpa/2:2.4-1+deb9u6
Bug #949367 [release.debian.org] stretch-pu: package wpa/2:2.4-1+deb9u5
Changed Bug title to 'stretch-pu: package wpa/2:2.4-1+deb9u6' from 'stretch-pu:
package wpa/2:2.4-1+deb9u5'.
--
949367:
Control: retitle -1 stretch-pu: package wpa/2:2.4-1+deb9u6
Hi,
On Sun, 5 Jul 2020, at 18:08, Cyril Brulebois wrote:
> Andrej Shadura (2020-05-03):
> > Oh, I somehow forgot about it. Please see attached debdiff; I have
> > also added the same minor fix I wanted to push into buster, I think
> >
Samuel Henrique do you know where backdoor is I believe you don't
On Fri, Jul 3, 2020, 4:24 PM Samuel Henrique wrote:
> Package: release.debian.org
> Severity: normal
> Tags: buster
> User: release.debian@packages.debian.org
> Usertags: pu
>
> A backported upstream patch [0] is required to
Processing changes file: linux-latest_80+deb9u11_mips.changes
ACCEPT
Package: release.debian.org
Severity: normal
Tags: buster
User: release.debian@packages.debian.org
Usertags: pu
Older versions of glib-networking's TLS implementation have a security
issue (CVE-2020-13645): according to the documentation, if the caller
does not specify a server identity,
45 matches
Mail list logo