Re: Bug#870056: nmu: robustirc-bridge_1.7-1

2018-01-07 Thread Julien Cristau
On Sat, Jan 6, 2018 at 19:19:13 +0100, Michael Stapelberg wrote: > On Sat, Jan 6, 2018 at 6:30 PM, Julien Cristau wrote: > > > also implications on visibility of unreleased security updates, so the > > set of people with access needs to stay limited. > > > Just to confirm: is this a side-effe

Processed: Re: Bug#882697: stretch-pu: package apparmor/2.11.0-3+deb9u1

2018-01-07 Thread Debian Bug Tracking System
Processing control commands: > tag -1 + moreinfo Bug #882697 [release.debian.org] stretch-pu: package apparmor/2.11.0-3+deb9u1 Added tag(s) moreinfo. -- 882697: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=882697 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems

Bug#882697: stretch-pu: package apparmor/2.11.0-3+deb9u1

2018-01-07 Thread intrigeri
Control: tag -1 + moreinfo The issue in Linux 4.14 with feature set pinning vs. mount operations was not fixed yet so the 2.11.0-3+deb9u1 package that was accepted in the proposed-updates stable queue is not suitable for Stretch currently ⇒ dear release team, feel free to reject or delete it if it

Bug#886509: marked as done (britney: drop duplicate 'has new bugs' excuses item)

2018-01-07 Thread Debian Bug Tracking System
Your message dated Sun, 07 Jan 2018 12:22:00 + with message-id and subject line Re: Bug#886509: britney: drop duplicate 'has new bugs' excuses item has caused the Debian Bug report #886509, regarding britney: drop duplicate 'has new bugs' excuses item to be marked as done. This means that yo

Bug#886319: failed amd64 build of singular 1:4.1.0-p3+ds-2+b1

2018-01-07 Thread Ximin Luo
Debian buildds: > * Source package: singular > * Version: 1:4.1.0-p3+ds-2+b1 > * Architecture: amd64 > * State: failed > * Suite: sid > * Builder: x86-ubc-01.debian.org > * Build log: > https://buildd.debian.org/status/fetch.php?pkg=singular&arch=amd64&ver=1%3A4.1.0-p3%2Bds-2%2Bb1&stamp=151

Bug#886589: stretch-pu: package mapproxy/1.9.0-3+deb9u1

2018-01-07 Thread Bas Couwenberg
Package: release.debian.org Severity: normal Tags: stretch User: release.debian@packages.debian.org Usertags: pu To fix CVE-2017-1000426 an update of mapproxy for stretch has been prepared, but the security team doesn't consider the issue severe enough to warrant a DSA. Is this change okay to

Bug#886593: stretch-pu: package qtpass/1.1.6-1

2018-01-07 Thread Philip Rinn
Package: release.debian.org Severity: normal Tags: stretch User: release.debian@packages.debian.org Usertags: pu Hi, the current version in stable has a insecure built-in password generator. As the built-in password generator not used in qtpass' default config, the security team asked me to f