FYI: The status of the winregfs source package
in Debian's testing distribution has changed.
Previous version: 0.6-1
Current version: 0.7-1
--
This email is automatically generated once a day. As the installation of
new packages into testing happens multiple times a day you will receive
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Sat, 01 Jul 2017 00:41:52 +0200
Source: yara
Binary: yara libyara3 libyara-dev yara-doc
Architecture: source
Version: 3.6.2+dfsg-3
Distribution: unstable
Urgency: medium
Maintainer: Debian Forensics
yara_3.6.2+dfsg-3_source.changes uploaded successfully to localhost
along with the files:
yara_3.6.2+dfsg-3.dsc
yara_3.6.2+dfsg-3.debian.tar.xz
yara_3.6.2+dfsg-3_source.buildinfo
Greetings,
Your Debian queue daemon (running on host usper.debian.org)
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Fri, 30 Jun 2017 23:59:50 +0200
Source: yara
Binary: yara libyara3 libyara-dev yara-doc
Architecture: source
Version: 3.6.2+dfsg-2
Distribution: unstable
Urgency: medium
Maintainer: Debian Forensics
yara_3.6.2+dfsg-2_source.changes uploaded successfully to localhost
along with the files:
yara_3.6.2+dfsg-2.dsc
yara_3.6.2+dfsg-2.debian.tar.xz
yara_3.6.2+dfsg-2_source.buildinfo
Greetings,
Your Debian queue daemon (running on host usper.debian.org)
Source: rkhunter
Version: 1.4.2-0.4
Severity: grave
Tags: upstream security
Hi,
the following vulnerability was published for rkhunter (somehow
releated will be at least #765895)
CVE-2017-7480[0]:
File download via http might lead to RCE
If you fix the vulnerability please also make sure to
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Wed, 28 Jun 2017 09:11:55 +0200
Source: yara
Binary: yara libyara3 libyara-dev yara-doc
Architecture: source
Version: 3.6.2+dfsg-1
Distribution: unstable
Urgency: medium
Maintainer: Debian Forensics