Thomas Klute <thomas2.kl...@uni-dortmund.de> writes: > Package: sponsorship-requests > Severity: normal > > Dear mentors, > > I'm looking for a sponsor for a bugfix update of mod-gnutls that would > close bug #775909 (segfaults with reverse proxy configuration). > > I've uploaded the package to Debian Mentors a few weeks ago. The > maintainer has not responded (like for the security updates to > 0.5.10-1.1+deb7u1 and 0.6-1.3, which went through the security team, see > DSA-3177 [1]), so now I'm looking for a sponsor for an NMU.
Hi. I'm using mod-gnutls on some servers, and would like to help. I have never sponsored an upload before, but let me read up on what to do and I'll try to see if it can be done. /Simon > * Package name : mod-gnutls > Version : 0.6-1.4 > Upstream Author : Daniel Kahn Gillmor <d...@fifthhorseman.net> > * URL : https://mod.gnutls.org/ > * License : Apache-2.0 > Section : httpd > > It builds those binary packages: > > libapache2-mod-gnutls - Apache module for SSL and TLS encryption with > GnuTLS > > To access further information about this package, please visit the > following URL: > > http://mentors.debian.net/package/mod-gnutls > > Alternatively, one can download the package with dget using this command: > > dget -x > http://mentors.debian.net/debian/pool/main/m/mod-gnutls/mod-gnutls_0.6-1.4.dsc > > More information about hello can be obtained from http://www.example.com. > > Changes since the last upload: > > * Fix segfaults with reverse proxy configuration (Closes: #775909) > * Upgrade Standards-Version to 3.9.6, change DocumentRoot in > default-tls.conf to /var/www/html accordingly. > > Regards, > Thomas Klute > > > [1] https://www.debian.org/security/2015/dsa-3177
signature.asc
Description: PGP signature