Hi Adam,

Thanks for the quick reply.

On Wed, Mar 25, 2015 at 07:59:06AM +0000, Adam D. Barratt wrote:
> retitle 781141 unblock: dulwich/0.9.7-2
> user release.debian....@packages.debian.org
> usertags 781141 = unblock
> tags 781141 + moreinfo
> thanks
> 
> On 2015-03-25 1:31, Jelmer Vernooij wrote:
> [...]
> >User: release.debian....@packages.debian.org
> >Usertags: pu
> 
> Updates via t-p-u are unblocks; "pu" is intended for stable updates. I
> realise that this apparently isn't clear from the reportbug wording.

I was told to file a bug when I asked on #debian-release about uploading to 
testing-proposed-updates.

> >I'd like to upload a new version of dulwich to testing-proposed-updates.
> >unstable already has a new upstream version (0.9.8) from an upload in
> >November, and has diverged from testing.
> >
> >This upload would fix two serious security bugs:
> >
> >#780958 CVE-2015-0838: buffer overflow in C implementation of pack
> >apply_delta()
> >#780989 CVE-2014-9706: does not prevent to write files in commits with
> >invalid paths to working tree
> 
> +dulwich (0.9.7-3) unstable; urgency=medium
> 
> s/unstable/jessie/ :)
Whoops, fixed :)

> The patches look okay, but according to the BTS metadata both bugs affect
> the package in unstable and are not yet fixed there. If that's correct,
> please fix unstable and then get back to us; if it's not, please fix the
> metadata to indicate where the bugs are fixed.

The upload for unstable is probably stuck in NEW (behind another change that
required NEW processing).

Cheers,

Jelmer

Attachment: signature.asc
Description: Digital signature

Reply via email to