Thunderbird 52.9.0 for LTS?

2018-07-07 Thread Carsten Schoenert
Hello Emilio,

in the past I've also built the Thunderbird packages for
jessie(-security) suite which is now covered by LTS.

I can easily rebuild and upload the packages for jessie and Thunderbird
now too but I'm not familiar with the needed steps and things inside the
LTS team workflow. Guido gave me some hints but I guess it better to ask
and clarify.

I'm preparing right now the packages for stretch-security and will
upload them over the weekend to security. So do you have an opinion on
how to continue with Thunderbird for jessie-security? I'm fine if you
want to do the packages for LTS on your own, the git tree for
thunderbird is up to date for debian/sid.

-- 
Regards
Carsten Schoenert



Re: Thunderbird 52.9.0 for LTS?

2018-07-07 Thread Emilio Pozuelo Monfort
Hi Carsten!

On 07/07/18 10:17, Carsten Schoenert wrote:
> Hello Emilio,
> 
> in the past I've also built the Thunderbird packages for
> jessie(-security) suite which is now covered by LTS.
> 
> I can easily rebuild and upload the packages for jessie and Thunderbird
> now too but I'm not familiar with the needed steps and things inside the
> LTS team workflow. Guido gave me some hints but I guess it better to ask
> and clarify.
> 
> I'm preparing right now the packages for stretch-security and will
> upload them over the weekend to security. So do you have an opinion on
> how to continue with Thunderbird for jessie-security? I'm fine if you
> want to do the packages for LTS on your own, the git tree for
> thunderbird is up to date for debian/sid.

Since I had done the previous updates for wheezy, I did this one for jessie
since it's now LTS. The update is ready, I'm just waiting for the stretch update
so that we don't end with a higher version in jessie if that gets delayed. I
will push the changes to the jessie branch when I upload it.

For future updates, if you want to prepare them that would be fine. If you also
want to test and release them that's cool too. The final step is to announce
them (for which you need to grab a DLA number). I can explain you the steps to
do that, or again I or someone from the team could do it, as you prefer.

Cheers,
Emilio



Re: Thunderbird 52.9.0 for LTS?

2018-07-07 Thread Carsten Schoenert
Hello Emilio and Security-Team,

while preparing the stretch-security package for Thunderbird upstream
has announced just right now via the private driver mailing list to stop
the current automatic updates for 52.9.0 due a critical issue [1] that
can bring in some data loss while working with attachments. So I decided
to open a bug [2] with severity grave against the version of thunderbird
in unstable to prevent the migration to testing for now.

But this means also we shouldn't deliver version 52.9.0 in any -security
release for now. So I will not upload my prepared packages for
stretch-security as I think Mozilla will provide a fix for the new issue
within the next days. Or there are other objections?

Am 07.07.18 um 10:54 schrieb Emilio Pozuelo Monfort:
> Hi Carsten!
> 
> On 07/07/18 10:17, Carsten Schoenert wrote:
>> Hello Emilio,
>>
>> in the past I've also built the Thunderbird packages for
>> jessie(-security) suite which is now covered by LTS.
>>
>> I can easily rebuild and upload the packages for jessie and Thunderbird
>> now too but I'm not familiar with the needed steps and things inside the
>> LTS team workflow. Guido gave me some hints but I guess it better to ask
>> and clarify.
>>
>> I'm preparing right now the packages for stretch-security and will
>> upload them over the weekend to security. So do you have an opinion on
>> how to continue with Thunderbird for jessie-security? I'm fine if you
>> want to do the packages for LTS on your own, the git tree for
>> thunderbird is up to date for debian/sid.
> 
> Since I had done the previous updates for wheezy, I did this one for jessie
> since it's now LTS. The update is ready, I'm just waiting for the stretch 
> update
> so that we don't end with a higher version in jessie if that gets delayed. I
> will push the changes to the jessie branch when I upload it.

I'm fine with this.

> For future updates, if you want to prepare them that would be fine. If you 
> also
> want to test and release them that's cool too. The final step is to announce
> them (for which you need to grab a DLA number). I can explain you the steps to
> do that, or again I or someone from the team could do it, as you prefer.

If we can a have look at this at DebConf e.g. I gladly will follow any
existing procedures if I know what and how to do. Maybe it is completely
different with 60.x releases related to the needs for rustc and cargo
and some time constrains on my side then, but this we will see once we
are there.


[1] https://bugzilla.mozilla.org/show_bug.cgi?id=1473893
[2] https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=903160

-- 
Regards
Carsten Schoenert



LTS report for June 2018 - Abhijith PA

2018-07-07 Thread Abhijith PA
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

June 2018 was my fifth month as a Debian LTS paid contributor. I was
assigned 10 hours but I only able to do 8. Carrying rest to next month.

I have spent these hours on;

 * ansible: Marked CVE-2016-8614 and CVE-2016-8628 as not-affecting. The
   first one is reported against sub project of ansible which only
   merged to core in v2.3. Working on two new CVEs that
   just piled up.

 * enigmail: Researched on upstream commit histories for the
   CVE-2017-17688, efail.

 * phpmyadmin: There were 13 security vulnerabilities reported on
   Jessie. Backported 11 of them of which some are prepared
   before Jessie reaching LTS but couldn't upload. Rest are marked as
   not affecting. Thanks to Emilio Pozuelo for taking care of broken
   CVE-2016-6616.patch and sponsoring upload[1].


- --
Abhijith PA

[1] - https://lists.debian.org/debian-lts-announce/2018/07/msg6.html
-BEGIN PGP SIGNATURE-
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=EiY/
-END PGP SIGNATURE-