Bug#824834: outdated info on www: Debian GNU/hurd probably not planned for wheezy anymore…
package: www.debian.org x-debbugs-cc: debian-h...@lists.debian.org Hi, https://www.debian.org/ports/hurd/ contains the following: "We hope to be able to release Debian GNU/Hurd for wheezy." As you might be aware, wheezy has been released and so has jessie, so you might want to update the text on this page :-) -- cheers, Holger signature.asc Description: Digital signature
Bug#824834: marked as done (outdated info on www: Debian GNU/hurd probably not planned for wheezy anymore…)
Your message dated Fri, 20 May 2016 11:01:55 +0200 with message-id <20160520090155.ga10...@var.bordeaux.inria.fr> and subject line Re: Bug#824834: outdated info on www: Debian GNU/hurd probably not planned for wheezy anymore… has caused the Debian Bug report #824834, regarding outdated info on www: Debian GNU/hurd probably not planned for wheezy anymore… to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 824834: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=824834 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems --- Begin Message --- package: www.debian.org x-debbugs-cc: debian-h...@lists.debian.org Hi, https://www.debian.org/ports/hurd/ contains the following: "We hope to be able to release Debian GNU/Hurd for wheezy." As you might be aware, wheezy has been released and so has jessie, so you might want to update the text on this page :-) -- cheers, Holger signature.asc Description: Digital signature --- End Message --- --- Begin Message --- Hello, Holger Levsen, on Fri 20 May 2016 08:52:54 +, wrote: > https://www.debian.org/ports/hurd/ contains the following: > > "We hope to be able to release Debian GNU/Hurd for wheezy." > > As you might be aware, wheezy has been released and so has jessie, so > you might want to update the text on this page :-) Fixed, thanks :) Samuel--- End Message ---
Bug#824834: outdated info on www: Debian GNU/hurd probably not planned for wheezy anymore…
On Fri, May 20, 2016 at 11:01:55AM +0200, Samuel Thibault wrote: > Fixed, thanks :) Thank you for fixing this so quickly too! :) -- cheers, Holger signature.asc Description: Digital signature
Bug#819198: marked as done (Missing libapache2-mod-auth-radius on Debian 8.3 mirrors.)
Your message dated Fri, 20 May 2016 22:12:42 +0200 with message-id and subject line Re: Bug#819198: Missing libapache2-mod-auth-radius on Debian 8.3 mirrors. has caused the Debian Bug report #819198, regarding Missing libapache2-mod-auth-radius on Debian 8.3 mirrors. to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 819198: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=819198 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems --- Begin Message --- Package: libapache2-mod-auth-radius Version: 1.5 Severity: serious Tags: upstream Justification: fails to build from source (but built successfully in the past) The package libapache2-mod-auth-radius is not on Debian mirrors. I did not find why this package was excluded from mirrors. Is there a new way to configure Apache authentication against RADIUS server? Thank You very much in advance. -- System Information: Debian Release: 8.3 APT prefers stable-updates APT policy: (500, 'stable-updates'), (500, 'stable') Architecture: amd64 (x86_64) Foreign Architectures: i386 Kernel: Linux 3.16.0-4-amd64 (SMP w/4 CPU cores) Locale: LANG=pt_BR.utf8, LC_CTYPE=pt_BR.utf8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Init: systemd (via /run/systemd/system) --- End Message --- --- Begin Message --- Closing this bug. packages.debian.org shows the situation correctly. So there is no bug (anymore) in www.debian.org 2016-04-25 21:58 GMT+02:00 Jonas Crescencio : > It is not on the stable mirrors, there is no > pool/main/liba/libapache-mod-auth-radius/ directory on Jessie. It is on > Wheezy, Stretch and Sid, but it is not on Jessie. > > > Wheezy - > https://buildd.debian.org/status/package.php?p=libapache-mod-auth-radius&suite=wheezy > > Stretch - > https://buildd.debian.org/status/package.php?p=libapache-mod-auth-radius&suite=stretch > > Sid - > https://buildd.debian.org/status/package.php?p=libapache-mod-auth-radius&suite=sid > > > Will it be released on this stable version (Jessie 8.x)? Or it will only be > released on the next Debian 9.x ? That the package is not in stable will not change during Jessie. Packages are not added to stable after release. Only in the next release. > I am asking this, because I need so much this package on the current > official stable version mirrors (Debian 8) and if it will not be released on > a soon upgrade, I will try another method of apache authentication, because > this package is missing. > > Thank you. Regards, Frank > > 2016-04-24 16:58 GMT-03:00 Josip Rodin : >> >> reassign 819198 www.debian.org >> thanks >> >> On Thu, Mar 24, 2016 at 03:49:28PM -0300, Js wrote: >> > Package: libapache2-mod-auth-radius >> > Version: 1.5 >> > Severity: serious >> > Tags: upstream >> > Justification: fails to build from source (but built successfully in the >> > past) >> > >> > The package libapache2-mod-auth-radius is not on Debian mirrors. I did >> > not >> > find why this package was excluded from mirrors. >> >> It is on the mirrors, you can check the >> pool/main/liba/libapache-mod-auth-radius/ directory I guess? >> >> The package just got back into testing a couple of months ago, putting it >> on >> track to be released with Debian 9.x, and now this bug report removed it >> again :) >> >> I do find it strange that the website search brings up nothing: >> https://packages.debian.org/search?keywords=libapache2-mod-auth-radius >> >> It's supposed to show the one in unstable at least... >> >> https://packages.qa.debian.org/liba/libapache-mod-auth-radius.html >> >> >> https://buildd.debian.org/status/package.php?p=libapache-mod-auth-radius&suite=unstable >> >> -- >> 2. That which causes joy or happiness. > >--- End Message ---
Bug#824239: marked as done ([DLA] fixes for 2014/dla-*)
Your message dated Fri, 20 May 2016 23:05:28 +0200 with message-id and subject line Re: Bug#824239: [DLA] fixes for dla-20,38,53,54 has caused the Debian Bug report #824239, regarding [DLA] fixes for 2014/dla-* to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 824239: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=824239 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems --- Begin Message --- Package: www.debian.org Severity: normal Tags: patch X-Debbugs-CC: debian-...@lists.debian.org * wrong references in dla-20 * missing wireshirk advisory (dla-38), no one sent to d-d-a * wrong dla ID for "dla-54" sent and created as dla-53 * missing "real" dla-54 see the bottom of the mail p.s.: scripts are not all-round genius; scripts cannot decide if the source is valid, scripts cannot fix issues in the source, scripts do just as instructed. then, YOU NEED CHECK AND FIX YOURSELF THE GENERATED CONTENTS -- victory no need to CC me :-) Index: english/security/2014/dla-20.wml === --- english/security/2014/dla-20.wml(revision 193) +++ english/security/2014/dla-20.wml(working copy) @@ -8,9 +8,9 @@ (Closes: #679897), closes https://security-tracker.debian.org/tracker/CVE-2012-3512";>CVE-2012-3512. plugins: use runtime $ENV{MUNIN_PLUGSTATE}. So all properly written plugins will use /var/lib/munin-node/plugin-state/$uid/$some_file now please report plugins that are still using /var/lib/munin/plugin-state/ as those might pose a security risk! -Validate multigraph plugin name, https://security-tracker.debian.org/tracker/CVE-2013-6048";>CVE-2013-6048. Don't abort data collection for a node due to malicious node, fixing - munin#1397, https://security-tracker.debian.org/tracker/CVE-2013-6359";>CVE-2013-6359. + munin#1397, https://security-tracker.debian.org/tracker/CVE-2013-6048";>CVE-2013-6048. +Validate multigraph plugin name, https://security-tracker.debian.org/tracker/CVE-2013-6359";>CVE-2013-6359. For Debian 6 Squeeze, these issues have been fixed in munin version 1.4.5-3+deb6u1 Index: english/security/2014/dla-38.data === --- english/security/2014/dla-38.data (nonexistent) +++ english/security/2014/dla-38.data (working copy) @@ -0,0 +1,10 @@ +DLA-38-1 wireshark +2014-8-20 +CVE-2014-5161 CVE-2014-5162 CVE-2014-5163 +wireshark +yes +yes +no + +#use wml::debian::security + Index: english/security/2014/dla-38.wml === --- english/security/2014/dla-38.wml(nonexistent) +++ english/security/2014/dla-38.wml(working copy) @@ -0,0 +1,25 @@ +LTS security update + + + +https://security-tracker.debian.org/tracker/CVE-2014-5161";>CVE-2014-5161, +https://security-tracker.debian.org/tracker/CVE-2014-5162";>CVE-2014-5162: + +The Catapult DCT2000 and IrDA dissectors could underrun a buffer. +It may be possible to make Wireshark crash by injecting a malformed packet onto +the wire or by convincing someone to read a malformed packet trace file. + +https://security-tracker.debian.org/tracker/CVE-2014-5163";>CVE-2014-5163: + +The GSM Management dissector could crash. +It may be possible to make Wireshark crash by injecting a malformed packet onto +the wire or by convincing someone to read a malformed packet trace file. + + +For Debian 6 Squeeze, these issues have been fixed in wireshark version 1.2.11-6+squeeze15 + + + +# do not modify the following line +#include "$(ENGLISHDIR)/security/2014/dla-38.data" +# $Id: $ Index: english/security/2014/dla-53.data === --- english/security/2014/dla-53.data (revision 193) +++ english/security/2014/dla-53.data (working copy) @@ -1,10 +1,10 @@ -DLA-53-1 gnupg -2014-9-14 -CVE-2014-5270 -gnupg -yes -yes -no - -#use wml::debian::security - +DLA-53-1 apt +2014-9-3 +CVE-2014-0487 CVE-2014-0488 CVE-2014-0489 +apt +yes +yes +no + +#use wml::debian::security + Index: english/security/2014/dla-53.wml === --- english/security/2014/dla-53.wml(revision 193) +++ english/security/2014/dla-53.wml(working copy) @@ -1,15 +1,16 @@ LTS security update -Genkin, Pipman and Tromer discovered a side-channel attack on Elgamal -encryption subkeys (https://security-tracker.debian.org/tracker/CVE-2014-5270";>CVE-2014-5270). +It was discovered that APT, the high level package manager, does not +properly invalidate unau
Bug#820119: marked as done (tidy reports valid NCR as invalid)
Your message dated Fri, 20 May 2016 21:15:45 + with message-id and subject line Debian WWW CVS commit by djpig fixes #820119 has caused the Debian Bug report #820119, regarding tidy reports valid NCR as invalid to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 820119: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=820119 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems --- Begin Message --- Package: www.debian.org Severity: wishlist https://www.w3.org/International/questions/qa-controls#support HTML, XHTML and XML 1.0 do not support the C0 range, except for HT (Horizontal Tabulation) U+0009, LF (Line Feed) U+000A, and CR (Carriage Return) U+000D. The C1 range is supported, i.e. you can encode the controls directly or represent them as NCRs (Numeric Character References). * https://www.w3.org/International/questions/qa-controls#background The control codes in the range U+0080-U+009F are known as the "C1" range. unfortunately no option seems to eliminate this :( latest source use the same code (line 1165-) https://github.com/htacg/tidy-html5/blob/master/src/lexer.c -- victory no need to CC me :-) --- End Message --- --- Begin Message --- This bug was closed by djpig in the webwml CVS repository: https://www.debian.org/devel/website/using_cvs Note that it might take some time until www.debian.org has been updated. CVSROOT:/cvs/webwml Module name:webwml Changes by: djpig 16/05/20 21:15:45 Modified files: english/international/l10n/scripts: gen-files.pl Log message: Remove BREAK PERMITTED HERE (Closes: #820119)--- End Message ---
Processed: severity of 821096 is wishlist
Processing commands for cont...@bugs.debian.org: > severity 821096 wishlist Bug #821096 [www.debian.org] filenames of generated by parse-advisory.pl and parse-dls.pl files should include the revision number Severity set to 'wishlist' from 'normal' > thanks Stopping processing here. Please contact me if you need assistance. -- 821096: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=821096 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems
Re:
On Thu, 2016-05-19 at 18:29 -0400, Adolfo Holzmann wrote: > i'm a real person not machine, i'm from chile and i have a friend who > knows php, Java,bootstrap,html5,phonegap,laravel,codeigniter and many > others. He is a father of 2 kids and he is unemployed, could you give > him a work as a dedicated developer? The Debian project does not employ developers, but your friend is welcome to volunteer to help out with various aspects of Debian: https://www.debian.org/intro/help Also, your friend may want to become a Debian consultant or watch the debian-jobs mailing list for job opportunities. https://www.debian.org/consultants/ https://lists.debian.org/debian-jobs/ -- bye, pabs https://wiki.debian.org/PaulWise signature.asc Description: This is a digitally signed message part