Le jeudi, 4 juin 2020, 13.26:16 h CEST Utkarsh Gupta a écrit :
> Hi again,
>
> On Thu, Jun 4, 2020 at 4:20 PM Utkarsh Gupta wrote:
> > Your last upload of cups to oldoldstable, version 1.7.5-11+deb8u7, had
> > one test failing:
> > ```
> > httpAddrGetList(debian): FAIL
> > ```
> > Was it supposed
Le jeudi, 14 mai 2020, 07.58:19 h CEST Mike Gabriel a écrit :
> The Debian LTS team recently reviewed the security issue(s) affecting your
> package in Jessie:
> https://security-tracker.debian.org/tracker/CVE-2019-8842
> https://security-tracker.debian.org/tracker/CVE-2020-3898
>
> We decided tha
Le jeudi, 7 juin 2018, 17.42:28 h CEST Antoine Beaupré a écrit :
> I've pushed a MR here to sync with the test package I uploaded:
>
> https://salsa.debian.org/printing-team/cups/merge_requests/1
>
> I am not sure if we should target jessie or jessie-security so I kept
> the UNRELEASED tag for no
Le jeudi, 7 juin 2018, 16.13:39 h CEST Antoine Beaupré a écrit :
> Hi again,
>
> Next in line: cups. Two fairly simple patches and this time the test
> suite passes without a fuss, provided that the local hostname resolves
> within the chroot. ;)
Excellent, thanks for caring about CUPS in oldolds
Hi Chris,
Le vendredi, 6 janvier 2017, 06.28:58 h CET Chris Lamb a écrit :
> the Debian LTS team would like to fix the security issues which are
> currently open in the Wheezy version of jbig2dec:
> https://security-tracker.debian.org/tracker/source-package/jbig2dec
>
> Would you like to take car
Hi Ola,
Le jeudi, 29 décembre 2016, 22.52:00 h CET Ola Lundqvist a écrit :
> Some comments on the debdiff.
>
> The release name for wheezy is wheezy-security, not stable-security
> (nor oldstable-security).
ACK.
> Apart from that I think the change looks fine to me. Will you send out
> the DLA
Dear LTS Team,
I'd like to get CVE-2015-0839 fixed in wheezy, it's a no-DSA issue, and
security team members suggested to get it fixed in stable and oldstable.
This bug is a simple 'fetching gpg key from keyservers with a short
keyid' problem, and upstream's fix is to use the full fingerprint.
T
Version: 2.0.2-1
Hi Frederic, hi Stable & LTS teams,
Frederic's suggestion is to patch CUPS to disable SSLv3 and RC4 algorithms to
protect CUPS from the POODLE vulnerability.
Have we removed protocols' support in {old,}stable before? Ubuntu applied
this patch in Ubuntu Trusty, and RedHat did
Sorry to not have seen the initial mail, on too many lists…
Le lundi, 21 septembre 2015, 23.30:16 Santiago Ruano Rincón a écrit :
> Sorry if you receive the below message twice. The debdiff is too big,
> so I put it here:
> https://people.debian.org/~santiago/cups_1.4.4-7+squeeze9_versus_squee
> z
Le vendredi, 27 février 2015, 04.39:08 Ben Hutchings a écrit :
> On Fri, 2015-02-27 at 03:17 +, Ben Hutchings wrote:
> > This does not fix the bug!
>
> I cherry-picked git commit 6c087a72a0708bcb7929955c75770ee364755c42
> ("Add some range checking (probably more to come) to avoid divide-by-0
>
Hi,
Le lundi, 23 février 2015, 11.58:33 Raphael Hertzog a écrit :
> the Debian LTS team would like to fix the security issues which are
> currently open in the Squeeze version of your package:
> https://security-tracker.debian.org/tracker/CVE-2014-9679
>
> Would you like to take care of this your
Hi Salvatore,
Le mercredi, 30 juillet 2014, 15.59:50 Salvatore Bonaccorso a écrit :
> (Cc'ing you as I don't know if you are subscribed):
I am now. :)
> I have added you to the alioth project. (it should be that DDs can
> commit there via the Debian Developer role, but this is currently
> not wo
Hi all,
Trying to be a good citizen, I want to provide a src:cups security
update for squeeze-lts (debdiff attached), following up on the
DSA-2990-1 upload to wheezy.
So I followed https://wiki.debian.org/LTS/Development and encountered
the following hurdles:
* Claiming the issue in lts-neede
13 matches
Mail list logo