-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Am Freitag, den 17.08.2018, 00:34 +0200 schrieb Julien Cristau:
> [re-adding debian-release]
>
> On Thu, Aug 16, 2018 at 22:34:47 +0200, Jörg Frings-Fürst wrote:
>
> > Am Donnerstag, den 16.08.2018, 10:10 +0200 schrieb Julien Cristau:
> > > On 08/1
[re-adding debian-release]
On Thu, Aug 16, 2018 at 22:34:47 +0200, Jörg Frings-Fürst wrote:
> Am Donnerstag, den 16.08.2018, 10:10 +0200 schrieb Julien Cristau:
> > On 08/16/2018 07:32 AM, Jörg Frings-Fürst wrote:
> > > Hello,
> > >
> > > for the package sane-backends I ask my sponsor to upload
On 2018-08-15 05:45, Niels Thykier wrote:
> Aurelien Jarno:
> [...]
> >> then removing clsync from testing is also an option
> >> AFAICT.
> >>
> >> I am considering since clsync has had its FTBFS bug against sid for
> >> almost 2 years now with no reaction from its maintainers.
> >
> > That soluti
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Am Donnerstag, den 16.08.2018, 10:10 +0200 schrieb Julien Cristau:
> On 08/16/2018 07:32 AM, Jörg Frings-Fürst wrote:
> > Hello,
> >
> > for the package sane-backends I ask my sponsor to upload it into
> > experimental, but it was uploaded into sid.
Dear Adam,
> > > libxcursor (1:1.1.14-1+deb9u2) stretch; urgency=high
> > >
> > > * Fix a denial of service or potentially code execution via
> > > a one-byte heap overflow. (CVE-2015-9262) Closes: #906012)
> >
> > Would it be possible to get a "yay/nay" on this s-p-u request?
>
> Ple
Processing control commands:
> tags -1 + confirmed
Bug #906042 [release.debian.org] stretch-pu: package
libxcursor/1:1.1.14-1+deb9u2
Added tag(s) confirmed.
--
906042: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=906042
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
Control: tags -1 + confirmed
FWIW, CCing both a p-u bug and debian-release is a little redundant.
On Thu, 2018-08-16 at 09:44 +0100, Chris Lamb wrote:
> Chris Lamb wrote:
>
> > libxcursor (1:1.1.14-1+deb9u2) stretch; urgency=high
> >
> > * Fix a denial of service or potentially code execut
Chris Lamb wrote:
> libxcursor (1:1.1.14-1+deb9u2) stretch; urgency=high
>
>* Fix a denial of service or potentially code execution via
> a one-byte heap overflow. (CVE-2015-9262) Closes: #906012)
Would it be possible to get a "yay/nay" on this s-p-u request?
I wouldn't normally pres
On 08/16/2018 07:32 AM, Jörg Frings-Fürst wrote:
> Hello,
>
> for the package sane-backends I ask my sponsor to upload it into
> experimental, but it was uploaded into sid.
>
> All rebuilds against libsane1 on amd64 are tested and ok.
>
> What further action is proposed by you?
Did the ABI actu
Processing control commands:
> tag -1 + moreinfo
Bug #906258 [release.debian.org] stretch-pu: package yubico-piv-tool/1.4.2-2
Added tag(s) moreinfo.
> tag -1 - security
Bug #906258 [release.debian.org] stretch-pu: package yubico-piv-tool/1.4.2-2
Removed tag(s) security.
--
906258: https://bugs.d
Control: tag -1 + moreinfo
Control: tag -1 - security
On 08/16/2018 10:01 AM, Nicolas Braud-Santoni wrote:
> Package: release.debian.org
> Severity: normal
> Tags: stretch security
> User: release.debian@packages.debian.org
> Usertags: pu
> Control: block 906128 by -1
>
> Hi,
>
> I would lik
Processing control commands:
> block 906128 by -1
Bug #906128 [libykpiv1] libykpiv1 impacted by CVE-2018-14779 and CVE-2018-14780
906128 was not blocked by any bugs.
906128 was not blocking any bugs.
Added blocking bug(s) of 906128: 906258
--
906128: https://bugs.debian.org/cgi-bin/bugreport.cgi
Package: release.debian.org
Severity: normal
Tags: stretch security
User: release.debian@packages.debian.org
Usertags: pu
Control: block 906128 by -1
Hi,
I would like to upload a fix for #906128 (CVE-2018-14779 and CVE-2018-14780)
to stretch-pu; I already backported the fix from upstream to v
13 matches
Mail list logo