Package: release.debian.org
Severity: normal
Tags: bookworm
User: release.debian@packages.debian.org
Usertags: pu
[ Reason ]
As requested by the security team, I would like to bring the microcode
update level for AMD64 processors in Bullseye and Bookworm to match what
we have in Sid and Trixi
Package: release.debian.org
Severity: normal
Tags: bullseye
User: release.debian@packages.debian.org
Usertags: pu
[ Reason ]
As requested by the security team, I would like to bring the microcode
update level for AMD64 processors in Bullseye and Bookworm to match what
we have in Sid and Trixi
Processing changes file: glibc_2.36-9+deb12u2_mipsel-buildd.changes
ACCEPT
Processing control commands:
> tags -1 confirmed
Bug #1053219 [release.debian.org] bookworm-pu: package
lemonldap-ng/2.16.1+ds-deb12u2
Added tag(s) confirmed.
--
1053219: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1053219
Debian Bug Tracking System
Contact ow...@bugs.debian.org with prob
Control: tags -1 confirmed
On Fri, 2023-09-29 at 17:37 +0400, Yadd wrote:
> Two new vulnerabilities have been dicovered and fixed in lemonldap-
> ng:
> - an open redirection only when configuration is edited by hand and
>doesn't follow OIDC specifications
> - a server-side-request-forgery (C
Control: tags -1 confirmed
On Fri, 2023-09-29 at 08:35 +0200, Birger Schacht wrote:
> The terminal emulator foot contains a vulnerability. The issue is
> that, if an XTGETTCAP escape sequence printed to the terminal
> contains newline characters, foot will echo the newline characters
> back into t
Processing control commands:
> tags -1 confirmed
Bug #1053189 [release.debian.org] bookworm-pu: package foot/1.13.1-2+deb12u1
Added tag(s) confirmed.
--
1053189: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1053189
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
Processing control commands:
> tags -1 confirmed
Bug #1053220 [release.debian.org] bullseye-pu: package
lemonldap-ng/2.0.11+ds-4+deb11u5
Added tag(s) confirmed.
--
1053220: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1053220
Debian Bug Tracking System
Contact ow...@bugs.debian.org with pr
Control: tags -1 confirmed
On Fri, 2023-09-29 at 17:45 +0400, Yadd wrote:
> Two new vulnerabilities have been dicovered and fixed in lemonldap-
> ng:
> - an open redirection due to incorrect escape handling
> - an open redirection only when configuration is edited by hand and
>doesn't follow
Processing control commands:
> tags -1 confirmed
Bug #1053270 [release.debian.org] bullseye-pu: package curl/7.74.0-1.3+deb11u9
Added tag(s) confirmed.
--
1053270: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1053270
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
Control: tags -1 confirmed
On Sat, 2023-09-30 at 20:46 +0800, Carlos Henrique Lima Melara wrote:
> Vulnerabilities were discovered and reported to Curl upstream [1][2]
> with the
> following CVE IDs:
>
> - CVE-2023-28321
> - CVE-2023-28322
>
Please go ahead.
Regards,
Adam
Your message dated Sat, 30 Sep 2023 18:22:22 +0200
with message-id
and subject line Re: Bug#1052467: transition: svt-av1
has caused the Debian Bug report #1052467,
regarding transition: svt-av1
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not th
Package: release.debian.org
Severity: normal
Tags: bookworm
User: release.debian@packages.debian.org
Usertags: pu
X-Debbugs-Cc: Julian Gilbey , Carlos Maddela
This adds the #1040940 fix to the #1040939 upload for an unrelated
issue that is already included for the next point release.
#10409
Package: release.debian.org
Severity: normal
Tags: bullseye
User: release.debian@packages.debian.org
Usertags: pu
X-Debbugs-Cc: t...@security.debian.org, Anibal Monsalve Salazar
This updates the cpio package in bullseye to the package
in bookworm/trixie/sid (same upstream version).
The firs
Package: release.debian.org
Severity: normal
Tags: bullseye
User: release.debian@packages.debian.org
Usertags: pu
X-Debbugs-Cc: c...@packages.debian.org, charlesmel...@riseup.net
Control: affects -1 + src:curl
[ Reason ]
Vulnerabilities were discovered and reported to Curl upstream [1][2] with
Processing control commands:
> affects -1 + src:curl
Bug #1053270 [release.debian.org] bullseye-pu: package curl/7.74.0-1.3+deb11u9
Added indication that 1053270 affects src:curl
--
1053270: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1053270
Debian Bug Tracking System
Contact ow...@bugs.d
Processing changes file: linux_6.1.55-1_mips64el-buildd.changes
ACCEPT
Processing changes file: linux_6.1.55-1_mipsel-buildd.changes
ACCEPT
Processing changes file: glibc_2.36-9+deb12u2_armhf-buildd.changes
ACCEPT
19 matches
Mail list logo