On 12/26/2010 01:22 PM, Mehdi Dogguy wrote:
>
> I'll wait for your comments before uploading.
>
FTR, I've uploaded Bugzilla to testing-proposed-updates.
(debdiff is attached, fixed an issue found by Julien).
Regards,
--
Mehdi Dogguy مهدي الدڤي
http://dogguy.org/
diff -Nru bugzilla-3.6.2.0/deb
On 12/26/2010 02:02 PM, Holger Levsen wrote:
> Hi Mehdi,
>
> On Sonntag, 26. Dezember 2010, Mehdi Dogguy wrote:
>> I'll wait for your comments before uploading.
>
> did you include the fix for 604230/602738? (which is in the sid version)
>
Yes. (first hunk in the diff, fwiw)
Regards,
--
Mehd
Hi Mehdi,
On Sonntag, 26. Dezember 2010, Mehdi Dogguy wrote:
> I'll wait for your comments before uploading.
did you include the fix for 604230/602738? (which is in the sid version)
cheers,
Holger
signature.asc
Description: This is a digitally signed message part.
On 12/18/2010 02:39 PM, Julien Cristau wrote:
> On Wed, Dec 8, 2010 at 16:03:58 +0100, Raphael Bossek wrote:
>
>> Dear Christian,
>>
>> Debian uses a different directory structure then upstream since
>> years. The CVE-2010-3764 patch can not be applied as drop in
>> because it's affect the direc
On Wed, Dec 8, 2010 at 16:03:58 +0100, Raphael Bossek wrote:
> Dear Christian,
>
> Debian uses a different directory structure then upstream since years.
> The CVE-2010-3764 patch can not be applied as drop in because it's
> affect the directory structure of Debian. You have to change Debian's
>
Quoting Raphael Bossek (boss...@debian.org):
> Dear Christian,
>
> Debian uses a different directory structure then upstream since years.
> The CVE-2010-3764 patch can not be applied as drop in because it's
> affect the directory structure of Debian. You have to change Debian's
> patches to achiev
Dear Christian,
Debian uses a different directory structure then upstream since years.
The CVE-2010-3764 patch can not be applied as drop in because it's
affect the directory structure of Debian. You have to change Debian's
patches to achieve this too.
Instead of loosing time changing something t
Quoting Julien Cristau (jcris...@debian.org):
> On Thu, Nov 25, 2010 at 22:05:47 +, Adam D. Barratt wrote:
>
> > On Thu, 2010-11-25 at 21:07 +, Adam D. Barratt wrote:
> > > $ debdiff ftp/pool/main/b/bugzilla/bugzilla_3.6.{2.0-4,3.0-2}.dsc
> > > 2>/dev/null | diffstat | tail -n1
> > > 164
On Thu, Nov 25, 2010 at 22:05:47 +, Adam D. Barratt wrote:
> On Thu, 2010-11-25 at 21:07 +, Adam D. Barratt wrote:
> > $ debdiff ftp/pool/main/b/bugzilla/bugzilla_3.6.{2.0-4,3.0-2}.dsc
> > 2>/dev/null | diffstat | tail -n1
> > 1645 files changed, 80807 insertions(+), 94494 deletions(-)
>
On Thu, 2010-11-25 at 21:07 +, Adam D. Barratt wrote:
> $ debdiff ftp/pool/main/b/bugzilla/bugzilla_3.6.{2.0-4,3.0-2}.dsc 2>/dev/null
> | diffstat | tail -n1
> 1645 files changed, 80807 insertions(+), 94494 deletions(-)
>
> A lot of that is probably ignorable as it relates to changes in CVS
On Mon, 2010-11-22 at 10:34 +0100, Raphael Bossek wrote:
> thank you for your support. Sorry but I missed your response.
> If 3.6.3 is not accepted for testing -- where these security
> vulnerabilities (http://bugs.debian.org/602420) are solved upstream --
> applying patches to 3.6.2 could be but i
On Mon, Nov 22, 2010 at 10:34:11AM +0100, Raphael Bossek wrote:
> Hi Moritz,
>
> thank you for your support. Sorry but I missed your response.
> If 3.6.3 is not accepted for testing -- where these security
> vulnerabilities (http://bugs.debian.org/602420) are solved upstream --
> applying patches
Hi Moritz,
thank you for your support. Sorry but I missed your response.
If 3.6.3 is not accepted for testing -- where these security
vulnerabilities (http://bugs.debian.org/602420) are solved upstream --
applying patches to 3.6.2 could be but in consideration. By the way,
3.6.3.0-2 solved some fu
Raphael,
On Thu, Nov 18, 2010 at 21:40:31 +0100, Moritz Muehlenhoff wrote:
> In gmane.linux.debian.devel.release, you wrote:
> > Bugzilla 3.6.3.0-1 with security fixes pending for unfreeze in
> > unstable since today.
>
> Why did you upload a new upstream version? We're in freeze and
> new upstr
In gmane.linux.debian.devel.release, you wrote:
> Bugzilla 3.6.3.0-1 with security fixes pending for unfreeze in
> unstable since today.
Why did you upload a new upstream version? We're in freeze and
new upstream releases should be avoided, as outlined on debian-
devel-announce several times. I ev
Bugzilla 3.6.3.0-1 with security fixes pending for unfreeze in
unstable since today.
Greetings,
Raphael
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Mon, 15 Nov 2010 10:09:20 +0100
Source: bugzilla
Binary: bugzilla3 bugzilla3-doc
Architecture: source all
Version: 3.6.3.0-1
Dis
16 matches
Mail list logo