On 8/19/21 9:26 PM, Salvatore Bonaccorso wrote:
> Hi Thomas,
>
> [not an authoritative answer, but a suggestion below]
>
>
> If this is an import of a new upstream version on top of the current
> packaging (plus some adjustment) then please actually use
> 2:22.2.2-0+deb11u1 which sorts before (a
Hi RMs,
On Tue, Aug 10, 2021 at 4:21 PM László Böszörményi wrote:
> Asking for a fetchmail package update, fixing a regression in its last
> security fix. This is a one liner, moving down an 'endif'.
Another issue has emerged, a regression since Buster. With certain
configurations, fetchmail cra
Processing control commands:
> forwarded -1 https://release.debian.org/transitions/html/auto-gdal.html
Bug #992563 [release.debian.org] transition: gdal
Set Bug forwarded-to-address to
'https://release.debian.org/transitions/html/auto-gdal.html'.
> block -1 by 992527 992528
Bug #992563 [release.d
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: transition
X-Debbugs-Cc: pkg-grass-de...@lists.alioth.debian.org
Control: forwarded -1 https://release.debian.org/transitions/html/auto-gdal.html
Control: block -1 by 992527 992528
For the Debian GI
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: binnmu
nmu eln_1.4.0-1 . amd64 . unstable . -m "rebuild on buildd"
nmu jpegqs_1.20210408-1 . amd64 . unstable . -m "rebuild on buildd"
nmu python-pyo_1.0.4-1 . amd64 . unstable . -m "rebuild on buil
On Fri, Aug 20, 2021 at 12:23:46AM +0200, Sebastian Ramacher wrote:
> On 2021-06-08 02:06:08 +0800, Chow Loong Jin wrote:
> > On Sat, Jun 05, 2021 at 05:39:04PM +0800, Chow Loong Jin wrote:
> > > On Wed, Jun 02, 2021 at 12:27:06PM +0200, Sebastian Ramacher wrote:
> > > > On 2021-06-02 02:45:56, Cho
Package: release.debian.org
Severity: normal
Tags: buster
User: release.debian@packages.debian.org
Usertags: pu
X-Debbugs-Cc: a...@debian.org
[ Reason ]
Fixing CVE-2021-29425 in Buster which has been marked no-dsa by the
security team.
[ Impact ]
Buster would still be vulnerable to CVE-2021
7 matches
Mail list logo