Accepted linux 4.19.260-1 (source) into oldstable

2022-09-29 Thread Debian FTP Masters
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Thu, 29 Sep 2022 02:47:06 +0200 Source: linux Architecture: source Version: 4.19.260-1 Distribution: buster-security Urgency: high Maintainer: Debian Kernel Team Changed-By: Ben Hutchings Closes: 1018752 Changes: linux

Accepted gdal 2.4.0+dfsg-1+deb10u1 (source) into oldstable

2022-09-29 Thread Debian FTP Masters
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Fri, 30 Sep 2022 06:08:49 +0530 Source: gdal Architecture: source Version: 2.4.0+dfsg-1+deb10u1 Distribution: buster-security Urgency: high Maintainer: Debian GIS Project Changed-By: Utkarsh Gupta Changes: gdal

Accepted node-thenify 3.3.0-1+deb10u1 (source) into oldstable

2022-09-29 Thread Debian FTP Masters
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Fri, 30 Sep 2022 05:43:40 +0530 Source: node-thenify Architecture: source Version: 3.3.0-1+deb10u1 Distribution: buster-security Urgency: high Maintainer: Debian Javascript Maintainers Changed-By: Utkarsh Gupta Changes:

Accepted linux-latest 105+deb10u17 (source) into oldstable

2022-09-29 Thread Debian FTP Masters
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Fri, 30 Sep 2022 00:47:24 +0200 Source: linux-latest Architecture: source Version: 105+deb10u17 Distribution: buster-security Urgency: medium Maintainer: Debian Kernel Team Changed-By: Ben Hutchings Changes: linux-latest

Re: What do do with bullseye minor issues?

2022-09-29 Thread Sylvain Beucler
Hi, On 29/09/2022 09:09, Emilio Pozuelo Monfort wrote: On 28/09/2022 23:54, Ola Lundqvist wrote: Took me a month to get down here in the email backlog. I think your reasoning makes sense. I have added the following to the LTS/Development page. "If a CVE has been fixed in Debian Stable it

[SECURITY] [DLA 3126-1] libsndfile security update

2022-09-29 Thread Thorsten Alteholz
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 - - Debian LTS Advisory DLA-3126-1debian-...@lists.debian.org https://www.debian.org/lts/security/Thorsten Alteholz September 30, 2022

[SECURITY] [DLA 3125-1] libvncserver security update

2022-09-29 Thread Thorsten Alteholz
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 - - Debian LTS Advisory DLA-3125-1debian-...@lists.debian.org https://www.debian.org/lts/security/Thorsten Alteholz September 30, 2022

Accepted libsndfile 1.0.28-6+deb10u2 (source) into oldstable

2022-09-29 Thread Debian FTP Masters
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Thu, 29 Sep 2022 19:03:02 +0200 Source: libsndfile Architecture: source Version: 1.0.28-6+deb10u2 Distribution: buster-security Urgency: high Maintainer: Debian Multimedia Maintainers Changed-By: Thorsten Alteholz Changes:

Accepted libvncserver 0.9.11+dfsg-1.3+deb10u5 (source) into oldstable

2022-09-29 Thread Debian FTP Masters
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Mon, 26 Sep 2022 22:03:02 +0200 Source: libvncserver Architecture: source Version: 0.9.11+dfsg-1.3+deb10u5 Distribution: buster-security Urgency: high Maintainer: Peter Spiess-Knafl Changed-By: Thorsten Alteholz Changes:

Re: What do do with bullseye minor issues?

2022-09-29 Thread Moritz Muehlenhoff
On Thu, Sep 29, 2022 at 09:09:29AM +0200, Emilio Pozuelo Monfort wrote: > On 28/09/2022 23:54, Ola Lundqvist wrote: > > Hi Sylvain > > > > Took me a month to get down here in the email backlog. I think your > > reasoning makes sense. > > I have added the following to the LTS/Development page. > >

[SECURITY] [DLA 3124-1] webkit2gtk security update

2022-09-29 Thread Emilio Pozuelo Monfort
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 - - Debian LTS Advisory DLA-3124-1debian-...@lists.debian.org https://www.debian.org/lts/security/ Emilio Pozuelo Monfort September 28, 2022

Re: What do do with bullseye minor issues?

2022-09-29 Thread Emilio Pozuelo Monfort
On 28/09/2022 23:54, Ola Lundqvist wrote: Hi Sylvain Took me a month to get down here in the email backlog. I think your reasoning makes sense. I have added the following to the LTS/Development page. "If a CVE has been fixed in Debian Stable it should, in general, be fixed in LTS as well, or