-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
- -
Debian LTS Advisory DLA-2648-1debian-...@lists.debian.org
https://www.debian.org/lts/security/ Abhijith PA
May 05, 2021
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
- -
Debian LTS Advisory DLA-2649-1debian-...@lists.debian.org
https://www.debian.org/lts/security/ Anton Gladky
May 04, 2021
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Tue, 04 May 2021 22:23:39 +0200
Source: cgal
Architecture: source
Version: 4.9-1+deb9u1
Distribution: stretch-security
Urgency: medium
Maintainer: Joachim Reichel
Changed-By: Anton Gladky
Changes:
cgal (4.9-1+deb9u1)
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Tue, 04 May 2021 19:07:06 +0530
Source: mediawiki
Binary: mediawiki mediawiki-classes
Architecture: source
Version: 1:1.27.7-1~deb9u8
Distribution: stretch-security
Urgency: medium
Maintainer: Kunal Mehta
Changed-By: Abhijith PA
I have added autopkgtest to the stretch-version of bind9 [1].
And the pipelines passed [2].
Feel free to commit there the following versions.
[1]
https://salsa.debian.org/lts-team/packages/bind9/-/tree/master-stretch/debian/tests
[2]
Hello,
On Mon, May 3, 2021 at 5:47 PM Emilio Pozuelo Monfort wrote:
> I have prepared a security update for LTS for the recent bind9 CVEs. I have
> done
> some testing on them, but if someone can give them some additional testing
> that'd be great.
If it still helps, I had set up a DNS server,
Hi,
On 03/05/2021 16:40, Lynoure Braakman wrote:
Following DLAs have been reserved and haven't been published yet:
DLA 2637-1 (23 Apr 2021) (drupal7)
DLA 2610-1 (29 Mar 2021) (linux-4.19)
As FD, I have added these to the website (the other two were already done).
Cheers,
Emilio
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
- -
Debian LTS Advisory DLA-2647-1debian-...@lists.debian.org
https://www.debian.org/lts/security/ Emilio Pozuelo Monfort
May 04, 2021
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Mon, 03 May 2021 12:32:54 +0200
Source: bind9
Architecture: source
Version: 1:9.10.3.dfsg.P4-12.3+deb9u9
Distribution: stretch-security
Urgency: medium
Maintainer: Debian DNS Packaging
Changed-By: Emilio Pozuelo Monfort
Changes:
On 04/05/2021 07:30, Anton Gladky wrote:
Hi Emilio,
I have prepared a repo for bind9-lts-upload and salsa pipelines are passed
[2].
I needed to disable blhc-test though, but it should not be fixed by targeted
security upload.
[1] https://salsa.debian.org/lts-team/packages/bind9
[2]
10 matches
Mail list logo