Package: release.debian.org
Severity: normal
Tags: jessie
User: release.debian@packages.debian.org
Usertags: pu
Hi,
for fixing CVE-2016-8826, CVE-2016-7382, CVE-2016-7389 in
nvidia-graphics-drivers-legacy-304xx we need to update to a new upstream
version.
The packaging contains further
On Mon, Dec 19, 2016 at 11:13:48PM +0100, Andreas Beckmann wrote:
> > which I understood as both having the same tests…
>
> That's the same *tarballs*
>
> [sid]
> precedence = 1
> description = + Fails if there are leftover files after purge.
> piuparts-flags =
> %(flags-leftovers)s
>
>
Hi Emilio,
On 02.11.2016 20:09, Andreas Cadhalpun wrote:
> On 02.11.2016 09:22, Emilio Pozuelo Monfort wrote:
>> Is there a minimum ffmpeg version that is needed here? Wondering if I need to
>> add some dep-wait to this.
>
> The libavfilter-extra flavor was added in ffmpeg 7:3.1.3-2. A newer
Hi,
The press team is ok with the following dates:
> Jan 7th/8th
> Jan 14th/15th
> Jan 21st/22nd
Best,
Cédric
signature.asc
Description: PGP signature
@debian-release: please
piuparts-ignore gitlab/8.13.6+dfsg2-2
and let's see if we can improve the situation on piuparts' side for the
next upload.
On 2016-12-19 17:33, Holger Levsen wrote:
> [tarball/sid]
> piuparts-flags =
> %(flags-default)s
>
> [tarball/stretch]
> piuparts-flags =
>
2016-12-19 20:51 GMT+01:00 Niels Thykier :
> Control: severity -1 normal
>
> On Mon, 19 Dec 2016 20:44:58 +0100 Mathieu Parent
> wrote:
>> Package: release.debian.org
>> Severity: serious
>> User: release.debian@packages.debian.org
>> Usertags: unblock
Control: severity -1 normal
On Mon, 19 Dec 2016 20:44:58 +0100 Mathieu Parent
wrote:
> Package: release.debian.org
> Severity: serious
> User: release.debian@packages.debian.org
> Usertags: unblock
>
> Please let package samba enter testing fast, it includes security
Your message dated Mon, 19 Dec 2016 19:51:00 +
with message-id <84f4dd4e-dc94-c89c-b22e-d8042eb96...@thykier.net>
and subject line Re: unblock: samba/2:4.5.2+dfsg-2
has caused the Debian Bug report #848719,
regarding unblock: samba/2:4.5.2+dfsg-2
to be marked as done.
This means that you
Processing control commands:
> severity -1 normal
Bug #848719 [release.debian.org] unblock: samba/2:4.5.2+dfsg-2
Severity set to 'normal' from 'serious'
--
848719: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=848719
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
Package: release.debian.org
Severity: serious
User: release.debian@packages.debian.org
Usertags: unblock
Please let package samba enter testing fast, it includes security fixes only.
unblock samba/2:4.5.2+dfsg-2
-- System Information:
Debian Release: stretch/sid
APT prefers testing-debug
Hello,
I think you can now close those two bugs.
Regards
--
Mathieu
On 14526 March 1977, Julien Cristau wrote:
> Jan 7th/8th
> Jan 14th/15th
Should work.
> Jan 21st/22nd
> Jan 28th/29th - Cambridge BSP, probably not ideal
> Feb 4th/5th - FOSDEM, probably not great either
> Feb 11th/12th
None of them for me.
--
bye, Joerg
On Mon, Dec 19, 2016 at 05:24:38PM +0100, Andreas Beckmann wrote:
> On 2016-12-19 17:13, Niels Thykier wrote:
> > Though for some reason it appears that your testing version is passing
> > the piuparts, which leads me to thinking that unstable and testing have
> > different requirements.
> >
> >
On Mon, Dec 19, 2016 at 04:13:00PM +, Niels Thykier wrote:
> Though for some reason it appears that your testing version is passing
> the piuparts, which leads me to thinking that unstable and testing have
> different requirements.
>
> * @h01ger: can you confirm the above?
actually, no. (I
On 2016-12-19 17:13, Niels Thykier wrote:
> Though for some reason it appears that your testing version is passing
> the piuparts, which leads me to thinking that unstable and testing have
> different requirements.
>
> * @h01ger: can you confirm the above?
Yes, the sid configuration is more
Your message dated Mon, 19 Dec 2016 16:18:00 +
with message-id
and subject line Re: Bug#848679: nmu: ldns-transition
has caused the Debian Bug report #848679,
regarding nmu: ldns-transition
to be marked as done.
This means that you claim that
Pirate Praveen:
> On വെള്ളി 09 ഡിസംബര് 2016 01:45 വൈകു, Emilio Pozuelo Monfort wrote:
>> The hint was there, it's just that since this is a new kind of hint, it
>> hadn't
>> been enabled in the configuration and so britney was ignoring it.
>>
>> I have fixed that now and urgented gitlab so it
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: binnmu
gb magics++_2.30.0-4 . mips . -m "rebuild because of bus error on build machine"
-- System Information:
Debian Release: 8.6
APT prefers stable-updates
APT policy: (500,
On Mon, Dec 19, 2016 at 02:19:26PM +0100, Julien Cristau wrote:
>Hi,
>
>we're overdue for the next jessie point release. Here are some possible
>dates, please reply with availability.
>
>Jan 7th/8th
>
>Jan 14th/15th
>
>Jan 21st/22nd
>
>Jan 28th/29th - Cambridge BSP, probably not ideal
>
>Feb
Processing commands for cont...@bugs.debian.org:
> clone 828440 -1
Bug #828440 [src:moonshot-gss-eap] moonshot-gss-eap: FTBFS with openssl 1.1.0
Bug 828440 cloned as bug 848680
827061 was blocked by: 828414 835585 828597 828505 828345 828367 828603 828445
828248 844664 844904 828518 828619
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: binnmu
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
nmu getdns_1.1.0~a2-1 . ALL . -m "Rebuild with ldns >= 1.7.0~"
nmu dnssec-trigger_0.13~svn685-7 . ALL . -m "Rebuild with ldns >= 1.7.0~"
nmu
On വെള്ളി 09 ഡിസംബര് 2016 01:45 വൈകു, Emilio Pozuelo Monfort wrote:
> The hint was there, it's just that since this is a new kind of hint, it hadn't
> been enabled in the configuration and so britney was ignoring it.
>
> I have fixed that now and urgented gitlab so it doesn't have to wait until
Hi,
we're overdue for the next jessie point release. Here are some possible
dates, please reply with availability.
Jan 7th/8th
Jan 14th/15th
Jan 21st/22nd
Jan 28th/29th - Cambridge BSP, probably not ideal
Feb 4th/5th - FOSDEM, probably not great either
Feb 11th/12th
Thanks,
Julien
Hi
We intend to upload linux version 4.8.15-1 tonight or on Tuesday.
The upload incorporates the upstream stable updates 4.8.12, 4.8.13,
4.8.14 and 4.8.15 with various bugfixes and fixed vulnerabilities
(CVE-2016-8399, CVE-2016-8632, CVE-2016-8655, CVE-2016-9576,
CVE-2016-9755, CVE-2016-9756,
24 matches
Mail list logo