Respond for details
---
This email has been checked for viruses by AVG.
https://www.avg.com
___
pkg-kde-extras mailing list
pkg-kde-extras@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/pkg-kde-extras
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Sun, 04 Nov 2018 23:53:16 +0100
Source: skrooge
Binary: skrooge skrooge-common
Architecture: source
Version: 2.16.2-1
Distribution: unstable
Urgency: medium
Maintainer: Debian KDE Extras Team
Changed-By: Pino Toscano
skrooge_2.16.2-1_source.changes uploaded successfully to localhost
along with the files:
skrooge_2.16.2-1.dsc
skrooge_2.16.2.orig.tar.xz
skrooge_2.16.2-1.debian.tar.xz
skrooge_2.16.2-1_source.buildinfo
Greetings,
Your Debian queue daemon (running on host usper.debian.org)
Hi Roberto,
On Thu, Nov 01, 2018 at 09:11:38PM -0400, Roberto C. Sánchez wrote:
> On Tue, Oct 30, 2018 at 08:51:49AM +0100, Salvatore Bonaccorso wrote:
> >
> > Yes this is right. There was as well announced
> > https://lists.debian.org/debian-devel-announce/2018/04/msg7.html
> > for a
Source: exiv2
Version: 0.26-1
Severity: grave
Tags: security upstream
Forwarded: https://github.com/Exiv2/exiv2/issues/511
Hi,
The following vulnerability was published for exiv2, only affecting
the experimental version. The severity as such is not warranted but is
to make sure the 0.26