Bug#913450: RM: ibmquantumexperience/1.9.2-1
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: rm The code in this package now is part of qiskit-terra[1]. Upstream decided to merge it[2]. Therefore, it can be removed from all Debian dists. Thanks, luciano [1] https://tracker.debian.org/pkg/qiskit-terra [2] https://github.com/Qiskit/qiskit-terra/pull/1198
Bug#846017: jessie-pu: package ieee-data/20150531.1~deb8u1
Package: release.debian.org Severity: normal Tags: jessie User: release.debian@packages.debian.org Usertags: pu Hi there, I would like to remove the cron job in ieee-data (closes: #826104) since we are DDoS IEEE servers every month. I was hopping that the amount of stable installations were gentle with their servers, but I underestimate the amount of Debian installations (and overestimated the IEEE servers). Anyway, I still getting reports from people that we are getting fetching problems. So, here is the patch. -- System Information: Debian Release: stretch/sid APT prefers unstable APT policy: (990, 'unstable'), (500, 'testing'), (500, 'stable'), (500, 'oldstable') Architecture: amd64 (x86_64) Foreign Architectures: i386 Kernel: Linux 4.7.0-1-amd64 (SMP w/4 CPU cores) Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=ANSI_X3.4-1968) (ignored: LC_ALL set to C) Shell: /bin/sh linked to /bin/dash Init: systemd (via /run/systemd/system) diff -Nru ieee-data-20150531.1~deb8u1/debian/changelog ieee-data-20150531.1~deb8u2/debian/changelog --- ieee-data-20150531.1~deb8u1/debian/changelog 2015-12-20 09:58:11.0 -0500 +++ ieee-data-20150531.1~deb8u2/debian/changelog 2016-11-27 14:21:34.0 -0500 @@ -1,3 +1,9 @@ +ieee-data (20150531.1~deb8u2) stable; urgency=high + + * Crontab update disable. Closes: #826104 + + -- Luciano Bello <luci...@debian.org> Sun, 27 Nov 2016 14:21:34 -0500 + ieee-data (20150531.1~deb8u1) stable; urgency=medium * New iab.txt url updated. diff -Nru ieee-data-20150531.1~deb8u1/debian/ieee-data.cron.monthly ieee-data-20150531.1~deb8u2/debian/ieee-data.cron.monthly --- ieee-data-20150531.1~deb8u1/debian/ieee-data.cron.monthly 2014-10-19 14:20:43.0 -0400 +++ ieee-data-20150531.1~deb8u2/debian/ieee-data.cron.monthly 1969-12-31 19:00:00.0 -0500 @@ -1,3 +0,0 @@ -#!/bin/sh -test -x /usr/bin/update-oui || exit 0 -BASEDIR=/var/lib/ieee-data/ /usr/bin/update-oui -f -q
Bug#792806: jessie-pu: package ieee-data/20150531.1
On Saturday 19 December 2015 19.39.26 Adam D. Barratt wrote: > That's not quite what you meant. :-) The reversed diff looks okay, other > than the version should be 20150531.1~deb8u1, please. With that change, > feel free to upload. done! thanks for your help and patience. /l
Bug#792806: jessie-pu: package ieee-data/20150531.1
Package: release.debian.org User: release.debian@packages.debian.org Usertags: pu Tags: jessie Severity: normal Following the recommendation from https://bugs.debian.org/783096 /luciano -- System Information: Debian Release: jessie/sid APT prefers unstable APT policy: (990, 'unstable'), (500, 'stable'), (500, 'oldstable'), (1, 'experimental') Architecture: amd64 (x86_64) Foreign Architectures: i386 Kernel: Linux 3.14-2-amd64 (SMP w/4 CPU cores) Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Init: systemd (via /run/systemd/system) -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: https://lists.debian.org/3220226.1s849GXimQ@box
Bug#774211: freeze exception for binutils 2.25-3
Hi guys, https://sourceware.org/bugzilla/show_bug.cgi?id=17512 is still growing, and porting all the patches to 2.24.90.20141023-1 is getting less and less trivial. If you short the distance with the upstream version, that will put a lot of work of the security-team off :) Thanks for your work in the release team. Cheers, luciano -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: https://lists.debian.org/2980127.7AZxXk6CMa@box
Bug#777312: nmu (for stable): vlc (and mplayer?)
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: binnmu Dear release team, I just dak-installed liblivemedia_2012.05.17-1+wheezy1 to release a DSA announcing fix for was recently updated in wheezy-security and wheezy-p-u to fix CVE-2013-6933. This requires vlc and mplayer to be built against this new version. The plan is to include all these fixes in the same DSA. vlc is in the security-archive mplayer is not. If I understand correctly, in the mplayer case, I just need to recompile mplayer using the now-installed liblivemedia and upload to security master as a normal security fix. Am I right? Thanks, luciano -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: https://lists.debian.org/13687410.RRnST32hlS@box
Bug#759300: wheezy-pu: package live-config/3.0.23-1+deb7u1
Package: release.debian.org Severity: normal Tags: wheezy User: release.debian@packages.debian.org Usertags: pu Hi, After talking with Daniel, we agreed to update the patch for this (non- critical security) bug via spu. This will allow to build the next debian-live without the vulnerability. The problem is the following: Debian-live allows to SSH access with default user and password. The patch disable ssh password authentication. The debdiff is attached. Thanks! /lucianodiff -Nru live-config-3.0.23/debian/changelog live-config-3.0.23/debian/changelog --- live-config-3.0.23/debian/changelog 2013-04-25 19:36:15.0 +0200 +++ live-config-3.0.23/debian/changelog 2014-08-26 00:48:24.0 +0200 @@ -1,3 +1,10 @@ +live-config (3.0.23-1+deb7u1) wheezy-proposed-updates; urgency=medium + + * Non-maintainer upload. + * Disbaling ssh password authentication by default (Closes: #741678) + + -- Luciano Bello luci...@debian.org Tue, 26 Aug 2014 00:44:04 +0200 + live-config (3.0.23-1) unstable; urgency=low * Loading fglrx module with --ignore-install like the nvidia ones too. diff -Nru live-config-3.0.23/debian/patches/PasswordAuthentication_no live-config-3.0.23/debian/patches/PasswordAuthentication_no --- live-config-3.0.23/debian/patches/PasswordAuthentication_no 1970-01-01 01:00:00.0 +0100 +++ live-config-3.0.23/debian/patches/PasswordAuthentication_no 2014-08-26 00:43:49.0 +0200 @@ -0,0 +1,11 @@ +--- a/scripts/config/1170-openssh-server b/scripts/config/1170-openssh-server +@@ -35,6 +35,8 @@ + fi + done + ++ sed -i -e 's|#\(PasswordAuthentication\) yes|\1 no|' /etc/ssh/sshd_config ++ + case ${_SSH} in + true) + # Creating state file diff -Nru live-config-3.0.23/debian/patches/series live-config-3.0.23/debian/patches/series --- live-config-3.0.23/debian/patches/series 1970-01-01 01:00:00.0 +0100 +++ live-config-3.0.23/debian/patches/series 2014-08-26 00:43:09.0 +0200 @@ -0,0 +1 @@ +PasswordAuthentication_no
s-p-u: security update for XXX package
(CC is appreciated. I'm not following this list) Hey there, I would like to upload a new poppler package to stable in order to fix a the security issue 2178 [1], #524806 [2]. This was checked with the security team and is a non-dsa case. The debdiff: http://people.debian.org/~luciano/poppler/poppler_2178_lenny.debdiff Builded: http://people.debian.org/~luciano/poppler/ Cheers, luciano [1] https://rt.debian.org/Ticket/Display.html?id=2178 [2] http://bugs.debian.org/524806 signature.asc Description: This is a digitally signed message part.
Re: s-p-u: security update for xfs package
El Mar 17 Nov 2009, Adam D. Barratt escribió: From a stable-update point-of-view, I'd also prefer that it was fixed in unstable first. It's a lot easier to fix sid if any unforeseen problems arise. :) So, I made the QA upload few minutes ago. luciano -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
freeze exception for davfs2
Hi release team, The Davfs2 upstream[1] detects that *may* lead to wrong modification times and - in very rare cases - to data loss. This bug was filed here[2]. There you can find the patch applied to 1.3.3-2. Is the only modification from 1.3.3-1 (which is the lenny one). AFAIK, the data loss situation is quite weird. Is an overdo reaction ask for an exception? The patch is really simple, but I don't want to take you to much time with this... [1] http://packages.debian.org/davfs2 [2] http://bugs.debian.org/496688 thx, luciano signature.asc Description: This is a digitally signed message part.
davfs2 0.2.3-1.1 needs an update in sarge
The davfs2 unstable version (0.2.3-1.1)[1] its a NMU and it resolved a RC Bug[2]. Please, update it to the frozen sarge. BTW, I worked in a new package version 0.2.3-2 which resolve some minors bugs. Have sense to add it to the sarge too? Please, CC me, Im not subscribed on the list [1] http://packages.debian.org/unstable/utils/davfs2 [2] http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=307085 -- Luciano Bello [EMAIL PROTECTED] Linux Argetina signature.asc Description: This is a digitally signed message part