Re: Preparation of the next stable Debian GNU/Linux update

2008-12-17 Thread Philipp Kern
On Sat, Dec 13, 2008 at 04:37:51PM +0100, Philipp Kern wrote:
 Preparation of Debian GNU/Linux 4.0r6
 =
 
 Accepted Packages
 -
 
 These packages will be installed into the stable Debian distribution
 and will be part of the next revision.

Also accepted was this upload to reportbug:

Sourceful update of reportbug:
 version in stable:  3.31
 version in updates: 3.31+etch1
 Rationales:
  - 3.31+etch1: reportbug - bugs.d.o is now RR DNS. SMTP is only running on one 
of them.

And the following security updates (also listed below):

Sourceful update of phpmyadmin:
 version in stable:  4:2.9.1.1-8
 version in updates: 4:2.9.1.1-9
 Rationales:
  - 2.9.1.1-9: DSA 1675 phpmyadmin - fix cross site scripting, fix regression 
introduced in DSA 1641

Sourceful update of fai-kernels:
 version in stable:  1.17+etch.23
 version in updates: 1.17+etch.23etch1
  - 1.17+etch.23etch1: DSA 1687 fai-kernels - several vulnerabilities

Sourceful update of squirrelmail:
 version in stable:  2:1.4.9a-2
 version in updates: 2:1.4.9a-3
 Rationales:
  - 1.4.9a-3: DSA 1682 squirrelmail - fix cross site scripting

Sourceful update of user-mode-linux:
 version in stable:  2.6.18-1um-2etch.23
 version in updates: 2.6.18-1um-2etch.23etch1
 Rationales:
  - 2.6.18-1um-2etch.23etch1: DSA 1687 user-mode-linux - several vulnerabilities

Sourceful update of linux-2.6:
 version in stable:  2.6.18.dfsg.1-23
 version in updates: 2.6.18.dfsg.1-23etch1
 Rationales:
  - 2.6.18.dfsg.1-23etch1: DSA 1687 linux-2.6 - several vulnerabilities

 Requires further Investigation
 --
 
 These packages need further investigation.  One reason the package is
 listed here could be that I'm not yet convinced this package should go
 into stable, but don't want to reject it entirely at the moment.
 
 Another reason could be that released and updated architectures are
 not yet in sync.
 
 Sourceful update of devscripts:
  version in stable:  2.9.26
  version in updates: 2.9.26etch1
  Rationales:
   - 2.9.26etch1: devscripts - Allow signing of changes files produced by dpkg 
 versions = 1.14.17 (#474949)
  Problems: mipsel build missing
 
 Sourceful update of graphviz:
  version in stable:  2.8-2.4
  version in updates: 2.8-3+etch1
  Rationales:
   - 2.8-3+etch1: graphviz - fix stack overflow (CVE-2008-4555)
  Problems: ia64 and mipsel builds missing

The builds for both packages are in and they are ready to be installed
into stable.

 Sourceful update of perl:
  version in updates: 5.8.8-7etch4
  version in updates-NEW: 5.8.8-7etch5
  Rationales:
   - 5.8.8-7etch5: DSA 1678 perl - fix privilege escalation
  Problems: FTBFS on hppa

This will hopefully be fixed with a new upload for the next point release.

 Packages Waiting for Investigation
 --
 
 glpi | 0.68.2-1etch0.2
 phpmyadmin   | 2.9.1.1-9
 squirrelmail | 1.4.9a-3
 uw-imap  | 2002edebian1-13.1+etch1

phpmyadmin and squirrelmail have been accepted.  The other two (glpi and
uw-imap) will be considered for the next point release.

 Covered DSAs
 
 
 The following DSAs are incorporated into this point release.

Additionally to those already listed the following were accepted into this
point release:

DSA 1675 | phpmyadmin | fix cross site scripting, fix regression introduced in 
DSA 1641
DSA 1682 | squirrelmail | fix cross site scripting
DSA 1687 | fai-kernels | several vulnerabilities
DSA 1687 | linux-2.6 | several vulnerabilities
DSA 1687 | user-mode-linux | several vulnerabilities

Kind regards,
Philipp Kern
-- 
 .''`.  Philipp KernDebian Developer
: :' :  http://philkern.de Release Assistant
`. `'   xmpp:p...@0x539.de Stable Release Manager
  `-finger pkern/k...@db.debian.org


signature.asc
Description: Digital signature


Re: Preparation of the next stable Debian GNU/Linux update

2008-10-31 Thread Adeodato Simó
* Paul Hardy [Fri, 17 Oct 2008 11:03:37 -0700]:

 If this is not a strong enough reason, I'll follow up with
 backports.org.  I hadn't brought up a backport previously because I
 knew everyone was trying to focus on a lenny release.

I think that's going to be better.

Cheers,

-- 
Adeodato Simó dato at net.com.org.es
Debian Developer  adeodato at debian.org
 
  Listening to: Ellos - Lejos de lo perfecto


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Preparation of the next stable Debian GNU/Linux update (1st update)

2008-10-17 Thread Daniel Leidert
Am Freitag, den 17.10.2008, 13:13 +0200 schrieb Philipp Kern:

[..]
 Preparation of Debian GNU/Linux 4.0r5
 =
[..]
 If you would like to get a package updated in the stable release, you
 are advised to talk to the stable release managers first (see
 http://www.debian.org/intro/organization).

I would like to get an update of xml-core into Etch. The reason is bug
#482140 [1]. The update would not change the behaviour, but the
dependencies and parts of the code-base (see the attachment and the bug
report). xml-core would then just depend on perl-base and
update-xmlcatalog should not longer fail during upgrade (seems, that
this does not always happen). Independent from this change I will
prepare an update to xml-core and docbook-xml (and other affected
packages) for Lenny.

[1] http://bugs.debian.org/482140

Regards, Daniel


Index: tools/update-xmlcatalog
===
--- tools/update-xmlcatalog	(Revision 1255)
+++ tools/update-xmlcatalog	(Arbeitskopie)
@@ -121,7 +121,7 @@
 use strict;
 
 ## --
-use File::Spec::Functions;
+use File::Spec;
 use Getopt::Long;
 
 ## --
@@ -196,7 +196,7 @@
 {
 	if ( defined( $package ) )
 	{
-	my $catalog = catfile( $catalog_dir, $package.xml );
+	my $catalog = File::Spec-catfile( $catalog_dir, $package.xml );
 	if ( ! -f $catalog )
 	{
 		print STDERR $name: error: package catalog $catalog not found\n;
@@ -261,7 +261,7 @@
 {
 if ( defined( $root ) )
 {
-	my $catalog = catfile( $catalog_dir, 'catalog' );
+	my $catalog = File::Spec-catfile( $catalog_dir, 'catalog' );
 	if ( ! -f $catalog )
 	{
 	print STDERR $name: error: root catalog $catalog not found\n;
@@ -275,7 +275,7 @@
 }
 elsif ( defined( $package ) )
 {
-	my $catalog = catfile( $catalog_dir, $package.xml );
+	my $catalog = File::Spec-catfile( $catalog_dir, $package.xml );
 	if ( ! -f $catalog )
 	{
 	print STDERR $name: error: package catalog $catalog not found\n;
@@ -344,8 +344,8 @@
 if ( defined( $root ) )
 {
 $catalog = 'catalog';
-$catalog_data = catfile( $catalog_data_dir, $catalog );
-$catalog = catfile( $catalog_dir, $catalog );
+$catalog_data = File::Spec-catfile( $catalog_data_dir, $catalog );
+$catalog = File::Spec-catfile( $catalog_dir, $catalog );
 my $start = $type;
 $start .= 'Id' unless $type eq 'uri';
 $start .= 'StartString';
@@ -358,8 +358,8 @@
 }
 elsif ( defined( $package ) )
 {
-$catalog_data = catfile( $catalog_data_dir, $package );
-$catalog = catfile( $catalog_dir, $package.xml );
+$catalog_data = File::Spec-catfile( $catalog_data_dir, $package );
+$catalog = File::Spec-catfile( $catalog_dir, $package.xml );
 my $start = $type;
 $start .= 'Id' unless $type eq 'uri';
 $start .= 'StartString';
@@ -375,7 +375,7 @@
 $catalog = $local;
 $catalog_data = $local;
 $catalog_data =~ tr|/|_|;
-$catalog_data = catfile( $catalog_data_dir, $catalog_data );
+$catalog_data = File::Spec-catfile( $catalog_data_dir, $catalog_data );
 my $start = ( $type eq 'uri' ) ? 'name' : $type;
 $start .= 'Id' unless $type eq 'uri';
 $id = $start=\$id\;
Index: debian/changelog
===
--- debian/changelog	(Revision 1255)
+++ debian/changelog	(Arbeitskopie)
@@ -1,3 +1,12 @@
+xml-core (0.09-0.1etch1) stable; urgency=low
+
+  * Non-maintainer upload.
+  * tools/update-xmlcatalog: Use File::Spec instead of File::Spec::Functions
+as workaround to #482140.
+  * debian/rules: Depend on perl-base rather than the full perl package.
+
+ -- Daniel Leidert (dale) [EMAIL PROTECTED]  Tue, 14 Oct 2008 20:33:12 +0200
+
 xml-core (0.09-0.1) unstable; urgency=low
 
   * Non-maintainer upload.
Index: debian/rules
===
--- debian/rules	(Revision 1255)
+++ debian/rules	(Arbeitskopie)
@@ -48,7 +48,7 @@
 		dh_compress
 		dh_fixperms
 		dh_installdeb
-		dh_perl
+		dh_perl -d
 		dh_gencontrol
 		dh_md5sums
 		dh_builddeb


Re: Preparation of the next stable Debian GNU/Linux update (1st update)

2008-10-17 Thread Luk Claes
Daniel Leidert wrote:
 Am Freitag, den 17.10.2008, 13:13 +0200 schrieb Philipp Kern:
 
 [..]
 Preparation of Debian GNU/Linux 4.0r5
 =
 [..]
 If you would like to get a package updated in the stable release, you
 are advised to talk to the stable release managers first (see
 http://www.debian.org/intro/organization).
 
 I would like to get an update of xml-core into Etch. The reason is bug
 #482140 [1]. The update would not change the behaviour, but the
 dependencies and parts of the code-base (see the attachment and the bug
 report). xml-core would then just depend on perl-base and
 update-xmlcatalog should not longer fail during upgrade (seems, that
 this does not always happen). Independent from this change I will
 prepare an update to xml-core and docbook-xml (and other affected
 packages) for Lenny.

There is no requirement that people need to upgrade to the latest point
release before upgrading to lenny and we don't intend to introduce that
requirement. It also appears that you're too late to get this change
included in the currently planned point release...

If it gets 'fixed' in lenny, then I don't see a reason why anything else
is needed?

Cheers

Luk


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Preparation of the next stable Debian GNU/Linux update

2008-10-15 Thread Luk Claes
Philipp Kern wrote:

 Removed Packages
 
 
 These packages will be removed from the stable Debian distribution.
 This normally only a result of license problems when the license
 prohibits their distribution.
 
 [ No removals known at this point. ]

what about f-prot (#495171)?

Cheers

Luk


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Preparation of the next stable Debian GNU/Linux update

2008-10-15 Thread Paul Hardy
Phillip,

On Wed, Oct 15, 2008 at 6:39 AM, Philipp Kern [EMAIL PROTECTED] wrote:
 Preparation of Debian GNU/Linux 4.0r5
 =

 We are preparing the next revision of the current stable Debian
 distribution (etch)...

 If you would like to get a package updated in the stable release, you
 are advised to talk to the stable release managers first (see
 http://www.debian.org/intro/organization).

I see from the list that you're a manager on the Stable release team,
so I hope this message satisfies the above requirement. :-)

Can you include the latest version of the package I'm maintaining,
unifont 1:5.1.20080914-1, which is currently in testing?

The latest package has these improvements over the versions (original
 backport) currently in stable:

* Closes all known bugs (some of which had been open in Debian for years).
* Addresses potential DFSG issues, notably with a replacement of the
11,000+ glyphs in the Hangul Syllables block.
* Provides complete coverage of the Unicode Basic Multilingual Plane.
* Includes all additions for Unicode 5.1, released in April 2008.
* Incorporates improvements made in older Ubuntu versions that weren't
ported back to Debian.

I did most of the development of the package under etch 4.0r3, and
always made sure during development that the latest version would
still build and install under 4.0r3.  The current package builds under
4.0r3 with just a couple of warnings:

1) Warns about using a version of Policy  3.7.2.
2) Warns that the Homepage: control field isn't recognized and is
being skipped.

I asked about these for backporting to etch on the debian-mentors IRC
channel a while ago.  I was told that I should ignore those messages
(because they were harmless) rather than constructing a separate
backport control file.  According to that advice, the version of
unifont currently in testing should therefore be suitable as is for
etch 4.0r5 (which probably won't even give the above two warnings
anymore).


Paul Hardy
GPG Key ID: E6E6E390


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Preparation of the next stable Debian GNU/Linux update

2008-07-28 Thread Martin Schulze
dann frazier wrote:
 On Sun, Jul 27, 2008 at 02:29:38PM -0400, Joey Hess wrote:
  I'm wondering who wrote:
As linux-modules-extra-2.6-etchnhalf was not ready in time we decided to
skip it for r4 and include it in r5.
   
  Frans Pop wrote:
   Well done folks. You've again managed to break at least part of the 
   functionality of Debian Installer and, more importantly, left users with 
   a potentially unbootable system after installation.
  
  fjp You can now partition using loop-aes encryption, but the modules are 
  not
available for the installed system.
  fjp So you cannot access any loop-aes encrypted partitions.
  fjp Or (hopefully) the installation will fail during finish-install.
  
  Well, it would seem we have the first peice of errata for the end of
  http://www.debian.org/releases/etch/debian-installer/etchnhalf
 
 How's this?
 
 Index: etchnhalf.wml
 ===
 RCS file: 
 /cvs/webwml/webwml/english/releases/etch/debian-installer/etchnhalf.wml,v
 retrieving revision 1.4
 diff -u -p -r1.4 etchnhalf.wml
 --- etchnhalf.wml 15 Jul 2008 08:56:10 -  1.4
 +++ etchnhalf.wml 27 Jul 2008 21:17:42 -
 @@ -175,6 +175,9 @@ release.
  h3 id=errata-r0Errata specific to qetch-and-a-half/q/h3
  
  p
 -No known issues.
 +Partitions encrypted using loop-AES will not be accessable after 
 installation.
   accessible?
 +This issue is due to the absence of loop-aes kernel modules for the etchnhalf
 ^^
caused by?
 +kernel. These modules will be made available in the next update of Debian
 +GNU/Linux 4.0, 4.0r5.

... and can be fetched from proposed-updates before.?

Regards,

Joey

-- 
Open source is important from a technical angle. -- Linus Torvalds


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Preparation of the next stable Debian GNU/Linux update

2008-07-27 Thread Frans Pop
 New package loop-aes-etchnhalf:
  architectures in updates: s390 all amd64 i386 powerpc arm sparc alpha
  ia64 mips mipsel hppa version in updates: 3.2c-2~etchnhalf.2
  Rationales:
   - 3.2c-2~etchnhalf.1: loop-aes-etchnhalf - source compatible w/
   etchnhalf kernel

 As linux-modules-extra-2.6-etchnhalf was not ready in time we decided to
 skip it for r4 and include it in r5.

Well done folks. You've again managed to break at least part of the 
functionality of Debian Installer and, more importantly, left users with 
a potentially unbootable system after installation.

This is the third time since Etch where a stable release involving 
something I have spent a serious amount of my time on is mishandled by 
the release team.
I've had it with this mentality where apparently it is OK to just skip 
proper and timely preparation of releases, where it is OK to do things at 
the very last possible moment, break promises made to colleague DDs and 
break their work without any prior communication at all.

As you obviously don't appreciate the work done by others to get things to 
the point that a release is possible, I will not participate in ANYTHING 
that has to do with releasing Lenny anymore, which means I'm dropping per 
now a lot of my D-I work, debian-cd work, documentation work and website 
work and any testing work I normally do.

Frans Pop


signature.asc
Description: This is a digitally signed message part.


Re: Preparation of the next stable Debian GNU/Linux update

2008-07-27 Thread Joey Hess
I'm wondering who wrote:
  As linux-modules-extra-2.6-etchnhalf was not ready in time we decided to
  skip it for r4 and include it in r5.
 
Frans Pop wrote:
 Well done folks. You've again managed to break at least part of the 
 functionality of Debian Installer and, more importantly, left users with 
 a potentially unbootable system after installation.

fjp You can now partition using loop-aes encryption, but the modules are not
  available for the installed system.
fjp So you cannot access any loop-aes encrypted partitions.
fjp Or (hopefully) the installation will fail during finish-install.

Well, it would seem we have the first peice of errata for the end of
http://www.debian.org/releases/etch/debian-installer/etchnhalf

How many months do we plan to let users stumble over this before r5?

 This is the third time since Etch where a stable release involving 
 something I have spent a serious amount of my time on is mishandled by 
 the release team.
 I've had it with this mentality where apparently it is OK to just skip 
 proper and timely preparation of releases, where it is OK to do things at 
 the very last possible moment, break promises made to colleague DDs and 
 break their work without any prior communication at all.

We're very good at releasing every day / week (hello, britney, debian-cd). We
*suck* at releasing every X years where every single thing is ad-hoc. As long
as stable release frequency is random and release preparations are ad-hoc, we
will continue to have such problems.

 As you obviously don't appreciate the work done by others to get things to 
 the point that a release is possible, I will not participate in ANYTHING 
 that has to do with releasing Lenny anymore, which means I'm dropping per 
 now a lot of my D-I work, debian-cd work, documentation work and website 
 work and any testing work I normally do.

It might help your motivation slightly to think of stable as a sub-par and
largely irrelevant derived distribution bolted onto the side of the real
Debian.

-- 
see shy jo, who at least can stop feeling bad about his original slink-and-half
release. Apparently being an official Debian release would not have
made it any better..


signature.asc
Description: Digital signature


Re: Preparation of the next stable Debian GNU/Linux update

2008-07-27 Thread Steve Langasek
On Sun, Jul 27, 2008 at 07:22:21PM +0200, Frans Pop wrote:
  New package loop-aes-etchnhalf:
   architectures in updates: s390 all amd64 i386 powerpc arm sparc alpha
   ia64 mips mipsel hppa version in updates: 3.2c-2~etchnhalf.2
   Rationales:
- 3.2c-2~etchnhalf.1: loop-aes-etchnhalf - source compatible w/
etchnhalf kernel

  As linux-modules-extra-2.6-etchnhalf was not ready in time we decided to
  skip it for r4 and include it in r5.

 Well done folks. You've again managed to break at least part of the 
 functionality of Debian Installer and, more importantly, left users with 
 a potentially unbootable system after installation.

 This is the third time since Etch where a stable release involving 
 something I have spent a serious amount of my time on is mishandled by 
 the release team.
 I've had it with this mentality where apparently it is OK to just skip 
 proper and timely preparation of releases, where it is OK to do things at 
 the very last possible moment, break promises made to colleague DDs and 
 break their work without any prior communication at all.

So you would have had the release team do what instead, exactly?  Wait
indefinitely for this package to be ready, even if that meant impacting
lenny preparations or releasing etch-and-a-half after the lenny release?

The value in doing a ½ style point release is to make the OS available to
users of newer hardware.  If the point release is delayed so long that
there's a new full release out before it's done, then *no one* gets the
benefit of being able to install a supported Debian release on hardware that
wasn't supported before.  How would *that* be showing appreciation for the
work that people have done to make etch ½ happen, exactly?

Releasing without linux-modules-extra-2.6-etchnhalf et al. means that the
updated hardware support is still useful to *some* users with newer
hardware.

As a release management decision, I see no grounds for attacking the release
team the way you do.  The normal media are still useful the same way that
they were before, and the etchnhalf installer option is more useful than not
having one was.  That looks like a success to me, albeit a qualified
success.

On breaking promises and without any prior communication, I have no
idea.  I agree that neither is a good thing, but in my following of
debian-release and debian-boot, I frankly have no idea where promises were
made and broken.

-- 
Steve Langasek   Give me a lever long enough and a Free OS
Debian Developer   to set it on, and I can move the world.
Ubuntu Developerhttp://www.debian.org/
[EMAIL PROTECTED] [EMAIL PROTECTED]


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Preparation of the next stable Debian GNU/Linux update

2008-07-27 Thread dann frazier
On Sun, Jul 27, 2008 at 02:29:38PM -0400, Joey Hess wrote:
 I'm wondering who wrote:
   As linux-modules-extra-2.6-etchnhalf was not ready in time we decided to
   skip it for r4 and include it in r5.
  
 Frans Pop wrote:
  Well done folks. You've again managed to break at least part of the 
  functionality of Debian Installer and, more importantly, left users with 
  a potentially unbootable system after installation.
 
 fjp You can now partition using loop-aes encryption, but the modules are not
   available for the installed system.
 fjp So you cannot access any loop-aes encrypted partitions.
 fjp Or (hopefully) the installation will fail during finish-install.
 
 Well, it would seem we have the first peice of errata for the end of
 http://www.debian.org/releases/etch/debian-installer/etchnhalf

How's this?

Index: etchnhalf.wml
===
RCS file: 
/cvs/webwml/webwml/english/releases/etch/debian-installer/etchnhalf.wml,v
retrieving revision 1.4
diff -u -p -r1.4 etchnhalf.wml
--- etchnhalf.wml   15 Jul 2008 08:56:10 -  1.4
+++ etchnhalf.wml   27 Jul 2008 21:17:42 -
@@ -175,6 +175,9 @@ release.
 h3 id=errata-r0Errata specific to qetch-and-a-half/q/h3
 
 p
-No known issues.
+Partitions encrypted using loop-AES will not be accessable after installation.
+This issue is due to the absence of loop-aes kernel modules for the etchnhalf
+kernel. These modules will be made available in the next update of Debian
+GNU/Linux 4.0, 4.0r5.
 /p
 /if-etchnhalf-released

--
dann frazier


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Preparation of the next stable Debian GNU/Linux update

2008-07-27 Thread Cyril Brulebois
dann frazier [EMAIL PROTECTED] (27/07/2008):
 How's this?

1 typo.

 -No known issues.
 +Partitions encrypted using loop-AES will not be accessable after 
 installation.
   accessible

 +This issue is due to the absence of loop-aes kernel modules for the etchnhalf
 +kernel. These modules will be made available in the next update of Debian
 +GNU/Linux 4.0, 4.0r5.
  /p
  /if-etchnhalf-released

Mraw,
KiBi.


signature.asc
Description: Digital signature


Re: Preparation of the next stable Debian GNU/Linux update

2008-07-27 Thread Martin Zobel-Helas
Hi, 

On Sun Jul 27, 2008 at 15:19:25 -0600, dann frazier wrote:
 On Sun, Jul 27, 2008 at 02:29:38PM -0400, Joey Hess wrote:
  I'm wondering who wrote:
As linux-modules-extra-2.6-etchnhalf was not ready in time we decided to
skip it for r4 and include it in r5.
   
  Frans Pop wrote:
   Well done folks. You've again managed to break at least part of the 
   functionality of Debian Installer and, more importantly, left users with 
   a potentially unbootable system after installation.
  
  fjp You can now partition using loop-aes encryption, but the modules are 
  not
available for the installed system.
  fjp So you cannot access any loop-aes encrypted partitions.
  fjp Or (hopefully) the installation will fail during finish-install.
  
  Well, it would seem we have the first peice of errata for the end of
  http://www.debian.org/releases/etch/debian-installer/etchnhalf
 
 How's this?
 
 Index: etchnhalf.wml
 ===
 RCS file: 
 /cvs/webwml/webwml/english/releases/etch/debian-installer/etchnhalf.wml,v
 retrieving revision 1.4
 diff -u -p -r1.4 etchnhalf.wml
 --- etchnhalf.wml 15 Jul 2008 08:56:10 -  1.4
 +++ etchnhalf.wml 27 Jul 2008 21:17:42 -
 @@ -175,6 +175,9 @@ release.
  h3 id=errata-r0Errata specific to qetch-and-a-half/q/h3
  
  p
 -No known issues.
 +Partitions encrypted using loop-AES will not be accessable after 
 installation.
 +This issue is due to the absence of loop-aes kernel modules for the etchnhalf
 +kernel. These modules will be made available in the next update of Debian
 +GNU/Linux 4.0, 4.0r5.
  /p
  /if-etchnhalf-released

We just agreed with Joerg Jaspert to post-release the missing modules as
soon as he has arrived in Argentina.

Greetings
Martin

-- 
 Martin Zobel-Helas [EMAIL PROTECTED]  |  Debian Release Team Member
 Debian  GNU/Linux Developer   |   Debian Listmaster
 Public key http://zobel.ftbfs.de/5d64f870.asc   -   KeyID: 5D64 F870
 GPG Fingerprint:  5DB3 1301 375A A50F 07E7  302F 493E FB8E 5D64 F870


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Preparation of the next stable Debian GNU/Linux update

2008-07-26 Thread Philipp Kern
On Fri, Jul 25, 2008 at 01:27:25PM +0200, Philipp Kern wrote:
 New package atl2-etchnhalf:
  architectures in updates: s390 all amd64 i386 powerpc arm sparc alpha ia64 
 mips mipsel hppa
  version in updates: 2.0.3-3~etchnhalf.1
  Rationales:
   - 2.0.3-3~etchnhalf.1: atl2-etchnhalf - source compatible w/ etchnhalf 
 kernel
 
 New package squashfs-etchnhalf:
  architectures in updates: s390 all amd64 i386 powerpc arm sparc alpha ia64 
 mips mipsel hppa
  version in updates: 1:3.3-7~etchnhalf.2
  Rationales:
   - 3.3-7~etchnhalf.2: squashfs-etchnhalf - source compatible w/ etchnhalf 
 kernel
 
 New package loop-aes-etchnhalf:
  architectures in updates: s390 all amd64 i386 powerpc arm sparc alpha ia64 
 mips mipsel hppa
  version in updates: 3.2c-2~etchnhalf.2
  Rationales:
   - 3.2c-2~etchnhalf.1: loop-aes-etchnhalf - source compatible w/ etchnhalf 
 kernel

As linux-modules-extra-2.6-etchnhalf was not ready in time we decided to
skip it for r4 and include it in r5.  This also affects the new packages
mentioned above which will not be included in the point release neither.

Kind regards,
Philipp Kern
-- 
 .''`.  Philipp Kern Debian Developer
: :' :  http://philkern.de   Debian Release Assistant
`. `'   xmpp:[EMAIL PROTECTED]
  `-finger pkern/[EMAIL PROTECTED]


signature.asc
Description: Digital signature


Re: Preparation of the next stable Debian GNU/Linux update

2008-07-25 Thread Francesco P. Lovergine
On Fri, Jul 25, 2008 at 12:53:09PM +0200, Philipp Kern wrote:
 [ Changes: include linux-modules-extra-2.6-etchnhalf, mention]
 [ architectures of new packages  ]
 
 Preparation of Debian GNU/Linux 4.0r4
 =
 

Isn't that the case to give evidence to the etch-n-half packages
presence ?

-- 
Francesco P. Lovergine


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Preparation of the next stable Debian GNU/Linux update

2008-07-24 Thread Francesco P. Lovergine
On Thu, Jul 24, 2008 at 01:09:14AM +0200, Philipp Kern wrote:
 We are preparing the next revision of the current stable Debian
 distribution (sarge) and will frequently send reports so people can
 actually comment on it and intervene whenever this is required.
 

I saw proftpd 1.3.0-19etch1 has been approved, but is missing in the
report. It fixes CVE-2007-2165.

-- 
Francesco P. Lovergine


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Preparation of the next stable Debian GNU/Linux update

2008-07-23 Thread Eugene V. Lyubimkin
Philipp Kern wrote:
 We are preparing the next revision of the current stable Debian
 distribution (sarge) and will frequently send reports so people can
You mean etch, don't you?

-- 
Eugene V. Lyubimkin aka JackYF, Ukrainian C++ developer.



signature.asc
Description: OpenPGP digital signature


Re: Preparation of the next stable Debian GNU/Linux update

2008-07-23 Thread Philipp Kern
On Thu, Jul 24, 2008 at 02:24:33AM +0300, Eugene V. Lyubimkin wrote:
 Philipp Kern wrote:
  We are preparing the next revision of the current stable Debian
  distribution (sarge) and will frequently send reports so people can
 You mean etch, don't you?

Sure.  Classical copy'n'paste mistake.

Kind regards,
Philipp Kern
-- 
 .''`.  Philipp Kern Debian Developer
: :' :  http://philkern.de   Debian Release Assistant
`. `'   xmpp:[EMAIL PROTECTED]
  `-finger pkern/[EMAIL PROTECTED]


signature.asc
Description: Digital signature


Re: Preparation of the next stable Debian GNU/Linux update (II)

2008-01-17 Thread Stephen Gran
This one time, at band camp, Martin Zobel-Helas said:
 If you would like to get a package updated in the stable release, you
 are advised to talk to the stable release managers first (see
 http://www.debian.org/intro/organization).

Following a conversation on IRC:

clamav 0.90.1dfsg-3etch9

Uploaded, but not yet built, obviously.
-- 
 -
|   ,''`.Stephen Gran |
|  : :' :[EMAIL PROTECTED] |
|  `. `'Debian user, admin, and developer |
|`- http://www.debian.org |
 -


signature.asc
Description: Digital signature


Re: Preparation of the next stable Debian GNU/Linux update (II)

2008-01-17 Thread Luk Claes
Martin Zobel-Helas wrote:
 Preparation of Debian GNU/Linux 4.1r3
 =

 Requires further Investigation
 --

 unace-nonfree  stable2.5-1   alpha amd64 arm hppa i386 ia64 mips 
 mipsel powerpc sparc source
 unace-nonfree  updates   2.5-1etch1  amd64 i386 source
 
   unace-nonfree - Make 64-bit clean and fix possible denial of service

This is fine as 2.5-1 is scheduled for removal...

 Removed Packages
 
 
 These packages will be removed from the stable Debian distribution.
 This normally only a result of license problems when the license
 prohibits their distribution.
 
 flyspray  stable   0.9.8-10 all source
 
   #459296

unace-nonfree   stable   2.5-1   alpha amd64 arm hppa i386 ia64 mips
mipsel powerpc sparc source

#458052

Cheers

Luk


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Preparation of the next stable Debian GNU/Linux update (II)

2008-01-17 Thread Martin Zobel-Helas
Hi, 

On Thu Jan 17, 2008 at 22:32:37 +0100, Luk Claes wrote:
 Martin Zobel-Helas wrote:
  Preparation of Debian GNU/Linux 4.1r3
  =
 
  Requires further Investigation
  --
 
  unace-nonfree  stable2.5-1   alpha amd64 arm hppa i386 ia64 mips 
  mipsel powerpc sparc source
  unace-nonfree  updates   2.5-1etch1  amd64 i386 source
  
  unace-nonfree - Make 64-bit clean and fix possible denial of service
 
 This is fine as 2.5-1 is scheduled for removal...
 
  Removed Packages
  
  
  These packages will be removed from the stable Debian distribution.
  This normally only a result of license problems when the license
  prohibits their distribution.
  
  flyspraystable   0.9.8-10 all source
  
  #459296
 
 unace-nonfree   stable   2.5-1   alpha amd64 arm hppa i386 ia64 mips
 mipsel powerpc sparc source
 
   #458052

added, thanks

-- 
 Martin Zobel-Helas [EMAIL PROTECTED]  |  Debian Release Team Member
 Debian  GNU/Linux Developer   |   Debian Listmaster
 Public key http://zobel.ftbfs.de/5d64f870.asc   -   KeyID: 5D64 F870
 GPG Fingerprint:  5DB3 1301 375A A50F 07E7  302F 493E FB8E 5D64 F870


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Preparation of the next stable Debian GNU/Linux update

2007-12-28 Thread Martin Zobel-Helas
Hi, 

On Sat Dec 29, 2007 at 00:20:15 +0100, Martin Zobel-Helas wrote:
 The next revision of stable
 should therefore be released at the mid of February or 48h before the
 release of Etch, whatever comes first.

ignore that one. i really should kill that from the skel directory..

Greetings
Martin

-- 
[EMAIL PROTECTED] /root]# man real-life
No manual entry for real-life


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



flash version (Re: Preparation of the next stable Debian GNU/Linux update)

2007-12-25 Thread Hideki Yamane
Hi,

 flashplugin-nonfree  stable9.0.31.0.1   i386 source
 flashplugin-nonfree  updates   9.0.48.0.1etch1  i386 source
 
   flashplugin-nonfree - New upstream release fixes security problems
 
 but adobe flash 9.0.48 has some CVE bugs - potential execution of arbitrary 
 code, cross-site scripting, etc.
 see http://www.adobe.com/support/security/bulletins/apsb07-20.html

 These will be solved by only flash 9.0.115.0.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: flash version (Re: Preparation of the next stable Debian GNU/Linux update)

2007-12-25 Thread Petter Reinholdtsen

[Hideki Yamane]
  but adobe flash 9.0.48 has some CVE bugs - potential execution of arbitrary 
  code, cross-site scripting, etc.
  see http://www.adobe.com/support/security/bulletins/apsb07-20.html

  These will be solved by only flash 9.0.115.0.

Good.  I guess one should use 9.0.115.0, then.  But I believe 9.0.48
got fewer bugs than 9.0.31, so an update is preferable in any case.

Happy hacking,
-- 
Petter Reinholdtsen


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Preparation of the next stable Debian GNU/Linux update

2007-12-24 Thread Aníbal Monsalve Salazar
On Mon, Dec 24, 2007 at 10:50:42PM +0100, Ina Zobel wrote:
Preparation of Debian GNU/Linux 4.0r2
=
[...]

Ina Zobel? :)

That mail wasn't signed! :(

Is Ina sending that mail on behalf of Martin Zobel-Helas?


signature.asc
Description: Digital signature


Re: Preparation of the next stable Debian GNU/Linux update

2007-12-24 Thread Aníbal Monsalve Salazar
On Mon, Dec 24, 2007 at 07:25:42PM +1100, Anibal Monsalve Salazar wrote:
On Mon, Dec 24, 2007 at 10:50:42PM +0100, Ina Zobel wrote:
Preparation of Debian GNU/Linux 4.0r2
=
[...]

Ina Zobel? :)

That mail wasn't signed! :(

Is Ina sending that mail on behalf of Martin Zobel-Helas?

And the date and time of that mail is wrong! In Australia it is
24 Dec at 7:29pm +1100. Ina's clock is too far in the future. :(


signature.asc
Description: Digital signature


Re: Preparation of the next stable Debian GNU/Linux update

2007-12-24 Thread Bart Martens
On Mon, 2007-12-24 at 22:50 +0100, Ina Zobel wrote:
 If you disagree with one bit or another, please reply to this mail and
 explain why these things should be handled differently.

 flashplugin-nonfree  stable9.0.31.0.1   i386 source
 flashplugin-nonfree  updates   9.0.48.0.1etch1  i386 source
 
   flashplugin-nonfree - New upstream release fixes security problems

This should be version 9.0.115.0.1~etch1.

Regards,

Bart Martens




signature.asc
Description: This is a digitally signed message part


Re: Preparation of the next stable Debian GNU/Linux update

2007-12-24 Thread Martin Zobel-Helas
Hi, 

On Mon Dec 24, 2007 at 09:33:39 +0100, Bart Martens wrote:
 On Mon, 2007-12-24 at 22:50 +0100, Ina Zobel wrote:
  If you disagree with one bit or another, please reply to this mail and
  explain why these things should be handled differently.
 
  flashplugin-nonfree  stable9.0.31.0.1   i386 source
  flashplugin-nonfree  updates   9.0.48.0.1etch1  i386 source
  
  flashplugin-nonfree - New upstream release fixes security problems
 
 This should be version 9.0.115.0.1~etch1.

I can run the scripts generating this mail only on packages already
installed on the archive, which wasn't the fact during that script run.
The newer version is now installed and will be pushed into r2.

Thx
Martin


-- 
[EMAIL PROTECTED] /root]# man real-life
No manual entry for real-life


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Preparation of the next stable Debian GNU/Linux update

2007-12-24 Thread Martin Zobel-Helas
Hi Luk, 

i guess the subject should have been 
Preparation of the next oldstable Debian GNU/Linux update

Greetings
Martin

PS: Happy XMAS


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Preparation of the next stable Debian GNU/Linux update

2007-12-24 Thread Kenshi Muto
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Hi,

At Mon, 24 Dec 2007 12:59:24 +0100,
Luk Claes wrote:
 Preparation of Debian GNU/Linux 3.1r7
 =
 
 An up-to-date version is at http://release.debian.org/stable/3.1/3.1r7/.
 
 We are preparing the next revision of the current oldstable Debian
 distribution (sarge) and will frequently send reports so people can
 actually comment on it and intervene whenever this is required.

Please take care #446086 when CD team creates an image.

Thanks,
- -- 
Kenshi Muto
[EMAIL PROTECTED]
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)
Comment: Processed by Mailcrypt 3.5.8+ http://mailcrypt.sourceforge.net/

iEYEARECAAYFAkdwPyIACgkQQKW+7XLQPLFVrACfduCc+R1zKduxScMmPyC3t6ww
TTAAnRsVnHpJfFKOZDl7lfkIAB4T//Um
=BsAP
-END PGP SIGNATURE-


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Preparation of the next stable Debian GNU/Linux update

2007-12-24 Thread Steve McIntyre
On Tue, Dec 25, 2007 at 08:22:18AM +0900, Kenshi Muto wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Hi,

At Mon, 24 Dec 2007 12:59:24 +0100,
Luk Claes wrote:
 Preparation of Debian GNU/Linux 3.1r7
 =
 
 An up-to-date version is at http://release.debian.org/stable/3.1/3.1r7/.
 
 We are preparing the next revision of the current oldstable Debian
 distribution (sarge) and will frequently send reports so people can
 actually comment on it and intervene whenever this is required.

Please take care #446086 when CD team creates an image.

Yup, will do. Thanks for the reminder.

-- 
Steve McIntyre, Cambridge, UK.[EMAIL PROTECTED]
  Armed with Valor: Centurion represents quality of Discipline,
  Honor, Integrity and Loyalty. Now you don't have to be a Caesar to
  concord the digital world while feeling safe and proud.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Preparation of the next stable Debian GNU/Linux update

2007-05-20 Thread Teodor

On 5/20/07, Martin Zobel-Helas [EMAIL PROTECTED] wrote:

Hi,

On Sun May 20, 2007 at 00:11:44 +0200, Thijs Kinkhorst wrote:
 On Saturday 19 May 2007 23:48, Martin Zobel-Helas - automated mail wrote:
  An up-to-date version is at http://release.debian.org/stable/4.0/4.0r1/.

 This yields a 404...

fixed now.


The requested URL /stable/4.0/4.0r1/changelog.txt was not found on this server.
The requested URL /stable/4.0/4.0r1/timeline.txt was not found on this server.

How can I propose a package for inclusion to further revisions?


--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Preparation of the next stable Debian GNU/Linux update

2007-05-20 Thread Holger Levsen
Hi,

On Saturday 19 May 2007 23:48, Martin Zobel-Helas - automated mail wrote:
 Preparation of Debian GNU/Linux 4.0r1

thanks for working on this!

 An up-to-date version is at http://release.debian.org/stable/4.0/4.0r1/.

fai-kernels (1.17+etch3) is missing there.


regards,
Holger


pgp6d4oPtB3ec.pgp
Description: PGP signature


Re: Preparation of the next stable Debian GNU/Linux update

2007-05-20 Thread Martin Zobel-Helas
Hi, 

On Sun May 20, 2007 at 11:31:06 +0300, Teodor wrote:
 On 5/20/07, Martin Zobel-Helas [EMAIL PROTECTED] wrote:
 Hi,
 
 On Sun May 20, 2007 at 00:11:44 +0200, Thijs Kinkhorst wrote:
  On Saturday 19 May 2007 23:48, Martin Zobel-Helas - automated mail wrote:
   An up-to-date version is at 
 http://release.debian.org/stable/4.0/4.0r1/.
 
  This yields a 404...
 
 fixed now.
 
 The requested URL /stable/4.0/4.0r1/changelog.txt was not found on this 
 server.
 The requested URL /stable/4.0/4.0r1/timeline.txt was not found on this 
 server.
 
 How can I propose a package for inclusion to further revisions?

If you are maintainer of a package: speak up in
[EMAIL PROTECTED] and show your proposed changes.

If you are user, please encourage the maintainer of the package to speak
up in [EMAIL PROTECTED]

Greetings
Martin

-- 
[EMAIL PROTECTED] /root]# man real-life
No manual entry for real-life


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Preparation of the next stable Debian GNU/Linux update

2007-05-20 Thread Touko Korpela
Unrar (source package unrar-nonfree) has CVE-2007-0855 (Stack-based buffer
overflow) bug in etch and sarge. It has debian bug #410580
Maintainer didn't ask for it but should 1:3.7.3-1 be included in 4.0r1?


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Preparation of the next stable Debian GNU/Linux update

2007-05-20 Thread Martin Zobel-Helas
Hi, 

On Sun May 20, 2007 at 17:29:19 +0300, Touko Korpela wrote:
 Unrar (source package unrar-nonfree) has CVE-2007-0855 (Stack-based buffer
 overflow) bug in etch and sarge. It has debian bug #410580
 Maintainer didn't ask for it but should 1:3.7.3-1 be included in 4.0r1?

yes, please upload.

-- 
[EMAIL PROTECTED] /root]# man real-life
No manual entry for real-life


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Preparation of the next stable Debian GNU/Linux update

2007-05-19 Thread Martin Zobel-Helas
Hi, 

On Sun May 20, 2007 at 00:11:44 +0200, Thijs Kinkhorst wrote:
 On Saturday 19 May 2007 23:48, Martin Zobel-Helas - automated mail wrote:
  An up-to-date version is at http://release.debian.org/stable/4.0/4.0r1/.
 
 This yields a 404...

fixed now.

-- 
[EMAIL PROTECTED] /root]# man real-life
No manual entry for real-life


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Preparation of the next stable Debian GNU/Linux update (I)

2006-12-18 Thread Stephen Gran
This one time, at band camp, Martin Zobel-Helas said:
 Preparation of Debian GNU/Linux 3.1r5
 =
 
 An up-to-date version is at http://release.debian.org/stable/3.1/3.1r5/.
 
 We are preparing the next revision of the current stable Debian
 distribution (sarge) and will frequently send reports so people can
 actually comment on it and intervene whenever this is required.

I would like to see clamav 0.84-2.sarge.13 go in, if possible,  It
fixes:

  * Unusual MIME Encoding Content Filter Bypass [ CVE-2006-6406 ]
  * nested multipart DoS  [ CVE-2006-6481 ] 
  * Fix null pointer dereference on base64 MIME attachments without 
file names [ CVE-2006-5874 ]
  * libclamav/rebuildpe.c: fix possible heap overflow [IDEF1597]
  * libclamav/chmunpack.c: fix possible crash [IDEF1736]

Thanks for your consideration.
-- 
 -
|   ,''`.Stephen Gran |
|  : :' :[EMAIL PROTECTED] |
|  `. `'Debian user, admin, and developer |
|`- http://www.debian.org |
 -


signature.asc
Description: Digital signature


Re: Preparation of the next stable Debian GNU/Linux update (II)

2006-09-24 Thread Roger Leigh
Martin Zobel-Helas [EMAIL PROTECTED] writes:

 Hi Roger,

 On Sat, Sep 23, 2006 at 12:07:58AM +0100, Roger Leigh [EMAIL PROTECTED] 
 wrote:

 Please could you make sure that devmapper is included in the next
 stable update?  It was supposed to be included in the last update, but
 for some reason was omitted.
 please go ahead and upload.

Done.


Regards,
Roger

-- 
  .''`.  Roger Leigh
 : :' :  Debian GNU/Linux http://people.debian.org/~rleigh/
 `. `'   Printing on GNU/Linux?   http://gutenprint.sourceforge.net/
   `-GPG Public Key: 0x25BFB848   Please GPG sign your mail.


pgpkrVbC1SaAY.pgp
Description: PGP signature


Re: Preparation of the next stable Debian GNU/Linux update (II)

2006-09-22 Thread Roger Leigh
Please could you make sure that devmapper is included in the next
stable update?  It was supposed to be included in the last update, but
for some reason was omitted.


Thanks,
Roger

-- 
  .''`.  Roger Leigh
 : :' :  Debian GNU/Linux http://people.debian.org/~rleigh/
 `. `'   Printing on GNU/Linux?   http://gutenprint.sourceforge.net/
   `-GPG Public Key: 0x25BFB848   Please GPG sign your mail.


pgpFeQO5RcgqM.pgp
Description: PGP signature


Re: Preparation of the next stable Debian GNU/Linux update (II)

2006-09-22 Thread Martin Zobel-Helas
Hi Roger,

On Sat, Sep 23, 2006 at 12:07:58AM +0100, Roger Leigh [EMAIL PROTECTED] wrote:

 Please could you make sure that devmapper is included in the next
 stable update?  It was supposed to be included in the last update, but
 for some reason was omitted.
please go ahead and upload.

Greetings
Martin


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Preparation of the next stable Debian GNU/Linux update (II)

2006-09-22 Thread Roger Leigh
Martin Zobel-Helas [EMAIL PROTECTED] writes:

 Hi Roger,

 On Sat, Sep 23, 2006 at 12:07:58AM +0100, Roger Leigh [EMAIL PROTECTED] 
 wrote:

 Please could you make sure that devmapper is included in the next
 stable update?  It was supposed to be included in the last update, but
 for some reason was omitted.
 please go ahead and upload.

I uploaded it just before 3.1r2 was released.  Does it require
reuploading?


-- 
  .''`.  Roger Leigh
 : :' :  Debian GNU/Linux http://people.debian.org/~rleigh/
 `. `'   Printing on GNU/Linux?   http://gutenprint.sourceforge.net/
   `-GPG Public Key: 0x25BFB848   Please GPG sign your mail.


pgp8e4jzqQWuR.pgp
Description: PGP signature


Re: Preparation of the next stable Debian GNU/Linux update (I)

2006-09-19 Thread Holger Levsen
Hi,

On Saturday 16 September 2006 19:39, Moritz Muehlenhoff wrote:
  Please explain why you think that putting arbitrary long strings into
  fixed= sized buffers is not a security problem, preferedly in the
  bugreport.
 The buffer overflow can only be triggered through a file only root can
 write to.

Thanks for your explainations (also to Joey), forwarded to the BTS.


regards,
Holger


pgpG61ysGOpDr.pgp
Description: PGP signature


Re: Preparation of the next stable Debian GNU/Linux update (I)

2006-09-19 Thread Martin Zobel-Helas
Hi Matthijs,

 Hi,
 
 What about #375494 and #377047, those are security bugs in the current
 stable distribution (Sarge) and according to the Security Team it
 didn't warrant an upload. Although it has a CVE so I think it's worth
 an upload to stable.
 
 What do you think ?

If you are the maintainer of that package, please go ahead.

Greetings
Martin


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Preparation of the next stable Debian GNU/Linux update (I)

2006-09-16 Thread Martin Schulze
Matthijs Mohlmann wrote:
 Hi,
 
 What about #375494 and #377047, those are security bugs in the current
 stable distribution (Sarge) and according to the Security Team it didn't
 warrant an upload. Although it has a CVE so I think it's worth an upload
 to stable.

The first one doesn't look like a real security problem.
And the second one is just a copy of the first one.

Regards,

Joey

PS: Please make use of linebreaks

-- 
Have you ever noticed that General Public Licence contains the word Pub?

Please always Cc to me when replying to me on the lists.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Preparation of the next stable Debian GNU/Linux update (I)

2006-09-16 Thread Holger Levsen
Hi,

On Saturday 16 September 2006 08:50, Martin Schulze wrote:
 The first one doesn't look like a real security problem.

Please explain why you think that putting arbitrary long strings into fixed 
sized buffers is not a security problem, preferedly in the bugreport.


Thanks,
Holger


pgposIMHPkZOw.pgp
Description: PGP signature


Re: Preparation of the next stable Debian GNU/Linux update (I)

2006-09-16 Thread Moritz Muehlenhoff
Holger Levsen wrote:
 The first one doesn't look like a real security problem.

 Please explain why you think that putting arbitrary long strings into fixed=
 sized buffers is not a security problem, preferedly in the bugreport.

The buffer overflow can only be triggered through a file only root can
write to. 

Cheers,
Moritz


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Preparation of the next stable Debian GNU/Linux update (I)

2006-09-16 Thread Martin Schulze
Holger Levsen wrote:
 On Saturday 16 September 2006 08:50, Martin Schulze wrote:
  The first one doesn't look like a real security problem.
 
 Please explain why you think that putting arbitrary long strings into fixed 
 sized buffers is not a security problem, preferedly in the bugreport.

Please explain how an attacker can exploit this and force slapd to
put arbitrary long strings into fixed sized buffers.

Precondition: Requiring either root permissions or LDAP admin
permissions don't count.

Regards,

Joey

-- 
Have you ever noticed that General Public Licence contains the word Pub?


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Preparation of the next stable Debian GNU/Linux update (I)

2006-09-15 Thread Matthijs Mohlmann
On Fri, 15 Sep 2006 00:45:35 +0200
Martin Zobel-Helas [EMAIL PROTECTED] wrote:

 Preparation of Debian GNU/Linux 3.1r4
 =
 
 An up-to-date version is at http://release.debian.org/stable/3.1/3.1r4/.
 
 We are preparing the next revision of the current stable Debian
 distribution (sarge) and will frequently send reports so people can
 actually comment on it and intervene whenever this is required.
 
 If you disagree with one bit or another, please reply to this mail and
 explain why these things should be handled differently.  
 
 The overall plan is to release a new update of the stable Debian
 distribution roughly two months after the last update or after the
 initial release, whichever is suitable.  The next revision of stable
 should therefore be released at October, 16th.
 
 An ftpmaster still has to give the final approval for each package
 since ftpmasters are responsible for the archive.  However, we are
 trying to make their work as easy as possible in hope to get the next
 revision out properly and without any hassle.
 
 The regulations for updates to the stable Debian release are quite
 conservative.
 
 The requirements for packages to get updated in stable are:
 
  1. The package fixes a security problem.  An advisory by our own
 Security Team is required.  Updates need to be approved by the
 Security Team.
 
  2. The package fixes a critical bug which can lead to data loss,
 data corruption, or an overly broken system, or the package is
 broken or not usable (anymore).
 
  3. The stable version of the package is not installable at all due to
 broken or unmet dependencies or broken installation scripts.
 
  4. All released architectures have to be in sync.
 
  5. The package gets all released architectures back in sync.
 
 It is (or (and (or 1 2 3) 4) 5)
 
 Regular bugs and upgrade problems don't get fixed in new revisions for
 the stable distribution.  They should instead be documented in the
 Release Notes which are maintained by Rob Bradford
 mailto:[EMAIL PROTECTED] and are found at
 http://www.debian.org/releases/sarge/releasenotes.
 
 Packages which will most probably be rejected:
 
   . Packages that fix non-critical bugs.
 
   . Misplaced uploads, i.e. packages that were uploaded to 'stable
 unstable' or `frozen unstable' or similar.
 
   . Packages for which its binary packages are out of sync with regard
 to all supported architectures in the stable distribution.
 
   . Binary packages for which the source got lost somehow.
 
   . Packages that fix an unusable minor part of a package.
 
 If you would like to get a package updated in the stable release, you
 are advised to talk to the stable release managers first (see
 http://www.debian.org/intro/organization).
 

Hi,

What about #375494 and #377047, those are security bugs in the current stable 
distribution (Sarge) and according to the Security Team it didn't warrant an 
upload. Although it has a CVE so I think it's worth an upload to stable.

What do you think ?

Regards,

Matthijs Mohlmann


signature.asc
Description: PGP signature


Re: Preparation of the next stable Debian GNU/Linux update (I)

2006-08-27 Thread Martin Zobel-Helas
Hi Kevin,

On Fri, Aug 25, 2006 at 09:59:53AM -0700, Kevin B. McCarty [EMAIL PROTECTED] 
wrote:

 Martin Zobel-Helas wrote:
  
  mozilla-thunderbird-devstable1.0.2-2.sarge1.0.7   alpha arm 
  hppa i386 ia64 m68k mips mipsel powerpc s390 sparc
  mozilla-thunderbird-devupdates   1.0.2-2.sarge1.0.8a  alpha arm 
  hppa i386 ia64 m68k mips mipsel powerpc s390 sparc
  mozilla-thunderbird-inspector  stable1.0.2-2.sarge1.0.7   alpha arm 
  hppa i386 ia64 m68k mips mipsel powerpc s390 sparc
  mozilla-thunderbird-inspector  updates   1.0.2-2.sarge1.0.8a  alpha arm 
  hppa i386 ia64 m68k mips mipsel powerpc s390 sparc
  mozilla-thunderbird-offlinestable1.0.2-2.sarge1.0.7   alpha arm 
  hppa i386 ia64 m68k mips mipsel powerpc s390 sparc
  mozilla-thunderbird-offlineupdates   1.0.2-2.sarge1.0.8a  alpha arm 
  hppa i386 ia64 m68k mips mipsel powerpc s390 sparc
  mozilla-thunderbird-typeaheadfind  stable1.0.2-2.sarge1.0.7   alpha arm 
  hppa i386 ia64 m68k mips mipsel powerpc s390 sparc
  mozilla-thunderbird-typeaheadfind  updates   1.0.2-2.sarge1.0.8a  alpha arm 
  hppa i386 ia64 m68k mips mipsel powerpc s390 sparc
  mozilla-thunderbirdstable1.0.2-2.sarge1.0.7   alpha arm 
  hppa i386 ia64 m68k mips mipsel powerpc s390 sparc source
  mozilla-thunderbirdupdates   1.0.2-2.sarge1.0.8a  alpha arm 
  hppa i386 ia64 m68k mips mipsel powerpc s390 sparc source
  
  DSA 1051 mozilla-thunderbird - several vulnerabilities
 
 First of all, the above should also mention DSA 1134.
Yeah that is fixed. There where several DSAs missing, i found that while
digging for DSA 1134. My fault.

 Second, is it planned to include the next round of security updates to
 the Mozilla family by Alexander Sack?  (cf. [0] [1])  For some reason
 these don't seem to have gone into security.d.o yet and it would be very
 nice to ship mozilla* packages that are up-to-date with security fixes.
Not for r3 anymore. I know that these packages are in preparation, but i
would like to publish r3 rather soon, and we usually let DSA packages wait
about one week in p-u-new before adding them to proposed-updates. This
way, we can catch up with debian-security or the BTS if a DSA is
seriously broken (like mozilla-thunderbird on i386 or libfreetype6).
Okay, that did not work this time, but mainly also my fault...

 Third, please note that even if those updates don't get into Sarge r3,
 the existing mozilla-thunderbird security update needs a bin-NMU on i386
 [2].

I have prepared a binNMU on i386 for mozilla-thunderbird, availible on 
http://people.debian.org/~zobel/packages/3.1r3/

Could you please check, if these packages work for you?

The debdiff for the package is the following:

[EMAIL PROTECTED]:~$ debdiff mozilla-thunderbird_1.0.2-2.sarge1.0.8a_i386.deb 
/org/solar.home.ftbfs.de/chroots/sarge/tmp/mozilla-thunderbird_1.0.2-2.sarge1.0.8a.1_i386.deb
[The following lists of changes regard files as different if they have 
different names, permissions or owners.]

Files in first .deb but not in second
-
-rw-r--r--  root/root
/usr/lib/mozilla-thunderbird/components/libmozgnome.so

Control files: lines which differ (wdiff format)

Version: [-1.0.2-2.sarge1.0.8a-] {+1.0.2-2.sarge1.0.8a.1+}
Depends: bash, libatk1.0-0 (= 1.7.2), [-libbonobo2-0 (= 2.8.0),-] libc6 (= 
2.3.2.ds1-21), libfontconfig1 (= 2.3.0), libfreetype6 (= 2.1.5-1), libgcc1 
(= 1:3.4.1-3), [-libgconf2-4 (= 2.8.1),-] libglib2.0-0 (= 2.6.0), 
[-libgnome2-0 (= 2.8.0), libgnomevfs2-0 (= 2.8.3-7),-] libgtk2.0-0 (= 
2.6.0), libjpeg62, [-liborbit2 (= 1:2.10.0),-] libpango1.0-0 (= 1.8.1), 
libpng12-0 (= 1.2.8rel), [-libpopt0 (= 1.7),-] libstdc++5 (= 1:3.3.4-1), 
libx11-6 | xlibs ( 4.1.0), libxext6 | xlibs ( 4.1.0), libxft2 ( 2.1.1), 
libxp6 | xlibs ( 4.1.0), libxrender1, libxt6 | xlibs ( 4.1.0), zlib1g (= 
1:1.2.1)
Installed-Size: [-33011-] {+33016+}

Greetings
Martin


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Preparation of the next stable Debian GNU/Linux update (I)

2006-08-27 Thread Kevin B. McCarty
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Martin Zobel-Helas wrote:
 Hi Kevin,
 
 On Fri, Aug 25, 2006 at 09:59:53AM -0700, Kevin B. McCarty [EMAIL 
 PROTECTED] wrote:

Second, is it planned to include the next round of security updates to
the Mozilla family by Alexander Sack?  (cf. [0] [1])  For some reason
these don't seem to have gone into security.d.o yet and it would be very
nice to ship mozilla* packages that are up-to-date with security fixes.
 
 Not for r3 anymore. I know that these packages are in preparation, but i
 would like to publish r3 rather soon, and we usually let DSA packages wait
 about one week in p-u-new before adding them to proposed-updates. This
 way, we can catch up with debian-security or the BTS if a DSA is
 seriously broken (like mozilla-thunderbird on i386 or libfreetype6).

OK.

Third, please note that even if those updates don't get into Sarge r3,
the existing mozilla-thunderbird security update needs a bin-NMU on i386
[2].
 
 I have prepared a binNMU on i386 for mozilla-thunderbird, availible on 
 http://people.debian.org/~zobel/packages/3.1r3/
 
 Could you please check, if these packages work for you?

Yes, I'm writing this email with the updated bin-NMU package you
provided.  I've used it to read ~100 emails now, together with the
Enigmail extension, and found no problems.

best regards,

- --
Kevin B. McCarty [EMAIL PROTECTED]   Physics Department
WWW: http://www.princeton.edu/~kmccarty/Princeton University
GPG: public key ID 4F83C751 Princeton, NJ 08544
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.1 (GNU/Linux)
Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org

iD8DBQFE8cdcfYxAIk+Dx1ERAlF3AJ9O+DbsEy1JS3LDbkU6Gr+h++oFSQCffHiy
vudHnEdu7zvSjs7GW53P0yw=
=tvst
-END PGP SIGNATURE-


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Preparation of the next stable Debian GNU/Linux update (I)

2006-08-25 Thread Kevin B. McCarty
Martin Zobel-Helas wrote:

 libnspr-devstable2:1.7.8-1sarge3alpha arm hppa i386 ia64 
 m68k mips mipsel powerpc s390 sparc
 libnspr-devupdates   2:1.7.8-1sarge7.1  alpha arm hppa i386 ia64 
 m68k mips mipsel powerpc s390 sparc
 libnspr4   stable2:1.7.8-1sarge3alpha arm hppa i386 ia64 
 m68k mips mipsel powerpc s390 sparc
 libnspr4   updates   2:1.7.8-1sarge7.1  alpha arm hppa i386 ia64 
 m68k mips mipsel powerpc s390 sparc
 libnss-dev stable2:1.7.8-1sarge3alpha arm hppa i386 ia64 
 m68k mips mipsel powerpc s390 sparc
 libnss-dev updates   2:1.7.8-1sarge7.1  alpha arm hppa i386 ia64 
 m68k mips mipsel powerpc s390 sparc
 libnss3stable2:1.7.8-1sarge3alpha arm hppa i386 ia64 
 m68k mips mipsel powerpc s390 sparc
 libnss3updates   2:1.7.8-1sarge7.1  alpha arm hppa i386 ia64 
 m68k mips mipsel powerpc s390 sparc
 mozilla-browserstable2:1.7.8-1sarge3alpha arm hppa i386 ia64 
 m68k mips mipsel powerpc s390 sparc
 mozilla-browserupdates   2:1.7.8-1sarge7.1  alpha arm hppa i386 ia64 
 m68k mips mipsel powerpc s390 sparc
 mozilla-calendar   stable2:1.7.8-1sarge3alpha arm hppa i386 ia64 
 m68k mips mipsel powerpc s390 sparc
 mozilla-calendar   updates   2:1.7.8-1sarge7.1  alpha arm hppa i386 ia64 
 m68k mips mipsel powerpc s390 sparc
 mozilla-chatzilla  stable2:1.7.8-1sarge3alpha arm hppa i386 ia64 
 m68k mips mipsel powerpc s390 sparc
 mozilla-chatzilla  updates   2:1.7.8-1sarge7.1  alpha arm hppa i386 ia64 
 m68k mips mipsel powerpc s390 sparc
 mozilla-devstable2:1.7.8-1sarge3alpha arm hppa i386 ia64 
 m68k mips mipsel powerpc s390 sparc
 mozilla-devupdates   2:1.7.8-1sarge7.1  alpha arm hppa i386 ia64 
 m68k mips mipsel powerpc s390 sparc
 mozilla-dom-inspector  stable2:1.7.8-1sarge3alpha arm hppa i386 ia64 
 m68k mips mipsel powerpc s390 sparc
 mozilla-dom-inspector  updates   2:1.7.8-1sarge7.1  alpha arm hppa i386 ia64 
 m68k mips mipsel powerpc s390 sparc
 mozilla-js-debuggerstable2:1.7.8-1sarge3alpha arm hppa i386 ia64 
 m68k mips mipsel powerpc s390 sparc
 mozilla-js-debuggerupdates   2:1.7.8-1sarge7.1  alpha arm hppa i386 ia64 
 m68k mips mipsel powerpc s390 sparc
 mozilla-mailnews   stable2:1.7.8-1sarge3alpha arm hppa i386 ia64 
 m68k mips mipsel powerpc s390 sparc
 mozilla-mailnews   updates   2:1.7.8-1sarge7.1  alpha arm hppa i386 ia64 
 m68k mips mipsel powerpc s390 sparc
 mozilla-psmstable2:1.7.8-1sarge3alpha arm hppa i386 ia64 
 m68k mips mipsel powerpc s390 sparc
 mozilla-psmupdates   2:1.7.8-1sarge7.1  alpha arm hppa i386 ia64 
 m68k mips mipsel powerpc s390 sparc
 mozillastable2:1.7.8-1sarge3alpha arm hppa i386 ia64 
 m68k mips mipsel powerpc s390 sparc source
 mozillaupdates   2:1.7.8-1sarge7.1  alpha arm hppa i386 ia64 
 m68k mips mipsel powerpc s390 sparc source
 
   DSA 1046 mozilla - several vulnerabilities
   DSA 1053 mozilla - programming error
   DSA 1118 mozilla - several vulnerabilities
 
 mozilla-firefox-dom-inspector  stable1.0.4-2sarge4  alpha arm hppa i386 
 ia64 m68k mips mipsel powerpc s390 sparc
 mozilla-firefox-dom-inspector  updates   1.0.4-2sarge9  alpha arm hppa i386 
 ia64 m68k mips mipsel powerpc s390 sparc
 mozilla-firefox-gnome-support  stable1.0.4-2sarge4  alpha arm hppa i386 
 ia64 m68k mips mipsel powerpc s390 sparc
 mozilla-firefox-gnome-support  updates   1.0.4-2sarge9  alpha arm hppa i386 
 ia64 m68k mips mipsel powerpc s390 sparc
 mozilla-firefoxstable1.0.4-2sarge4  alpha arm hppa i386 
 ia64 m68k mips mipsel powerpc s390 sparc source
 mozilla-firefoxupdates   1.0.4-2sarge9  alpha arm hppa i386 
 ia64 m68k mips mipsel powerpc s390 sparc source
 
   DSA 1044 mozilla-firefox - several vulnerabilities
   DSA 1055 mozilla-firefox - programming error
   DSA 1120 mozilla-firefox - several vulnerabilities
 
 mozilla-thunderbird-devstable1.0.2-2.sarge1.0.7   alpha arm 
 hppa i386 ia64 m68k mips mipsel powerpc s390 sparc
 mozilla-thunderbird-devupdates   1.0.2-2.sarge1.0.8a  alpha arm 
 hppa i386 ia64 m68k mips mipsel powerpc s390 sparc
 mozilla-thunderbird-inspector  stable1.0.2-2.sarge1.0.7   alpha arm 
 hppa i386 ia64 m68k mips mipsel powerpc s390 sparc
 mozilla-thunderbird-inspector  updates   1.0.2-2.sarge1.0.8a  alpha arm 
 hppa i386 ia64 m68k mips mipsel powerpc s390 sparc
 mozilla-thunderbird-offlinestable1.0.2-2.sarge1.0.7   alpha arm 
 hppa i386 ia64 m68k mips mipsel powerpc s390 sparc
 mozilla-thunderbird-offlineupdates   1.0.2-2.sarge1.0.8a  alpha arm 
 hppa i386 ia64 m68k mips mipsel powerpc s390 sparc
 mozilla-thunderbird-typeaheadfind  stable1.0.2-2.sarge1.0.7   alpha arm 
 hppa i386 ia64 m68k mips 

Re: Preparation of the next stable Debian GNU/Linux update (I)

2006-08-25 Thread Martin Schulze
Kevin B. McCarty wrote:
 Second, is it planned to include the next round of security updates to
 the Mozilla family by Alexander Sack?  (cf. [0] [1])  For some reason
 these don't seem to have gone into security.d.o yet and it would be very
 nice to ship mozilla* packages that are up-to-date with security fixes.

They are still building.

Although I'm not speaking for the SRM anymore, they have to draw
the line at some date after which no updates are possible anymore
or they won't be able to update stable at all, because there are
always some security updates in preparation.

 Third, please note that even if those updates don't get into Sarge r3,
 the existing mozilla-thunderbird security update needs a bin-NMU on i386
 [2].

Eeks.

In case somebody is working on an NMU, please get in touch with
the security team so that it doesn't annulate the upcoming security
update.

Regards,

Joey

-- 
Whenever you meet yourself you're in a time loop or in front of a mirror.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Preparation of the next stable Debian GNU/Linux update (I)

2006-08-25 Thread Alexander Sack
On Fri, Aug 25, 2006 at 09:59:53AM -0700, Kevin B. McCarty wrote:
 
 First of all, the above should also mention DSA 1134.
 
 Second, is it planned to include the next round of security updates to
 the Mozilla family by Alexander Sack?  (cf. [0] [1])  For some reason
 these don't seem to have gone into security.d.o yet and it would be very
 nice to ship mozilla* packages that are up-to-date with security fixes.
 
 Third, please note that even if those updates don't get into Sarge r3,
 the existing mozilla-thunderbird security update needs a bin-NMU on i386
 [2].
 
 CC'ed to Alexander.

There have been minor glitches in communication, which unfortunately
led to this delay, sorry! However, I am expecting the latest security
updates every minute.

And yes, we should wait or bin NMU thunderbird. If I know more, I will
let you know.

 - Alexander

-- 
 GPG messages preferred.   |  .''`.  ** Debian GNU/Linux **
 Alexander Sack| : :' :  The  universal
 [EMAIL PROTECTED]   | `. `'  Operating System
 http://www.asoftsite.org  |   `-http://www.debian.org


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Preparation of the next stable Debian GNU/Linux update (I)

2006-08-24 Thread Rene Engelhard
Martin Zobel-Helas wrote:
 Accepted Packages
 -
 
 These packages will be installed into the stable Debian distribution
 and will be part of the next revision.
[...]
 freetype2-demosstable2.1.7-2.4   alpha arm hppa i386 ia64 m68k mips 
 mipsel powerpc s390 sparc
 freetype2-demosupdates   2.1.7-2.5   alpha arm hppa i386 ia64 m68k mips 
 mipsel powerpc s390 sparc
 freetype   stable2.1.7-2.4   source
 freetype   updates   2.1.7-2.5   source
 libfreetype6-dev   stable2.1.7-2.4   alpha arm hppa i386 ia64 m68k mips 
 mipsel powerpc s390 sparc
 libfreetype6-dev   updates   2.1.7-2.5   alpha arm hppa i386 ia64 m68k mips 
 mipsel powerpc s390 sparc
 libfreetype6-udeb  stable2.1.7-2.4   alpha arm hppa i386 ia64 m68k mips 
 mipsel powerpc s390 sparc
 libfreetype6-udeb  updates   2.1.7-2.5   alpha arm hppa i386 ia64 m68k mips 
 mipsel powerpc s390 sparc
 libfreetype6   stable2.1.7-2.4   alpha arm hppa i386 ia64 m68k mips 
 mipsel powerpc s390 sparc
 libfreetype6   updates   2.1.7-2.5   alpha arm hppa i386 ia64 m68k mips 
 mipsel powerpc s390 sparc
 
   DSA 1095 freetype - fix several vulnerabilities

Uh, that's bad. -2.5 is broken. See http://bugs.debian.org/libfreetype6.
Unfortunately still no DSA which corrects the broken packages caused by
the first DSA...

Regards,

Rene


signature.asc
Description: Digital signature


Re: Preparation of the next stable Debian GNU/Linux update (I)

2006-08-24 Thread Martin Zobel-Helas
Hi Rene,

On Thu, Aug 24, 2006 at 08:24:35PM +0200, Rene Engelhard [EMAIL PROTECTED] 
wrote:

 Martin Zobel-Helas wrote:
  Accepted Packages
  -
  
  These packages will be installed into the stable Debian distribution
  and will be part of the next revision.
 [...]
  freetype2-demosstable2.1.7-2.4   alpha arm hppa i386 ia64 m68k mips 
  mipsel powerpc s390 sparc
  freetype2-demosupdates   2.1.7-2.5   alpha arm hppa i386 ia64 m68k mips 
  mipsel powerpc s390 sparc
  freetype   stable2.1.7-2.4   source
  freetype   updates   2.1.7-2.5   source
  libfreetype6-dev   stable2.1.7-2.4   alpha arm hppa i386 ia64 m68k mips 
  mipsel powerpc s390 sparc
  libfreetype6-dev   updates   2.1.7-2.5   alpha arm hppa i386 ia64 m68k mips 
  mipsel powerpc s390 sparc
  libfreetype6-udeb  stable2.1.7-2.4   alpha arm hppa i386 ia64 m68k mips 
  mipsel powerpc s390 sparc
  libfreetype6-udeb  updates   2.1.7-2.5   alpha arm hppa i386 ia64 m68k mips 
  mipsel powerpc s390 sparc
  libfreetype6   stable2.1.7-2.4   alpha arm hppa i386 ia64 m68k mips 
  mipsel powerpc s390 sparc
  libfreetype6   updates   2.1.7-2.5   alpha arm hppa i386 ia64 m68k mips 
  mipsel powerpc s390 sparc
  
  DSA 1095 freetype - fix several vulnerabilities
 
 Uh, that's bad. -2.5 is broken. See http://bugs.debian.org/libfreetype6.
 Unfortunately still no DSA which corrects the broken packages caused by
 the first DSA...

moved out of the way for now, won't be in r3 for now, but i think this
issue needs fixing NOW, so i think we want to wait for an updated
freetype package.

Greetings
Martin


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Preparation of the next stable Debian GNU/Linux update (I)

2006-08-24 Thread Stephen Gran
This one time, at band camp, Martin Zobel-Helas said:
 
 clamav-base   stable0.84-2.sarge.8  all
 clamav-base   updates   0.84-2.sarge.9  all
 clamav-daemon stable0.84-2.sarge.8  alpha arm hppa i386 ia64 m68k 
 mips mipsel powerpc s390 sparc
 clamav-daemon updates   0.84-2.sarge.9  alpha arm hppa i386 ia64 m68k 
 mips mipsel powerpc s390 sparc
 clamav-docs   stable0.84-2.sarge.8  all
 clamav-docs   updates   0.84-2.sarge.9  all
 clamav-freshclam  stable0.84-2.sarge.8  alpha arm hppa i386 ia64 m68k 
 mips mipsel powerpc s390 sparc
 clamav-freshclam  updates   0.84-2.sarge.9  alpha arm hppa i386 ia64 m68k 
 mips mipsel powerpc s390 sparc
 clamav-milter stable0.84-2.sarge.8  alpha arm hppa i386 ia64 m68k 
 mips mipsel powerpc s390 sparc
 clamav-milter updates   0.84-2.sarge.9  alpha arm hppa i386 ia64 m68k 
 mips mipsel powerpc s390 sparc
 clamav-testfiles  stable0.84-2.sarge.8  all
 clamav-testfiles  updates   0.84-2.sarge.9  all
 clamavstable0.84-2.sarge.8  alpha arm hppa i386 ia64 m68k 
 mips mipsel powerpc s390 sparc source
 clamavupdates   0.84-2.sarge.9  alpha arm hppa i386 ia64 m68k 
 mips mipsel powerpc s390 sparc source
 libclamav-dev stable0.84-2.sarge.8  alpha arm hppa i386 ia64 m68k 
 mips mipsel powerpc s390 sparc
 libclamav-dev updates   0.84-2.sarge.9  alpha arm hppa i386 ia64 m68k 
 mips mipsel powerpc s390 sparc
 libclamav1stable0.84-2.sarge.8  alpha arm hppa i386 ia64 m68k 
 mips mipsel powerpc s390 sparc
 libclamav1updates   0.84-2.sarge.9  alpha arm hppa i386 ia64 m68k 
 mips mipsel powerpc s390 sparc
 
   DSA 1050 clamav - fix denial of service or arbitrary code execution

This should be 0.84-2.sarge.10.  
DSA-1153-1 clamav -- buffer overflow
-- 
 -
|   ,''`.Stephen Gran |
|  : :' :[EMAIL PROTECTED] |
|  `. `'Debian user, admin, and developer |
|`- http://www.debian.org |
 -


signature.asc
Description: Digital signature


Re: Preparation of the next stable Debian GNU/Linux update (I)

2006-08-24 Thread Martin Schulze
Rene Engelhard wrote:
 Martin Zobel-Helas wrote:
  Accepted Packages
  -
  
  These packages will be installed into the stable Debian distribution
  and will be part of the next revision.
 [...]
  freetype2-demosstable2.1.7-2.4   alpha arm hppa i386 ia64 m68k mips 
  mipsel powerpc s390 sparc
  freetype2-demosupdates   2.1.7-2.5   alpha arm hppa i386 ia64 m68k mips 
  mipsel powerpc s390 sparc
  freetype   stable2.1.7-2.4   source
  freetype   updates   2.1.7-2.5   source
  libfreetype6-dev   stable2.1.7-2.4   alpha arm hppa i386 ia64 m68k mips 
  mipsel powerpc s390 sparc
  libfreetype6-dev   updates   2.1.7-2.5   alpha arm hppa i386 ia64 m68k mips 
  mipsel powerpc s390 sparc
  libfreetype6-udeb  stable2.1.7-2.4   alpha arm hppa i386 ia64 m68k mips 
  mipsel powerpc s390 sparc
  libfreetype6-udeb  updates   2.1.7-2.5   alpha arm hppa i386 ia64 m68k mips 
  mipsel powerpc s390 sparc
  libfreetype6   stable2.1.7-2.4   alpha arm hppa i386 ia64 m68k mips 
  mipsel powerpc s390 sparc
  libfreetype6   updates   2.1.7-2.5   alpha arm hppa i386 ia64 m68k mips 
  mipsel powerpc s390 sparc
  
  DSA 1095 freetype - fix several vulnerabilities
 
 Uh, that's bad. -2.5 is broken. See http://bugs.debian.org/libfreetype6.
 Unfortunately still no DSA which corrects the broken packages caused by
 the first DSA...

There's not going to be any due to ongoing conflicting actions by the
security team and the maintainer.  Attached is my last trial to get
this fixed.  Feel free to pass this through proposed-updates.

Regards,

Joey

-- 
Those who don't understand Unix are condemned to reinvent it, poorly.
diff -u freetype-2.1.7/debian/changelog freetype-2.1.7/debian/changelog
--- freetype-2.1.7/debian/changelog
+++ freetype-2.1.7/debian/changelog
@@ -1,3 +1,19 @@
+freetype (2.1.7-3.1) stable-security; urgency=high
+
+  * Non-maintainer upload by the Security Team
+  * Rebuilt with higher version number
+
+ -- Martin Schulze [EMAIL PROTECTED]  Fri, 18 Aug 2006 17:06:28 +0200
+
+freetype (2.1.7-2.6) stable-security; urgency=high
+
+  * Non-maintainer upload by the Security Team
+  * Adjusted the patch to fix integer overflows to catch negative and zero
+values as well, thanks to Wolfram Gloger [EMAIL PROTECTED]
+[debian/patches/400-CVE-2006-2493_integer-overflows.diff, Bug#373581]
+
+ -- Martin Schulze [EMAIL PROTECTED]  Thu, 17 Aug 2006 09:15:31 +0200
+
 freetype (2.1.7-2.5) stable-security; urgency=high
 
   * Non-maintainer upload by the Security Team
diff -u freetype-2.1.7/debian/patches/400-CVE-2006-2493_integer-overflows.diff 
freetype-2.1.7/debian/patches/400-CVE-2006-2493_integer-overflows.diff
--- freetype-2.1.7/debian/patches/400-CVE-2006-2493_integer-overflows.diff
+++ freetype-2.1.7/debian/patches/400-CVE-2006-2493_integer-overflows.diff
@@ -77,12 +77,15 @@
  
  #include rasterrs.h
  
-@@ -175,6 +176,9 @@
+@@ -175,6 +176,12 @@
  bitmap-rows  = height;
  bitmap-pitch = pitch;
  
-+if ((FT_ULong)pitch  LONG_MAX/height)
++if ((FT_ULong)pitch  LONG_MAX/height || height = 0)
++{
++  error = Raster_Err_Array_Too_Large;
 +  goto Exit;
++}
 +
  if ( FT_ALLOC( bitmap-buffer, (FT_ULong)pitch * height ) )
goto Exit;


signature.asc
Description: Digital signature


Re: Preparation of the next stable Debian GNU/Linux update (V)

2006-04-09 Thread Frank Lichtenheld
On Wed, Apr 05, 2006 at 05:58:17PM +0200, Martin Zobel-Helas wrote:
 fai stable2.8.4all source
 fai updates   2.8.4sarge1  all source
 
   Fixes three problems

This explanation should probably be more verbose, shouldn't it?

Gruesse,
-- 
Frank Lichtenheld [EMAIL PROTECTED]
www: http://www.djpig.de/


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Preparation of the next stable Debian GNU/Linux update (V)

2006-04-09 Thread Martin Zobel-Helas
Hi Frank,

On Sunday, 09 Apr 2006, you wrote:
 On Wed, Apr 05, 2006 at 05:58:17PM +0200, Martin Zobel-Helas wrote:
  fai stable2.8.4all source
  fai updates   2.8.4sarge1  all source
  
  Fixes three problems
 
 This explanation should probably be more verbose, shouldn't it?

allready fixed. but thanks.

Greetings
Martin


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Preparation of the next stable Debian GNU/Linux update (V)

2006-04-06 Thread Stephen Gran
This one time, at band camp, Martin Zobel-Helas said:
 Preparation of Debian GNU/Linux 3.1r2
 =
 
 An up-to-date version is at http://release.debian.org/stable/3.1/3.1r2/.
 
 We are preparing the next revision of the current stable Debian
 distribution (sarge) and will frequently send reports so people can
 actually comment on it and intervene whenever this is required.


 The status of the following packages changed since the last announcement:
 -

 New Packages
 =-=-=-=-=-=-

Please add kaffeine to the list of new packages.
   DSA 1023 kaffeine - buffer overflow 

 clamavupdates   0.84-2.sarge.7  alpha arm hppa i386 ia64 m68k 
 mips mipsel powerpc s390 sparc source

These should hopefully be 0.84-2.sarge.8
DSA 1024 clamav - several vulnerabilities

Thanks,
-- 
 -
|   ,''`.Stephen Gran |
|  : :' :[EMAIL PROTECTED] |
|  `. `'Debian user, admin, and developer |
|`- http://www.debian.org |
 -


signature.asc
Description: Digital signature


Re: Preparation of the next stable Debian GNU/Linux update (V)

2006-04-06 Thread Andreas Barth
* Stephen Gran ([EMAIL PROTECTED]) [060406 14:11]:
 Please add kaffeine to the list of new packages.
DSA 1023 kaffeine - buffer overflow 
 
  clamavupdates   0.84-2.sarge.7  alpha arm hppa i386 ia64 m68k 
  mips mipsel powerpc s390 sparc source
 
 These should hopefully be 0.84-2.sarge.8
 DSA 1024 clamav - several vulnerabilities

At the time where this mail was written, it was .7. Now it's of course
.8 :)


Cheers,
Andi
-- 
  http://home.arcor.de/andreas-barth/


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Preparation of the next stable Debian GNU/Linux update (III)

2006-02-17 Thread Thomas Viehmann
Hi Martin,

thanks for the update.

Martin Schulze wrote:
 libchipcard20   stable0.9.1-7alpha arm hppa i386 ia64 m68k 
 mips mipsel powerpc s390 sparc
 libchipcard20   updates   0.9.1-7sarge0  alpha arm hppa i386 ia64 m68k 
 mips mipsel powerpc s390
 libchipcard stable0.9.1-7source
 libchipcard updates   0.9.1-7sarge0  source
[...]
   MISSING arm

I assume that is MISSING sparc?
Is there anything I can/need to do to fix this or is this transient?

Kind regards

T.
-- 
Thomas Viehmann, http://thomas.viehmann.net/


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Preparation of the next stable Debian GNU/Linux update (I)

2006-02-11 Thread Thomas Viehmann
Martin Schulze wrote:
would you entertain a one-line fix removing the deluser command from the
postrm of chipcard-tools (source package libchipcard).
[...]
 Please go ahead.  Normally, such a change wouldn not warrant a fix in
 a stable release, but in this case the package in question is not available
 in the subsequent distribution so it will be removed in either way, hence
 an update.
OK, I've uploaded 0.9.1-7sarge0. Thank you for the quick reply and
assessment.

Kind regards

T.
-- 
Thomas Viehmann, http://thomas.viehmann.net/


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Preparation of the next stable Debian GNU/Linux update (I)

2006-02-10 Thread J.H.M. Dassen (Ray)
On Thu, Feb 09, 2006 at 10:37:38 +0100, Martin Schulze wrote:
 Martin Zobel-Helas wrote:
  there was some discussion[1] wether the next stable update could have
  some timezone data updated in the glibc package.
 
 Show me the changes.
 
 Unless large chunks of the world are affected I don't consider timezone
 details to warrant an update in our stable release.  A note in the
 release notes may be useful instead.

A diff between the timezone dir in sarge's glibc sources and upstream CVS
HEAD's lists changes for at least Australia, Azerbaijan, Canada, Cuba,
Georgia, Haiti, Iran, Jordan, Kyrgyzstan, Libya, Nicaragua, Palestine,
Tasmania, Tunisia, United States of America, Uruguay as well as the 2005
leap second.

IMHO those are sufficient changes to warrant an update in stable.

HTH,
Ray
-- 
LWN normally tries to avoid talking much about Microsoft - it is simply
irrelevant to the free software world most of the time.
http://www.lwn.net/2000/0406/


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Preparation of the next stable Debian GNU/Linux update (I)

2006-02-09 Thread Martin Schulze
Martin Zobel-Helas wrote:
 Hi Joey,
 
 there was some discussion[1] wether the next stable update could have some
 timezone data updated in the glibc package.

Show me the changes.

Unless large chunks of the world are affected I don't consider timezone
details to warrant an update in our stable release.  A note in the
release notes may be useful instead.

Regards,

Joey

-- 
Everybody talks about it, but nobody does anything about it!  -- Mark Twain


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Preparation of the next stable Debian GNU/Linux update (I)

2006-02-09 Thread Thomas Viehmann
Hi Joey,

would you entertain a one-line fix removing the deluser command from the
postrm of chipcard-tools (source package libchipcard).
I'm having trouble with this on #346527 (still need to figure out how to
fix this for users upgrading from original sarge) and think that this
could be simple enough and grave enough for being worth addressing in a
stable update.

If you are generally OK with this, I'll upload the (one-line postrm +
changelog) fix to s-p-u.

Kind regards

T.
-- 
Thomas Viehmann, http://thomas.viehmann.net/


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Preparation of the next stable Debian GNU/Linux update (I)

2006-02-09 Thread Martin Schulze
Thomas Viehmann wrote:
 would you entertain a one-line fix removing the deluser command from the
 postrm of chipcard-tools (source package libchipcard).
 I'm having trouble with this on #346527 (still need to figure out how to
 fix this for users upgrading from original sarge) and think that this
 could be simple enough and grave enough for being worth addressing in a
 stable update.
 
 If you are generally OK with this, I'll upload the (one-line postrm +
 changelog) fix to s-p-u.

Please go ahead.  Normally, such a change wouldn not warrant a fix in
a stable release, but in this case the package in question is not available
in the subsequent distribution so it will be removed in either way, hence
an update.

Regards,

Joey

-- 
Linux - the choice of a GNU generation.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Preparation of the next stable Debian GNU/Linux update (I)

2006-02-08 Thread Steve Langasek
On Mon, Feb 06, 2006 at 09:53:14AM +0100, Martin Schulze wrote:
 2006/01/21 21:45 MET

  * Accepted albatross
  * Accepted antiword
  * Investigation of cernlib
  * Investigation of clamav
  * Accepted crawl
  * Moved evms from further to accept
  * Accepted mantis
  * Accepted perl
  * Accepted sudo

Are you aware of the complaints regarding the solution implemented in the
sudo DSA?

http://bugs.debian.org/349729
http://bugs.debian.org/349196
http://bugs.debian.org/349549
http://bugs.debian.org/349587

-- 
Steve Langasek   Give me a lever long enough and a Free OS
Debian Developer   to set it on, and I can move the world.
[EMAIL PROTECTED]   http://www.debian.org/


signature.asc
Description: Digital signature


Re: Preparation of the next stable Debian GNU/Linux update (I)

2006-02-08 Thread Martin Zobel-Helas
Hi Joey,

there was some discussion[1] wether the next stable update could have some
timezone data updated in the glibc package.

Greetings

[1] http://lists.debian.org/debian-volatile/2006/02/msg0.html


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Preparation of the next stable Debian GNU/Linux update (I)

2006-02-06 Thread Adeodato Simó
* Martin Schulze [Mon, 06 Feb 2006 09:53:14 +0100]:

 Rejected Packages
 -

 muttstable1.5.9-2alpha arm hppa i386 ia64 m68k mips 
 mipsel powerpc s390 sparc source
 muttupdates   1.5.9-2sarge1  alpha arm hppa i386 ia64 m68k mips 
 mipsel powerpc s390 sparc source

   Arbitrary changes.

  Just for the record:

mutt (1.5.9-2sarge1) stable; urgency=low
  
* For attachments marked for deletion after the message is sent, don't
  remove them if the message is finally cancelled, or if the attachments
  are dropped from the message prior to sending. (Closes: #332972)

  But well, this was solved on IRC already: Joey insisted that this was
  not suitable for stable, and I did not fight over it.

  Cheers,

-- 
Adeodato Simó dato at net.com.org.es
Debian Developer  adeodato at debian.org
 
A black cat crossing your path signifies that the animal is going somewhere.
-- Groucho Marx


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Preparation of the next stable Debian GNU/Linux update (I)

2005-12-17 Thread Stephen Gran
I see that the preparations for releasin 3.1r1 are well underway, and I
may be too late for this, but I though I would ask.

I realize (after having it gently pointed out to me in #338004) that
this patch is incomplete, as it missed a stray db_stop.

This one time, at band camp, Stephen Gran said:
 diff -u debian/clamav-daemon.postinst.in.old debian/clamav-daemon.postinst.in
 --- debian/clamav-daemon.postinst.in.old2005-08-20 18:55:06.0 
 -0400
 +++ debian/clamav-daemon.postinst.in2005-08-20 18:58:42.0 
 -0400
 @@ -30,10 +30,10 @@
 
UCFVER=`check_ucf`
 
 -  . /usr/share/debconf/confmodule
if [ -n $2 ]; then
  if dpkg --compare-versions $2 lt 0.82-2; then
#loading debconf module
 +  . /usr/share/debconf/confmodule
db_purge || true
db_stop  || true
  fi
 @@ -60,7 +60,7 @@
echo  delaycompress  $DEBROTATEFILE
echo  create 640  $User adm  $DEBROTATEFILE
echo  postrotate  $DEBROTATEFILE
 -  echo  kill -HUP \`cat $PidFile\`  /dev/null  $DEBROTATEFILE
 +  echo  [ ! -f $PidFile ] || kill -HUP \`cat $PidFile\`  
 /dev/null  $DEBROTATEFILE
echo  endscript  $DEBROTATEFILE
echo  }  $DEBROTATEFILE
touch $LogFile

Would it be possible to add the following:

@@ -78,8 +78,6 @@
 fi
   fi

-  db_stop  || true
-
   ;;
   abort-upgrade|abort-remove|abort-deconfigure)
   ;;

If it is, I will prepare a fixed package as soon as possible.  If not, I
understand.

Thanks,
-- 
 -
|   ,''`.Stephen Gran |
|  : :' :[EMAIL PROTECTED] |
|  `. `'Debian user, admin, and developer |
|`- http://www.debian.org |
 -


signature.asc
Description: Digital signature


Re: Preparation of the next stable Debian GNU/Linux update (VI)

2005-12-03 Thread Martin Schulze
Andrew Donnellan wrote:
 It's been a while since the last update: how long to go before r1?

Dunno.

Ryan (ftpmaster) won't give a green light for r1 until the kernel
has been updated.

That'll still take a while.

Regards,

Joey

-- 
Life is too short to run proprietary software.  -- Bdale Garbee


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Preparation of the next stable Debian GNU/Linux update (VI)

2005-12-03 Thread Otavio Salvador
Martin Schulze [EMAIL PROTECTED] writes:

 Andrew Donnellan wrote:
 It's been a while since the last update: how long to go before r1?

 Dunno.

 Ryan (ftpmaster) won't give a green light for r1 until the kernel
 has been updated.

Kernel of sarge? 2.6.8 and 2.4.27?

IIRC, Debian Kernel Team already have some ready packages for it.

-- 
O T A V I OS A L V A D O R
-
 E-mail: [EMAIL PROTECTED]  UIN: 5906116
 GNU/Linux User: 239058 GPG ID: 49A5F855
 Home Page: http://www.freedom.ind.br/otavio
-
Microsoft gives you Windows ... Linux gives
 you the whole house.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Preparation of the next stable Debian GNU/Linux update (VI)

2005-12-03 Thread Andreas Metzler
On 2005-12-03 Otavio Salvador [EMAIL PROTECTED] wrote:
 Martin Schulze [EMAIL PROTECTED] writes:
  Andrew Donnellan wrote:
  It's been a while since the last update: how long to go before r1?

  Dunno.

  Ryan (ftpmaster) won't give a green light for r1 until the kernel
  has been updated.

 Kernel of sarge? 2.6.8 and 2.4.27?

 IIRC, Debian Kernel Team already have some ready packages for it.

deb http://kernel.debian.net/debian sarge-proposed-security-updates main
cu andreas
-- 
The 'Galactic Cleaning' policy undertaken by Emperor Zhark is a personal
vision of the emperor's, and its inclusion in this work does not constitute
tacit approval by the author or the publisher for any such projects,
howsoever undertaken.(c) Jasper Ffforde


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Preparation of the next stable Debian GNU/Linux update (VI)

2005-12-03 Thread Martin Schulze
Otavio Salvador wrote:
 Martin Schulze [EMAIL PROTECTED] writes:
 
  Andrew Donnellan wrote:
  It's been a while since the last update: how long to go before r1?
 
  Dunno.
 
  Ryan (ftpmaster) won't give a green light for r1 until the kernel
  has been updated.
 
 Kernel of sarge? 2.6.8 and 2.4.27?
 
 IIRC, Debian Kernel Team already have some ready packages for it.

I know.  Most of them are ready.

Regards,

Joey

-- 
Life is too short to run proprietary software.  -- Bdale Garbee


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Preparation of the next stable Debian GNU/Linux update (IV)

2005-09-15 Thread Martin Zobel-Helas
Hi Joey,

please also update base-config.

#154482 is still valid for sarge, and is very annoying.

Greetings
Martin


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Preparation of the next stable Debian GNU/Linux update (IV)

2005-09-15 Thread Martin Schulze
Martin Zobel-Helas wrote:
 Hi Joey,
 
 please also update base-config.
 
 #154482 is still valid for sarge, and is very annoying.

From the first glance this looks like a wrong setting in the debconf db.

-- dpkg-reconfigure base-config with proper priorities

Regards,

Joey

-- 
Testing? What's that? If it compiles, it is good, if it boots up, it is perfect.

Please always Cc to me when replying to me on the lists.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Preparation of the next stable Debian GNU/Linux update (IV)

2005-09-15 Thread Colin Watson
On Thu, Sep 15, 2005 at 06:42:08PM +0200, Martin Schulze wrote:
 Martin Zobel-Helas wrote:
  please also update base-config.
  
  #154482 is still valid for sarge, and is very annoying.
 
 From the first glance this looks like a wrong setting in the debconf db.
 
 -- dpkg-reconfigure base-config with proper priorities

(a) You mean 'apt-setup' - base-config does not ask any questions in its
maintainer scripts so dpkg-reconfigure is not useful for it;

(b) The apt-setup patch mentioned in base-config 2.66's changelog is
needed to have that question actually get re-asked when you run
apt-setup, which is the bug.

-- 
Colin Watson   [EMAIL PROTECTED]


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Preparation of the next stable Debian GNU/Linux update (IV)

2005-09-15 Thread Martin Schulze
Colin Watson wrote:
  Martin Zobel-Helas wrote:
   please also update base-config.
   
   #154482 is still valid for sarge, and is very annoying.
  
  From the first glance this looks like a wrong setting in the debconf db.
  
  -- dpkg-reconfigure base-config with proper priorities
 
 (a) You mean 'apt-setup' - base-config does not ask any questions in its
 maintainer scripts so dpkg-reconfigure is not useful for it;
 
 (b) The apt-setup patch mentioned in base-config 2.66's changelog is
 needed to have that question actually get re-asked when you run
 apt-setup, which is the bug.

So, where is the patch, and where is the updated package?

Regards,

Joey

-- 
Testing? What's that? If it compiles, it is good, if it boots up, it is perfect.

Please always Cc to me when replying to me on the lists.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Preparation of the next stable Debian GNU/Linux update (II)

2005-08-22 Thread Alexander Sack
On Sat, Aug 20, 2005 at 05:11:01PM +0200, Martin Schulze wrote:
 If you would like to get a package updated in the stable release, you
 are advised to talk to the stable release manager first (see
 http://www.debian.org/intro/organization).
 
 Changelog
 -
 
 2005/08/20 17:09 MET
 
  * Accepted mantis
  * Investigation of mozilla
  * Investigation of mozilla-firefox
 

Please add mozilla-thunderbird here too. The security upload is pending as
you told me :).


--
 GPG messages preferred. |  .''`.  ** Debian GNU/Linux **
 Alexander Sack  | : :' :  The  universal
 [EMAIL PROTECTED] | `. `'  Operating System
 http://www.jwsdot.com/  |   `-http://www.debian.org/


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Preparation of the next stable Debian GNU/Linux update (II)

2005-08-22 Thread Martin Schulze
Alexander Sack wrote:
 On Sat, Aug 20, 2005 at 05:11:01PM +0200, Martin Schulze wrote:
  If you would like to get a package updated in the stable release, you
  are advised to talk to the stable release manager first (see
  http://www.debian.org/intro/organization).
  
  Changelog
  -
  
  2005/08/20 17:09 MET
  
   * Accepted mantis
   * Investigation of mozilla
   * Investigation of mozilla-firefox
  
 
 Please add mozilla-thunderbird here too. The security upload is pending as
 you told me :).

I can only add packages that are there.

Two architectures are missing for Thunderbird on klecker before I can
release an advisory.

Regards,

Joey

-- 
Those who don't understand Unix are condemned to reinvent it, poorly.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Preparation of the next stable Debian GNU/Linux update (II)

2005-08-22 Thread LENHOF Jean-Yves

On Lun 22 août 2005 11:42, Martin Schulze a écrit :
 Alexander Sack wrote:
 On Sat, Aug 20, 2005 at 05:11:01PM +0200, Martin Schulze wrote:
  If you would like to get a package updated in the stable release, you
  are advised to talk to the stable release manager first (see
  http://www.debian.org/intro/organization).
 
  Changelog
  -
 
  2005/08/20 17:09 MET
 
   * Accepted mantis
   * Investigation of mozilla
   * Investigation of mozilla-firefox

For firefox, there's this bug which is very bad
So for now please don't accept it in this new release

http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=324344
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=324173

Regards,

-- 
Jean-Yves LENHOF
http://www.lenhof.eu.org
[EMAIL PROTECTED]
Port Perso : 06 09 39 96 49 Fixe : 03 20 39 62 86
Tel Free ADSL (Dégroupage Free) :  08 71 76 47 32


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Preparation of the next stable Debian GNU/Linux update (I)

2005-08-21 Thread Stephen Gran
This one time, at band camp, Martin Schulze said:
 These packages will be installed into the stable Debian distribution
 and will be part of the next revision.
 
 clamav-base   stable0.84-2  all
 clamav-base   updates   0.84-2.sarge.1  all
 clamav-daemon stable0.84-2  alpha arm hppa i386 ia64 m68k 
 mips mipsel powerpc s390 sparc
 clamav-daemon updates   0.84-2.sarge.1  alpha arm hppa i386 ia64 m68k 
 mips mipsel powerpc s390 sparc
 clamav-docs   stable0.84-2  all
 clamav-docs   updates   0.84-2.sarge.1  all
 clamav-freshclam  stable0.84-2  alpha arm hppa i386 ia64 m68k 
 mips mipsel powerpc s390 sparc
 clamav-freshclam  updates   0.84-2.sarge.1  alpha arm hppa i386 ia64 m68k 
 mips mipsel powerpc s390 sparc
 clamav-milter stable0.84-2  alpha arm hppa i386 ia64 m68k 
 mips mipsel powerpc s390 sparc
 clamav-milter updates   0.84-2.sarge.1  alpha arm hppa i386 ia64 m68k 
 mips mipsel powerpc s390 sparc
 clamav-testfiles  stable0.84-2  all
 clamav-testfiles  updates   0.84-2.sarge.1  all
 clamavstable0.84-2  alpha arm hppa i386 ia64 m68k 
 mips mipsel powerpc s390 sparc source
 clamavupdates   0.84-2.sarge.1  alpha arm hppa i386 ia64 m68k 
 mips mipsel powerpc s390 sparc source
 libclamav-dev stable0.84-2  alpha arm hppa i386 ia64 m68k 
 mips mipsel powerpc s390 sparc
 libclamav-dev updates   0.84-2.sarge.1  alpha arm hppa i386 ia64 m68k 
 mips mipsel powerpc s390 sparc
 libclamav1stable0.84-2  alpha arm hppa i386 ia64 m68k 
 mips mipsel powerpc s390 sparc
 libclamav1updates   0.84-2.sarge.1  alpha arm hppa i386 ia64 m68k 
 mips mipsel powerpc s390 sparc
 
   DSA 737 clamav - remote DOS

I see that you are actually including .2 (which is great).  I would like
to get the following patch in as well, but I understand if you feel it
inapropriate for a stable update.  

The first 2 diff's fix #321440 and #315063, while the last fixes an
unreported bug in redirection, as well as a privately reported bug about
a hang on low entropy systems.  All of these changes have been in unstable
for some time, so I feel as though they have gotten at least some testing
to make sure they won't do additional harm.

Thanks for considering,

diff -u debian/clamav-freshclam.logrotate.old debian/clamav-freshclam.logrotate
--- debian/clamav-freshclam.logrotate.old   2005-08-20 18:54:28.0 -0400
+++ debian/clamav-freshclam.logrotate   2005-08-20 18:54:39.0 -0400
@@ -5,7 +5,7 @@
  delaycompress
  create 640 clamav adm
  postrotate
- [ -f /var/run/clamav/freshclam.pid ]  kill -HUP `cat 
/var/run/clamav/freshclam.pid`  /dev/null
+ [ ! -f /var/run/clamav/freshclam.pid ] || kill -HUP `cat 
/var/run/clamav/freshclam.pid`  /dev/null
  endscript
  }

diff -u debian/clamav-daemon.postinst.in.old debian/clamav-daemon.postinst.in
--- debian/clamav-daemon.postinst.in.old2005-08-20 18:55:06.0 -0400
+++ debian/clamav-daemon.postinst.in2005-08-20 18:58:42.0 -0400
@@ -30,10 +30,10 @@

   UCFVER=`check_ucf`

-  . /usr/share/debconf/confmodule
   if [ -n $2 ]; then
 if dpkg --compare-versions $2 lt 0.82-2; then
   #loading debconf module
+  . /usr/share/debconf/confmodule
   db_purge || true
   db_stop  || true
 fi
@@ -60,7 +60,7 @@
   echo  delaycompress  $DEBROTATEFILE
   echo  create 640  $User adm  $DEBROTATEFILE
   echo  postrotate  $DEBROTATEFILE
-  echo  kill -HUP \`cat $PidFile\`  /dev/null  $DEBROTATEFILE
+  echo  [ ! -f $PidFile ] || kill -HUP \`cat $PidFile\`  /dev/null 
 $DEBROTATEFILE
   echo  endscript  $DEBROTATEFILE
   echo  }  $DEBROTATEFILE
   touch $LogFile
diff -u debian/clamav-freshclam.postinst.in.old 
debian/clamav-freshclam.postinst.in
--- debian/clamav-freshclam.postinst.in.old 2005-08-20 18:52:54.0 -0400
+++ debian/clamav-freshclam.postinst.in 2005-08-20 18:53:39.0 -0400
@@ -161,7 +161,7 @@

   # Set up cron method
   if [ $runas = cron ]; then
-min=$(( `od -A n -N 2 -l   /dev/random`  %  3600 / 60 ))
+min=$(( `od -A n -N 2 -l   /dev/urandom`  %  3600 / 60 ))
 # min=`perl -e 'print int(rand(60))'`
 FRESHCLAMCRON=/etc/cron.d/clamav-freshclam
 FRESHCLAMTEMP=/var/lib/clamav/freshclam.cron
@@ -173,7 +173,7 @@
 if [ -e /etc/cron.d/clamav-freshclam ]; then
   echo -n Disabling old cron script . . . 
   mv /etc/cron.d/clamav-freshclam /etc/cron.d/clamav-freshclam.dpkg-old
-  ucf -p /etc/cron.d/clamav-freshclam  /dev/null 21 || true
+  ucf -p /etc/cron.d/clamav-freshclam  /dev/null 21 || true
   echo done
 fi
   fi

-- 
 -
|   ,''`.Stephen Gran |
|  : :' :[EMAIL PROTECTED] |
|  

Re: Preparation of the next stable Debian GNU/Linux update (I)

2005-07-22 Thread Loïc Minier
Hi,

On Fri, Jul 08, 2005, Martin Schulze wrote:
 Preparation of the next stable Debian GNU/Linux update
 ==
 An up-to-date version is at http://people.debian.org/~joey/3.1r1/.

 There's no trace of gnome-system-monitor on that page.  Could you
 please review
 http://lists.debian.org/debian-release/2005/06/msg00302.html and
 tell me whether you accept or reject it?

   Thanks,

-- 
Loïc Minier [EMAIL PROTECTED]
Come, your destiny awaits!


signature.asc
Description: Digital signature


Re: Preparation of the next stable Debian GNU/Linux update (I)

2005-07-15 Thread Andres Salomon
On Fri, 08 Jul 2005 09:18:16 +0200, Martin Schulze wrote:

 Preparation of the next stable Debian GNU/Linux update
 ==
 
 An up-to-date version is at http://people.debian.org/~joey/3.1r1/.
 
 I am preparing the (most probably) last revision ever of the current
 stable Debian distribution (woody) and will frequently send reports so
 people can actually comment on it and intervene whenever this is
 required.  It is scheduled for any time now.
 
 If you disagree with one bit or another, please reply to this mail and
 explain why these things should be handled differently.  There is
 still time to reconsider.
 

I notice kernel updates are missing from this list.  We are still sitting
on the ABI-changing netfilter frag leak fix; there are also numerous
other security fixes that the kernel needs.  I've spoken to joeyh about
this, and he's fine with the kernel package name change.  So, our plan is
to upload to stable-proposed-updates, and the d-i folks will update
sarge's d-i for the new kernels.  Martin, do you have any problems
with this?


 The plan is to release a new revision roughly two months after the
last
 update.  It is required, however, that this happens before the release
 of sarge since the Debian archive infrastructure is unable to update the
 then called oldstable distribution.  Hence, this update is planned for
 the end of May, right before the proposed release of sarge.
 



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Preparation of the next stable Debian GNU/Linux update (I)

2005-07-11 Thread Thomas Viehmann
Martin Schulze wrote:
  3. The stable version of the package is not installable at all due to
 broken or unmet dependencies or broken installation scripts.
Would you consider a fix for #315946 if uploaded to s-p-u?

Kind regards

T.
-- 
Thomas Viehmann, http://thomas.viehmann.net/


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Preparation of the next stable Debian GNU/Linux update (I)

2005-07-08 Thread Steffen Grunewald
Hi Joey,

On Fri, Jul 08, 2005 at 09:18:16AM +0200, Martin Schulze wrote:
 Preparation of the next stable Debian GNU/Linux update
 ==
 
 An up-to-date version is at http://people.debian.org/~joey/3.1r1/.
 
 I am preparing the (most probably) last revision ever of the current
 stable Debian distribution (woody) and will frequently send reports so
 people can actually comment on it and intervene whenever this is
 required.  It is scheduled for any time now.

s/the \(most probably\) last revision ever/another step towards the final 
version/
s/woody/sarge/


The joy of semi-automated postings...

Cheers,
 Steffen


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Preparation of the next stable Debian GNU/Linux update (I)

2005-07-08 Thread Martin Schulze
Steffen Grunewald wrote:
 Hi Joey,
 
 On Fri, Jul 08, 2005 at 09:18:16AM +0200, Martin Schulze wrote:
  Preparation of the next stable Debian GNU/Linux update
  ==
  
  An up-to-date version is at http://people.debian.org/~joey/3.1r1/.
  
  I am preparing the (most probably) last revision ever of the current
  stable Debian distribution (woody) and will frequently send reports so
  people can actually comment on it and intervene whenever this is
  required.  It is scheduled for any time now.
 
 s/the \(most probably\) last revision ever/another step towards the final 
 version/
 s/woody/sarge/
 
 
 The joy of semi-automated postings...

No, the joy of copied templates... :)
It's corrected on the web page.

Regards,

Joey

-- 
Computers are not intelligent.  They only think they are.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Preparation of the next stable Debian GNU/Linux update (I)

2005-07-08 Thread Loïc Minier
Hi,

On Fri, Jul 08, 2005, Martin Schulze wrote:
  2. The package fixes a critical bug which can lead into data loss,
 data corruption, or an overly broken system, or the package is
 broken or not usable (anymore).

 I've sent an updated package for gnome-system-monitor in my message
 of the 23th of june to this list:
   http://lists.debian.org/debian-release/2005/06/msg00302.html

 I've reminded you of this request in a private mail the 27th of june.

 Is anything preventing inclusion of gnome-system-monitor?  Please
 confirm its inclusion or reject it.

 Thanks for your work.

   Regards,

-- 
Loïc Minier [EMAIL PROTECTED]
Life is like a sewer - what you get out of it
depends on what you put into it. -- Hen3ry


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Preparation of the next stable Debian GNU/Linux update (I)

2005-07-08 Thread Roberto C. Sanchez
On Fri, Jul 08, 2005 at 09:18:16AM +0200, Martin Schulze wrote:
 
 The requirements for packages to get updated in stable are:
 
  1. The package fixes a security problem.  An advisory by our own
 Security Team is required.  Updates need to be approved by the
 Security Team.
 
  2. The package fixes a critical bug which can lead into data loss,
 data corruption, or an overly broken system, or the package is
 broken or not usable (anymore).
 
  3. The stable version of the package is not installable at all due to
 broken or unmet dependencies or broken installation scripts.
 
  4. All released architectures have to be in sync.
 
  5. The package gets all released architectures back in sync.
 
 It is (or (and (or 1 2 3) 4) 5)
 

I am adopting the httperf package.  It was in Woody and was removed from
Sarge/Sid because of licensing issues with linking to OpenSSL.  The
issue has been resolved [0] by the current upstream maintainer.   Since
the package was in Woody and not in Sarge [1], there is the potential
for someone to have had it installed prior to upgrading and now have it
still installed.  This could be a problem since if the package is only
allowed back into Sid/Etch, then Sarge users with the obsolete httperf
would not receive any future security updates (if they become necessary)
for the package.  Is this sufficient justification to have the package
added back in to Sarge?

Here is a summary of the changes from the Woody version:

* Move from non-US to main
* Recompile against libssl0.9.7
* Update license and copyright file.
* Corrected some minor lintian warnings against the man page.
* Added a watch file.

The last two changes can be backed out if it is necessary to get the
package into Sarge.  If this is sufficient, I can have a new package
done and uploaded (by my sponsor) by tomorrow.

Comments would be appreciated.

-Roberto

[0] http://lists.debian.org/debian-legal/2005/07/msg00040.html
[1] http://packages.debian.org/httperf
-- 
Roberto C. Sanchez
http://familiasanchez.net/~sanchezr


pgp48hFSwc7Gi.pgp
Description: PGP signature


Re: Preparation of the next stable Debian GNU/Linux update (I)

2005-07-08 Thread Michelle Konzack
Am 2005-07-08 09:18:16, schrieb Martin Schulze:
 Preparation of the next stable Debian GNU/Linux update
 ==
 
 An up-to-date version is at http://people.debian.org/~joey/3.1r1/.
  ^
 
 I am preparing the (most probably) last revision ever of the current
 stable Debian distribution (woody) and will frequently send reports so
  ^

 The plan is to release a new revision roughly two months after the
 last update.  It is required, however, that this happens before the
 release of sarge since the Debian archive infrastructure is unable to
 update the then called oldstable distribution.  Hence, this update is
 planned for the end of May, right before the proposed release of sarge.

???

 Disclaimer
 --
 
 This list intends to help the ftp-masters releasing 3.1r1.  They have the
 final power to accept a package or not.  If you want to comment on
 this list, please send a mail to Martin Schulze [EMAIL PROTECTED].
 
 Last updated 2005/07/08 09:16 MET

Ist this message an accident ?

Greetings
Michelle

-- 
Linux-User #280138 with the Linux Counter, http://counter.li.org/
Michelle Konzack   Apt. 917  ICQ #328449886
   50, rue de Soultz MSM LinuxMichi
0033/3/8845235667100 Strasbourg/France   IRC #Debian (irc.icq.com)


signature.pgp
Description: Digital signature


Re: Preparation of the next stable Debian GNU/Linux update (III)

2004-12-19 Thread Mark Brown
On Sat, Dec 18, 2004 at 11:46:31PM +0100, Santiago Vila wrote:

 Someone who installs from 3.0r[012] should have stable in sources.list.
 There is no need to have packages available in both places, at least
 not several weeks after the release of 3.0r3.

Assuming they've got a network source in there which has an up to date
mirror.  If they're using something like a local mirror that isn't
updated or CDs they may not have a copy of 3.0r3 in their sources.list.

-- 
You grabbed my hand and we fell into it, like a daydream - or a fever.



Re: Preparation of the next stable Debian GNU/Linux update (III)

2004-12-18 Thread Santiago Vila
Not directly related to 3.0r4, but while we are at it:

Would be possible to remove packages in security.debian.org which are
already part of 3.0r3?



Re: Preparation of the next stable Debian GNU/Linux update (III)

2004-12-18 Thread Ron Johnson
On Sat, 2004-12-18 at 19:53 +0100, Santiago Vila wrote:
 Not directly related to 3.0r4, but while we are at it:
 
 Would be possible to remove packages in security.debian.org which are
 already part of 3.0r3?

Isn't that not correct, since someone who installs from 3.0 or
3.0r[123] disks will need all of the packages in security.d.o to
be able to upgrade to the latest secure revisions?

-- 
-
Ron Johnson, Jr.
Jefferson, LA USA
PGP Key ID 8834C06B I prefer encrypted mail.

Fair is where you take your cows to be judged.
Unknown



signature.asc
Description: This is a digitally signed message part


Re: Preparation of the next stable Debian GNU/Linux update (III)

2004-12-18 Thread Martin Schulze
Santiago Vila wrote:
 Not directly related to 3.0r4, but while we are at it:
 
 Would be possible to remove packages in security.debian.org which are
 already part of 3.0r3?

What would we gain from this?

I would not like that but maybe you have a good reason for asking.

Regards,

Joey

-- 
Experience is something you don't get until just after you need it.



Re: Preparation of the next stable Debian GNU/Linux update (III)

2004-12-18 Thread Otavio Salvador
|| On Sat, 18 Dec 2004 20:06:13 +0100
|| Martin Schulze [EMAIL PROTECTED] wrote: 

ms Santiago Vila wrote:
 Not directly related to 3.0r4, but while we are at it:
 
 Would be possible to remove packages in security.debian.org which are
 already part of 3.0r3?

ms What would we gain from this?

ms I would not like that but maybe you have a good reason for asking.

It reduze the index files. But I don't like to force it because the
user can use an outdated mirror and in this case security will have
the needed packages for his system be secure again.

IMHO we should leave it in both places.

-- 
O T A V I OS A L V A D O R
-
 E-mail: [EMAIL PROTECTED]  UIN: 5906116
 GNU/Linux User: 239058 GPG ID: 49A5F855
 Home Page: http://www.freedom.ind.br/otavio
-
Microsoft gives you Windows ... Linux gives
 you the whole house.


pgpKz3JhQx4iU.pgp
Description: PGP signature


Re: Preparation of the next stable Debian GNU/Linux update (III)

2004-12-18 Thread Martin Schulze
Ron Johnson wrote:
 On Sat, 2004-12-18 at 19:53 +0100, Santiago Vila wrote:
  Not directly related to 3.0r4, but while we are at it:
  
  Would be possible to remove packages in security.debian.org which are
  already part of 3.0r3?
 
 Isn't that not correct, since someone who installs from 3.0 or
 3.0r[123] disks will need all of the packages in security.d.o to
 be able to upgrade to the latest secure revisions?

In general yes, but normally you also have the regular links to
http.us.debian.org, no?

Regards,

Joey

-- 
Experience is something you don't get until just after you need it.



Re: Preparation of the next stable Debian GNU/Linux update (III)

2004-12-18 Thread Ron Johnson
On Sat, 2004-12-18 at 20:22 +0100, Martin Schulze wrote:
 Ron Johnson wrote:
  On Sat, 2004-12-18 at 19:53 +0100, Santiago Vila wrote:
   Not directly related to 3.0r4, but while we are at it:
   
   Would be possible to remove packages in security.debian.org which are
   already part of 3.0r3?
  
  Isn't that not correct, since someone who installs from 3.0 or
  3.0r[123] disks will need all of the packages in security.d.o to
  be able to upgrade to the latest secure revisions?
 
 In general yes, but normally you also have the regular links to
 http.us.debian.org, no?

Well, it's moot in my case (I track sid).

-- 
-
Ron Johnson, Jr.
Jefferson, LA USA
PGP Key ID 8834C06B I prefer encrypted mail.

All else being equal, you're safer traveling in a passenger
vehicle that's larger and heavier than in one that's smaller and
lighter.
http://www.carsafety.org/vehicle_ratings/sfsc.htm



signature.asc
Description: This is a digitally signed message part


Re: Preparation of the next stable Debian GNU/Linux update (III)

2004-12-18 Thread Santiago Vila
On Sat, 18 Dec 2004, Ron Johnson wrote:

 On Sat, 2004-12-18 at 19:53 +0100, Santiago Vila wrote:
  Not directly related to 3.0r4, but while we are at it:
 
  Would be possible to remove packages in security.debian.org which are
  already part of 3.0r3?

 Isn't that not correct, since someone who installs from 3.0 or
 3.0r[123] disks will need all of the packages in security.d.o to
 be able to upgrade to the latest secure revisions?

Someone who installs from 3.0r[012] should have stable in sources.list.
There is no need to have packages available in both places, at least
not several weeks after the release of 3.0r3.



  1   2   >