On Mon, Oct 07, 2019 at 06:16:48PM +0300, Niko Tyni wrote:
This package failed to build from source on arm64, mips64el, ppc64el
and s390x, but earlier versions built there successfully in the past.
This is preventing 1.16.1-1 testing migration and is a blocker for
the ongoing Perl 5.30 transitio
Control: tag -1 pending
Hello,
Bug #918511 in golang-github-shopify-sarama reported by you has been fixed in
the
Git repository and is awaiting an upload. You can see the commit
message below and you can check the diff of the fix at:
https://salsa.debian.org/go-team/packages/golang-github-shopi
08248c9d96a3a6d83444f268219a8f8812c79f48
Author: Christos Trochalakis
Date: Fri Oct 13 12:59:41 2017 +0300
Release 1.13.6-2
diff --git a/debian/changelog b/debian/changelog
index 8aa3e0a..5be779e 100644
--- a/debian/changelog
+++ b/debian/changelog
@@ -1,3 +1,9 @@
+nginx (1.13.6-2) unstable; urgency=medium
+
+ * rtmp: Ship
ee4f08f8b48651eb584373af0bb71afd5a4d3c1d
Author: Christos Trochalakis
Date: Tue Aug 29 10:50:48 2017 +0300
Release 1.13.4-1
diff --git a/debian/changelog b/debian/changelog
index 7d350cf..3e671b0 100644
--- a/debian/changelog
+++ b/debian/changelog
@@ -1,3 +1,20 @@
+nginx (1.13.4-1) unstable; urgency=medium
+
+ * New
+leak. (Closes: #868109)
+
+ -- Chris Lamb Thu, 13 Jul 2017 09:06:49 +0100
+
nginx (1.2.1-2.2+wheezy4) wheezy-security; urgency=high
[ Christos Trochalakis ]
95f7f656da1f216cba0e292813cf0889dff2dd04
Author: Christos Trochalakis
Date: Wed Jul 12 11:20:46 2017 +0300
Release 1.13.3-1
diff --git a/debian/changelog b/debian/changelog
index 0b7711b..7d350cf 100644
--- a/debian/changelog
+++ b/debian/changelog
@@ -1,3 +1,11 @@
+nginx (1.13.3-1) unstable; urgency=high
+
+ * New
bb02365c7f998eeb3cb5fae373aa3132836d3a8a
Author: Christos Trochalakis
Date: Sat Jul 8 14:37:42 2017 +0300
Release 0.9.4-3
diff --git a/debian/changelog b/debian/changelog
index fa8e27b..2f670fb 100644
--- a/debian/changelog
+++ b/debian/changelog
@@ -1,3 +1,9 @@
+python-confluent-kafka (0.9.4
On Fri, Nov 11, 2016 at 12:46:49PM +0100, Moritz Muehlenhoff wrote:
B0;115;0cOn Fri, Nov 04, 2016 at 10:03:02AM +0200, Christos Trochalakis wrote:
On Wed, Nov 02, 2016 at 05:22:21PM +0100, Kurt Roeckx wrote:
>On Wed, Nov 02, 2016 at 10:39:29AM +0100, Moritz Muehlenhoff wrote:
>>
&g
962a960e3f0fe9847a71580b43a6e207f10c420a
Author: Christos Trochalakis
Date: Wed Sep 14 12:23:49 2016 +0300
Release 1.9.10-1~bpo8+4 (CVE-2016-1247)
CVE-2016-1247: Secure log file handling
Backporting patches from 1.6.2-5+deb8u{3,4} and adjusting
the compare-versions check for backports.
diff --git a
On Wed, Nov 02, 2016 at 05:22:21PM +0100, Kurt Roeckx wrote:
On Wed, Nov 02, 2016 at 10:39:29AM +0100, Moritz Muehlenhoff wrote:
The issue hasn't been diagnosed upstream, but this will likely also affect nginx
once rebuilt against openssl 1.1.
It seems it was fixed in OpenSSL in the mean time
424f50a53b532f552261df7102adcc8d64881c10
Author: Christos Trochalakis
Date: Thu Nov 3 16:50:33 2016 +0200
Fix FTBFS for OpenSSL 1.1.0
diff --git a/debian/changelog b/debian/changelog
index 5101bbb..470a04a 100644
--- a/debian/changelog
+++ b/debian/changelog
@@ -1,5 +1,8 @@
nginx (1.10.2-2) UNRELEASED; urgency=medium
On Sat, Oct 29, 2016 at 11:29:12AM +0200, Kurt Roeckx wrote:
On Sat, Oct 29, 2016 at 11:04:33AM +0300, Christos Trochalakis wrote:
I am not sure if the first lua patch is safe (regarding the
"ssl_conn->tlsext_status_expected = 1;" removal).
I'm not sure which patch you
On Sat, Oct 29, 2016 at 11:21:05AM +0200, Kurt Roeckx wrote:
On Sat, Oct 29, 2016 at 11:04:33AM +0300, Christos Trochalakis wrote:
On Tue, Oct 11, 2016 at 10:41:01AM +0300, Christos Trochalakis wrote:
> On Fri, Sep 02, 2016 at 10:52:15PM +0200, Kurt Roeckx wrote:
> > Hi,
> >
&
On Tue, Oct 11, 2016 at 10:41:01AM +0300, Christos Trochalakis wrote:
On Fri, Sep 02, 2016 at 10:52:15PM +0200, Kurt Roeckx wrote:
Hi,
It seems the version in experimental needs this patch to build
nginx itself:
http://hg.nginx.org/nginx/rev/1891b2892b68
You might also want this one:
http
333595dc8382e728bc9d57c1e533fa656b2fd6b3
Author: Christos Trochalakis
Date: Wed Sep 14 12:23:49 2016 +0300
CVE-2016-1247: Secure log file handling
Backporting patches from 1.6.2-5+deb8u{3,4} and adjusting
the compare-versions check to 1.10.2-1~.
diff --git a/debian/changelog b/debian/changelog
index 3671be9
9e18152111b9f4f9b04f99ca5c34067f559557a2
Author: Christos Trochalakis
Date: Fri Oct 28 09:00:35 2016 +0300
Import Debian patch 1.6.2-5+deb8u4
diff --git a/debian/changelog b/debian/changelog
index d49cdd8..b5390d1 100644
--- a/debian/changelog
+++ b/debian/changelog
@@ -1,3 +1,11 @@
+nginx (1.6.2-5+deb8u4) jessie-security
58105135c4fde9f33b277f02ff07ba6189d57abf
Author: Christos Trochalakis
Date: Wed Apr 27 16:37:15 2016 +0300
Fix upgrading nginx-extras from a non-dynamic version
libnginx-mod-http-perl ships a common file with nginx-extras,
adding a Replaces header fixes that.
Note that the is no need to add a Breaks
Control: tags -1 moreinfo
On Sun, Nov 08, 2015 at 04:27:50PM -0500, Andrew Siplas wrote:
Package: nginx-extras
Version: 1.9.6-1
Severity: grave
Justification: renders package unusable
Upon upgrade to nginx, it did not restart successfully due to the following:
/usr/sbin/nginx: error while load
On Mon, Mar 09, 2015 at 10:58:52PM +0530, shirish शिरीष wrote:
at bottom :-
On 3/9/15, Ivan Baldo wrote:
Ok, decided to check current Debian Policy Manual and there isn't a
specific mention of what to do when starting a service after dpkg's
configuration phase and that service fails.
b6807de05a05c8f277ba30dbef1a528280139857
Author: Christos Trochalakis
Date: Thu Sep 18 15:27:09 2014 +0300
Release 1.2.1-2.2+wheezy3
diff --git a/debian/changelog b/debian/changelog
index 9aaed10..8f8eb4c 100644
--- a/debian/changelog
+++ b/debian/changelog
@@ -1,3 +1,13 @@
+nginx (1.2.1-2.2+wheezy3) wheezy-security
severity 762531 normal
thanks
On Tue, Sep 23, 2014 at 08:55:45AM +0200, shugen wrote:
Package: nginx-common
Version: 1.2.1-2.2+wheezy2
Severity: serious
Justification: must
Dear Maintainer,
our nginx configuration at startup opens many files (many vhost etc). Normally
is not a problem, we can
510ec78adf402dcc4ca4d4bd46fbd0267d9eb1cd
Author: Christos Trochalakis
Date: Wed Sep 17 11:19:18 2014 +0300
Release 1.6.2-1
diff --git a/debian/changelog b/debian/changelog
index 178101e..1ac0f8c 100644
--- a/debian/changelog
+++ b/debian/changelog
@@ -1,3 +1,14 @@
+nginx (1.6.2-1) unstable; urgency=high
+
+ [ Christos
1ed0224979e9b1cc197f166eee486dfdce8b2534
Author: Christos Trochalakis
Date: Tue Mar 18 22:04:03 2014 +0200
Release 1.4.7-1, CVE-2014-0133
Release announcement:
http://mailman.nginx.org/pipermail/nginx-announce/2014/000135.html
diff --git a/debian/changelog b/debian/changelog
index 4c66bd8..dbe62da 100644
--- a
tags 715435 + pending
thanks
A fix will be included in the next upload:
http://anonscm.debian.org/gitweb/?p=collab-maint/nginx.git;a=commitdiff;h=1f1192
The `abort-upgrade` error has already been handled in 1.4.3-1
Andreas, thank you for the bug report.
--
To UNSUBSCRIBE, email to debian-bugs
On Mon, Nov 25, 2013 at 08:37:20PM +0100, Kevin Price wrote:
Hi!
Thanks a lot for fixing this issue! Is there a chance that the still
vulnerable wheezy-backports will soon be either patched or updated?
(I know, security does not include bpo.)
patch: http://nginx.org/download/patch.2013.space.tx
Package: ruby1.9.1
Severity: grave
Tags: security
Hi,
The follow vulnerability was published for ruby:
CVE-2013-4164: Heap Overflow in Floating Point Parsing
https://www.ruby-lang.org/en/news/2013/11/22/heap-overflow-in-floating-point-parsing-cve-2013-4164/
--
To UNSUBSCRIBE, email to debian-
26 matches
Mail list logo