Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Wed, 12 Nov 2014 19:37:38 -0700
Source: tzdata
Binary: tzdata tzdata-java
Architecture: all source
Version: 2014j-1
Distribution: unstable
Urgency: high
Maintainer: GNU Libc Maintainers
Changed-By: Adam Conrad
Descripti
tzdata_2014j-1_multi.changes uploaded successfully to localhost
along with the files:
tzdata_2014j-1.dsc
tzdata_2014j.orig.tar.gz
tzdata_2014j-1.debian.tar.xz
tzdata_2014j-1_all.deb
tzdata-java_2014j-1_all.deb
Greetings,
Your Debian queue daemon (running on host franck.debian.or
Hi Aurelien,
Thanks for the help.
Actually I have to apply the patch on glibc2.3.6 version.
You have mentioned two patch links. Are both needed to be applied for this
vulnerability?
-Thanks and Regards,
Deepak Kumar
-Original Message-
From: Aurelien Jarno [mailto:aurel...@aurel32.ne
13.11.2014 00:03, Michael Tokarev пишет:
> 12.11.2014 22:45, Aurelien Jarno wrote:
>> On Wed, Nov 12, 2014 at 09:17:20PM +0400, Michael Tokarev wrote:
>>> Should I list them all in the build-deps? If yes, what's the complete list?
>
>> It should be libc6-dev[linux-any !alpha !ia64] | libc6.1-dev
On Thu, Nov 13, 2014 at 12:03:39AM +0300, Michael Tokarev wrote:
> 12.11.2014 22:45, Aurelien Jarno wrote:
> > On Wed, Nov 12, 2014 at 09:17:20PM +0400, Michael Tokarev wrote:
> >> Should I list them all in the build-deps? If yes, what's the complete
> >> list?
>
> > It should be libc6-dev[linux
Processing commands for cont...@bugs.debian.org:
> found 754813 2.19-0experimental0
Bug #754813 [libc6] libc6 version 2.19 breaks NSS loading for static binaries
Bug #757941 [libc6] libc6 version 2.19 breaks NSS loading for static binaries
Marked as found in versions eglibc/2.19-0experimental0.
Ma
Hi,
Michael Tokarev wrote:
> Since this is all alternatives, is it really necessary to list the [arch]
> names? I mean, just list of pkgs with versions should be enough I think,
> each arch will pick the right name, no?
I could be wrong, but I think within sbuild only the first of the
alternativ
12.11.2014 22:45, Aurelien Jarno wrote:
> On Wed, Nov 12, 2014 at 09:17:20PM +0400, Michael Tokarev wrote:
>> Should I list them all in the build-deps? If yes, what's the complete list?
> It should be libc6-dev[linux-any !alpha !ia64] | libc6.1-dev [alpha ia64] |
> libc0.1-dev (>> 2.19-12~) [kfr
On Wed, Nov 12, 2014 at 09:17:20PM +0400, Michael Tokarev wrote:
> 12.11.2014 21:05, Aurelien Jarno wrote:
> []
> >> And there's nothing I can do about this on busybox side -- except,
> >> again, adding a versioned build-dep.
> >
> > I'll schedule binNMUs for now, but it might be a good idea to ad
12.11.2014 21:05, Aurelien Jarno wrote:
[]
>> And there's nothing I can do about this on busybox side -- except,
>> again, adding a versioned build-dep.
>
> I'll schedule binNMUs for now, but it might be a good idea to add a
> versioned build-dep so that it doesn't happen again.
Please don't. I
BTW, the bug is _not_ fixed by -12 upload where I added a build-dep on libc-bin.
/mjt
--
To UNSUBSCRIBE, email to debian-glibc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/546396a3.1000...@msgid.tls.msk.
On Wed, Nov 12, 2014 at 10:53:51AM +0300, Michael Tokarev wrote:
> 12.11.2014 04:27, Diederik de Haas wrote:
> > Package: busybox-static
> > Version: 1:1.22.0-11
> > Severity: important
> >
> > This is basically the same error as with bug #757941, but it was
> > reassigned to glibc and fixed there
On Wed, Nov 12, 2014 at 09:35:37AM +, Deepak Kumar wrote:
> Hi All,
>
> Could anyone please help, with the vulnerability ID, CVE-2013-4357.
>
> Could you please help with the description of the vulnerability as in what is
> the applicability of the vulnerability, and The patch for the vulner
On Wed, Nov 12, 2014 at 03:14:55AM +0100, Julian Taylor wrote:
> It would be good to have this fixed for jessie.
> Correct handling of denormals which are controlled via this register is
> very important for the performance of e.g. audio applications.
If we have a patch I guess it can still be inc
Glibc Pakage :- 2.3.6.tar.bz2
From: Deepak Kumar
Sent: Wednesday, November 12, 2014 2:47 PM
To: Deepak Kumar; '742...@bugs.debian.org'; 'car...@systemhalted.org';
'mgilb...@debian.org'; 'sub...@bugs.debian.org'
Cc: Shobhit Shingla
Subject: RE: Re: Bug#742925: eglibc: CVE-2013-4357
Hi,
Could yo
Hi,
Could you please help here.
-Thanks and Regards,
Deepak Kumar
From: Deepak Kumar
Sent: Wednesday, November 05, 2014 11:41 AM
To: '742...@bugs.debian.org'; 'car...@systemhalted.org'; 'mgilb...@debian.org';
'sub...@bugs.debian.org'
Cc: Shobhit Shingla
Subject: Re: Bug#742925: eglibc: CVE-20
16 matches
Mail list logo