Re: draft of announcement for sarge r2

2006-04-14 Thread Filipus Klutiero
Andreas Barth a écrit : DSA 1000 libapreq2-perl If I understand correctly, only 1000-1 will go in stable, so it would be a little confusing to just say "DSA 1000". As a sidenote, the libapreq2-perl DSA on http://release.debian.org/stable/3.1/3.1r2/ is referred to as "D

Re: Please accept dmidecode into testing

2006-04-14 Thread Steve Langasek
On Fri, Apr 14, 2006 at 11:14:00AM +0200, Petter Reinholdtsen wrote: > As usual, the new version of dmidecode is blocked from entering > testing because it produces an udeb. Please allow version 2.8-2 to > enter testing. The only change from the testing version is adding > kfreebsd-amd64 to the

Please accept dmidecode into testing

2006-04-14 Thread Petter Reinholdtsen
As usual, the new version of dmidecode is blocked from entering testing because it produces an udeb. Please allow version 2.8-2 to enter testing. The only change from the testing version is adding kfreebsd-amd64 to the achitecture list. Friendly, -- Petter Reinholdtsen -- To UNSUBSCRIBE, em

Re: draft of announcement for sarge r2

2006-04-14 Thread Martin Zobel-Helas
Hi, On Friday, 14 Apr 2006, you wrote: > * Andreas Barth ([EMAIL PROTECTED]) [060414 17:14]: > > * Andreas Barth ([EMAIL PROTECTED]) [060412 11:07]: > > > as we're now directly moving towards sarge r2, we drafted an > > > announcement. Please see the attachement for more details. We will > > > not

Re: draft of announcement for sarge r2

2006-04-14 Thread Andreas Barth
* Andreas Barth ([EMAIL PROTECTED]) [060414 17:14]: > * Andreas Barth ([EMAIL PROTECTED]) [060412 11:07]: > > as we're now directly moving towards sarge r2, we drafted an > > announcement. Please see the attachement for more details. We will > > notify you as soon as the mail can be sent out. > As

Re: draft of announcement for sarge r2

2006-04-14 Thread Andreas Barth
* Andreas Barth ([EMAIL PROTECTED]) [060412 11:07]: > as we're now directly moving towards sarge r2, we drafted an > announcement. Please see the attachement for more details. We will > notify you as soon as the mail can be sent out. As promised, here is an updated announcement draft. Cheers, And

Re: Bug#349653: xmame: exploitable buffer overflows [CVE-2006-0176]

2006-04-14 Thread Pierre Riteau
On Wed, Apr 12, 2006 at 05:59:45PM +0200, Moritz Muehlenhoff wrote: > > The Debian security FAQ says that non-free is not supported, and I > > understand why. But it also says that if it is fixable, an update can be > > made. There were (a few) non-free security updates in the past. > > > > I see