Bug#701476: unblock: nagios-nrpe/2.13-2

2013-02-24 Thread Thijs Kinkhorst
On Sat, February 23, 2013 17:55, Niels Thykier wrote: Control: reopen -1 On 2013-02-23 17:45, Alexander Wirt wrote: Thijs Kinkhorst schrieb am Saturday, den 23. February 2013: Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock

Re: Fixing lucky 13 CVE-2013-0169 in gnutls28

2013-02-24 Thread Julien Cristau
On Sat, Feb 23, 2013 at 19:33:14 +0100, Andreas Metzler wrote: Judging from the fact that 2.12.20 tarball does not include largefile.m4 I guess the configure option is not necessary in 2.12.20. - If you prefer to I can try without. So you're saying gnutls26 currently is built for 32bit

Bug#701476: unblock: nagios-nrpe/2.13-2

2013-02-24 Thread Niels Thykier
On 2013-02-24 10:41, Thijs Kinkhorst wrote: On Sat, February 23, 2013 17:55, Niels Thykier wrote: Control: reopen -1 On 2013-02-23 17:45, Alexander Wirt wrote: [...] Hold on please :). We agreed on IRC earlier that morning to wait for the coming security update. Thanks Alex Alright,

Bug#700806: unblock: openconnect/3.20-3 (Fixes CVE-2012-6128)

2013-02-24 Thread Thijs Kinkhorst
As mentioned in #700805, this line introduces a memory leak if realloc fails for any reason. Upstream has committed a fix for the issue but also concluded that this causing real world trouble is not very probable. So either the patch needs to be applied to openconnect or the package needs to

Bug#700806: marked as done (unblock: openconnect/3.20-3 (Fixes CVE-2012-6128))

2013-02-24 Thread Debian Bug Tracking System
Your message dated Sun, 24 Feb 2013 11:31:03 +0100 with message-id 5129ebe7.8040...@thykier.net and subject line Re: Bug#700806: unblock: openconnect/3.20-3 (Fixes CVE-2012-6128) has caused the Debian Bug report #700806, regarding unblock: openconnect/3.20-3 (Fixes CVE-2012-6128) to be marked as

Re: Fixing lucky 13 CVE-2013-0169 in gnutls28

2013-02-24 Thread Andreas Metzler
On 2013-02-24 Julien Cristau jcris...@debian.org wrote: On Sat, Feb 23, 2013 at 19:33:14 +0100, Andreas Metzler wrote: Judging from the fact that 2.12.20 tarball does not include largefile.m4 I guess the configure option is not necessary in 2.12.20. - If you prefer to I can try without. So

Bug#700194: unblock: python3-defaults/3.2.3-6

2013-02-24 Thread Julien Cristau
On Thu, Feb 21, 2013 at 15:09:10 +0100, Piotr Ozarowski wrote: [Julien Cristau, 2013-02-21] So there's bits in debpython/depends.py I don't understand. Why is maxv sometimes inclusive and sometimes exclusive? I assume you're talking about minv==maxv case, that's a special case and I

Bug#701538: pre-approval of acpid/1:2.0.16-1+deb7u1

2013-02-24 Thread Philipp Kern
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock Hi, the attached patch fixes an issue with acpid running under systemd. acpid ships its own unit files for systemd, instead of using the init script. The one that should've replaced the

unblock-udeb for xorg-server

2013-02-24 Thread Adam D. Barratt
Hi, I unblocked xorg-server for a kSBD fix to make the recent qt4-x11 security fix work on that platform. Could I have a udeb ack to go with it, please? Regards, Adam -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact

Bug#699591: exim4 upload to stable (dovecot stability / and optionally spf quoting)

2013-02-24 Thread Andreas Metzler
On 2013-02-17 Adam D. Barratt a...@adam-barratt.org.uk wrote: Apologies for the delay in getting back to you about this. no worries. On Sat, 2013-02-02 at 09:34 +0100, Andreas Metzler wrote: | Dovecot: robustness; better msg on missing mech. [...] This fixes an exim segfault when accessing

udeb unblock for libgcrypt11

2013-02-24 Thread Adam D. Barratt
Hi, Sorry, me again. libgcrypt11 1.5.0-4 contains a few small patches fixing RC bugs affecting other packages. I'm happy unblocking it, but can we add it to the unblock-udeb request list please? (Would a single mail with several requests in be more helpful?) Thanks, Adam -- To UNSUBSCRIBE,

Re: udeb unblock for libgcrypt11

2013-02-24 Thread Andreas Metzler
On 2013-02-24 Adam D. Barratt a...@adam-barratt.org.uk wrote: Sorry, me again. libgcrypt11 1.5.0-4 contains a few small patches fixing RC bugs affecting other packages. I'm happy unblocking it, but can we add it to the unblock-udeb request list please? (Would a single mail with several

Re: Allow pyrad 1.2-1+deb7u1 into wheezy

2013-02-24 Thread Jonathan Wiltshire
On Sat, Feb 23, 2013 at 01:33:58PM +, Adam D. Barratt wrote: On Sun, 2013-02-17 at 13:59 +, Jonathan Wiltshire wrote: On Sun, Feb 17, 2013 at 08:06:36AM +0100, Salvatore Bonaccorso wrote: Assuming there will be also either a DSA or a pu for pyrad, how should that be versioned?

Bug#701584: unblock: pygpgme/0.2-3

2013-02-24 Thread Jonathan Wiltshire
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock Please unblock pygpgme to fix an upgrade bug with symlinked /usr/share/doc directories in python-gpgme-dbg. unblock pygpgme/0.2-3 Thanks, -- Jonathan Wiltshire

Bug#701584: marked as done (unblock: pygpgme/0.2-3)

2013-02-24 Thread Debian Bug Tracking System
Your message dated Sun, 24 Feb 2013 19:27:17 + with message-id 1361734037.20752.45.ca...@jacala.jungle.funky-badger.org and subject line Re: Bug#701584: unblock: pygpgme/0.2-3 has caused the Debian Bug report #701584, regarding unblock: pygpgme/0.2-3 to be marked as done. This means that you

Bug#700798: unblock: live-tools/3.0.18-1

2013-02-24 Thread Adam D. Barratt
Control: tags -1 + moreinfo On Sun, 2013-02-17 at 12:17 -0400, Ben Armstrong wrote: The version in wheezy had some issues (see #685752 which this request supercedes and I will now close) with upgradability that, while not typical use cases (live-tools would normally only be installed on a live

Processed: Re: Bug#700798: unblock: live-tools/3.0.18-1

2013-02-24 Thread Debian Bug Tracking System
Processing control commands: tags -1 + moreinfo Bug #700798 [release.debian.org] unblock: live-tools/3.0.18-1 Added tag(s) moreinfo. -- 700798: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=700798 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE,

Re: Allow pyrad 1.2-1+deb7u1 into wheezy

2013-02-24 Thread Salvatore Bonaccorso
Hi On Sun, Feb 24, 2013 at 06:09:45PM +, Jonathan Wiltshire wrote: On Sat, Feb 23, 2013 at 01:33:58PM +, Adam D. Barratt wrote: On Sun, 2013-02-17 at 13:59 +, Jonathan Wiltshire wrote: On Sun, Feb 17, 2013 at 08:06:36AM +0100, Salvatore Bonaccorso wrote: Assuming there will

Re: Uploading linux (3.2.39-1)

2013-02-24 Thread Julien Cristau
On Sun, Feb 17, 2013 at 23:59:43 +, Ben Hutchings wrote: Would it be OK to upload a package based on that shortly after? Are there any other urgent fixes? No objection here, feel free to upload. And sorry for the delay. Cheers, Julien signature.asc Description: Digital signature

Bug#701600: unblock: mercurial/2.2.2-3

2013-02-24 Thread Javi Merino
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock Please unblock package mercurial, it fixes #701168, an important bug in wheezy[0] [0] http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=701168 unblock mercurial/2.2.2-3 debdiff against

Bug#700441: marked as done (unblock openssl/1.0.1e-1)

2013-02-24 Thread Debian Bug Tracking System
Your message dated Sun, 24 Feb 2013 23:10:15 + with message-id 1361747415.20752.67.ca...@jacala.jungle.funky-badger.org and subject line Re: Bug#700441: unblock openssl/1.0.1e-1 has caused the Debian Bug report #700441, regarding unblock openssl/1.0.1e-1 to be marked as done. This means that

Bug#701600: marked as done (unblock: mercurial/2.2.2-3)

2013-02-24 Thread Debian Bug Tracking System
Your message dated Sun, 24 Feb 2013 23:12:46 + with message-id 20130224231246.gb7...@ernie.home.powdarrmonkey.net and subject line Re: Bug#701600: unblock: mercurial/2.2.2-3 has caused the Debian Bug report #701600, regarding unblock: mercurial/2.2.2-3 to be marked as done. This means that

Uploading new s3ql to testing-proposed-updates

2013-02-24 Thread Nikolaus Rath
Hi, I'd like to upload a new version of S3QL to testing-proposed-updates to fix bug #701350. Unstable already contains a newer upstream release (1.12), so I cannot upload there. Essentially, a missing fflush() call when accessing a file using both a FILE* stream and a file descriptor causes data

Re: Uploading new s3ql to testing-proposed-updates

2013-02-24 Thread Nikolaus Rath
On 02/24/2013 06:41 PM, Nikolaus Rath wrote: Hi, I'd like to upload a new version of S3QL to testing-proposed-updates to fix bug #701350. Unstable already contains a newer upstream release (1.12), so I cannot upload there. Essentially, a missing fflush() call when accessing a file using

Re: Uploading linux (3.2.39-1)

2013-02-24 Thread Ben Hutchings
On Sun, 2013-02-24 at 23:14 +0100, Julien Cristau wrote: On Sun, Feb 17, 2013 at 23:59:43 +, Ben Hutchings wrote: Would it be OK to upload a package based on that shortly after? Are there any other urgent fixes? No objection here, feel free to upload. And sorry for the delay.

Re: Uploading new s3ql to testing-proposed-updates

2013-02-24 Thread Laszlo Boszormenyi (GCS)
Hi Nikolaus, On Sun, 2013-02-24 at 18:41 -0800, Nikolaus Rath wrote: I'd like to upload a new version of S3QL to testing-proposed-updates to fix bug #701350. Unstable already contains a newer upstream release (1.12), so I cannot upload there. [...] The necessary patch is one line (adding

Re: Bug#700669: Allow pyrad 1.2-1+deb7u1 into wheezy

2013-02-24 Thread Jeremy Lainé
On 02/23/2013 02:33 PM, Adam D. Barratt wrote: On Sun, 2013-02-17 at 13:59 +, Jonathan Wiltshire wrote: Once 1.2-1+deb7u1 reaches wheezy (next 24 hours) we will be able to use 1.2-1+deb6u1 for any hypothetical DSA to slot in between squeeze and wheezy. Well, there's a 1.2.1+deb6u1 in

Bug#701608: pu: package pyrad/1.2-1+deb6u1

2013-02-24 Thread Jeremy Laine
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: pu Recently the following security vulnerability in the pyrad package was brought to my attention by Salvatore Bonaccorso: https://security-tracker.debian.org/tracker/CVE-2013-0294 It is tracked