issue via spu.
Cheers
Nico
--
Nico Golde - XMPP: n...@jabber.ccc.de - GPG: 0xA0A0
pgpZ0_6m3mFmz.pgp
Description: PGP signature
Hi,
* Julien Cristau jcris...@debian.org [2012-12-28 18:12]:
Control: tags -1 moreinfo
On Mon, Dec 17, 2012 at 13:16:13 +0100, Nico Golde wrote:
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: freeze-exception
Hi,
please
Hi,
* Salvatore Bonaccorso car...@debian.org [2012-12-28 19:19]:
On Fri, Dec 28, 2012 at 06:46:40PM +0100, Nico Golde wrote:
Hi,
* Julien Cristau jcris...@debian.org [2012-12-28 18:12]:
Control: tags -1 moreinfo
On Mon, Dec 17, 2012 at 13:16:13 +0100, Nico Golde wrote
that did not work as intended (#671294).
unblock: fetchmail/6.3.22-2
Kind regards
Nico
--
Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0
For security reasons, all text in this mail is double-rot13 encrypted.
pgpBrbnU2nvCk.pgp
Description: PGP signature
regards
Nico
--
Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0
For security reasons, all text in this mail is double-rot13 encrypted.
pgpbMAXzzPHoa.pgp
Description: PGP signature
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: freeze-exception
Hi,
please unblock freeradius. The version in unstable contains an isolated fix for
CVE-2012-3547.
unblock: freeradius/2.1.12+dfsg-1.1
Kind regards
Nico
--
Nico Golde - http
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: freeze-exception
Hi,
please unblock bind9. The version in unstable contains an isolated fix for
CVE-2012-3817.
unblock: bind9/1:9.8.1.dfsg.P1-4.2
Kind regards
Nico
--
Nico Golde - http
--
Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0
For security reasons, all text in this mail is double-rot13 encrypted.
pgp5ElQ95kL1R.pgp
Description: PGP signature
/3.2.12-1
Kind regards
Nico
--
Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0
For security reasons, all text in this mail is double-rot13 encrypted.
pgpW3gLNRNUaN.pgp
Description: PGP signature
to be honest,
especially due to the integer arithmetics involved in several allocations.
I don't think there is an objection from the security team in general to
include this codec.
Cheers
Nico
--
Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0
For security reasons, all text
is usually used, I
think it is fair to assume that most users are already root anyway. This has
very little priority for us currently.
Cheers
Nico
--
Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0
For security reasons, all text in this mail is double-rot13 encrypted
generally not involved in such discussions until after
the security team have decided they don't want to issue a DSA for a
particular issue and someone raises it with us.
We will not issue a DSA for this vulnerability. Please go ahead and fix this
through spu.
Kind regards
Nico
--
Nico Golde
* Fix python module path for fetchmailconf (Closes: #603861).
-- Nico Golde n...@debian.org Wed, 01 Dec 2010 23:20:37 +0100
debdiff attached.
Cheers
Nico
--
Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0
For security reasons, all text in this mail is double-rot13
and
binary blobs stripped:
http://people.debian.org/~nion/fetchmail_6.3.17-4_6.3.18-1_stripped.diff
Kind regards
Nico
--
Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0
For security reasons, all text in this mail is double-rot13 encrypted.
pgpXZyRmhL4Fn.pgp
Description: PGP
Hi,
* Nico Golde debian-release...@ngolde.de [2010-10-12 00:43]:
[...]
A full debdiff of what I plan to upload is available at:
http://people.debian.org/~nion/fetchmail_6.3.17-4_6.3.18-1.diff
96 files changed, 18618 insertions(+), 20580 deletions(-)
This is quite a lot even though almost all
think, I plan to upload this as soon as possible.
Kind regards
Nico
--
Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0
For security reasons, all text in this mail is double-rot13 encrypted.
pgpOqK8LMOsXy.pgp
Description: PGP signature
.
Cheers
Nico
--
Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0
For security reasons, all text in this mail is double-rot13 encrypted.
pgpuxw79DVJ1s.pgp
Description: PGP signature
know version numbers can be
problematic and therefore are important but in this case I don't really see a
problem apart from nitpicking and I think the time rebuilding the package with
a new version number can be better spent, e.g. with fixing RC bugs.
Cheers
Nico
--
Nico Golde - http
-u to fix this. Please let me know if I'm allowed to upload this.
debdiff attached.
Cheers
Nico
--
Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0
For security reasons, all text in this mail is double-rot13 encrypted.
diff -u git-core-1.5.6.5/debian/changelog git-core
the testing-security team has an embargoed queue as well, so next time it
should also work to upload a fixed version prior to disclosure if the
migration is a common show stopper for this package.
Cheers
Nico
--
Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0
For security
Hi,
* Nico Golde debian-release...@ngolde.de [2009-08-31 22:09]:
I'd like to upload an update for fetchmail for both
oldstable and stable. The oldstable update fixes to minor
security issues which are unfixed in etch and the stable
update fixes some annoyances with the init script (mostly
Hi,
* Adam D. Barratt a...@adam-barratt.org.uk [2009-10-29 12:39]:
Nico Golde wrote, Thu, 29 Oct 2009 11:37:02 +
* Nico Golde debian-release...@ngolde.de [2009-08-31 22:09]:
I'd like to upload an update for fetchmail for both
oldstable and stable.
This upload was ACKed quite some time
Hi,
* Nico Golde debian-release...@ngolde.de [2009-08-31 22:09]:
I'd like to upload an update for fetchmail for both
oldstable and stable. The oldstable update fixes to minor
security issues which are unfixed in etch and the stable
update fixes some annoyances with the init script (mostly
enabled via /etc/default/fetchmail).
debdiffs attached, please let me know if I can upload this.
Cheers
Nico
--
Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0
For security reasons, all text in this mail is double-rot13 encrypted.
diff -u fetchmail-6.3.6/debian
or by the updated advisory at
http://www.squid-cache.org/Advisories/SQUID-2009_2.txt?
Cause this is not about a regression but about a similar
attack vector via a different path and in this case I think
the update should get a DSA.
Cheers
Nico
--
Nico Golde - http://www.ngolde.de - n
Hi,
* Nico Golde debian-release...@ngolde.de [2009-08-09 15:17]:
* Philipp Kern pk...@debian.org [2009-08-09 14:46]:
On Sun, Aug 09, 2009 at 01:16:31AM +0200, Luigi Gangitano wrote:
Please find the attached patch against current sources.
Can you please provide a debdiff instead? TIA
.
Maybe debian-project.
Cheers
Nico
--
Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0
For security reasons, all text in this mail is double-rot13 encrypted.
pgpXI6j7hvZgT.pgp
Description: PGP signature
test this though.
Cheers
Nico
--
Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0
For security reasons, all text in this mail is double-rot13 encrypted.
pgppXwSYqfKHP.pgp
Description: PGP signature
Hi,
* Mike Massonnet mmasson...@gmail.com [2009-07-22 16:36]:
2009/7/22 Nico Golde debian-release...@ngolde.de:
I'd vote for removing it completely with my security team
hat on. Regarding just this bug it should work to fix this
with:
screenshot_cmd scrot $(mktemp -d /tmp
Hi,
* Laurent Fousse laur...@komite.net [2009-05-09 16:34]:
* Nico Golde [Sun, Apr 26, 2009 at 06:30:39PM +0200]:
the following CVE (Common Vulnerabilities Exposures) id was
published for mpfr some time ago.
CVE-2009-0757[0]:
| Multiple buffer overflows in GNU MPFR 2.4.0 allow context
Hi,
can you please unblock freetype as it fixes various integer
overflow?
Cheers
Nico
--
Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.
pgpjAAsLmB5tg.pgp
Description: PGP signature
at the changelog it looks indeed like it would be a
good idea to ship 1.38. Would that be a problem for the
release team?
Cheers
Nico
--
Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.
pgp3K8uTsOA55
-security. thanks!
It was rejected:
php5_5.2.6.dfsg.1-1+lenny2_amd64.changes
REJECT
Rejected: php5_5.2.6.dfsg.1-1+lenny2.dsc refers to
php5_5.2.6.dfsg.1.orig.tar.gz, but I can't find it in the queue or in the pool.
Rejecting.
Please build with -sa.
Cheers
Nico
--
Nico Golde - http
, virus removal and some other
cases.
I currently don't Know when I will have the time to do this.
I have attached the diff against 4.68.8 debian package.
I'm afraid this is too late, mailscanner has already been
removed from lenny.
Cheers
Nico
--
Nico Golde - http://www.ngolde.de - n
homepage.
Cheers
Nico
--
Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.
pgp1fs8abgtZc.pgp
Description: PGP signature
Hi,
* Vincent Bernat ber...@debian.org [2008-12-24 22:49]:
Due to CVE-2008-5620, a new upload of roundcube is currently sitting in
unstable. Here is the changelog:
roundcube (0.1.1-10) unstable; urgency=high
already unblocked by luk.
Cheers
Nico
--
Nico Golde - http://www.ngolde.de - n
.
python2.4-doc still needs an unblock.
Cheers
Nico
--
Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.
pgp9Iir9BMDwK.pgp
Description: PGP signature
hardly any movement.
As we are not even in sync with the upstream versions I
doubt we can properly support twiki with security fixes
during the lenny lifecycle.
[0] http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=508257
[1] http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=508256
--
Nico Golde
Hi,
* Dominic Hargreaves d...@earth.li [2008-12-21 18:20]:
On Sun, Dec 21, 2008 at 02:14:45PM +0100, Nico Golde wrote:
please remove the twiki package from testing. twiki is a
regular candidate for security issues that pop up.
Currently it has two security issues unfixed (one[0] enables
Hi,
* Thijs Kinkhorst th...@debian.org [2008-12-12 12:30]:
Please unblock the following for fixing security issues:
awstats/6.7.dfsg-5.1
already unblocked by Luk.
Cheers
Nico
--
Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0x73647CFF
For security reasons, all text
Hi,
* Adam D. Barratt [EMAIL PROTECTED] [2008-12-08 11:03]:
Nico Golde wrote, Monday, December 08, 2008 8:36 AM:
* Adam D. Barratt [EMAIL PROTECTED] [2008-12-08 09:09]:
On Mon, 2008-12-08 at 01:31 +0100, Cyril Brulebois wrote:
[...]
Since the filename is predictable, I guess debsign
Hi,
the following packages fix security issues in unstable that
should migrate to testing:
- wordpress
- tkman
- flamethrower
Please unblock.
Thanks!
Nico
--
Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13
Hi,
* Hilmar Preusse [EMAIL PROTECTED] [2008-12-01 15:16]:
On 30.11.08 Nico Golde ([EMAIL PROTECTED]) wrote:
the following CVE (Common Vulnerabilities Exposures) id was
published for texlive-bin some time ago.
CVE-2007-5935[0]:
This CVE number is/was already in the changelog
Hi,
* Hilmar Preusse [EMAIL PROTECTED] [2008-12-01 18:17]:
On 01.12.08 Nico Golde ([EMAIL PROTECTED]) wrote:
[...]
http://packages.debian.org/changelogs/pool/main/t/texlive-bin/texlive-bin_2005.dfsg.2-12/changelog
Can't see anything in the stable version related to this CVE
id.
I
Hi,
the following packages fix security issues in unstable,
please unblock:
flamethrower
p3nfs
quassel
Thanks!
Nico
--
Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.
pgpsXErxSt189.pgp
Description
Hi,
Samba contains a security issue in testing which is fixed in
2:3.2.5-1. This is a security-only upstream release and some
other minor changes.
Release team, can you please unblock this one?
Cheers
Nico
--
Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
For security
Hi,
* Nico Golde [EMAIL PROTECTED] [2008-11-21 13:02]:
please unblock the following packages to enter lenny, they
fix security issues:
- wordpress
- movabletype-opensource
- libxml2
ping?
--
Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
For security reasons, all
Hi,
* Patryk Cisek [EMAIL PROTECTED] [2008-11-17 14:24]:
Can you please unblock kadu-0.6.0.2-3? This upload contains a fix for
CVE-2008-4776 (#504429, #504430)
already unblocked by luk.
Cheers
Nico
--
Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
For security
a version that what is in t-p-u. (Though britney
would be happy to migrate it, I think, because the source in t-p-u is
bigger than the source in testing.)
Good catch, I didn't see this. Is there any other solution apart from
uploading a new version with +lenny1?
Cheers
Nico
--
Nico Golde - http
Hi,
please unblock fetchmail. This would fix #492745 for lenny.
The debdiff is minimal.
Cheers
Nico
--
Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.
pgpLt9LbVhFiZ.pgp
Description: PGP signature
?
On its way.
Cheers
Nico
--
Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.
pgptUGq7Mn54N.pgp
Description: PGP signature
Hi,
* Nico Golde [EMAIL PROTECTED] [2008-10-07 14:50]:
Hi Manoj,
* Manoj Srivastava [EMAIL PROTECTED] [2008-10-07 13:07]:
On Sat, Oct 04 2008, Nico Golde wrote:
* Manoj Srivastava [EMAIL PROTECTED] [2008-10-04 16:39]:
On the other hand, back-porting the fix will probably
Hi Chris,
* Chris Lamb [EMAIL PROTECTED] [2008-10-14 13:01]:
Please unblock wims 3.62-13.1. The associated changelog entry is:
This was already unblocked by Luk.
Cheers
Nico
--
Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
For security reasons, all text in this mail
uploaded to
the testing-security repository.
Cheers
Nico
--
Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.
pgpI4DJUbdKZk.pgp
Description: PGP signature
Hi Manoj,
* Manoj Srivastava [EMAIL PROTECTED] [2008-10-07 13:07]:
On Sat, Oct 04 2008, Nico Golde wrote:
* Manoj Srivastava [EMAIL PROTECTED] [2008-10-04 16:39]:
On the other hand, back-porting the fix will probably be pretty
easy, though still a chore. Since
at any point in time. What's the
current deal?
Not that I know, I don't think there is a current status
page specific to NMUs. Everything available should be on
http://release.debian.org/ I think.
Cheers
Nico
--
Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
For security
Hi Manoj,
* Manoj Srivastava [EMAIL PROTECTED] [2008-10-04 16:39]:
On Sat, Oct 04 2008, Nico Golde wrote:
[...]
This is an automatically generated mail, in case you are already
working on an upgrade this is of course pointless.
Umm. The fixed package is already in testing
Hi Steve,
* Steve M. Robbins [EMAIL PROTECTED] [2008-10-03 19:52]:
On Thu, Oct 02, 2008 at 01:43:45PM +0200, Nico Golde wrote:
an insecure temporary file creation was reported to the mgt some time ago.
This is Debian bug #496434.
Unfortunately the vulnerability is not important enough
Hi Thomas,
* Thomas Schmidt [EMAIL PROTECTED] [2008-10-02 14:23]:
Am Donnerstag, den 02.10.2008, 13:45 +0200 schrieb Nico Golde:
an insecure temporary file creation was reported to the vdr some time ago.
This is Debian bug #496421.
Unfortunately the vulnerability is not important enough
Hi,
* Arnaud Cornet [EMAIL PROTECTED] [2008-09-05 01:51]:
Make that 0.4.dfsg-3 that has a cleaner patch.
Looks ok now, please unblock.
Cheers
Nico
--
Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted
.
This is incomplete, you also fix a bind problem looking at
the changes in server/socket.c which is not related to the
security fix.
Kind regards
Nico
--
Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted
enter testing.
As this doesn't seem to get fixed in time for the lenny
release, are you going to sync those packages before the
release then?
Kind regards
Nico
--
Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13
to upload a DTSA and poke Neil to sync it then.
Cheers
Nico
--
Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.
pgpCATLoqU6Px.pgp
Description: PGP signature
from signed to unsigned types is not preventing you from
getting an integer overflow.
Kind regards
Nico
--
Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.
pgpJbRQJ9cPHY.pgp
Description: PGP signature
. There is currently a
DTSA in preparation that will be synced to
testing-proposed-updates afterwards to fix the four
outstanding CVE ids.
Kind regards
Nico
--
Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted
as in the pre37.
http://www.openwall.com/lists/oss-security/2008/07/28/5
contains an explanation of the actual issue if it helps for
the decision...
Cheers
Nico
--
Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted
: It would go to stable-proposed-updates,
and it would be version 0.5-16etch1. Is this ok?
Yes both correct.
BTW: Nico, the above URL does not currently work.
Thanks, already fixed in the script.
Cheers
Nico
--
Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
Hi Adeodato,
* Adeodato Simó [EMAIL PROTECTED] [2008-07-24 12:09]:
* Nico Golde [Wed, 23 Jul 2008 15:03:34 +0200]:
can someone please unblock xulrunner?
1.9.0.1-1 fixes CVE-2008-2785[0] which is a fairly important
security issue that allows arbitrary code execution by
overflowing a CSS
[1] http://www.mozilla.org/security/announce/2008/mfsa2008-34.html
[2] http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=491161#17
Cheers
Nico
--
Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted
build, but please unblock it so the freeze
won't delay it any further.
The testing security team (Nico and Steffen Cc'd) is working
on a separate lenny upload if needed.
Done, no need for an unblock anymore.
Kind regards
Nico
--
Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG
but either way it's fine..
Cheers
Nico
--
Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.
pgprsPf9qyuKO.pgp
Description: PGP signature
in such
cases.
Release team, can you insert an:
age-days 5 movabletype-opensource?
Kind regards
Nico
--
Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.
pgp2D5nxQlrLE.pgp
Description: PGP signature
changes.
The patch applied is attached. Please tell me if it is ok to upload it to
stable-proposed-updates.
Patch looks good to me. Release team?
Cheers
Nico
--
Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13
Hi,
can someone please bump and unblock openssh?
This would fix CVE-2008-2285 for testing which is about
ssh-vulnkey not being able to properly scan authorized_keys
which contain options.
Thanks
Nico
--
Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
For security
to prepare an update
cause there won't be a DSA for this issue. If he's MIA feel
free to prepare an update.
Cheers
Nico
--
Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.
pgpBpm84Pdms2.pgp
Description: PGP
--
Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.
pgpANxl2SeL5M.pgp
Description: PGP signature
Hi,
* Nico Golde [EMAIL PROTECTED] [2008-05-07 17:21]:
* Nico Golde [EMAIL PROTECTED] [2008-05-07 12:38]:
could you unblock cairo? webkit has a dep-wait on cairo
which is in freeze and the testing migration of webkit would
fix CVE-2008-1025.
Nevermind, saw the mail of Frans.
Ok, can I
to upload a
testing-security fix since the block can be removed now.
Kind regards
Nico
--
Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.
pgpVAJRbWvITP.pgp
Description: PGP signature
Hi,
could you unblock cairo? webkit has a dep-wait on cairo
which is in freeze and the testing migration of webkit would
fix CVE-2008-1025.
Kind regards
Nico
--
Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13
Hi Nico,
* Nico Golde [EMAIL PROTECTED] [2008-05-07 12:38]:
could you unblock cairo? webkit has a dep-wait on cairo
which is in freeze and the testing migration of webkit would
fix CVE-2008-1025.
Nevermind, saw the mail of Frans.
Cheers
Nico
--
Nico Golde - http://www.ngolde.de - [EMAIL
Hi,
could someone bump peercast 0.1218+svn20080104-1.1 in
needs-build on arm to let it migrate to testing?
This version fixes a security issue (CVE-2008-2040).
Kind regards
Nico
--
Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
For security reasons, all text
Hi,
please schedule binNMUs for obconf with a dep-wait on
openbox-dev 3.4.7.2-1. openbox-dev and thus libobparser and
libobrender and an ABI change and obconf needs to be rebuild
against the new version in order to be installable.
Kind regards
Nico
--
Nico Golde - http://www.ngolde.de
Hi,
would a give-back solve:
http://buildd.debian.org/fetch.cgi?pkg=xine-libarch=alphaver=1.1.11-1stamp=1206554579file=logas=raw
If yes could you do that please?
Kind regards
Nico
--
Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
For security reasons, all text
-security yesterday because of
this, waiting for an answer.
Kind regards
Nico
--
Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.
pgphFcgnTZeJ2.pgp
Description: PGP signature
Hi,
* Rene Mayorga [EMAIL PROTECTED] [2008-02-05 07:37]:
New upstream version of libmrss broked some rdepends including rsstail
please rebuild it in all arches to solve this issue.
Please also rebuild newsbeuter.
Kind regards
Nico
--
Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG
Hi Nicolas,
* Nicolas Boullis [EMAIL PROTECTED] [2008-01-22 00:40]:
On Sun, Jan 20, 2008 at 02:31:39PM +0100, Nico Golde wrote:
[...]
Unfortunately the vulnerability described above is not important enough
to get it fixed via regular security update in Debian stable. It does
not warrant
Hi Moritz,
* Moritz Muehlenhoff [EMAIL PROTECTED] [2008-01-18 10:08]:
Nico Golde wrote:
currently there is one medium severe security issue in the=20
dcc software (CVE-2007-1047[0]) which is currently unfixed=20
in all Debian distributions.
I had a private conversation[1
does have a negative impact on
the DCC network itself, what do you think about removing
this package from stable?
Kind regards
Nico
[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1047
[1] https://rt.debian.org/Ticket/Display.html?id=423
--
Nico Golde - http://www.ngolde.de - [EMAIL
Hi Alberto,
* Alberto Gonzalez Iniesta [EMAIL PROTECTED] [2008-01-01 19:00]:
On Sun, Dec 30, 2007 at 04:22:52PM +0100, Nico Golde wrote:
[...]
I prepared packages for both Etch and Sarge (stable and oldstable) and
I'm ready to upload them. Please, SRMs, let me know if it's ok to do so.
Sorry
tarball from the adobe
site and the name did not change after the security update.
Kind regards
Nico
--
Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.
pgpnhEqqw7oP0.pgp
Description: PGP signature
architectures, so that it can migrate first (it's a security upload).
Same for xpdf and koffice.
Kind regards
Nico
--
Nico Golde - http://ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.
pgpN3LYV9WjrA.pgp
Description: PGP signature
Hi,
* Adam D. Barratt [EMAIL PROTECTED] [2007-09-26 15:39]:
Lucas Nussbaum wrote, Wednesday, September 26, 2007 2:01 PM
On 26/09/07 at 12:53 +0200, Nico Golde wrote:
[...]
=== libacpi:
= This package has not been in testing for 79 days.
= This package has not been able to migrate from
Kind regards
Nico
--
Nico Golde - http://ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.
pgpFS12ni4AtD.pgp
Description: PGP signature
Hi,
I hope I understood Andreas' mail in the right way.
Please allow fetchmail 6.3.8-8 to enter testing. It is
currently blocked because of the sparc buildd and is fixing
a security issue (CVE-2007-4565).
Kind regards
Nico
--
Nico Golde - http://ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
Hi,
can you please schedule a give back for obconf on all archs?
I again forgot to wait with the obconf upload until the
openbox package is threw NEW and therefore the builds
failed.
Thanks!
Nico
--
Nico Golde - http://ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
For security reasons, all
on debian vote system.
[...]
To solve which problem?
Kind regards
Nico
--
Nico Golde - http://ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.
pgpoLwWbLycht.pgp
Description: PGP signature
Hi,
* Julien Cristau [EMAIL PROTECTED] [2007-07-26 15:41]:
On Thu, Jul 26, 2007 at 15:37:36 +0200, Nico Golde wrote:
* Nico Golde [EMAIL PROTECTED] [2007-07-22 13:16]:
can you please schedule a give back for obconf on all archs?
It depended on openbox-dev on build time which was in NEW
Hi,
* Nico Golde [EMAIL PROTECTED] [2007-07-22 13:16]:
can you please schedule a give back for obconf on all archs?
It depended on openbox-dev on build time which was in NEW.
ping? I saw that obconf was build for sparc yesterday but
not on the other archs that's why I am not sure
Hi,
can you please schedule a give back for obconf on all archs?
It depended on openbox-dev on build time which was in NEW.
Thanks
Nico
--
Nico Golde - http://ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted
Hi,
Can you please schedule a give-back for the newsbeuter
package on all archs?
The buildds couldn't build it before because newsbeuter
depends on libmrss which had a broken libcurl dependency.
Kind regards
Nico
--
Nico Golde - http://ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
1 - 100 of 110 matches
Mail list logo