FYI: The status of the intellij-annotations source package
in Debian's testing distribution has changed.
Previous version: 20.0.0-1
Current version: 20.1.0-1
--
This email is automatically generated once a day. As the installation of
new packages into testing happens multiple times a day
FYI: The status of the commons-csv source package
in Debian's testing distribution has changed.
Previous version: 1.7-1
Current version: 1.8-1
--
This email is automatically generated once a day. As the installation of
new packages into testing happens multiple times a day you will
FYI: The status of the robocode source package
in Debian's testing distribution has changed.
Previous version: 1.9.3.9-1
Current version: 1.9.3.9-2
--
This email is automatically generated once a day. As the installation of
new packages into testing happens multiple times a day you will
Processing commands for cont...@bugs.debian.org:
> severity 970346 serious
Bug #970346 [src:undertow] undertow: should not be part of Debian 11
Severity set to 'serious' from 'normal'
> thanks
Stopping processing here.
Please contact me if you need assistance.
--
970346:
Source: undertow
Severity: normal
Tags: security
X-Debbugs-Cc: Debian Security Team
I believe we should remove undertow from testing again for the same
reasons as last time. Although the package is up-to-date no other
package in Debian (except syncany in experimental) is currently using
it.
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Mon, 14 Sep 2020 23:36:07 +0200
Source: undertow
Architecture: source
Version: 2.2.0-1
Distribution: unstable
Urgency: medium
Maintainer: Debian Java Maintainers
Changed-By: Markus Koschany
Changes:
undertow
undertow_2.2.0-1_source.changes uploaded successfully to localhost
along with the files:
undertow_2.2.0-1.dsc
undertow_2.2.0.orig.tar.gz
undertow_2.2.0-1.debian.tar.xz
undertow_2.2.0-1_amd64.buildinfo
Greetings,
Your Debian queue daemon (running on host usper.debian.org)
__
This
Your message dated Mon, 14 Sep 2020 23:40:16 +0200
with message-id
and subject line Re: CVE-2020-10719
has caused the Debian Bug report #969913,
regarding CVE-2020-10719
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your
Processing commands for cont...@bugs.debian.org:
> tags 970328 + upstream
Bug #970328 [src:resteasy] CVE-2020-10688
Added tag(s) upstream.
> thanks
Stopping processing here.
Please contact me if you need assistance.
--
970328: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=970328
Debian Bug
Source: resteasy
Severity: important
Tags: security
X-Debbugs-Cc: Debian Security Team
This was assigned CVE-2020-10688:
https://bugzilla.redhat.com/show_bug.cgi?id=1814974
https://github.com/quarkusio/quarkus/issues/7248
https://issues.redhat.com/browse/RESTEASY-2519
Cheers,
Moritz
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Mon, 14 Sep 2020 02:03:39 -0400
Source: jsonld-java
Architecture: source
Version: 0.13.1-1
Distribution: unstable
Urgency: medium
Maintainer: Debian Java Maintainers
Changed-By: Andrius Merkys
Changes:
jsonld-java
jsonld-java_0.13.1-1_source.changes uploaded successfully to localhost
along with the files:
jsonld-java_0.13.1-1.dsc
jsonld-java_0.13.1.orig.tar.xz
jsonld-java_0.13.1-1.debian.tar.xz
jsonld-java_0.13.1-1_source.buildinfo
Greetings,
Your Debian queue daemon (running on host
12 matches
Mail list logo