binary:libjnr-constants-java is NEW.
binary:libjnr-constants-java-doc is NEW.
source:jnr-constants is NEW.
Your package has been put into the NEW queue, which requires manual action
from the ftpteam to process. The upload was otherwise valid (it had a good
OpenPGP signature and file hashes are
jnr-constants_0.8.6-1_amd64.changes uploaded successfully to localhost
along with the files:
jnr-constants_0.8.6-1.dsc
jnr-constants_0.8.6.orig.tar.gz
jnr-constants_0.8.6-1.debian.tar.xz
libjnr-constants-java_0.8.6-1_all.deb
libjnr-constants-java-doc_0.8.6-1_all.deb
Greetings,
Package: src:jnr-netdb
Version: 1.0.3-3
Severity: wishlist
As title says and mostly a reminder for myself.
To be used with recent jruby releases.
-- System Information:
Debian Release: 7.8
APT prefers stable-updates
APT policy: (500, 'stable-updates'), (500, 'stable')
Architecture: amd64
Processing commands for cont...@bugs.debian.org:
block 773131 by 776082 771269 38
Bug #773131 [src:jruby] jruby: Update it to 1.7.17 or more recent release
773131 was not blocked by any bugs.
773131 was not blocking any bugs.
Added blocking bug(s) of 773131: 771269, 776082, and 38
block
Hi Ralf,
Could you post the configuration of your datasource please?
Emmanuel Bourg
__
This is the maintainer address of Debian's Java team
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/pkg-java-maintainers.
Please use
debian-j...@lists.debian.org for discussions and questions.
Package: wss4j
Severity: grave
Tags: security
Justification: user security hole
Hi,
please see
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2015-0226
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2015-0227
Cheers,
Moritz
__
This is the maintainer address of Debian's Java team
6 matches
Mail list logo