[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#785683: RFS: mod-gnutls/0.6-1.4 [NMU]



Thomas Klute <thomas2.klute@uni-dortmund.de> writes:

> Package: sponsorship-requests
> Severity: normal
>
> Dear mentors,
>
> I'm looking for a sponsor for a bugfix update of mod-gnutls that would
> close bug #775909 (segfaults with reverse proxy configuration).
>
> I've uploaded the package to Debian Mentors a few weeks ago. The
> maintainer has not responded (like for the security updates to
> 0.5.10-1.1+deb7u1 and 0.6-1.3, which went through the security team, see
> DSA-3177 [1]), so now I'm looking for a sponsor for an NMU.

Hi.  I'm using mod-gnutls on some servers, and would like to help.  I
have never sponsored an upload before, but let me read up on what to do
and I'll try to see if it can be done.

/Simon

> * Package name    : mod-gnutls
>   Version         : 0.6-1.4
>   Upstream Author : Daniel Kahn Gillmor <dkg@fifthhorseman.net>
> * URL             : https://mod.gnutls.org/
> * License         : Apache-2.0
>   Section         : httpd
>
> It builds those binary packages:
>
>   libapache2-mod-gnutls - Apache module for SSL and TLS encryption with
> GnuTLS
>
> To access further information about this package, please visit the
> following URL:
>
> http://mentors.debian.net/package/mod-gnutls
>
> Alternatively, one can download the package with dget using this command:
>
> dget -x
> http://mentors.debian.net/debian/pool/main/m/mod-gnutls/mod-gnutls_0.6-1.4.dsc
>
> More information about hello can be obtained from http://www.example.com.
>
> Changes since the last upload:
>
> * Fix segfaults with reverse proxy configuration (Closes: #775909)
> * Upgrade Standards-Version to 3.9.6, change DocumentRoot in
>   default-tls.conf to /var/www/html accordingly.
>
> Regards,
> Thomas Klute
>
>
> [1] https://www.debian.org/security/2015/dsa-3177

Attachment: signature.asc
Description: PGP signature


Reply to: