Your message dated Tue, 31 Mar 2015 21:15:10 +0200 with message-id <20150331211510.2b9a1b31@heffalump.sk2.org> and subject line Re: nmu: binutils-mingw-w64_5.1 has caused the Debian Bug report #775309, regarding nmu: binutils-mingw-w64_5.1 to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner@bugs.debian.org immediately.) -- 775309: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=775309 Debian Bug Tracking System Contact owner@bugs.debian.org with problems
--- Begin Message ---
- To: Debian Bug Tracking System <submit@bugs.debian.org>
- Subject: nmu: binutils-mingw-w64_5.1
- From: Stephen Kitt <skitt@debian.org>
- Date: Tue, 13 Jan 2015 23:01:30 +0100
- Message-id: <20150113220130.8629.6603.reportbug@heffalump.sk2.org>
Package: release.debian.org Severity: normal User: release.debian.org@packages.debian.org Usertags: binnmu Dear release team, My earlier binNMU in wheezy-security wasn't appropriate, but binutils-mingw-w64 still needs fixing in jessie and sid, and I'm wondering whether to do sourceful uploads or request binNMUs. If binNMUs are OK, there won't be any trouble with inappropriate versions of binutils-source ending up being used in jessie; otherwise I suppose I'll need to do a source upload to jessie-p-u (so it picks up binutils 2.24.90.20141023-1 from jessie) as well as sid (which will pick up binutils 2.25-3)... nmu binutils-mingw-w64_5.1 . ALL . -m "Rebuild for DSA-2013-2 (CVE-2014-8484, CVE-2014-8485, CVE-2014-8501, CVE-2014-8502, CVE-2014-8503, CVE-2014-8504, CVE-2014-8737, CVE-2014-8738)." nmu binutils-mingw-w64_5.1 . ALL . jessie-proposed-updates . -m "Rebuild for DSA-2013-2 (CVE-2014-8484, CVE-2014-8485, CVE-2014-8501, CVE-2014-8502, CVE-2014-8503, CVE-2014-8504, CVE-2014-8737, CVE-2014-8738)." Regards, Stephen -- System Information: Debian Release: 8.0 APT prefers testing APT policy: (500, 'testing'), (500, 'stable'), (200, 'unstable'), (1, 'experimental') Architecture: amd64 (x86_64) Foreign Architectures: i386 Kernel: Linux 3.16.0-4-amd64 (SMP w/8 CPU cores) Locale: LANG=en_GB.utf8, LC_CTYPE=en_GB.utf8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Init: sysvinit (via /sbin/init)
--- End Message ---
--- Begin Message ---
- To: 775309-done@bugs.debian.org
- Subject: Re: nmu: binutils-mingw-w64_5.1
- From: Stephen Kitt <skitt@debian.org>
- Date: Tue, 31 Mar 2015 21:15:10 +0200
- Message-id: <20150331211510.2b9a1b31@heffalump.sk2.org>
- In-reply-to: <20150113220130.8629.6603.reportbug@heffalump.sk2.org>
- References: <20150113220130.8629.6603.reportbug@heffalump.sk2.org>
On Tue, 13 Jan 2015 23:01:30 +0100, Stephen Kitt <skitt@debian.org> wrote: > My earlier binNMU in wheezy-security wasn't appropriate, but > binutils-mingw-w64 still needs fixing in jessie and sid, and I'm > wondering whether to do sourceful uploads or request binNMUs. And this is no longer necessary given that 5.2 is in jessie and sid with the appropriate fixes! Regards, StephenAttachment: pgpkjgu9jNfG1.pgp
Description: OpenPGP digital signature
--- End Message ---