Your message dated Sat, 23 Jan 2016 13:57:15 +0000 with message-id <1453557435.1835.52.camel@adam-barratt.org.uk> and subject line 8.3 point release cleanup has caused the Debian Bug report #798892, regarding php-doctrine-common/2.4.2-2+deb8u1 to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner@bugs.debian.org immediately.) -- 798892: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798892 Debian Bug Tracking System Contact owner@bugs.debian.org with problems
--- Begin Message ---
- To: Debian Bug Tracking System <submit@bugs.debian.org>
- Subject: jessie-pu: package doctrine/2.4.6-1+deb8u1
- From: David Prévot <taffit@debian.org>
- Date: Sun, 13 Sep 2015 16:26:39 -0400
- Message-id: <55F5DBFF.7070102@debian.org>
Package: release.debian.org Severity: normal Tags: jessie User: release.debian.org@packages.debian.org Usertags: pu Control: clone -1 -2 -3 -4 Control: retitle -2 php-doctrine-annotations/1.2.1-1+deb8u1 Control: retitle -3 php-doctrine-cache/1.3.1-1+deb8u1 Control: retitle -4 php-doctrine-common/2.4.2-2+deb8u1 Hi, As already discussed with the security team [1], please accept the fixes for CVE-2015-5723 in doctrine and php-doctrine-{annotations,cache,common}. Source debdiff attached. 1: https://lists.alioth.debian.org/pipermail/pkg-php-pear/2015-September/005785.html Please note there is also a bit of noise in the binary debdiff for php-doctrine-common, because the pkg-php-tools version that was in Sid over a year ago was not as effective as the version that made it into Jessie (hence the php5-common version instead of plain php5 or php5-cli, and the version boundary changes), so that was expected: Control files: lines which differ (wdiff format) ------------------------------------------------ Depends: [-php5 (>= 5.3.2) | php5-cli-] {+php5-common+} (>= 5.3.2), php-doctrine-inflector (>= [-1~),-] {+1),+} php-doctrine-inflector (<< [-2~),-] {+2~~),+} php-doctrine-cache (>= [-1~),-] {+1),+} php-doctrine-cache (<< [-2~),-] {+2~~),+} php-doctrine-collections (>= [-1~),-] {+1),+} php-doctrine-collections (<< [-2~),-] {+2~~),+} php-doctrine-lexer (>= [-1~),-] {+1),+} php-doctrine-lexer (<< [-2~),-] {+2~~),+} php-doctrine-annotations (>= [-1~),-] {+1),+} php-doctrine-annotations (<< [-2~)-] {+2~~)+} Installed-Size: [-320-] {+255+} Version: [-2.4.2-2-] {+2.4.2-2+deb8u1+} Regards Daviddiff --git a/debian/changelog b/debian/changelog index dffb472..4fad3b0 100644 --- a/debian/changelog +++ b/debian/changelog @@ -1,3 +1,10 @@ +php-doctrine-common (2.4.2-2+deb8u1) jessie; urgency=medium + + * gbp.conf: Track the jessie branch + * Fix security misconfiguration vulnerability [CVE-2015-5723] + + -- David Prévot <taffit@debian.org> Mon, 31 Aug 2015 22:57:23 -0400 + php-doctrine-common (2.4.2-2) unstable; urgency=medium * Upload to unstable diff --git a/debian/gbp.conf b/debian/gbp.conf new file mode 100644 index 0000000..fae4302 --- /dev/null +++ b/debian/gbp.conf @@ -0,0 +1,2 @@ +[DEFAULT] +debian-branch = jessie diff --git a/debian/patches/0002-Applying-patch-for-CVE-2015-5723.patch b/debian/patches/0002-Applying-patch-for-CVE-2015-5723.patch new file mode 100644 index 0000000..5135152 --- /dev/null +++ b/debian/patches/0002-Applying-patch-for-CVE-2015-5723.patch @@ -0,0 +1,23 @@ +From: Marco Pivetta <ocramius@gmail.com> +Date: Mon, 31 Aug 2015 15:38:45 +0100 +Subject: Applying patch for CVE-2015-5723 + +See http://www.doctrine-project.org/2015/08/31/security_misconfiguration_vulnerability_in_various_doctrine_projects.html + +Origin: upstream, https://github.com/doctrine/common/commit/4824569127daa9784bf35219a1cd49306c795389 +--- + lib/Doctrine/Common/Proxy/ProxyGenerator.php | 1 + + 1 file changed, 1 insertion(+) + +diff --git a/lib/Doctrine/Common/Proxy/ProxyGenerator.php b/lib/Doctrine/Common/Proxy/ProxyGenerator.php +index 4c5a239..3941f17 100644 +--- a/lib/Doctrine/Common/Proxy/ProxyGenerator.php ++++ b/lib/Doctrine/Common/Proxy/ProxyGenerator.php +@@ -302,6 +302,7 @@ class <proxyShortClassName> extends \<className> implements \<baseProxyInterface + $tmpFileName = $fileName . '.' . uniqid('', true); + + file_put_contents($tmpFileName, $proxyCode); ++ chmod($tmpFileName, 0664); + rename($tmpFileName, $fileName); + } + diff --git a/debian/patches/series b/debian/patches/series index e4166b6..5042a17 100644 --- a/debian/patches/series +++ b/debian/patches/series @@ -1 +1,2 @@ 0001-Use-ClassLoader-from-Symfony-instead-of-autoload.patch +0002-Applying-patch-for-CVE-2015-5723.patchdiff --git a/debian/changelog b/debian/changelog index 7dc2075..f5c757f 100644 --- a/debian/changelog +++ b/debian/changelog @@ -1,3 +1,10 @@ +php-doctrine-cache (1.3.1-1+deb8u1) jessie; urgency=medium + + * gbp.conf: Track the jessie branch + * Fix security misconfiguration vulnerability [CVE-2015-5723] + + -- David Prévot <taffit@debian.org> Mon, 31 Aug 2015 23:07:58 -0400 + php-doctrine-cache (1.3.1-1) unstable; urgency=medium [ David Prévot ] diff --git a/debian/gbp.conf b/debian/gbp.conf new file mode 100644 index 0000000..fae4302 --- /dev/null +++ b/debian/gbp.conf @@ -0,0 +1,2 @@ +[DEFAULT] +debian-branch = jessie diff --git a/debian/patches/0002-DCOM-293-Fix-for-CVE-2015-5723-Security-Misconfigura.patch b/debian/patches/0002-DCOM-293-Fix-for-CVE-2015-5723-Security-Misconfigura.patch new file mode 100644 index 0000000..4922520 --- /dev/null +++ b/debian/patches/0002-DCOM-293-Fix-for-CVE-2015-5723-Security-Misconfigura.patch @@ -0,0 +1,95 @@ +From: Benjamin Eberlei <kontakt@beberlei.de> +Date: Mon, 31 Aug 2015 13:45:08 +0200 +Subject: [DCOM-293] Fix for CVE-2015-5723 Security Misconfiguration + Vulnerability that can lead to local arbitrary code execution. + +Origin: upstream, https://github.com/doctrine/cache/commit/2196b831e62b04986a5c4d208a1b48e0680da369 +--- + lib/Doctrine/Common/Cache/FileCache.php | 19 +++++++++++++++++-- + lib/Doctrine/Common/Cache/FilesystemCache.php | 4 ++-- + lib/Doctrine/Common/Cache/PhpFileCache.php | 6 ++++-- + 3 files changed, 23 insertions(+), 6 deletions(-) + +diff --git a/lib/Doctrine/Common/Cache/FileCache.php b/lib/Doctrine/Common/Cache/FileCache.php +index d91d0bc..f1e4528 100644 +--- a/lib/Doctrine/Common/Cache/FileCache.php ++++ b/lib/Doctrine/Common/Cache/FileCache.php +@@ -42,16 +42,31 @@ abstract class FileCache extends CacheProvider + protected $extension; + + /** ++ * @var int ++ */ ++ protected $umask; ++ ++ /** + * Constructor. + * + * @param string $directory The cache directory. + * @param string|null $extension The cache file extension. ++ * @param int $umask + * + * @throws \InvalidArgumentException + */ +- public function __construct($directory, $extension = null) ++ public function __construct($directory, $extension = null, $umask = 0002) + { +- if ( ! is_dir($directory) && ! @mkdir($directory, 0777, true)) { ++ if (!is_int($umask)) { ++ throw new \InvalidArgumentException(sprintf( ++ "Umask is required to be integer, was: %s", ++ gettype($umask) ++ )); ++ } ++ ++ $this->umask = $umask; ++ ++ if ( ! is_dir($directory) && ! @mkdir($directory, 0777 & ~$umask, true)) { + throw new \InvalidArgumentException(sprintf( + 'The directory "%s" does not exist and could not be created.', + $directory +diff --git a/lib/Doctrine/Common/Cache/FilesystemCache.php b/lib/Doctrine/Common/Cache/FilesystemCache.php +index 07eda8e..b7060b5 100644 +--- a/lib/Doctrine/Common/Cache/FilesystemCache.php ++++ b/lib/Doctrine/Common/Cache/FilesystemCache.php +@@ -105,7 +105,7 @@ class FilesystemCache extends FileCache + $filepath = pathinfo($filename, PATHINFO_DIRNAME); + + if ( ! is_dir($filepath)) { +- if (false === @mkdir($filepath, 0777, true) && !is_dir($filepath)) { ++ if (false === @mkdir($filepath, 0775, true) && !is_dir($filepath)) { + return false; + } + } elseif ( ! is_writable($filepath)) { +@@ -115,7 +115,7 @@ class FilesystemCache extends FileCache + $tmpFile = tempnam($filepath, basename($filename)); + + if ((file_put_contents($tmpFile, $lifeTime . PHP_EOL . $data) !== false) && @rename($tmpFile, $filename)) { +- @chmod($filename, 0666 & ~umask()); ++ @chmod($filename, 0664 & ~umask()); + + return true; + } +diff --git a/lib/Doctrine/Common/Cache/PhpFileCache.php b/lib/Doctrine/Common/Cache/PhpFileCache.php +index f017d83..cc4883f 100644 +--- a/lib/Doctrine/Common/Cache/PhpFileCache.php ++++ b/lib/Doctrine/Common/Cache/PhpFileCache.php +@@ -91,7 +91,7 @@ class PhpFileCache extends FileCache + $filepath = pathinfo($filename, PATHINFO_DIRNAME); + + if ( ! is_dir($filepath)) { +- mkdir($filepath, 0777, true); ++ mkdir($filepath, 0777 & ~$this->umask, true); + } + + $value = array( +@@ -102,6 +102,8 @@ class PhpFileCache extends FileCache + $value = var_export($value, true); + $code = sprintf('<?php return %s;', $value); + +- return file_put_contents($filename, $code) !== false; ++ $ret = (file_put_contents($filename, $code) !== false); ++ chmod($filename, 0664); ++ return $ret; + } + } diff --git a/debian/patches/series b/debian/patches/series index e4166b6..ac8c6f9 100644 --- a/debian/patches/series +++ b/debian/patches/series @@ -1 +1,2 @@ 0001-Use-ClassLoader-from-Symfony-instead-of-autoload.patch +0002-DCOM-293-Fix-for-CVE-2015-5723-Security-Misconfigura.patchdiff --git a/debian/changelog b/debian/changelog index a57803f..bbcd0f9 100644 --- a/debian/changelog +++ b/debian/changelog @@ -1,3 +1,10 @@ +php-doctrine-annotations (1.2.1-1+deb8u1) jessie; urgency=medium + + * gbp.conf: Track the jessie branch + * Fix security misconfiguration vulnerability [CVE-2015-5723] + + -- David Prévot <taffit@debian.org> Mon, 31 Aug 2015 23:16:28 -0400 + php-doctrine-annotations (1.2.1-1) unstable; urgency=medium * Drop now useless XS-Testsuite diff --git a/debian/gbp.conf b/debian/gbp.conf new file mode 100644 index 0000000..fae4302 --- /dev/null +++ b/debian/gbp.conf @@ -0,0 +1,2 @@ +[DEFAULT] +debian-branch = jessie diff --git a/debian/patches/0002-DCOM-293-Fix-security-misconfiguration-vulnerability.patch b/debian/patches/0002-DCOM-293-Fix-security-misconfiguration-vulnerability.patch new file mode 100644 index 0000000..59a0691 --- /dev/null +++ b/debian/patches/0002-DCOM-293-Fix-security-misconfiguration-vulnerability.patch @@ -0,0 +1,48 @@ +From: Benjamin Eberlei <kontakt@beberlei.de> +Date: Mon, 31 Aug 2015 13:54:27 +0200 +Subject: [DCOM-293] Fix security misconfiguration vulnerability that can + allow local arbitrary code execution. + +Origin: upstream, https://github.com/doctrine/annotations/commit/f25c8aab83e0c3e976fd7d19875f198ccf2f7535 +--- + lib/Doctrine/Common/Annotations/FileCacheReader.php | 18 ++++++++++++++++-- + 1 file changed, 16 insertions(+), 2 deletions(-) + +diff --git a/lib/Doctrine/Common/Annotations/FileCacheReader.php b/lib/Doctrine/Common/Annotations/FileCacheReader.php +index e9b29af..f4ac5f2 100644 +--- a/lib/Doctrine/Common/Annotations/FileCacheReader.php ++++ b/lib/Doctrine/Common/Annotations/FileCacheReader.php +@@ -53,6 +53,11 @@ class FileCacheReader implements Reader + private $classNameHashes = array(); + + /** ++ * @var int ++ */ ++ private $umask; ++ ++ /** + * Constructor. + * + * @param Reader $reader +@@ -61,10 +66,19 @@ class FileCacheReader implements Reader + * + * @throws \InvalidArgumentException + */ +- public function __construct(Reader $reader, $cacheDir, $debug = false) ++ public function __construct(Reader $reader, $cacheDir, $debug = false, $umask = 0002) + { ++ if ( ! is_int($umask)) { ++ throw new \InvalidArgumentException(sprintf( ++ 'The parameter umask must be an integer, was: %s', ++ gettype($umask) ++ )); ++ } ++ + $this->reader = $reader; +- if (!is_dir($cacheDir) && !@mkdir($cacheDir, 0777, true)) { ++ $this->umask = $umask; ++ ++ if (!is_dir($cacheDir) && !@mkdir($cacheDir, 0777 & (~$this->umask), true)) { + throw new \InvalidArgumentException(sprintf('The directory "%s" does not exist and could not be created.', $cacheDir)); + } + diff --git a/debian/patches/series b/debian/patches/series index e4166b6..96fc0f0 100644 --- a/debian/patches/series +++ b/debian/patches/series @@ -1 +1,2 @@ 0001-Use-ClassLoader-from-Symfony-instead-of-autoload.patch +0002-DCOM-293-Fix-security-misconfiguration-vulnerability.patchdiff --git a/debian/changelog b/debian/changelog index 283f77c..fbf9f36 100644 --- a/debian/changelog +++ b/debian/changelog @@ -1,3 +1,10 @@ +doctrine (2.4.6-1+deb8u1) jessie; urgency=medium + + * gbp.conf: Track the jessie branch + * Fix security misconfiguration vulnerability [CVE-2015-5723] + + -- David Prévot <taffit@debian.org> Mon, 31 Aug 2015 22:34:27 -0400 + doctrine (2.4.6-1) unstable; urgency=medium [ Marco Pivetta ] diff --git a/debian/gbp.conf b/debian/gbp.conf new file mode 100644 index 0000000..fae4302 --- /dev/null +++ b/debian/gbp.conf @@ -0,0 +1,2 @@ +[DEFAULT] +debian-branch = jessie diff --git a/debian/patches/0002-DCOM-293-Fix-security-misconfiguration-vulnerability.patch b/debian/patches/0002-DCOM-293-Fix-security-misconfiguration-vulnerability.patch new file mode 100644 index 0000000..493950d --- /dev/null +++ b/debian/patches/0002-DCOM-293-Fix-security-misconfiguration-vulnerability.patch @@ -0,0 +1,107 @@ +From: Benjamin Eberlei <kontakt@beberlei.de> +Date: Mon, 31 Aug 2015 13:57:29 +0200 +Subject: [DCOM-293] Fix security misconfiguration vulnerability allowing + local remote arbitrary code execution. + +Origin: upstream, https://github.com/doctrine/doctrine2/commit/caf30b889bb898620d843d1ec4940d01fa1d8877 +--- + lib/Doctrine/ORM/Tools/Console/Command/ConvertMappingCommand.php | 2 +- + lib/Doctrine/ORM/Tools/Console/Command/GenerateProxiesCommand.php | 2 +- + lib/Doctrine/ORM/Tools/EntityGenerator.php | 3 ++- + lib/Doctrine/ORM/Tools/EntityRepositoryGenerator.php | 3 ++- + lib/Doctrine/ORM/Tools/Export/Driver/AbstractExporter.php | 5 +++-- + 5 files changed, 9 insertions(+), 6 deletions(-) + +diff --git a/lib/Doctrine/ORM/Tools/Console/Command/ConvertMappingCommand.php b/lib/Doctrine/ORM/Tools/Console/Command/ConvertMappingCommand.php +index 5300783..b2aee7e 100644 +--- a/lib/Doctrine/ORM/Tools/Console/Command/ConvertMappingCommand.php ++++ b/lib/Doctrine/ORM/Tools/Console/Command/ConvertMappingCommand.php +@@ -137,7 +137,7 @@ EOT + + // Process destination directory + if ( ! is_dir($destPath = $input->getArgument('dest-path'))) { +- mkdir($destPath, 0777, true); ++ mkdir($destPath, 0775, true); + } + $destPath = realpath($destPath); + +diff --git a/lib/Doctrine/ORM/Tools/Console/Command/GenerateProxiesCommand.php b/lib/Doctrine/ORM/Tools/Console/Command/GenerateProxiesCommand.php +index 5221187..21edb9d 100644 +--- a/lib/Doctrine/ORM/Tools/Console/Command/GenerateProxiesCommand.php ++++ b/lib/Doctrine/ORM/Tools/Console/Command/GenerateProxiesCommand.php +@@ -79,7 +79,7 @@ EOT + } + + if ( ! is_dir($destPath)) { +- mkdir($destPath, 0777, true); ++ mkdir($destPath, 0775, true); + } + + $destPath = realpath($destPath); +diff --git a/lib/Doctrine/ORM/Tools/EntityGenerator.php b/lib/Doctrine/ORM/Tools/EntityGenerator.php +index ec3a6e1..df0ab85 100644 +--- a/lib/Doctrine/ORM/Tools/EntityGenerator.php ++++ b/lib/Doctrine/ORM/Tools/EntityGenerator.php +@@ -340,7 +340,7 @@ public function __construct() + $dir = dirname($path); + + if ( ! is_dir($dir)) { +- mkdir($dir, 0777, true); ++ mkdir($dir, 0775, true); + } + + $this->isNew = !file_exists($path) || (file_exists($path) && $this->regenerateEntityIfExists); +@@ -365,6 +365,7 @@ public function __construct() + } elseif ( ! $this->isNew && $this->updateEntityIfExists) { + file_put_contents($path, $this->generateUpdatedEntityClass($metadata, $path)); + } ++ chmod($path, 0664); + } + + /** +diff --git a/lib/Doctrine/ORM/Tools/EntityRepositoryGenerator.php b/lib/Doctrine/ORM/Tools/EntityRepositoryGenerator.php +index 5093cd5..2bcc40c 100644 +--- a/lib/Doctrine/ORM/Tools/EntityRepositoryGenerator.php ++++ b/lib/Doctrine/ORM/Tools/EntityRepositoryGenerator.php +@@ -96,11 +96,12 @@ class <className> extends EntityRepository + $dir = dirname($path); + + if ( ! is_dir($dir)) { +- mkdir($dir, 0777, true); ++ mkdir($dir, 0775, true); + } + + if ( ! file_exists($path)) { + file_put_contents($path, $code); ++ chmod($path, 0664); + } + } + } +diff --git a/lib/Doctrine/ORM/Tools/Export/Driver/AbstractExporter.php b/lib/Doctrine/ORM/Tools/Export/Driver/AbstractExporter.php +index d40d078..546b576 100644 +--- a/lib/Doctrine/ORM/Tools/Export/Driver/AbstractExporter.php ++++ b/lib/Doctrine/ORM/Tools/Export/Driver/AbstractExporter.php +@@ -130,7 +130,7 @@ abstract class AbstractExporter + public function export() + { + if ( ! is_dir($this->_outputDir)) { +- mkdir($this->_outputDir, 0777, true); ++ mkdir($this->_outputDir, 0775, true); + } + + foreach ($this->_metadata as $metadata) { +@@ -139,12 +139,13 @@ abstract class AbstractExporter + $path = $this->_generateOutputPath($metadata); + $dir = dirname($path); + if ( ! is_dir($dir)) { +- mkdir($dir, 0777, true); ++ mkdir($dir, 0775, true); + } + if (file_exists($path) && !$this->_overwriteExistingFiles) { + throw ExportException::attemptOverwriteExistingFile($path); + } + file_put_contents($path, $output); ++ chmod($path, 0664); + } + } + } diff --git a/debian/patches/series b/debian/patches/series index fa85d5f..17fc21a 100644 --- a/debian/patches/series +++ b/debian/patches/series @@ -1 +1,2 @@ 0001-Drop-Unicode-character.patch +0002-DCOM-293-Fix-security-misconfiguration-vulnerability.patchAttachment: signature.asc
Description: OpenPGP digital signature
--- End Message ---
--- Begin Message ---
- To: 783355-done@bugs.debian.org, 784944-done@bugs.debian.org, 787021-done@bugs.debian.org, 787423-done@bugs.debian.org, 791403-done@bugs.debian.org, 792468-done@bugs.debian.org, 792806-done@bugs.debian.org, 793556-done@bugs.debian.org, 794940-done@bugs.debian.org, 796281-done@bugs.debian.org, 797170-done@bugs.debian.org, 797710-done@bugs.debian.org, 798028-done@bugs.debian.org, 798584-done@bugs.debian.org, 798749-done@bugs.debian.org, 798889-done@bugs.debian.org, 798890-done@bugs.debian.org, 798891-done@bugs.debian.org, 798892-done@bugs.debian.org, 798893-done@bugs.debian.org, 798895-done@bugs.debian.org, 799033-done@bugs.debian.org, 799070-done@bugs.debian.org, 799229-done@bugs.debian.org, 799230-done@bugs.debian.org, 799369-done@bugs.debian.org, 799477-done@bugs.debian.org, 799758-done@bugs.debian.org, 799777-done@bugs.debian.org, 800006-done@bugs.debian.org, 800664-done@bugs.debian.org, 800793-done@bugs.debian.org, 800881-done@bugs.debian.org, 801095-done@bugs.debian.org, 801098-done@bugs.debian.org, 801100-done@bugs.debian.org, 801304-done@bugs.debian.org, 801318-done@bugs.debian.org, 801441-done@bugs.debian.org, 801580-done@bugs.debian.org, 801743-done@bugs.debian.org, 801851-done@bugs.debian.org, 801892-done@bugs.debian.org, 802851-done@bugs.debian.org, 802879-done@bugs.debian.org, 802900-done@bugs.debian.org, 802942-done@bugs.debian.org, 803362-done@bugs.debian.org, 803467-done@bugs.debian.org, 803490-done@bugs.debian.org, 803569-done@bugs.debian.org, 803678-done@bugs.debian.org, 803730-done@bugs.debian.org, 804157-done@bugs.debian.org, 804172-done@bugs.debian.org, 804208-done@bugs.debian.org, 804381-done@bugs.debian.org, 804383-done@bugs.debian.org, 804734-done@bugs.debian.org, 804885-done@bugs.debian.org, 805024-done@bugs.debian.org, 805127-done@bugs.debian.org, 805190-done@bugs.debian.org, 805214-done@bugs.debian.org, 805260-done@bugs.debian.org, 805293-done@bugs.debian.org, 805383-done@bugs.debian.org, 805634-done@bugs.debian.org, 805721-done@bugs.debian.org, 805894-done@bugs.debian.org, 806129-done@bugs.debian.org, 806165-done@bugs.debian.org, 806247-done@bugs.debian.org, 806252-done@bugs.debian.org, 806338-done@bugs.debian.org, 806529-done@bugs.debian.org, 806640-done@bugs.debian.org, 807129-done@bugs.debian.org, 807140-done@bugs.debian.org, 807142-done@bugs.debian.org, 807273-done@bugs.debian.org, 807280-done@bugs.debian.org, 807467-done@bugs.debian.org, 807489-done@bugs.debian.org, 807515-done@bugs.debian.org, 807576-done@bugs.debian.org, 807612-done@bugs.debian.org, 807828-done@bugs.debian.org, 807917-done@bugs.debian.org, 808559-done@bugs.debian.org, 808890-done@bugs.debian.org, 809200-done@bugs.debian.org, 809255-done@bugs.debian.org, 809258-done@bugs.debian.org, 809307-done@bugs.debian.org, 809534-done@bugs.debian.org, 809561-done@bugs.debian.org, 809688-done@bugs.debian.org, 809757-done@bugs.debian.org, 809824-done@bugs.debian.org, 810004-done@bugs.debian.org, 810111-done@bugs.debian.org, 810130-done@bugs.debian.org, 810542-done@bugs.debian.org, 810760-done@bugs.debian.org, 810887-done@bugs.debian.org, 811132-done@bugs.debian.org, 811320-done@bugs.debian.org, 792779-done@bugs.debian.org
- Subject: 8.3 point release cleanup
- From: "Adam D. Barratt" <adam@adam-barratt.org.uk>
- Date: Sat, 23 Jan 2016 13:57:15 +0000
- Message-id: <1453557435.1835.52.camel@adam-barratt.org.uk>
Version: 8.3 Hi, The updates referred to in these bugs were included in today's 8.3 Jessie point release. Regards, Adam
--- End Message ---