Your message dated Thu, 20 Jun 2019 11:24:48 +0200 with message-id <a9cc531a-cdf9-64ce-2fb1-e78e211b447a@debian.org> and subject line Re: Bug#930749: unblock: samba/2:4.9.9+dfsg-1 has caused the Debian Bug report #930749, regarding unblock: samba/2:4.9.9+dfsg-1 to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner@bugs.debian.org immediately.) -- 930749: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=930749 Debian Bug Tracking System Contact owner@bugs.debian.org with problems
--- Begin Message ---
- To: Debian Bug Tracking System <submit@bugs.debian.org>
- Subject: unblock: samba/2:4.9.9+dfsg-1
- From: Mathieu Parent <math.parent@gmail.com>
- Date: Wed, 19 Jun 2019 22:14:52 +0200
- Message-id: <[🔎] CAFX5sbxa4cEW-QSSgMbiCha_hSy_BMpUqeM-2A524fER_gHaOA@mail.gmail.com>
Package: release.debian.org Severity: normal User: release.debian.org@packages.debian.org Usertags: unblock Hi, This is a pre-approval request about samba. A new Samba security version was released today to address CVE-2019-12435: 4.9.9. Sid/buster currently has 4.9.5. I'm tempted to upload 4.9.9 to sid (targeting buster). This would add a big diff of stability fixes. The d/changelog would look like: samba (2:4.9.9+dfsg-1) unstable; urgency=high * This is a security release in order to address the following defect: - CVE-2019-12435 zone operations can crash rpc server (Closes: #930748) * New upstream release - Remove security patches, included in release - libsamba-passdb.so bumped to 0.27.2 * Add missing Breaks+Replace found by piuparts (Closes: #929217) Thanks Andreas Beckmann! Without an ack from you, I will only add the patch for CVE-2019-12435 (and maybe #929217?) and delay the other fixes for buster-proposed-updates. What is you opinion? (not including the debdiff against the package in testing, which is huge) unblock samba/2:4.9.9+dfsg-1 -- System Information: Debian Release: 10.0 APT prefers testing APT policy: (500, 'testing') Architecture: amd64 (x86_64) Foreign Architectures: i386 Kernel: Linux 4.19.0-5-amd64 (SMP w/2 CPU cores) Kernel taint flags: TAINT_OOT_MODULE, TAINT_UNSIGNED_MODULE Locale: LANG=fr_FR.utf8, LC_CTYPE=fr_FR.utf8 (charmap=UTF-8), LANGUAGE=fr_FR.utf8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Init: systemd (via /run/systemd/system) LSM: AppArmor: enabled
--- End Message ---
--- Begin Message ---
- To: Mathieu Parent <math.parent@gmail.com>
- Cc: 930749-done@bugs.debian.org
- Subject: Re: Bug#930749: unblock: samba/2:4.9.9+dfsg-1
- From: Paul Gevers <elbrus@debian.org>
- Date: Thu, 20 Jun 2019 11:24:48 +0200
- Message-id: <a9cc531a-cdf9-64ce-2fb1-e78e211b447a@debian.org>
- In-reply-to: <[🔎] CAFX5sby_xNE_sujLMk6EYe1J1tQm11ms+m5yAc79J0+EpY-wRQ@mail.gmail.com>
- References: <[🔎] CAFX5sbxa4cEW-QSSgMbiCha_hSy_BMpUqeM-2A524fER_gHaOA@mail.gmail.com> <[🔎] 03a0a39a-1473-a8ce-9476-02555c48e3b3@debian.org> <[🔎] CAFX5sby_xNE_sujLMk6EYe1J1tQm11ms+m5yAc79J0+EpY-wRQ@mail.gmail.com>
Hi Mathieu, On 20-06-2019 09:42, Mathieu Parent wrote: > I went ahead and uploaded 2:4.9.5+dfsg-5 to sid just now. Unblocked, thanks. PaulAttachment: signature.asc
Description: OpenPGP digital signature
--- End Message ---