Hi Joost,
If you'd like to test the simplesamlphp packages for bullsyes, I've
prepared packages and placed them for your convenience here:
https://people.debian.org/~tobi/simplesamlphp/
--
Cheers,
tobi
On Mon, 28 Apr 2025 13:50:24 + Tobias Frost wrote:
> Hi Joost,
>
> I've been wokin
Hi Joost,
I've been woking on simplesmalphp yesterday, and the current status of my
backport of the patch for CVE-2025-27773 is in the lts team repo [1]
[1]
https://salsa.debian.org/lts-team/packages/simplesamlphp/-/tree/debian/bullseye/
Help in testing the changes would be very helpful, so
On Mon, Apr 28, 2025 at 09:07:51AM +0200, Joost van Baal-Ilić wrote:
> Hi,
>
> As you're probably aware, issue
> https://security-tracker.debian.org/tracker/CVE-2025-27773 has been open since
> March 11, 2025. Is anybody working on fixing this? I could probably help out
> with testing prerelease
Hi,
As you're probably aware, issue
https://security-tracker.debian.org/tracker/CVE-2025-27773 has been open since
March 11, 2025. Is anybody working on fixing this? I could probably help out
with testing prereleases for Debian bullseye.
Thanks, Bye,
Joost
On Thu, Feb 06, 2025 at 11:56:41AM
Control: User -1 debian-...@lists.debian.org
Control: Usertag -1 + upstream-trixie
Hello Thijs and LTS team,
El 01/12/24 a las 17:38, Thijs Kinkhorst escribió:
> Package: simplesamlphp
> Severity: grave
> Tags: trixie sid
>
> The current package in testing and unstable is version 1.19. Upstream
Package: simplesamlphp
Severity: grave
Tags: trixie sid
The current package in testing and unstable is version 1.19. Upstream no
longer supports this version. There's a 2.x series which should be
packaged.
There are a number of changes required for packaging 2.x. Most notably
the list of shipped
6 matches
Mail list logo