Re: Re: Please consider unblocking Chromium and linux packages for Buster

2019-07-01 Thread Carl Fink
On Mon, Jul 01, 2019 at 02:17:45PM -0400, Cindy Sue Causey wrote: > For newbies peeking in, every single one of those 91 incoming > *upgraded* packages is OVERWRITING... OBLITERATING.. the otherwise > stable packages that Developers manually tweaked especially for one's > currently installed Debia

Re: Re: Please consider unblocking Chromium and linux packages for Buster

2019-07-01 Thread Cindy Sue Causey
On 7/1/19, Greg Wooledge wrote: > On Mon, Jul 01, 2019 at 12:13:00PM +0200, Rodrigo Olmos wrote: >> > For security critical packages like web browsers I would always >> > recommend getting a newer version from unstable or from stable-security >> > ASAP. >> >> What would be the best procedure as of

Re: Re: Please consider unblocking Chromium and linux packages for Buster

2019-07-01 Thread Greg Wooledge
On Mon, Jul 01, 2019 at 12:13:00PM +0200, Rodrigo Olmos wrote: > > For security critical packages like web browsers I would always recommend > > getting a newer version from unstable or from stable-security ASAP. > > What would be the best procedure as of today to have v75 instead of > v73 on str

Re: Re: Please consider unblocking Chromium and linux packages for Buster

2019-07-01 Thread Rodrigo Olmos
> For security critical packages like web browsers I would always recommend > getting a newer version from unstable or from stable-security ASAP. What would be the best procedure as of today to have v75 instead of v73 on stretch? I tried pinning v75 from unstable but it suggests huge changes (91

Re: Please consider unblocking Chromium and linux packages for Buster

2019-06-28 Thread Michael Fothergill
On Thu, 20 Jun 2019 at 17:57, Lazar Tadić wrote: > Chromium is currently 2 major and 3 minor versions behind upstream in > both Stretch and Buster. Please consider uploading a recent version to > address 34 open security issues, before the complete freeze on 25th of > June. > I have recently ins

Re: Please consider unblocking Chromium and linux packages for Buster

2019-06-20 Thread Étienne Mollier
> Oh, and please excuse me for my poor use of these mailing > lists, I'm new here. I apologize myself if I've make you feel a bit uncomfortable. I'm not a native English speaker, and sometimes my wording may happen to be a little bit stronger than first intended, but I try to watch my tongue. Bla

Re: Please consider unblocking Chromium and linux packages for Buster

2019-06-20 Thread Lazar Tadić
> Thank you for your note. I do /not/ speak for the Debian kernel > team, but an upgrade of Linux fixing these TCP SACK > vulnerabilities are in the pipeline in Debian Sid, in Linux > version 4.19.37-5. There is an unconditional ten days delay for > introduction of upgrades from Sid to Testing,

Re: Please consider unblocking Chromium and linux packages for Buster

2019-06-20 Thread Sven Joachim
On 2019-06-20 14:48 -0400, Greg Wooledge wrote: > On Thu, Jun 20, 2019 at 08:45:51PM +0200, Étienne Mollier wrote: >> There is an unconditional ten days delay for >> introduction of upgrades from Sid to Testing, hence the missing >> security upgrade into Debian Buster at t time. Hopefully it >> s

Re: Please consider unblocking Chromium and linux packages for Buster

2019-06-20 Thread Étienne Mollier
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 6/20/19 8:48 PM, Greg Wooledge wrote: > On Thu, Jun 20, 2019 at 08:45:51PM +0200, Étienne Mollier wrote: >> There is an unconditional ten days delay for introduction of upgrades from >> Sid to Testing, hence the missing security upgrade into Debi

Re: Please consider unblocking Chromium and linux packages for Buster

2019-06-20 Thread Greg Wooledge
On Thu, Jun 20, 2019 at 08:45:51PM +0200, Étienne Mollier wrote: > There is an unconditional ten days delay for > introduction of upgrades from Sid to Testing, hence the missing > security upgrade into Debian Buster at t time. Hopefully it > should land on time for July, the 6th. The delay period

Re: Please consider unblocking Chromium and linux packages for Buster

2019-06-20 Thread Étienne Mollier
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 6/20/19 6:40 PM, Lazar Tadić wrote: > Likewise, linux package in Buster lack recent fixes for SACKs Panic > vulnerabilities. I hope it will also be uploaded soon. Good Day Lazar, Thank you for your note. I do /not/ speak for the Debian kernel