Hi,
seems like it's time for a stable T(A)ILS point-release (0.6.1) that
would fix the following Debian security announces:
  [DSA 2122-1] New glibc packages fix local privilege escalation
  [DSA 2123-1] New NSS packages fix cryptographic weaknesses
  [DSA 2124-1] New Xulrunner packages fix several vulnerabilities
  [DSA 2132-1] New xulrunner packages fix several vulnerabilities
  [DSA-2136-1] New tor packages fix potential code execution
In order to prepare this point-release I have looked at the bugfixes
that could be cherry-picked from the devel branch into the stable one
(using gitk origin/stable..origin/devel).
I cherry-picked a few ones (the commit IDs are the ones from the new
stable branch, not the ones from the devel branch):
  2ff8eede Remove trailing whitespace.
  ad9549df Htpdate: display the logs when the clock synchronization fails.
  eeab6f72 Seahorse: use same keyserver as in gpg.conf.
  83cbd310 FireGPG: use the same keyserver as the one configured in gpg.conf.
Any other important + tested enough bugfixes that we would want to
backport before building this point-release?
Bye,
-- 
  intrigeri <intrigeri@???>
  | GnuPG key @ https://gaffer.ptitcanardnoir.org/intrigeri/intrigeri.asc
  | OTR fingerprint @ https://gaffer.ptitcanardnoir.org/intrigeri/otr-fingerprint.asc
  | So what?