Bug#987956: libgcrypt20: ECDH decryption fails with "gpg: public key decryption failed: Invalid object" error message

2021-05-05 Thread NIIBE Yutaka
On Sun, 02 May 2021 19:47:15 +0200 "Xavier G." wrote: > Package: libgcrypt20 > Version: 1.8.7-4 > Severity: important > > Dear Maintainer, > > After a full-upgrade in Sid on 2021-05-02, `gpg --decrypt somefile.gpg` fails: > > gpg: encrypted with 256-bit ECDH key, ID [hopefully irrelevant] >

Bug#928525: Confirming

2021-05-05 Thread Trent W. Buck
gi1242+debianb...@gmail.com wrote: > Confirming I have this problem too. My /etc/sshguard/sshguard.conf has > > LOGREADER="LANG=C /bin/journalctl -afb -p info -n1 -o cat > SYSLOG_FACILITY=4 SYSLOG_FACILITY=10" > > The example provided by upstream has > > LOGREADER="LANG=C journalctl

Processed: tagging 928525 ...

2021-05-05 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > tags 928525 + patch Bug #928525 [sshguard] sshguard: Default configuration does not work as intended, needs configuration update Bug #987588 [sshguard] sshguard: blocks the remote ssh client at 1st mistake regardless of THRESHOLD option value

Processed: retitle 987588 to sshguard: blocks the remote ssh client at 1st mistake regardless of THRESHOLD option value ...

2021-05-05 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > # Make bug report less accusing and offensive, and give it a more precise > title which doesn't include facts which are in the metadata anyway > retitle 987588 sshguard: blocks the remote ssh client at 1st mistake > regardless of THRESHOLD

Processed: Re: [klibc] Bug#943425: Debian #943425: klibc: [s390x] setjmp/longjmp do not save/restore all registers in use

2021-05-05 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > tags 943425 + patch Bug #943425 [libklibc-dev] klibc: [s390x] setjmp/longjmp do not save/restore all registers in use Added tag(s) patch. > tags 988027 + patch Bug #988027 [libklibc-dev] klibc: sigsetjmp ignores second argument, siglongjmp

Bug#943425: [klibc] Bug#943425: Debian #943425: klibc: [s390x] setjmp/longjmp do not save/restore all registers in use

2021-05-05 Thread Thorsten Glaser
tags 943425 + patch tags 988027 + patch thanks Dixi quod… >Patches for klibc upstream git attched; I’m currently trying to test >them, will report. This was really tricky given we can’t install patched B-Ds on porterboxen, but I managed. I can confirm this fixes my issue. bye, //mirabilos --

Bug#987332: aprx automatically starts up with really bad default config

2021-05-05 Thread Hibby
Hi all, I had a quick look at the code - config.c carries a validate_callsign_input() function, which I think we could patch a check in to cause the program to exit with an incorrect callsign for APRS-IS error. Alternatively, it’s checking for a 6 character callsign, so we could make N0CALL-1

Processed: Re: Bug#987904: openstack-dashboard: fails to upgrade from buster if python3-cloudkitty-dashboard was installed and removed before the upgrade

2021-05-05 Thread Debian Bug Tracking System
Processing control commands: > found -1 3:14.0.2-3+deb10u2 Bug #987904 [openstack-dashboard] openstack-dashboard: fails to upgrade from buster if python3-cloudkitty-dashboard was installed and removed before the upgrade Marked as found in versions horizon/3:14.0.2-3+deb10u2. > retitle -1

Bug#987904: openstack-dashboard: fails to upgrade from buster if python3-cloudkitty-dashboard was installed and removed before the upgrade

2021-05-05 Thread Andreas Beckmann
Control: found -1 3:14.0.2-3+deb10u2 Control: retitle -1 openstack-dashboard: fails to (re-)configure after a plugin was removed but not purged On 05/05/2021 22.19, Thomas Goirand wrote: Thanks a lot for opening this bug, this brings light into a major defect of the Horizon plugin packaging.

Processed: APRX update

2021-05-05 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > forwarded 987332 https://github.com/PhirePhly/aprx/issues/64 Bug #987332 [aprx] aprx automatically starts up with really bad default config Set Bug forwarded-to-address to 'https://github.com/PhirePhly/aprx/issues/64'. > quit Stopping processing

Bug#987332: aprx automatically starts up with really bad default config

2021-05-05 Thread Dave Hibberd
Hi all, I'm filing a report upstream currently, but there's a lack of activity so let's not hold our collective breath. I'll take a wee dig into the program and see if I can find a point where it parses the config file to exit on N0CALL-1. Couple of questions: * Debian Janitor has given us

Bug#985220: velocity: CVE-2020-13936

2021-05-05 Thread Salvatore Bonaccorso
Hi Andreas, Thanks for raising the problem. On Wed, May 05, 2021 at 10:04:46PM +0200, Andreas Beckmann wrote: > Followup-For: Bug #985220 > > Hi, > > CVE-2020-13936 is fixed in stretch-security but not buster, making > upgrades difficult since stetch-security has a newer version than buster. >

Bug#964274: ruby-websocket-extensions: CVE-2020-7663

2021-05-05 Thread Salvatore Bonaccorso
Hi Andreas, On Wed, May 05, 2021 at 09:57:09PM +0200, Andreas Beckmann wrote: > Followup-For: Bug #964274 > > Hi, > > CVE-2020-7663 is fixed in stretch-security but not buster, making > upgrades difficult since stetch-security has a newer version than buster. > Please upload the fix to buster,

Bug#988103: [Pkg-javascript-devel] Bug#988103: node-require-from-string FBFS in buster: test failures

2021-05-05 Thread Yadd
Le 05/05/2021 à 20:00, Adrian Bunk a écrit : > Source: node-require-from-string > Version: 2.0.1-1 > Severity: serious > Tags: ftbfs > Control: close -1 2.0.2-1 > > https://tests.reproducible-builds.org/debian/rb-pkg/buster/amd64/node-require-from-string.html > > ... >debian/rules

Bug#988109: mqtt-client: CVE-2019-0222

2021-05-05 Thread Salvatore Bonaccorso
Hi Thanks for raising this problem. On Wed, May 05, 2021 at 10:12:34PM +0200, Andreas Beckmann wrote: > Source: mqtt-client > Version: 1.14-1 > Severity: serious > Tags: security > User: debian...@lists.debian.org > Usertags: piuparts > Control: fixed -1 1.14-1+deb9u1 > > Hi, > > CVE-2019-0222

Bug#987935: marked as done (gfsview: fails to build from the source)

2021-05-05 Thread Debian Bug Tracking System
Your message dated Wed, 05 May 2021 20:18:06 + with message-id and subject line Bug#987935: fixed in gfsview 20121130+dfsg-7 has caused the Debian Bug report #987935, regarding gfsview: fails to build from the source to be marked as done. This means that you claim that the problem has been

Bug#988109: closing 988109

2021-05-05 Thread Salvatore Bonaccorso
close 988109 1.16-1 thanks

Processed: user debian...@lists.debian.org, usertagging 964274, fixed 964274 in 0.1.2-1+deb9u1 ...

2021-05-05 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > user debian...@lists.debian.org Setting user to debian...@lists.debian.org (was a...@debian.org). > usertags 964274 piuparts There were no usertags set. Usertags are now: piuparts. > fixed 964274 0.1.2-1+deb9u1 Bug #964274 {Done: Pirate Praveen }

Bug#987904: openstack-dashboard: fails to upgrade from buster if python3-cloudkitty-dashboard was installed and removed before the upgrade

2021-05-05 Thread Thomas Goirand
On 5/1/21 9:58 PM, Andreas Beckmann wrote: > Package: openstack-dashboard > Version: 3:18.6.2-3 > Severity: serious > User: debian...@lists.debian.org > Usertags: piuparts > Control: affects -1 + python3-cloudkitty-dashboard python3-ironic-ui > python3-magnum-ui python3-neutron-fwaas-dashboard >

Processed: closing 988109

2021-05-05 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > close 988109 1.16-1 Bug #988109 [src:mqtt-client] mqtt-client: CVE-2019-0222 Marked as fixed in versions mqtt-client/1.16-1. Bug #988109 [src:mqtt-client] mqtt-client: CVE-2019-0222 Marked Bug as done > thanks Stopping processing here. Please

Processed: mqtt-client: CVE-2019-0222

2021-05-05 Thread Debian Bug Tracking System
Processing control commands: > fixed -1 1.14-1+deb9u1 Bug #988109 [src:mqtt-client] mqtt-client: CVE-2019-0222 The source 'mqtt-client' and version '1.14-1+deb9u1' do not appear to match any binary packages Marked as fixed in versions mqtt-client/1.14-1+deb9u1. -- 988109:

Bug#988109: mqtt-client: CVE-2019-0222

2021-05-05 Thread Andreas Beckmann
Source: mqtt-client Version: 1.14-1 Severity: serious Tags: security User: debian...@lists.debian.org Usertags: piuparts Control: fixed -1 1.14-1+deb9u1 Hi, CVE-2019-0222 is fixed in stretch-security but not buster, making upgrades difficult since stretch-security has a newer version than

Bug#985220: velocity: CVE-2020-13936

2021-05-05 Thread Andreas Beckmann
Followup-For: Bug #985220 Hi, CVE-2020-13936 is fixed in stretch-security but not buster, making upgrades difficult since stetch-security has a newer version than buster. Please upload the fix to buster, too. velocity | 1.7-4| jessie | source, all velocity | 1.7-5|

Bug#964274: ruby-websocket-extensions: CVE-2020-7663

2021-05-05 Thread Andreas Beckmann
Followup-For: Bug #964274 Hi, CVE-2020-7663 is fixed in stretch-security but not buster, making upgrades difficult since stetch-security has a newer version than buster. Please upload the fix to buster, too. ruby-websocket-extensions | 0.1.2-1| stretch | source, all

Bug#943425: [klibc] Debian #943425: klibc: [s390x] setjmp/longjmp do not save/restore all registers in use

2021-05-05 Thread Ben Hutchings
On Wed, 2021-05-05 at 20:24 +0200, Ben Hutchings wrote: > On Wed, 2021-05-05 at 17:32 +, Thorsten Glaser wrote: > [...] > > > > > @klibc list: as indicated earlier, I can provide a patch if needed > > > > > (though it should be obvious). > > > > hpa, maks, bwh: any of you taking these two or

Processed: found 988027 in 2.0.8-1

2021-05-05 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > found 988027 2.0.8-1 Bug #988027 [libklibc-dev] klibc: sigsetjmp ignores second argument, siglongjmp always restores signals Marked as found in versions klibc/2.0.8-1. > thanks Stopping processing here. Please contact me if you need assistance.

Processed: affects 988027

2021-05-05 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > affects 988027 - 2.0.8-1 Bug #988027 [libklibc-dev] klibc: sigsetjmp ignores second argument, siglongjmp always restores signals Removed indication that 988027 affects 2.0.8-1 > thanks Stopping processing here. Please contact me if you need

Bug#943425: [klibc] Debian #943425: klibc: [s390x] setjmp/longjmp do not save/restore all registers in use

2021-05-05 Thread Ben Hutchings
On Wed, 2021-05-05 at 17:32 +, Thorsten Glaser wrote: [...] > > > > @klibc list: as indicated earlier, I can provide a patch if needed > > > > (though it should be obvious). > > hpa, maks, bwh: any of you taking these two or should I send patches > and possibly NMU klibc in Debian? Please

Processed: affects 988027

2021-05-05 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > affects 988027 2.0.8-1 Bug #988027 [libklibc-dev] klibc: sigsetjmp ignores second argument, siglongjmp always restores signals Added indication that 988027 affects 2.0.8-1 > thanks Stopping processing here. Please contact me if you need

Processed: node-require-from-string FBFS in buster: test failures

2021-05-05 Thread Debian Bug Tracking System
Processing control commands: > close -1 2.0.2-1 Bug #988103 [src:node-require-from-string] node-require-from-string FBFS in buster: test failures Marked as fixed in versions node-require-from-string/2.0.2-1. Bug #988103 [src:node-require-from-string] node-require-from-string FBFS in buster:

Bug#988103: node-require-from-string FBFS in buster: test failures

2021-05-05 Thread Adrian Bunk
Source: node-require-from-string Version: 2.0.1-1 Severity: serious Tags: ftbfs Control: close -1 2.0.2-1 https://tests.reproducible-builds.org/debian/rb-pkg/buster/amd64/node-require-from-string.html ... debian/rules override_dh_auto_test make[1]: Entering directory

Bug#943425: Debian #943425: klibc: [s390x] setjmp/longjmp do not save/restore all registers in use

2021-05-05 Thread Thorsten Glaser
Hi Andreas, >>> Jessica Clarke brought out docs saying f8‥f15 must be saved, the >>> other FPU registers not: > >I can confirm this. It is f8-f15 for the z/Architecture (64 bit). thanks! >It is f1, f3, f5, f7 for the ESA >architecture (32 bit) which is still supported by Glibc and GCC. Is this

Bug#988086: Exim delivery process crashes on each mail with NULL-pointer

2021-05-05 Thread Andreas Metzler
Control: forwarded -1 https://bugs.exim.org/show_bug.cgi?id=2733 On 2021-05-05 halfdog wrote: [...] > What a weird coincidence that the 4.94-19 > seemed to crash exactly around that part of code that seemed > to related to CVE-2020-28007. Hello, thank you for the very helpful bug report that

Processed: Re: Bug#988086: Exim delivery process crashes on each mail with NULL-pointer

2021-05-05 Thread Debian Bug Tracking System
Processing control commands: > forwarded -1 https://bugs.exim.org/show_bug.cgi?id=2733 Bug #988086 [exim4-daemon-light] Exim delivery process crashes on each mail with NULL-pointer Set Bug forwarded-to-address to 'https://bugs.exim.org/show_bug.cgi?id=2733'. -- 988086:

Bug#986623: tuxmath: Segfaults on startup

2021-05-05 Thread Holger Levsen
control: tags -1 pending thanks https://salsa.debian.org/tux4kids-pkg-team/tuxmath/-/merge_requests/1 has a fix which I intend to upload shortly. -- cheers, Holger ⢀⣴⠾⠻⢶⣦⠀ ⣾⠁⢠⠒⠀⣿⡁ holger@(debian|reproducible-builds|layer-acht).org ⢿⡄⠘⠷⠚⠋⠀ OpenPGP: B8BF54137B09D35CF026FE9D

Bug#952298: marked as done (sshcommand: FTBFS: shellcheck fails)

2021-05-05 Thread Debian Bug Tracking System
Your message dated Wed, 05 May 2021 17:18:41 + with message-id and subject line Bug#952298: fixed in sshcommand 0~20160110.1~2795f65-1.1 has caused the Debian Bug report #952298, regarding sshcommand: FTBFS: shellcheck fails to be marked as done. This means that you claim that the problem

Processed: Re: Bug#986623: tuxmath: Segfaults on startup

2021-05-05 Thread Debian Bug Tracking System
Processing control commands: > tags -1 pending Bug #986623 [tuxmath] tuxmath: Segfaults on startup Added tag(s) pending. -- 986623: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=986623 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems

Bug#988102: python-libnacl: failing in tests on 32 bit systems

2021-05-05 Thread Ritesh Raj Sarraf
Package: python-libnacl Version: 1.7.2-2 Severity: serious Tags: ftbfs Justification: fails to build from source User: de...@lists.apertis.org Usertags: apertis-ftbfs X-Debbugs-Cc: de...@lists.apertis.org Dear Maintainer, Your package fails to build, so far on 32 bit systems. It is failing in

Bug#988101: golang-testify: failing tests on armhf

2021-05-05 Thread Ritesh Raj Sarraf
Source: golang-testify Version: 1.6.1-1 Severity: serious Tags: ftbfs Justification: fails to build from source User: de...@lists.apertis.org Usertags: apertis-ftbfs X-Debbugs-Cc: de...@lists.apertis.org Dear Maintainer, While preparing the pacakge for a derivative distribution, I have come to

Bug#988086: Exim delivery process crashes on each mail with NULL-pointer

2021-05-05 Thread halfdog
Also 4.94.2-1 crashes, e.g. calling "exim4 -qff": (gdb) bt #0 0x55ebf469d87c in log_open_already_exim (name=0x7ffcc589d560 "") at log.c:288 #1 0x55ebf469dadf in log_open_as_exim (name=name@entry=0x7ffcc589d560 "") at log.c:416 #2 0x55ebf469de8d in open_log

Processed: Re: Bug#988052: dpkg-cross: does not convert path to dynamic loader in linker scripts

2021-05-05 Thread Debian Bug Tracking System
Processing control commands: > severity -1 serious Bug #988052 [dpkg-cross] dpkg-cross: does not convert path to dynamic loader in linker scripts Severity set to 'serious' from 'important' -- 988052: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=988052 Debian Bug Tracking System Contact

Processed: severity of 986515 is important, tagging 986515

2021-05-05 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > severity 986515 important Bug #986515 [src:siconos] siconos: FTBFS: dh_auto_test: error: cd obj-x86_64-linux-gnu && make -j1 test "ARGS=-E 'COLLECTION|collection|python_test_lcp|dr_iso1|ContactTest'" ARGS\+=-j1 returned exit code 2 Severity

Bug#987959: pev: peres affected by off-by-one error in libpe

2021-05-05 Thread Petter Reinholdtsen
I've asked upstream if this is a security issue, and if so, what its CVE is, in https://github.com/merces/libpe/issues/34 >. As far as I can tell, it is writing past the assigned buffer, which might be a security issue. -- Happy hacking Petter Reinholdtsen

Bug#988086: Exim delivery process crashes on each mail with NULL-pointer

2021-05-05 Thread halfdog
Adam D. Barratt writes: > On Wed, 2021-05-05 at 11:07 +, halfdog wrote: >> This is weird: I have only bullseye/bullseye-updates/bullseye- >> security >> in my sources list. I applied all updates on 2nd of May with >> no Exim package available. Then after the 21nails disclosure >> I run the

Bug#987959: marked as done (pev: peres affected by off-by-one error in libpe)

2021-05-05 Thread Debian Bug Tracking System
Your message dated Wed, 05 May 2021 12:33:36 + with message-id and subject line Bug#987959: fixed in pev 0.81-3 has caused the Debian Bug report #987959, regarding pev: peres affected by off-by-one error in libpe to be marked as done. This means that you claim that the problem has been dealt

Bug#988086: Exim delivery process crashes on each mail with NULL-pointer

2021-05-05 Thread Adam D. Barratt
On Wed, 2021-05-05 at 11:07 +, halfdog wrote: > This is weird: I have only bullseye/bullseye-updates/bullseye- > security > in my sources list. I applied all updates on 2nd of May with > no Exim package available. Then after the 21nails disclosure > I run the updates (timestamps in UTC): > >

Bug#988086: Exim delivery process crashes on each mail with NULL-pointer

2021-05-05 Thread Salvatore Bonaccorso
Hi Just answering a couple of question below, but the actual problem will need to be handled by Andreas with more insight: On Wed, May 05, 2021 at 10:09:42AM +, halfdog wrote: > Salvatore Bonaccorso writes: > > Hi, > > > > On Wed, May 05, 2021 at 06:58:02AM +, halfdog wrote: > >>

Bug#988086: Exim delivery process crashes on each mail with NULL-pointer

2021-05-05 Thread halfdog
This is weird: I have only bullseye/bullseye-updates/bullseye-security in my sources list. I applied all updates on 2nd of May with no Exim package available. Then after the 21nails disclosure I run the updates (timestamps in UTC): 2021-05-02 07:05:31 status installed initramfs-tools:all 0.140

Bug#988086: Exim delivery process crashes on each mail with NULL-pointer

2021-05-05 Thread halfdog
Salvatore Bonaccorso writes: > Hi, > > On Wed, May 05, 2021 at 06:58:02AM +, halfdog wrote: >> Package: exim4-daemon-light >> Version: 4.94-19 >> Severity: grave >> >> Yesterdays 21nails update causes Exim to fail delivery of any >> messages. This might be related to using syslogging only

Bug#943425: Debian #943425: [s390x] setjmp/longjmp do not save/restore all registers in use

2021-05-05 Thread Andreas Krebbel
On 5/5/21 4:45 AM, Thorsten Glaser wrote: > Dixi quod… > >> Jessica Clarke brought out docs saying f8‥f15 must be saved, the >> other FPU registers not: I can confirm this. It is f8-f15 for the z/Architecture (64 bit). It is f1, f3, f5, f7 for the ESA architecture (32 bit) which is still

Bug#988024: hivex: CVE-2021-3504

2021-05-05 Thread Salvatore Bonaccorso
Hi Hilko On Wed, May 05, 2021 at 12:06:09AM +0200, Hilko Bengen wrote: > * Salvatore Bonaccorso: > > > CVE-2021-3504[0]: > > | Buffer overflow when provided invalid node key length > > > > Making the severity RC as I think the fix needs to go into bullseye. > > Right. > > I contacted

Bug#987614: marked as done (libica FTBFS with gcc 10)

2021-05-05 Thread Debian Bug Tracking System
Your message dated Wed, 05 May 2021 08:48:27 + with message-id and subject line Bug#987614: fixed in libica 3.2.0-4 has caused the Debian Bug report #987614, regarding libica FTBFS with gcc 10 to be marked as done. This means that you claim that the problem has been dealt with. If this is

Bug#982758: webext-browserpass: Failed to install on upgrade to bullseye

2021-05-05 Thread Axel Beckert
Control: severity -1 serious Ran into that to as said before. Tried to debug it and it indeed seems non-trivial. Daniel Baumann wrote: > I've tried both upgrading from a default buster to sid (browserpass > 2.0.22-2 to 3.7.2-1), as well as from a default sid (browserpass > 3.4.1-4+b2 to

Processed: Re: Bug#982758: webext-browserpass: Failed to install on upgrade to bullseye

2021-05-05 Thread Debian Bug Tracking System
Processing control commands: > severity -1 serious Bug #982758 [webext-browserpass] webext-browserpass: Failed to install on upgrade to bullseye Ignoring request to change severity of Bug 982758 to the same value. -- 982758: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=982758 Debian Bug

Processed: Re: Bug#982758: webext-browserpass: Failed to install on upgrade to bullseye

2021-05-05 Thread Debian Bug Tracking System
Processing control commands: > severity -1 serious Bug #982758 [webext-browserpass] webext-browserpass: Failed to install on upgrade to bullseye Severity set to 'serious' from 'important' -- 982758: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=982758 Debian Bug Tracking System Contact

Bug#988086: Exim delivery process crashes on each mail with NULL-pointer

2021-05-05 Thread Salvatore Bonaccorso
Hi, On Wed, May 05, 2021 at 06:58:02AM +, halfdog wrote: > Package: exim4-daemon-light > Version: 4.94-19 > Severity: grave > > Yesterdays 21nails update causes Exim to fail delivery of any > messages. This might be related to using syslogging only without > any file logging configured: > >

Processed: block 976146 with 969985

2021-05-05 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > block 976146 with 969985 Bug #976146 [pipx] pipx broken with python 3.9 976146 was not blocked by any bugs. 976146 was not blocking any bugs. Added blocking bug(s) of 976146: 969985 > thanks Stopping processing here. Please contact me if you

Processed: tagging 976146

2021-05-05 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > tags 976146 + upstream fixed-upstream Bug #976146 [pipx] pipx broken with python 3.9 Added tag(s) upstream and fixed-upstream. > thanks Stopping processing here. Please contact me if you need assistance. -- 976146:

Bug#988086: Exim delivery process crashes on each mail with NULL-pointer

2021-05-05 Thread halfdog
Package: exim4-daemon-light Version: 4.94-19 Severity: grave Yesterdays 21nails update causes Exim to fail delivery of any messages. This might be related to using syslogging only without any file logging configured: Core was generated by `/usr/sbin/exim4 -Mc 1ldzSC-0001yw-RY'. Program

Bug#931003: Fixing rust package FTBFS in buster (was: Bug#931003: Removed package(s) from unstable )

2021-05-05 Thread peter green
On 04/05/2021 12:28, Santiago Vila wrote: On Tue, May 04, 2021 at 11:48:09AM +0100, peter green wrote: This was automatically closed by ftpmaster because the package was removed from unstable, but this still does not fix the FTBFS problem in stable. Unfortunately I don't think a proper fix

Bug#973599: nvidia-graphics-drivers-legacy-340xx: EoL driver should not be released with bullseye

2021-05-05 Thread jim_p
Package: nvidia-graphics-drivers-legacy-340xx Followup-For: Bug #973599 X-Debbugs-Cc: pitsior...@gmail.com I just found out about the removal of nvidia legacy 340xx through reddit and I admit I had not noticed it all those months. Since the first days of kernel 5.x in debian, back in mid 2019, I

Bug#982758: webext-browserpass: Failed to install on upgrade to bullseye

2021-05-05 Thread Daniel Baumann
severity 982758 important thanks Hi, I've tried both upgrading from a default buster to sid (browserpass 2.0.22-2 to 3.7.2-1), as well as from a default sid (browserpass 3.4.1-4+b2 to 3.7.2-1).. and can't reproduce it, thus lowering the severity to important. As browserpass is a dependency of a

Processed: Re: webext-browserpass: Failed to install on upgrade to bullseye

2021-05-05 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > severity 982758 important Bug #982758 [webext-browserpass] webext-browserpass: Failed to install on upgrade to bullseye Severity set to 'important' from 'grave' > thanks Stopping processing here. Please contact me if you need assistance. --