On Wed, Jul 7, 2021 at 6:37 AM Andreas Beckmann wrote:
>
> On 06/07/2021 01.25, Otto Kekäläinen wrote:
> > Thanks Andreas for testing potential changes!
>
> So far this looks good, I see no more cases of default-mysql-server
> being held at the buster version (and thus mariadb-server-10.3 instead
> Thanks for clarifying. That was not obvious since the filename of the
> plugin library did not change. And another reason that dropping the
> virtual galera package should not do any harm.
> (If the plugin would have changed the name (e.g. used a proper
> SOVERSION), -3 and -4 should be
> BTW, the following apt option might be helpful for debugging upgrade
> issues in your CI jobs:
>
>Debug::pkgProblemResolver "true";
In https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=988089 we went as
far as running apt with:
apt dist-upgrade -o Debug::pkgDepCache::AutoInstall=1 -o
Your message dated Thu, 08 Jul 2021 22:03:29 +
with message-id
and subject line Bug#990741: fixed in ncbi-entrez-direct 14.6.20210224+dfsg-4
has caused the Debian Bug report #990741,
regarding ncbi-entrez-direct: efetch and einfo wrappers warn about some
supported options
to be marked as
Source: suricata
Version: 1:6.0.1-2
Severity: grave
Tags: security upstream
X-Debbugs-Cc: car...@debian.org, Debian Security Team
Control: fixed -1 1:6.0.3-1~exp1
Hi,
The following vulnerability was published for suricata.
CVE-2021-35063[0], it is mentioned in [1], but not much details
Processing control commands:
> fixed -1 1:6.0.3-1~exp1
Bug #990835 [src:suricata] suricata: CVE-2021-35063
Marked as fixed in versions suricata/1:6.0.3-1~exp1.
--
990835: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990835
Debian Bug Tracking System
Contact ow...@bugs.debian.org with
Processing control commands:
> tag -1 pending
Bug #990741 [ncbi-entrez-direct] ncbi-entrez-direct: efetch and einfo wrappers
warn about some supported options
Added tag(s) pending.
--
990741: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990741
Debian Bug Tracking System
Contact
Control: tag -1 pending
Hello,
Bug #990741 in ncbi-entrez-direct reported by you has been fixed in the
Git repository and is awaiting an upload. You can see the commit
message below and you can check the diff of the fix at:
Your message dated Thu, 08 Jul 2021 20:17:56 +
with message-id
and subject line Bug#990815: fixed in ruby2.7 2.7.4-1
has caused the Debian Bug report #990815,
regarding ruby2.7: CVE-2021-31799 CVE-2021-31810 CVE-2021-32066
to be marked as done.
This means that you claim that the problem has
Your message dated Thu, 08 Jul 2021 19:49:22 +
with message-id
and subject line Bug#989120: fixed in golang-github-go-sourcemap-sourcemap
2.1.3+git20201028.eed1c20-3
has caused the Debian Bug report #989120,
regarding golang-github-go-sourcemap-sourcemap accesses the network during the
Control: tag -1 pending
Hello,
Bug #989120 in golang-github-go-sourcemap-sourcemap reported by you has been
fixed in the
Git repository and is awaiting an upload. You can see the commit
message below and you can check the diff of the fix at:
Processing control commands:
> tag -1 pending
Bug #989120 [src:golang-github-go-sourcemap-sourcemap]
golang-github-go-sourcemap-sourcemap accesses the network during the build
Added tag(s) pending.
--
989120: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989120
Debian Bug Tracking System
Package: golang-github-go-sourcemap-sourcemap
Version: 2.1.3+git20201028.eed1c20-2
Followup-For: Bug #989120
User: ubuntu-de...@lists.ubuntu.com
Usertags: origin-ubuntu impish ubuntu-patch
Fixing a typo present in the previous message. Please, ignore the
previous patch.
diff -Nru
Your message dated Thu, 08 Jul 2021 17:35:37 +
with message-id
and subject line Bug#990817: fixed in xtensor 0.22.0-5
has caused the Debian Bug report #990817,
regarding libxtensor-dev: trying to overwrite
'/usr/include/xtensor/xaccessible.hpp', which is also in package
xtensor-dev:amd64
Source: golang-github-uber-go-atomic
Version: 1.8.0-1
X-Debbugs-CC: debian...@lists.debian.org
Severity: serious
User: debian...@lists.debian.org
Usertags: regression
Dear maintainer(s),
With a recent upload of golang-github-uber-go-atomic the autopkgtest of
golang-github-uber-go-atomic fails in
Package: golang-github-go-sourcemap-sourcemap
Version: 2.1.3+git20201028.eed1c20-2
Followup-For: Bug #989120
User: ubuntu-de...@lists.ubuntu.com
Usertags: origin-ubuntu impish ubuntu-patch
Dear Maintainer,
While patching the test suite to use libjs-jquery from the archive could
be an option,
Processing commands for cont...@bugs.debian.org:
> #
> # bts-link upstream status pull for source package src:gpac
> # see http://lists.debian.org/debian-devel-announce/2006/05/msg1.html
> # https://bts-link-team.pages.debian.net/bts-link/
> #
> user debian-bts-l...@lists.debian.org
Processing commands for cont...@bugs.debian.org:
> tags 990815 + upstream
Bug #990815 [src:ruby2.7] ruby2.7: CVE-2021-31799 CVE-2021-31810 CVE-2021-32066
Added tag(s) upstream.
> found 990815 2.7.3-2
Bug #990815 [src:ruby2.7] ruby2.7: CVE-2021-31799 CVE-2021-31810 CVE-2021-32066
Marked as found
Source: rtags
Version: 2.38-3
Severity: serious
Tags: bulleye-ignore
X-Debbugs-CC: debian...@lists.debian.org
User: debian...@lists.debian.org
Usertags: flaky timeout
Dear maintainer(s),
Your package has an autopkgtest, great. However, due to glibc reporting
a regression, I looked into the
Package: libxtensor-dev
Version: 0.22.0-4
Severity: serious
Justification: fails to install/upgrade
Dear Maintainer,
Updating xtensor packages fails with the following error:
Unpacking libxtensor-dev:amd64 (0.22.0-4) ...
dpkg: error processing archive
Package: python3-nosehtmloutput
Version: 0.0.5-2
Severity: grave
Justification: renders package unusable
X-Debbugs-Cc: cqu...@arcor.de
Dear Maintainer,
I have installed python3-nosehtmloutput package but it seems as if the plugin
has a problem and it is not possible to use the --with-html option
Source: ruby2.7
X-Debbugs-CC: t...@security.debian.org
Severity: grave
Tags: security
Hi,
The following vulnerabilities were published for ruby2.7.
CVE-2021-31799[0]:
A command injection vulnerability in RDoc
https://www.ruby-lang.org/en/news/2021/05/02/os-command-injection-in-rdoc/
23 matches
Mail list logo