Bug#1033683: unblock: libitext-java/2.1.7-14

2023-03-29 Thread tony mancill
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock X-Debbugs-Cc: libitext-j...@packages.debian.org Control: affects -1 + src:libitext-java Please unblock package libitext-java [ Reason ] src:libitext-java 2.1.7-14 no longer builds binary

Processed: unblock: libitext-java/2.1.7-14

2023-03-29 Thread Debian Bug Tracking System
Processing control commands: > affects -1 + src:libitext-java Bug #1033683 [release.debian.org] unblock: libitext-java/2.1.7-14 Added indication that 1033683 affects src:libitext-java -- 1033683: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033683 Debian Bug Tracking System Contact

Bug#1033682: unblock tomboy-ng: 0.36a

2023-03-29 Thread David Bannon
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock Please unblock package tomboy-ng v0.36a [ Reason ] Poor testing on my part lead to the use of bad colors for dark themes with version 0.36 currently in Bookworm. This relates to

Bug#1031587: [request-tracker-maintainers] Bug#1031587: Handling of the request-tracker4 -> request-tracker5 transition in bookworm

2023-03-29 Thread Dominic Hargreaves
On Mon, Mar 20, 2023 at 11:06:49PM +0100, Sebastian Ramacher wrote: > Hi Dominic > > On 2023-02-27 15:50:05 +, Dominic Hargreaves wrote: > > On Thu, Feb 23, 2023 at 04:54:33PM +0100, Paul Gevers wrote: > > > Control: tags -1 moreinfo > > > > > > Hi, > > > > > > On 20-02-2023 13:09, Dominic

Re: Situation for redis for bookworm?

2023-03-29 Thread Chris Lamb
Salvatore Bonaccorso wrote: > I do not think I have any special weight more on doing it ;-). If you > can ask with a bugreport for an unblock that would be great, thank you > Chris. Unblock request filed as #1033677. Regards, -- ,''`. : :' : Chris Lamb `. `'`

Bug#1033674: unblock: linux/6.1.20-1

2023-03-29 Thread Cyril Brulebois
Salvatore Bonaccorso (2023-03-29): > Thus please unblock the current version to testing (and age it > accordingly). > > unblock linux/6.1.20-1 ACK on the unblock/age-days 10 request for the d-i team, happy to build the installer against it. :) Cheers, -- Cyril Brulebois (k...@debian.org)

Bug#1033676: unblock: xen/4.17.0+74-g3eac216e6e-1 (pre-approval)

2023-03-29 Thread Maximilian Engelhardt
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock X-Debbugs-Cc: x...@packages.debian.org, m...@daemonizer.de, t...@security.debian.org Control: affects -1 + src:xen Please approve an upload of xen to unstable and later unblock package

Processed: unblock: xen/4.17.0+74-g3eac216e6e-1 (pre-approval)

2023-03-29 Thread Debian Bug Tracking System
Processing control commands: > affects -1 + src:xen Bug #1033676 [release.debian.org] unblock: xen/4.17.0+74-g3eac216e6e-1 (pre-approval) Added indication that 1033676 affects src:xen -- 1033676: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033676 Debian Bug Tracking System Contact

Bug#1033614: marked as done (unblock: zfs-linux/2.1.9-3)

2023-03-29 Thread Debian Bug Tracking System
Your message dated Wed, 29 Mar 2023 20:39:15 + with message-id and subject line unblock zfs-linux has caused the Debian Bug report #1033614, regarding unblock: zfs-linux/2.1.9-3 to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it

Bug#1033674: unblock: linux/6.1.20-1

2023-03-29 Thread Salvatore Bonaccorso
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock X-Debbugs-Cc: li...@packages.debian.org, k...@debian.org, car...@debian.org Control: affects -1 + src:linux Hi release team, Please unblock package linux The last update of src:linux did

Processed: unblock: linux/6.1.20-1

2023-03-29 Thread Debian Bug Tracking System
Processing control commands: > affects -1 + src:linux Bug #1033674 [release.debian.org] unblock: linux/6.1.20-1 Added indication that 1033674 affects src:linux -- 1033674: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033674 Debian Bug Tracking System Contact ow...@bugs.debian.org with

Processed: Re: Bug#1033439: pre-unblock: monitoring-plugins/2.3.3-5

2023-03-29 Thread Debian Bug Tracking System
Processing control commands: > tags -1 moreinfo Bug #1033439 [release.debian.org] pre-unblock: monitoring-plugins/2.3.3-5 Ignoring request to alter tags of bug #1033439 to the same tags previously set -- 1033439: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033439 Debian Bug Tracking

Bug#1033439: pre-unblock: monitoring-plugins/2.3.3-5

2023-03-29 Thread Sebastian Ramacher
Control: tags -1 moreinfo On 2023-03-27 16:13:50 +0200, Jan Wagner wrote: > Hi, > > Am 27.03.23 um 08:28 schrieb Jan Wagner: > > here are the upstream fixes, related upstream CI pipelines and issues: > > while we are at fixing bugs. > > I'd also like to include >

Bug#1033573: marked as done (unblock: ruby3.1/3.1.2-7)

2023-03-29 Thread Debian Bug Tracking System
Your message dated Wed, 29 Mar 2023 20:19:57 + with message-id and subject line unblock ruby3.1 has caused the Debian Bug report #1033573, regarding unblock: ruby3.1/3.1.2-7 to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is

Bug#1033668: marked as done (unblock: xorg-server/2:21.1.7-2)

2023-03-29 Thread Debian Bug Tracking System
Your message dated Wed, 29 Mar 2023 20:21:00 + with message-id and subject line unblock xorg-server has caused the Debian Bug report #1033668, regarding unblock: xorg-server/2:21.1.7-2 to be marked as done. This means that you claim that the problem has been dealt with. If this is not the

Bug#1033442: marked as done (unblock: golang-go.opencensus/0.24.0-1)

2023-03-29 Thread Debian Bug Tracking System
Your message dated Wed, 29 Mar 2023 20:51:37 +0200 with message-id and subject line Re: Bug#1033442: unblock: golang-go.opencensus/0.24.0-1 has caused the Debian Bug report #1033442, regarding unblock: golang-go.opencensus/0.24.0-1 to be marked as done. This means that you claim that the

Bug#1033670: unblock: xwayland/2:22.1.9-1

2023-03-29 Thread Julien Cristau
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock X-Debbugs-Cc: jcris...@debian.org Please unblock package xwayland [ Reason ] CVE-2023-1393 [ Risks ] Arguably we could have cherry-picked just the CVE fix but the rest seems reasonably

Bug#1033669: bullseye-pu: package libdatetime-timezone-perl/1:2.47-1+2023c

2023-03-29 Thread gregor herrmann
Package: release.debian.org Severity: normal Tags: bullseye User: release.debian@packages.debian.org Usertags: pu X-Debbugs-Cc: libdatetime-timezone-p...@packages.debian.org, debian-p...@lists.debian.org Control: affects -1 + src:libdatetime-timezone-perl -BEGIN PGP SIGNED MESSAGE-

Processed: bullseye-pu: package libdatetime-timezone-perl/1:2.47-1+2023c

2023-03-29 Thread Debian Bug Tracking System
Processing control commands: > affects -1 + src:libdatetime-timezone-perl Bug #1033669 [release.debian.org] bullseye-pu: package libdatetime-timezone-perl/1:2.47-1+2023c Added indication that 1033669 affects src:libdatetime-timezone-perl -- 1033669:

Bug#1033668: unblock: xorg-server/2:21.1.7-2

2023-03-29 Thread Julien Cristau
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock X-Debbugs-Cc: jcris...@debian.org Please unblock package xorg-server [ Reason ] CVE-2023-1393 [ Risks ] Simple patch to reset a pointer to freed memory. [ Checklist ] [x] all changes

Processed: unblock: libdatetime-timezone-perl/1:2.60-1+2023c

2023-03-29 Thread Debian Bug Tracking System
Processing control commands: > affects -1 + src:libdatetime-timezone-perl Bug #1033664 [release.debian.org] unblock: libdatetime-timezone-perl/1:2.60-1+2023c Added indication that 1033664 affects src:libdatetime-timezone-perl -- 1033664:

Bug#1033664: unblock: libdatetime-timezone-perl/1:2.60-1+2023c

2023-03-29 Thread gregor herrmann
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock X-Debbugs-Cc: libdatetime-timezone-p...@packages.debian.org, debian-p...@lists.debian.org Control: affects -1 + src:libdatetime-timezone-perl -BEGIN PGP SIGNED MESSAGE- Hash:

Bug#1033660: marked as done (unblock: pydle/0.9.4-4)

2023-03-29 Thread Debian Bug Tracking System
Your message dated Wed, 29 Mar 2023 16:56:21 + with message-id and subject line unblock pydle has caused the Debian Bug report #1033660, regarding unblock: pydle/0.9.4-4 to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now

Bug#1033638: marked as done (unblock: pocl/3.1-3)

2023-03-29 Thread Debian Bug Tracking System
Your message dated Wed, 29 Mar 2023 17:27:34 +0100 with message-id and subject line Re: Bug#1033638: unblock: pocl/3.1-3 has caused the Debian Bug report #1033638, regarding unblock: pocl/3.1-3 to be marked as done. This means that you claim that the problem has been dealt with. If this is not

Bug#1033660: unblock: pydle/0.9.4-4

2023-03-29 Thread Bastian Germann
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock X-Debbugs-Cc: py...@packages.debian.org Control: affects -1 + src:pydle Please unblock package pydle [ Reason ] Fixes FTBFS #1031974. [ Impact ] pydle will be auto-removed from bookworm

Processed: unblock: pydle/0.9.4-4

2023-03-29 Thread Debian Bug Tracking System
Processing control commands: > affects -1 + src:pydle Bug #1033660 [release.debian.org] unblock: pydle/0.9.4-4 Added indication that 1033660 affects src:pydle -- 1033660: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033660 Debian Bug Tracking System Contact ow...@bugs.debian.org with

Bug#1033653: bullseye-pu: package lemonldap-ng/2.0.11+ds-4+deb11u

2023-03-29 Thread Yadd
Package: release.debian.org Severity: normal Tags: bullseye User: release.debian@packages.debian.org Usertags: pu X-Debbugs-Cc: lemonldap...@packages.debian.org, secur...@debian.org Control: affects -1 + src:lemonldap-ng [ Reason ] lemonldap-ng is vulnarable to a second factor bypass when

Processed: bullseye-pu: package lemonldap-ng/2.0.11+ds-4+deb11u

2023-03-29 Thread Debian Bug Tracking System
Processing control commands: > affects -1 + src:lemonldap-ng Bug #1033653 [release.debian.org] bullseye-pu: package lemonldap-ng/2.0.11+ds-4+deb11u Added indication that 1033653 affects src:lemonldap-ng -- 1033653: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033653 Debian Bug Tracking

Re: Situation for redis for bookworm?

2023-03-29 Thread Salvatore Bonaccorso
Hi Chris, On Wed, Mar 29, 2023 at 01:00:20AM +0100, Chris Lamb wrote: > Dear all, > > > The new version does not have any further regressions, as per > > https://qa.debian.org/excuses.php?package=redis. So I think that > > would be welcome to resolve all the CVEs still affecting bookworm. > > >

Processed: unblock: pocl/3.1-3

2023-03-29 Thread Debian Bug Tracking System
Processing control commands: > block -1 with 1032887 Bug #1033638 [release.debian.org] unblock: pocl/3.1-3 1033638 was not blocked by any bugs. 1033638 was not blocking any bugs. Added blocking bug(s) of 1033638: 1032887 -- 1033638: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033638

Bug#1033638: unblock: pocl/3.1-3

2023-03-29 Thread Andreas Beckmann
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock Control: block -1 with 1032887 Please unblock package pocl [ Reason ] build pocl against llvm-15 insteal of llvm-14 this is blocked by llvm-toolchain-15 since it picked up a dependency on

NEW changes in stable-new

2023-03-29 Thread Debian FTP Masters
Processing changes file: ceph_14.2.21-1+deb11u1_source.changes REJECT Processing changes file: dino-im_0.2.0-3+deb11u1_source.changes ACCEPT Processing changes file: dino-im_0.2.0-3+deb11u1_all-buildd.changes ACCEPT Processing changes file: dino-im_0.2.0-3+deb11u1_amd64-buildd.changes

Bug#1033620: marked as done (unblock: python-scrapy/2.8.0-2)

2023-03-29 Thread Debian Bug Tracking System
Your message dated Wed, 29 Mar 2023 07:29:04 + with message-id and subject line unblock python-scrapy has caused the Debian Bug report #1033620, regarding unblock: python-scrapy/2.8.0-2 to be marked as done. This means that you claim that the problem has been dealt with. If this is not the