Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
X-Debbugs-Cc: libitext-j...@packages.debian.org
Control: affects -1 + src:libitext-java
Please unblock package libitext-java
[ Reason ]
src:libitext-java 2.1.7-14 no longer builds binary
Processing control commands:
> affects -1 + src:libitext-java
Bug #1033683 [release.debian.org] unblock: libitext-java/2.1.7-14
Added indication that 1033683 affects src:libitext-java
--
1033683: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033683
Debian Bug Tracking System
Contact
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
Please unblock package tomboy-ng v0.36a
[ Reason ]
Poor testing on my part lead to the use of bad colors for dark
themes with version 0.36 currently in Bookworm. This relates to
On Mon, Mar 20, 2023 at 11:06:49PM +0100, Sebastian Ramacher wrote:
> Hi Dominic
>
> On 2023-02-27 15:50:05 +, Dominic Hargreaves wrote:
> > On Thu, Feb 23, 2023 at 04:54:33PM +0100, Paul Gevers wrote:
> > > Control: tags -1 moreinfo
> > >
> > > Hi,
> > >
> > > On 20-02-2023 13:09, Dominic
Salvatore Bonaccorso wrote:
> I do not think I have any special weight more on doing it ;-). If you
> can ask with a bugreport for an unblock that would be great, thank you
> Chris.
Unblock request filed as #1033677.
Regards,
--
,''`.
: :' : Chris Lamb
`. `'`
Salvatore Bonaccorso (2023-03-29):
> Thus please unblock the current version to testing (and age it
> accordingly).
>
> unblock linux/6.1.20-1
ACK on the unblock/age-days 10 request for the d-i team, happy to build
the installer against it. :)
Cheers,
--
Cyril Brulebois (k...@debian.org)
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
X-Debbugs-Cc: x...@packages.debian.org, m...@daemonizer.de,
t...@security.debian.org
Control: affects -1 + src:xen
Please approve an upload of xen to unstable and later unblock package
Processing control commands:
> affects -1 + src:xen
Bug #1033676 [release.debian.org] unblock: xen/4.17.0+74-g3eac216e6e-1
(pre-approval)
Added indication that 1033676 affects src:xen
--
1033676: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033676
Debian Bug Tracking System
Contact
Your message dated Wed, 29 Mar 2023 20:39:15 +
with message-id
and subject line unblock zfs-linux
has caused the Debian Bug report #1033614,
regarding unblock: zfs-linux/2.1.9-3
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
X-Debbugs-Cc: li...@packages.debian.org, k...@debian.org, car...@debian.org
Control: affects -1 + src:linux
Hi release team,
Please unblock package linux
The last update of src:linux did
Processing control commands:
> affects -1 + src:linux
Bug #1033674 [release.debian.org] unblock: linux/6.1.20-1
Added indication that 1033674 affects src:linux
--
1033674: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033674
Debian Bug Tracking System
Contact ow...@bugs.debian.org with
Processing control commands:
> tags -1 moreinfo
Bug #1033439 [release.debian.org] pre-unblock: monitoring-plugins/2.3.3-5
Ignoring request to alter tags of bug #1033439 to the same tags previously set
--
1033439: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033439
Debian Bug Tracking
Control: tags -1 moreinfo
On 2023-03-27 16:13:50 +0200, Jan Wagner wrote:
> Hi,
>
> Am 27.03.23 um 08:28 schrieb Jan Wagner:
> > here are the upstream fixes, related upstream CI pipelines and issues:
>
> while we are at fixing bugs.
>
> I'd also like to include
>
Your message dated Wed, 29 Mar 2023 20:19:57 +
with message-id
and subject line unblock ruby3.1
has caused the Debian Bug report #1033573,
regarding unblock: ruby3.1/3.1.2-7
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is
Your message dated Wed, 29 Mar 2023 20:21:00 +
with message-id
and subject line unblock xorg-server
has caused the Debian Bug report #1033668,
regarding unblock: xorg-server/2:21.1.7-2
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the
Your message dated Wed, 29 Mar 2023 20:51:37 +0200
with message-id
and subject line Re: Bug#1033442: unblock: golang-go.opencensus/0.24.0-1
has caused the Debian Bug report #1033442,
regarding unblock: golang-go.opencensus/0.24.0-1
to be marked as done.
This means that you claim that the
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
X-Debbugs-Cc: jcris...@debian.org
Please unblock package xwayland
[ Reason ]
CVE-2023-1393
[ Risks ]
Arguably we could have cherry-picked just the CVE fix but the rest seems
reasonably
Package: release.debian.org
Severity: normal
Tags: bullseye
User: release.debian@packages.debian.org
Usertags: pu
X-Debbugs-Cc: libdatetime-timezone-p...@packages.debian.org,
debian-p...@lists.debian.org
Control: affects -1 + src:libdatetime-timezone-perl
-BEGIN PGP SIGNED MESSAGE-
Processing control commands:
> affects -1 + src:libdatetime-timezone-perl
Bug #1033669 [release.debian.org] bullseye-pu: package
libdatetime-timezone-perl/1:2.47-1+2023c
Added indication that 1033669 affects src:libdatetime-timezone-perl
--
1033669:
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
X-Debbugs-Cc: jcris...@debian.org
Please unblock package xorg-server
[ Reason ]
CVE-2023-1393
[ Risks ]
Simple patch to reset a pointer to freed memory.
[ Checklist ]
[x] all changes
Processing control commands:
> affects -1 + src:libdatetime-timezone-perl
Bug #1033664 [release.debian.org] unblock:
libdatetime-timezone-perl/1:2.60-1+2023c
Added indication that 1033664 affects src:libdatetime-timezone-perl
--
1033664:
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
X-Debbugs-Cc: libdatetime-timezone-p...@packages.debian.org,
debian-p...@lists.debian.org
Control: affects -1 + src:libdatetime-timezone-perl
-BEGIN PGP SIGNED MESSAGE-
Hash:
Your message dated Wed, 29 Mar 2023 16:56:21 +
with message-id
and subject line unblock pydle
has caused the Debian Bug report #1033660,
regarding unblock: pydle/0.9.4-4
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now
Your message dated Wed, 29 Mar 2023 17:27:34 +0100
with message-id
and subject line Re: Bug#1033638: unblock: pocl/3.1-3
has caused the Debian Bug report #1033638,
regarding unblock: pocl/3.1-3
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
X-Debbugs-Cc: py...@packages.debian.org
Control: affects -1 + src:pydle
Please unblock package pydle
[ Reason ]
Fixes FTBFS #1031974.
[ Impact ]
pydle will be auto-removed from bookworm
Processing control commands:
> affects -1 + src:pydle
Bug #1033660 [release.debian.org] unblock: pydle/0.9.4-4
Added indication that 1033660 affects src:pydle
--
1033660: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033660
Debian Bug Tracking System
Contact ow...@bugs.debian.org with
Package: release.debian.org
Severity: normal
Tags: bullseye
User: release.debian@packages.debian.org
Usertags: pu
X-Debbugs-Cc: lemonldap...@packages.debian.org, secur...@debian.org
Control: affects -1 + src:lemonldap-ng
[ Reason ]
lemonldap-ng is vulnarable to a second factor bypass when
Processing control commands:
> affects -1 + src:lemonldap-ng
Bug #1033653 [release.debian.org] bullseye-pu: package
lemonldap-ng/2.0.11+ds-4+deb11u
Added indication that 1033653 affects src:lemonldap-ng
--
1033653: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033653
Debian Bug Tracking
Hi Chris,
On Wed, Mar 29, 2023 at 01:00:20AM +0100, Chris Lamb wrote:
> Dear all,
>
> > The new version does not have any further regressions, as per
> > https://qa.debian.org/excuses.php?package=redis. So I think that
> > would be welcome to resolve all the CVEs still affecting bookworm.
> >
>
Processing control commands:
> block -1 with 1032887
Bug #1033638 [release.debian.org] unblock: pocl/3.1-3
1033638 was not blocked by any bugs.
1033638 was not blocking any bugs.
Added blocking bug(s) of 1033638: 1032887
--
1033638: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033638
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
Control: block -1 with 1032887
Please unblock package pocl
[ Reason ]
build pocl against llvm-15 insteal of llvm-14
this is blocked by llvm-toolchain-15 since it picked up a dependency on
Processing changes file: ceph_14.2.21-1+deb11u1_source.changes
REJECT
Processing changes file: dino-im_0.2.0-3+deb11u1_source.changes
ACCEPT
Processing changes file: dino-im_0.2.0-3+deb11u1_all-buildd.changes
ACCEPT
Processing changes file: dino-im_0.2.0-3+deb11u1_amd64-buildd.changes
Your message dated Wed, 29 Mar 2023 07:29:04 +
with message-id
and subject line unblock python-scrapy
has caused the Debian Bug report #1033620,
regarding unblock: python-scrapy/2.8.0-2
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the
33 matches
Mail list logo