[Ccing debian-release]
On Wed, 17 Feb 2021 14:01:40 + Julian Gilbey wrote:
> On Sun, Feb 14, 2021 at 02:26:30PM +0100, Jonas Smedegaard wrote:
> > I still recommend to request release team to ignore for this release
> > instead of lowering sverity, but don't care anough about this particular
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
Please unblock package libonig
[ Reason ]
Current testing version 6.9.6-1 is not compatible with previous version
6.9.5-2.
[ Impact ]
If current testing version 6.9.6-1 would be shipped, i
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
X-Debbugs-Cc: pi...@debian.org
Please unblock package debian-pan
it is a Debian blends, the objectif od this blends is to package
softwares for synchrotron and neutron facilities.
https://
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
X-Debbugs-Cc: unix...@gmail.com
Please unblock package ifetch-tools
The package uploaded to unstable closes RC bug:
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=985051
Due to hard fr
Processing changes file: fwupd_1.2.13-3+deb10u1_source.changes
ACCEPT
Processing changes file: pygments_2.3.1+dfsg-1+deb10u1_source.changes
ACCEPT
Processing changes file: pygments_2.3.1+dfsg-1+deb10u1_all.changes
ACCEPT
Processing changes file: tiff_4.1.0+git191117-2~deb10u2_amd64.changes
On 2021-03-13 17:31:50 [+], Adam D. Barratt wrote:
> Please go ahead.
Thanks, uploaded.
> Regards,
>
> Adam
Sebastian
Hi,
Am 13.03.21 um 19:57 schrieb Adam D. Barratt:
> Control: tags -1 + confirmed
>
> On Mon, 2021-03-08 at 13:26 +0100, Rene Engelhard wrote:
>> +libreoffice (1:6.1.5-3+deb10u7) buster; urgency=medium
>> +
>> + * debian/patches/fix-PYTHONPATH.diff: backport upstream fix to
>> +not leave a bar
Control: tags -1 + confirmed
On Mon, 2021-03-08 at 13:26 +0100, Rene Engelhard wrote:
> +libreoffice (1:6.1.5-3+deb10u7) buster; urgency=medium
> +
> + * debian/patches/fix-PYTHONPATH.diff: backport upstream fix to
> +not leave a bare trailing : in PYTHONPATH as it causes
> unconditional
> +
Processing control commands:
> tags -1 + confirmed
Bug #984790 [release.debian.org] buster-pu: package
libreoffice/1:6.1.5-3+deb10u7
Added tag(s) confirmed.
--
984790: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=984790
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
On Fri, 2021-02-26 at 16:30 +0100, Moritz Muehlenhoff wrote:
> On Fri, Feb 26, 2021 at 07:49:38AM +0100, Matthias Klose wrote:
> > On 2/25/21 7:41 PM, Moritz Muehlenhoff wrote:
> > > + * CVE-2021-3177
> >
> > are all the ctypes tests passing with this patch? See #983516.
>
> I'll have a look at
Control: tags -1 + confirmed
On Fri, 2021-03-05 at 20:00 +0100, Jeroen Ploemen wrote:
> The sabnzbdplus package in buster is affected by a security issue
> (CVE-2020-13124), permitting code execution from the program's web
> interface through crafted settings. By default, the web interface is
> on
Processing control commands:
> tags -1 + confirmed
Bug #984604 [release.debian.org] buster-pu: package sabnzbdplus/2.3.6+dfsg-1
Added tag(s) confirmed.
--
984604: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=984604
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
On 2021-03-13 17:27 +, Adam D. Barratt wrote:
> Control: tags -1 + confirmed
>
> On Sun, 2021-03-07 at 18:21 +0100, Sven Joachim wrote:
>> On 2021-02-18 17:54 +0100, Sven Joachim wrote:
> [...]
>> > I would like to fix bug #982439/CVE-2021-27135[1] in Buster, a
>> > potential
>> > DoS against
Processing control commands:
> tags -1 + confirmed
Bug #983485 [release.debian.org] buster-pu: package m2crypto/0.31.0-4+deb10u2
Added tag(s) confirmed.
--
983485: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=983485
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
Control: tags -1 + confirmed
On Wed, 2021-02-24 at 23:23 +0100, Sebastian Andrzej Siewior wrote:
> This is the proposed update for Buster to fix a build failure against
> openssl 1.1.1j which is proposed for Buster.
> The changes touch only the test suite:
> - A fix in openssl for the SSLv23 paddi
Processing control commands:
> tags -1 + confirmed
Bug #983134 [release.debian.org] buster-pu: package python3.7/3.7.3-2+deb10u3
Added tag(s) confirmed.
--
983134: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=983134
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
Control: tags -1 + confirmed
On Fri, 2021-02-19 at 22:32 +0100, Moritz Muehlenhoff wrote:
> +python3.7 (3.7.3-2+deb10u3) buster; urgency=medium
> +
> + * CVE-2020-26116
> + * CVE-2021-3177
>
Please go ahead.
Regards,
Adam
Processing changes file: docker.io_18.09.1+dfsg1-7.1+deb10u3_source.changes
ACCEPT
Processing changes file: docker.io_18.09.1+dfsg1-7.1+deb10u3_all.changes
ACCEPT
Processing changes file:
docker.io_18.09.1+dfsg1-7.1+deb10u3_amd64-buildd.changes
REJECT
Processing changes file:
docker.io_18.0
Processing control commands:
> tags -1 + confirmed
Bug #983051 [release.debian.org] buster-pu: package xterm/344-1+deb10u1
Added tag(s) confirmed.
--
983051: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=983051
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
Control: tags -1 + confirmed
On Sun, 2021-03-07 at 18:21 +0100, Sven Joachim wrote:
> On 2021-02-18 17:54 +0100, Sven Joachim wrote:
[...]
> > I would like to fix bug #982439/CVE-2021-27135[1] in Buster, a
> > potential
> > DoS against xterm when the user selects specially crafted
> > text. The f
Processing control commands:
> tags -1 + confirmed
Bug #982571 [release.debian.org] buster-pu: package gdnsd/2.4.3-1
Added tag(s) confirmed.
--
982571: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=982571
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
Control: tags -1 + confirmed
On Fri, 2021-02-12 at 02:15 +0200, Faidon Liambotis wrote:
> This is a buster proposed update to fix CVE-2019-13952 aka #932407.
> This
> is an old and really minor vulnerability, which I honestly had
> forgotten
> about. It's easy and thus still good to fix.
>
Pleas
Processing control commands:
> tags -1 + confirmed
Bug #981453 [release.debian.org] buster-pu: package
fetchmail/6.4.0~beta4-3+deb10u1
Added tag(s) confirmed.
--
981453: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=981453
Debian Bug Tracking System
Contact ow...@bugs.debian.org with proble
Control: tags -1 + confirmed
On Sun, 2021-01-31 at 15:04 +0100, László Böszörményi wrote:
> There are two SSL related bugs in fetchmail that affect Buster. The
> first cause is that otherwise working SSL connections fail sometimes
> [1]. The fix is in 6.4.0~rc1 and in Bullseye since Aug, 2019.
> T
Processing control commands:
> tags -1 + confirmed
Bug #981664 [release.debian.org] buster-pu: package privoxy/3.0.28-2
Added tag(s) confirmed.
--
981664: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=981664
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
Control: tags -1 + confirmed
On Mon, 2021-03-08 at 14:08 +0100, Roland Rosenfeld wrote:
> Hi release team!
>
> In the meantime privoxy 3.0.32 was released, which contains five more
> CVEs, I applied four of them to 3.0.28-2+deb10u1.patch-v4 now, while
> CVE-2021-20274 applies to code, that was in
Processing control commands:
> tags -1 + confirmed
Bug #982996 [release.debian.org] buster-pu: package awstats/7.6+dfsg-2
Added tag(s) confirmed.
--
982996: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=982996
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
Control: tags -1 + confirmed
On Wed, 2021-02-17 at 23:33 +0100, Håvard Flaget Aasen wrote:
> These are the same changes which was implemented in stretch, two
> upstream patches. Both of these patches resolves a path traversal
> flaw, which was first discovered with CVE-2017-1000501.
>
Please go
Processing control commands:
> tags -1 + confirmed
Bug #982311 [release.debian.org] buster-pu: package groff/1.22.4-3+deb10u1
Added tag(s) confirmed.
--
982311: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=982311
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
Control: tags -1 + confirmed
On Mon, 2021-02-08 at 16:08 +, Colin Watson wrote:
> https://bugs.debian.org/982302 reports that groff/buster is built
> with
> references to ghostscript 9.26, despite 9.27 having been uploaded to
> buster in August 2020. I think the path of least resistance/risk
Your message dated Sat, 13 Mar 2021 17:12:31 +
with message-id
<70e3af961623ecd9008e4dd08f6b51d49dee6c1c.ca...@adam-barratt.org.uk>
and subject line Re: Bug#984595: buster-pu: package samba/2:4.9.5+dfsg-5
has caused the Debian Bug report #984595,
regarding buster-pu: package samba/2:4.9.5+dfsg
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
Please unblock package gsequencer
[ Reason ]
I would love to patch the user's manual chapter 2. The information
there are incomplete and were not updated as extending the UI of
gsequencer.
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
Please unblock package nagios-check-xmppng
I am upstream of the packaged plugin and received a bug report [1] just
a few days before the end of the soft freeze. The bugfix is quite
minimal
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
X-Debbugs-Cc: "Dr. Tobias Quathamer" , Javier
Fernández-Sanguino Peña
Please unblock package manpages-l10n
(Please provide enough (but not too much) information to help
the release team t
> Tomorrow once firmware-nonfree has migrated 20210208-4 will be uploaded
> with important small fixes to Raspberry Pi 4B and BananaPi M2 ultra and
> BananaPi M3 supports.
20210208-4 upload happening now.
--
maks
signature.asc
Description: PGP signature
Hi Ivo
On Sat, Mar 13, 2021 at 03:30:39PM +0100, Ivo De Decker wrote:
> > The binary package is in testing since some time. Please add it to the
> > key packages list.
> Added.
Thanks.
Regards,
Bastian
--
Our way is peace.
-- Septimus, the Son Worshiper, "Bread and Circuses",
Your message dated Sat, 13 Mar 2021 14:31:59 +
with message-id
and subject line unblock gnome-passwordsafe
has caused the Debian Bug report #985136,
regarding unblock: gnome-passwordsafe/5.0-2
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not
Your message dated Sat, 13 Mar 2021 15:30:39 +0100
with message-id <20210313143037.ga27...@debian.org>
and subject line Re: Bug#929214: release.debian.org - Add package constraint
for cloud images
has caused the Debian Bug report #929214,
regarding Add key package for cloud images
to be marked as
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
Please unblock package gnome-passwordsafe
[ Reason ]
Fix a bug that prevents the icon of the application from being displayed
when the software is running in a Wayland session.
[ Impact ]
Hi Ole,
On 3/13/21 11:11 AM, Ole Streicher wrote:
I just found that you unblocked the packages cpl-plugin-hawki and
cpl-plugin amber, due to their fixing of grave/serious bugs (#984058 and
#984546).
There are however also other packages that had in fact the same bug
#984508; the bug author ment
Your message dated Sat, 13 Mar 2021 13:37:16 +
with message-id
and subject line unblock lxc-templates
has caused the Debian Bug report #985062,
regarding unblock: lxc-templates/3.0.4-5
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the cas
Your message dated Sat, 13 Mar 2021 14:28:22 +0100
with message-id <20210313132820.ga26...@debian.org>
and subject line Re: Bug#984468: Pre-approval for uploading KDE Apps 20.12.3
has caused the Debian Bug report #984468,
regarding Unblock selected KDE Apps 20.12.3
to be marked as done.
This means
Your message dated Sat, 13 Mar 2021 13:18:17 +
with message-id
and subject line unblock refpolicy
has caused the Debian Bug report #984645,
regarding unblock: refpolicy/2:2.20210203-4
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case
Your message dated Sat, 13 Mar 2021 13:16:41 +
with message-id
and subject line unblock policycoreutils
has caused the Debian Bug report #984642,
regarding unblock: policycoreutils/3.1-3
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the c
Your message dated Sat, 13 Mar 2021 14:10:15 +0100
with message-id <20210313131014.ga26...@debian.org>
and subject line Re: unblock: tipa/tipa_1.3-21
has caused the Debian Bug report #985132,
regarding unblock: tipa/tipa_1.3-21
to be marked as done.
This means that you claim that the problem has b
Your message dated Sat, 13 Mar 2021 12:58:46 +
with message-id
and subject line unblock texlive-bin
has caused the Debian Bug report #985128,
regarding unblock: texlive-bin/2020.20200327.54578-7
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is n
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
Please unblock package tipa
[ Reason ]
In the last upload I fixed the most issues regarding the Debian
packaging itself.
[ Impact ]
Not releasing the package results in a heavily outdated
Dear Ivo,
I just found that you unblocked the packages cpl-plugin-hawki and
cpl-plugin amber, due to their fixing of grave/serious bugs (#984058 and
#984546).
There are however also other packages that had in fact the same bug
#984508; the bug author mentioned it there but didn't really open then
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
X-Debbugs-Cc: debian-tex-ma...@lists.debian.org
Please unblock package texlive-bin
[ Reason ]
Several fixes for shell escape exploits recently reported on the
private TeX Live security list
49 matches
Mail list logo