Package: node-escope
Severity: important
Control: affects -1 node-eslint-plugin-eslint-plugin
node-escope upstream project is unmaintained and its only reverse
dependency node-eslint-plugin-eslint-plugin has updated its dependency
to a maintained fork of escope, ie, eslint-scope in its new
Source: python-babel
Version: 2.8.0+dfsg.1-6
Severity: important
Tags: security upstream
Forwarded: https://github.com/python-babel/babel/pull/782
X-Debbugs-Cc: car...@debian.org, Debian Security Team
Control: found -1 2.6.0+dfsg.1-1
Hi,
The following vulnerability was published for
Package: cinnamon
Version: 4.8.6-2
Severity: normal
Hey there.
Yesterday I did some cleanup of packages which I presumably didn't need
anymore (some ~650).
Unfortunately it seems that by this I've also deleted the window
decoration theme I've used and which I've could select from:
System
Control: reassign -1 node-opencv
Hi,
* Jérémy Lal [2021-04-22 18:38]:
(gdb) bt
#0 __memcpy_power7 () at ../sysdeps/powerpc/powerpc64/power7/memcpy.S:235
#1 0x70145254 in memcpy (__len=4, __src=,
__dest=0x7fffc779d480) at
/usr/include/powerpc64le-linux-gnu/bits/string_fortified.h:34
Package: src:dejagnu
Version: 1.6.2-2
Tags: patch
Apparently, the patch for https://bugs.debian.org/182177 was dropped at some
point. Please re-apply it.
Hi Vincent,
On Fri, Apr 30, 2021 at 12:43:22PM +0200, Vincent Blut wrote:
> Le 2021-04-30 09:12, Bastian Germann a écrit :
> > Am 29.04.21 um 20:13 schrieb Vincent Blut:
> > > Running 'xrandr --verbose' from Xorg should give you the supported
> > > HDCP Content Type. If that reports "HDCP Type1"
Hi Sergei,
When we prepared the fix, we were not aware that this would become an RC bug, so
we didn't strive for a minimal fix.
Okay. Then I'll open a bugreport with release.debian.org and ask if
this not so minimal
update can propagate to testing. If yes, I'll reupload it.
That sounds
Hi Ralf,
On Fri, Apr 30, 2021 at 2:07 PM Ralf Jung wrote:
>
> Hi Sergei,
>
> Our current problem is that we cannot even upload the package to unstable
> since
> my key in the debian keyring expired (and the updated key missed the April
> keyring update), and Sebastien is not yet allowed to
Hi Sergei,
Our current problem is that we cannot even upload the package to unstable since
my key in the debian keyring expired (and the updated key missed the April
keyring update), and Sebastien is not yet allowed to upload osspd.
I've done the upload before figuring this out, so now
Package: libvirt-daemon-system
Version: 7.0.0-3
Severity: normal
X-Debbugs-Cc: debianb...@pauldreik.se
Dear Maintainer,
I use Debian Buster as guest, but the problem also happens for Ubuntu 20.04
as well as Debian Bullseye/testing so I
think the problem lies in the host (running Debian
On Mon, Apr 19, 2021 at 08:41:14PM +0200, Andreas Beckmann wrote:
>...
> Preparing to unpack .../pypy-stem_1.8.0-3_all.deb ...
> /usr/bin/pypy: /lib/x86_64-linux-gnu/libm.so.6: version `GLIBC_2.29' not
> found (required by /usr/lib/pypy/bin/libpypy-c.so)
> dpkg: warning: old pypy-stem
Package: libtorrent-rasterbar
Version: 1.2.9-0.3
Severity: normal
Tags: patch pending
This is the patch for my 1.2.9-0.3 NMU. I failed to include the BTS
#987306 reference to the RC bug fixed by this upload.
diff --git a/debian/changelog b/debian/changelog
index fac2238e8..a7a0c392a 100644
Package: mate-optimus
Version: 20.10.0-1
Severity: grave
Justification: renders package unusable
X-Debbugs-Cc: raibo.quadro...@gmail.com
Dear Maintainer,
*** Reporter, please consider answering these questions, where appropriate ***
* What led up to the situation?
* What exactly did you
Le 2021-04-30 09:12, Bastian Germann a écrit :
> Am 29.04.21 um 20:13 schrieb Vincent Blut:
> > Running 'xrandr --verbose' from Xorg should give you the supported
> > HDCP Content Type. If that reports "HDCP Type1" then support for HDCP 2.2 is
> > enabled.
>
> Works as expected. Enabling the two
Control: tags -1 + moreinfo
On Thu, 22 Apr 2021 at 09:37:19 +0100, Simon McVittie wrote:
> On Wed, 21 Apr 2021 at 08:33:01 +0200, intrig...@debian.org wrote:
> > On LUKS-encrypted systems, by default the GNOME keyring is encrypted
> > using the LUKS passphrase typed on boot. pam_gdm unlocks the
Package: gcovr
Version: 4.2-1
Severity: wishlist
It seems gcovr doesn't use anything from the lcov package and creates
reports well without it so it would be great to drop this dependency (or
downgrade to a recommends if it's actually used so it can be removed).
This would help meson on Debian
This time I used "--block-size=65536" again, and it hang:
3841 pts/15 S 0:01 \_ -bash
92536 pts/15 R+ 2:36 \_ rsync -va --inplace --no-whole-file
--block-size=65536 --progress --stats
/var/lib/libvirt/images/win10.qcow2 win10.qcow2
92537 pts/15 S+ 1:28
Hi Ralf, Sebastien,
If you need any help with uploading the osspd package, please let me
know. I've looked at the current 1.3.2-12 in Git, and it looks fine
with the exception that it adds more changes than the fix of this bug
(which is not advisable during freeze periods). So, I'd start to ask
Package: opensc
Version: 0.21.0-1
The current version builds log has
' dh_missing
dh_missing: warning: etc/opensc.conf exists in debian/tmp but is not
installed to anywhere (related file: "etc/opensc.conf")
dh_missing: warning: etc/xdg/autostart/pkcs11-register.desktop exists in
debian/tmp but
I'm afraid that I was misinterpreting the screenshots, because it was
typing 'down' and 'ret' in quick enough succession for it only to show
the previous menu item.
This test shows what's going on much more clearly:
https://openqa.debian.net/tests/2401#step/locale/11
(that screenshot is the
Source: dask.distributed
Version: 2021.01.0+ds.1-2
Severity: important
Tags: ftbfs
User: de...@lists.apertis.org
Usertags: apertis-ftbfs
X-Debbugs-Cc: de...@lists.apertis.org
Dear Maintainer,
While rebuilding your package for Apertis, I found that it fails to
build because a few of the
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
Please unblock package openvpn
[ Reason ]
Fix CVE-2020-15078, an authentication bypass on servers configured
with deferred-authentication, i.e. with 2FA plugins. It was marked
no-dsa by
Source: linux
Version: 5.10.28-1
Severity: wishlist
The current configuration does not enable the multipath TCP
functionality provided by the kernel through the MPTCP (and the
the-default MPTCP_IPV6) binary options.
These have been available since kernel version 5.6.
When enabled, user space
* Cyril Brulebois [210430 09:47]:
> Anyway, looking at the diffstat between 1.43.0 (last known good) and
> 1.44.4 (first known bad), we have this:
> 179 files changed, 19157 insertions(+), 7045 deletions(-)
>
> Between 1.43.0 and 1.44 (if it were an earlier known bad):
> 165 files changed,
Hey there,
Any chance you could check on this one? That's a blocker if we want to
switch to the ayatana indicators in Ubuntu, which we should do this
cycle if we want to do it before the next LTS
Thanks,
Le 15/02/2021 à 10:48, Debian Bug Tracking System a écrit :
> Thank you for filing a new
Chris Hofstaedtler (2021-04-29):
> > Alright, I think I'm hitting my limits here.
> >
> > Versions 1.44, 1.44.2, and 1.44.3 all fail in a similar way:
> ../pango/pangofc-font.c:371:44: error: ‘HB_OT_METRICS_UNDERLINE_SIZE’
> undeclared (first use in this function); did you mean
>
Package: debian-installer
Severity: normal
As per kibi's request on IRC I'm opening this as a separate bug to make tracking
it as a distinct scenario easier.
This was detected while hunting for ways to trigger #987449
In order to trigger a lock-up, one does the following:
At the language
Package: ayatana-ido
Version: 0.8.2-1
The debian/copyright has on l3
'Upstrem-Contact'
Unsure how it's generated from debian/copyright.in which has the non
typoed version though
Am 29.04.21 um 20:13 schrieb Vincent Blut:
Running 'xrandr --verbose' from Xorg should give you the supported
HDCP Content Type. If that reports "HDCP Type1" then support for HDCP 2.2 is
enabled.
Works as expected. Enabling the two configs is sufficient.
On Thu, 2021-04-29 at 11:53 +, Mike Gabriel wrote:
> Hi Phil,
>
> On So 25 Apr 2021 21:23:03 CEST, Philip Wyett wrote:
>
> > Hi Mike,
> >
> > I prepared a buster NMU[1] for libvncserver to fix CVE-2020-25708.
> > After discussion with elbrus
> > during this weekends Salzburg BSP and he
same here
(and thanks for solving my problem)
Hi,
On Thu, Apr 29, 2021 at 06:39:04PM +, Debian Bug Tracking System wrote:
> Hi,
>
> Package maintainer has submitted/uploaded this fix, so closing this bug.
I'm slightly confused though here, I do not see a buster-pu bugreport
for finxing this issue yet in
Hi
[Disclaimer, not part of the release team]
On Sun, Apr 25, 2021 at 02:13:47PM +0200, Yadd wrote:
> Package: release.debian.org
> Severity: normal
> Tags: buster
> User: release.debian@packages.debian.org
> Usertags: pu
>
> [ Reason ]
> rode-redis is vulnerable ro ReDoS (CVE-2021-29469
>
101 - 133 of 133 matches
Mail list logo