Package: debian-installer
Version: 20230515
Severity: important
X-Debbugs-Cc: and...@lists.savchenko.net
# PROBLEM DESCRIPTION
User is unable to perform `apt update` right after installation.
# STEPS TO REPRODUCE
1. Start Bookworm installation and connect to a network where device is
issued n
Hello Nilson,
I have the package ready to send to the Rust team.
Are you still interested in him? Do you mind if I keep it?
Please go ahead. Fingers crossed it will be accepted in Bookworm.
--
With regards,
A
Package: gita
Severity: important
X-Debbugs-Cc: and...@lists.savchenko.net
Dear Maintainer,
Currently packaged version of `gita` uses unsafe `yaml.FullLoader`.
This is fixed upstream:
https://github.com/nosarthur/gita/compare/v0.12.9...v0.13.6#diff-b1d7ea073af79fb37be4b16f769ba60acb68546d0661f89
Package: pinentry-tty
Version: 1.1.0-4
Severity: normal
X-Debbugs-Cc: and...@lists.savchenko.net
Dear Maintainer,
After issuing `systemctl suspend`, pinentry segfaults with the following
output in the dmesg:
```
kern :info : [Aug18 21:14] pinentry-tty[140518]: segfault at 0 ip
7f395bd5a217
Package: iwd
Version: 1.14-3
Severity: normal
X-Debbugs-Cc: and...@lists.savchenko.net
Dear Maintainer,
iwd throws warning in the kernel ring buffer unless its start is delayed
with `ExecStartPre=ip link set wlan0 up` in `iwd.service` unit.
With the line above the warning is gone, however iwd ca
Pelle,
Would you be able to add a stack trace?
Here, or directly with the upstream:
https://github.com/swaywm/swaylock/issues/181
Thanks.
Package: nginx-light
Version: 1.18.0-6
Followup-For: Bug #869799
X-Debbugs-Cc: and...@lists.savchenko.net
This is still a problem for in Bullseye. Any plan to remove ipv6
directive in the default config before Debian v11 is released?
To reproduce:
1. Boot with `ipv6.disable=1`
2. Attempt to insta
Can't be reproduced after the restart :-/
Please close the bug. I have tried to do it via BTS, but to no avail.
Thank you.
Package: yubioath-desktop
Version: 5.0.4+post1-1
Severity: important
X-Debbugs-Cc: and...@lists.savchenko.net
Dear Maintainer,
Vaguely reminds of #981804 [1]. Given that error explicitly says "with
given serial", enumeration is deriving said serial at a certain point,
but it is lost on its way to
For what it's worth, I am unable to reproduce it on the latest weekly build of
Bullseye. Paolo, are you OK for this bug to be closed?
--
Regards,
A
Hello Yves-Alexis,
Sunday, April 4, 2021, 6:09:22 PM, you wrote:
> Hi, could you detail which permissions and from where? I'm aware of the issue
> with user namespaces but not from the permissions.
Indeed, user namespaces were to blame.
> There's already a small warning in the package long desc
Hello Yves-Alexis,
Sunday, April 4, 2021, 7:35:46 PM, you wrote:
> statoverride in hardening-runtime were added by Topi Miettinen so I'm adding
> him in the loop for comments.
For the screensavers specifically, I have narrowed it down to /etc/pam.d only.
chmod'ing it to the default 0755 fixes th
Package: hardening-runtime
Version: 2
Severity: important
X-Debbugs-Cc: and...@savchenko.net
Dear Maintainer,
Restricting permissions on /etc/pam.d to 0700 while the folder is owned
by `root:root` leads to xscreensaver, mate-screensaver and others being
unable to authenticate a user.
Perhaps wor
Package: hardening-runtime
Version: 2
Severity: important
X-Debbugs-Cc: and...@lists.savchenko.net
Dear Maintainer,
Installing this package leads to dpkg-overrides setting permissions in a
way that upowerd is unable to start under a non-root account.
This breaks default installation where DE is
Package: ansible
Version: 2.9.16+dfsg-1.1
Severity: wishlist
X-Debbugs-Cc: and...@lists.savchenko.net, hlieber...@debian.org
Dear Maintainers,
Migration from 2.9.X to 2.10.X is currently blocked by
`ansible-mitogen`. Upstream of the latter hasn't produced any official
releases since November 2019
Package: syncthing
Version: 1.12.1~ds1-2
Severity: wishlist
Tags: upstream
X-Debbugs-Cc: and...@lists.savchenko.net
Dear Maintainers,
In Testing, currently packaged version is 1.12.1 while stable upstream
is at 1.13.1 with 1.14.0 scheduled for 2nd of March (5 days from now).
Versions 1.13 and 1.
Package: python3-yubikey-manager
Version: 4.0.0~a1-1
Severity: important
X-Debbugs-Cc: and...@lists.savchenko.net
Dear Maintainer,
I have updated a Bullseye installation yesterday and among others
`python3-yubikey-manager` was upgraded from 3.1.1-3 to 4.0.0~a1-1.
This renders `yubioath-desktop`
Package: wnpp
Severity: wishlist
Owner: Andrew Savchenko
X-Debbugs-Cc: debian-de...@lists.debian.org, and...@savchenko.net
* Package name: vivid
Version : 0.6.0
Upstream Author : David Peter
* URL : https://github.com/sharkdp/vivid
* License : MIT
Package: pulseaudio
Version: 13.0-5
Severity: normal
X-Debbugs-Cc: and...@lists.savchenko.net
Dear Maintainer,
1. What led up to the situation?
`apt install pulseaudio` over the minimal installation of Bullseye
alpha 3.
2. What exactly did you do (or not do) that was effective (or ineffec
Package: systemd
Version: 241-7~deb10u4
Tags: security, buster, bullseye
Severity: wishlist
Dear Maintainers,
Among others, /usr/bin/systemd-analyze can be called with "security" parameter
which shows sandboxing settings of the loaded units on the scale from 0 to 10.
On Debian v10.6 vast major
Dear Maintainers,
Is there still a plan to backport a fix for CVE-2020-12667 into Buster?
Looking at the changelog [1], there is nothing that indicates it is already
fixed.
[1]
https://metadata.ftp-master.debian.org/changelogs//main/k/knot-resolver/knot-resolver_3.2.1-3_changelog
--
With re
Greetings,
As AppArmor v3.0 is now released[1], is there a chance that network, dbus and
sockets will be supported in Bullseye?
[1] https://lists.ubuntu.com/archives/apparmor/2020-October/012183.html
--
Regards,
A
Package: pandoc
Version: 2.7.2-1
Severity: wishlist
Dear Maintainer,
<- What led up to the situation?
-> Unavailability of the newer Pandoc version in Debian repository
<- What exactly did you do (or not do) that was effective (or ineffective)?
-> Searched stable and backports for the newer (2.7
23 matches
Mail list logo