an.org/news/1570674/libcupsfilters-200-3-migrated-to-testing/
Daniel Lewart
Urbana, Illinois
cupsfilters2-common
# apt install cups
# apt-mark unhold libcupsfilters2-common
Daniel Lewart
Urbana, Illinois
On Friday, October 11th, 2024 at 6:30 AM, Daniel Markstedt
wrote:
>
>
> As an additional remark, the Policy text suggests that the combination of
> Breaks and Replaces directives should allow dpkg to overwrite the overlapping
> files and transfer ownership of said f
e
still the CUPSv2 family of packages responsible for printing."
Could Commit 1d4a5968 be reverted for the time being?
Thank you!
Daniel Lewart
Urbana, Illinois
r, dpkg will disallow both installation and unpacking of the new
overlapping package.
This is with an up-to-date Debian Testing system.
Daniel
signature.asc
Description: OpenPGP digital signature
Control: tag -1 pending
Hello,
Bug #1084275 in hydra reported by you has been fixed in the
Git repository and is awaiting an upload. You can see the commit
message below and you can check the diff of the fix at:
https://salsa.debian.org/pkg-security-team/hydra/-/commit/c5adf1cc44e01373ad887bc2c9
64.deb
==
Is there any important step I'm missing here?
Or can you suggest another test case that demonstrates the invalid unpacking
behavior when only using Breaks?
Thanks!
Daniel
signature.asc
Description: OpenPGP digital signature
On Thursday, October 10th, 2024 at 8:56 AM, Helmut Grohne
wrote:
>
>
> Hi Daniel,
>
> Is there any reason that you reach out privately to me? I generally
> prefer having technical conversations in public and a simple way would
> be to copy this conversation to the
ears to be:
* Package: cpdb-backend-cups
* Maintainer: Thorsten Alteholz
* Depends: ..., libcupsfilters2 (>= 2.0.0), ...
And it is Recommended by libgtk-4-1.
FYI, NoisyCoil filed a bug against cpdb-backend-cups:
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1084195
Thank you,
Daniel Lewart
Urbana, Illinois
Control: close 1081342 0.13.1-2
I added gpg-agent to the Build-Depends and impass seems to build without
error on the buildd network:
https://buildd.debian.org/status/fetch.php?pkg=impass&arch=all&ver=0.13.1-2&stamp=1728413568&raw=0
If it continues to FTBFS using debusine or some other rebu
designs we can use to test the
whole yosys+nextpnr flow in Debian. See
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1068174#30.
--Daniel
signature.asc
Description: PGP signature
On 10/4/24 09:16, Bastian Blank wrote:
> What is the plan to get this fixed?
I'm working on getting all required build-depends in debian, but I can
also just remove the non-free bits until thats done.
Regards,
Daniel
Dear Chris and Helmut,
This bug appears in the UDD M2 Bugs query.
However, on Jul 23, comedilib was removed from testing.
How can it be removed from the M2 Bugs?
Thank you!
Daniel Lewart
Urbana, Illinois
Dear Chris, Helmut, and Matthew,
1) pcre3 is no longer a key package
2) On Aug 15, pcre3 was removed from testing
Can this bug be closed and marked as done?
Thank you!
Daniel Lewart
Urbana, Illinois
line 21 is:
SHUTDOWN=/sbin/shutdown
If so, either should be easy to fix.
Thank you!
Daniel Lewart
Urbana, Illinois
neither of my two
sid systems (running sid, 6.10.6-1 and mdadm), one having raid and one
having no raid but mdadm installed.
I'll try find out what's happening on Monday when I get more debug
access and to see if there's anything more I'd require from you in order
to able to reproduce it.
Regards,
Daniel
/e17ea4ffd19c1a2bcd5ccc0e430ff476832ea618
Building with fixed cmake (Closes: #1078446).
Signed-off-by: Daniel Baumann
(this message was generated automatically)
--
Greetings
https
bian maintainer will cherry-pick it asap.
Regards,
Daniel
other packages soon too.
Please consider cherry-picking the following trivial patch:
https://gitlab.kitware.com/cmake/cmake/-/merge_requests/9725/diffs?commit_id=472c4e84502a5f0626c3f202af53f89ee877b0ab
Regards,
Daniel
/fc0568864989a1532f742ac6656bce1520a32cfd
Correcting execution order of dh_movetousr, thanks to Helmut Grohne
(Closes: #1073640).
Signed-off-by: Daniel Baumann
(this message was
/7d0bd445e66b92db610fa0a5fff3066d7dfa5e4f
Correcting execution order of dh_movetousr, thanks to Helmut Grohne
(Closes: #1073640).
Signed-off-by: Daniel Baumann
(this message was
On 8/7/24 08:21, Daniel Baumann wrote:
> I'm uploading a new upstream version implementing this during the
> evening today.
I'm currently sick, but I will do it on the weekend.
Regards,
Daniel
close 1076259 20221002-16
thanks
Hi,
thanks for spotting it, I've uploaded fixed versions for both.
Regards,
Daniel
/6647b96bca5ee2254590f3ce6be6cf2c2c460171
Cherry-picking patches from upstream to fix FTBFS with gcc-14 (Closes:
#1074874).
Signed-off-by: Daniel Baumann
(this message was generated
tag 1074874 + pending
thanks
I've cherry-picked the necessary upstream commits on top of 18.2.4, will
finish running tests before uploading later on..
Regards,
Daniel
serve start stand-alone webserver
statusshow changed files in the working directory
summary summarize working directory state
updateupdate working directory (or switch revisions)
(use 'hg help' for the full list of commands or 'hg -v' for deta
module 'ssl' has no attribute 'wrap_socket'
It seems that Python 3.12 removed the ssl.wrap_socket() function (see
https://docs.python.org/3.12/whatsnew/3.12.html#ssl).
Regards, Daniel
- -- System Information:
Debian Release: trixie/sid
APT prefers stable-updates
APT po
Hi,
On Thu, 20 Jun 2024 19:58:55 +0900 Kentaro HAYASHI wrote:
> On Mon, 29 Apr 2024 15:41:02 +0200 Daniel Leidert wrote:
> >
> > when I try to connect to a windows (11) system, I get errors saying
> > something like "check security protocol negotiation". When I s
Package: netatalk
Version: 3.1.18~ds-1+b2
Severity: critical
Tags: patch security upstream
Justification: root security hole
X-Debbugs-Cc: Debian Security Team
This vulnerability in Netatalk arises due to a lack of validation for the
length field after parsing user-provided data, leading to an o
Package: netatalk
Version: 3.1.18~ds-1+b2
Severity: critical
Tags: patch security upstream
Justification: root security hole
X-Debbugs-Cc: Debian Security Team
This vulnerability in Netatalk arises due to a lack of validation for the
length field after parsing user-provided data, leading to an o
Package: netatalk
Version: 3.1.18~ds-1+b2
Severity: critical
Tags: security upstream patch
Justification: root security hole
X-Debbugs-Cc: Debian Security Team
This vulnerability in Netatalk arises due to a lack of validation for the
length field after parsing user-provided data, leading to an o
Control: tag -1 pending
Hello,
Bug #1072734 in prometheus-squid-exporter reported by you has been fixed in the
Git repository and is awaiting an upload. You can see the commit
message below and you can check the diff of the fix at:
https://salsa.debian.org/go-team/packages/prometheus-squid-expor
pg: encrypted with 255-bit ECDH key, ID 38024D718ABA3F3B, created 2023-12-06
"Daniel Kahn Gillmor"
gpg: encrypted with 255-bit ECDH key, ID 38024D718ABA3F3B, created 2023-12-06
"Daniel Kahn Gillmor"
--- /dev/fd/63 2024-05-31 17:08:37.339457042 -0400
+++ /dev/f
outing/frr/commits/debian/master/
nice, thanks!
Do you want to do anything else with it or should I go mark it as -1?
my last attempt from yesterday didn't work (after a long time it took to
build on the armel porterbox), so -1 looks good like that.
Regards,
Daniel
tag 1067077 +pending
thanks
Hi,
my initial attempt in 10.0-0.2 to link with libatomic didn't work, I've
fixed that locally but a build to confirming on an armel porterbox is
runnning before uploading 10.0-0.3 in some minutes..
Regards,
Daniel
d.net/ubuntu/+source/remmina/+bug/2062177 and/or
https://gitlab.com/Remmina/Remmina/-/issues/3090, or if this is a complete
different issue.
Regards, Daniel
- -- System Information:
Debian Release: trixie/sid
APT prefers stable-updates
APT policy: (500, 'stable-updates'),
On Mon 2024-04-22 20:17:54 +, Holger Levsen wrote:
> fixed in git.
thanks! I've just uninstalled the octopus, but i'll consider
reinstalling it later if this and some of the performance issues can be
ironed out (or maybe to help iron out the performance issues, visible
upstream at
https://git
Package: libsequoia-octopus-librnp
Version: 1.8.1-3
Severity: grave
X-Debbugs-Cc: Daniel Kahn Gillmor
Trying to install libsequoia-octopus-librnp:
/var/lib/dpkg/tmp.ci/preinst: 12: Syntax error: "fi" unexpected (expecting
"then")
dpkg: error processing archive
/tmp/apt-d
Control: reopen 1069202
Control: found 1069202 0.8.0-3
The symlinks in the gpg-from-sq and gpgv-from-sq packages appear to
point in the wrong direction. That is, gpg-from-sq installs a symlink
at /usr/bin/gpg-sq, which refers to gpg. Instead, gpg-from-sq should
install a symlink at /usr/bin/gpg,
Package: gpg-from-sq
Version: 0.8.0-1
Severity: grave
X-Debbugs-Cc: Daniel Kahn Gillmor
I did:
apt install gpg-from-sq
and i expected to run `gpg --version` and see the resultant info from
the chameleon.
Instead, i see:
bash: gpg: command not found
I'm seeing the same issue
Source: rust-sequoia-chameleon-gnupg
Version: 0.8.0-1
Severity: grave
X-Debbugs-Cc: Daniel Kahn Gillmor
trying to upgrade from sequoia-chameleon-gnupg 0.5.1-1 to
sequoia-chameleon-gnupg 0.8.0-1, i see this:
```
Selecting previously unselected package gpg-sq.
Preparing to unpack .../gpg
close 1067450
thanks
Hi,
On 3/21/24 18:03, Daniel wrote:
Mar 21 17:59:09 zone-s ttyd[1039170]: [2024/03/21 17:59:09:4449] E:
lws_create_context: failed to load evlib_uv
Mar 21 17:59:09 zone-s ttyd[1039170]: [2024/03/21 17:59:09:4449] E:
libwebsockets context creation failed
Mar 21 17:59:09
On Sat 2024-04-06 16:20:33 +0800, Sean Whitton wrote:
> Thanks! Just to note that I also had to add python3-gssapi as a b-d.
That sounds reasonable. thanks for taking care of that, Sean!
--dkg
signature.asc
Description: PGP signature
On Sat 2024-04-06 11:40:14 +0800, Sean Whitton wrote:
> On Thu 04 Apr 2024 at 06:37pm -04, Daniel Kahn Gillmor wrote:
>
>> On Wed 2024-04-03 13:03:19 +0800, Sean Whitton wrote:
>>> Thanks, but can you sign this off? Ty!
>>
>> Sure, attached. Let me know if you ne
Hi folks. Below is a commit note. I'm being a bit wordy -- this is a one-line
diff after all -- but I wanted to explain my situation, in not being able to
test whether this change will work. (It works on macos, but then again the old
code worked there too, after I updated auto tools, and inst
On Wed 2024-04-03 13:03:19 +0800, Sean Whitton wrote:
> Thanks, but can you sign this off? Ty!
Sure, attached. Let me know if you need anything different.
--dkg
From b522c1cc6201f75ab6103954016bbb719d4dd2fa Mon Sep 17 00:00:00 2001
From: Daniel Kahn Gillmor
Date: Tue, 30 Jan 2024 15
tch is worth applying generally, but given the flux around mypy
typing, i would also be fine with just recording the output of mypy
--strict instead of failing hard on it.
--dkg
From b522c1cc6201f75ab6103954016bbb719d4dd2fa Mon Sep 17 00:00:00 2001
From: Daniel Kahn Gillmor
Date: Tue, 30
Package: libnfft3-long4
Version: 3.5.3-3
Followup-For: Bug #1063922
X-Debbugs-Cc: neel...@gmail.com
There is a typo in the soname change patch. It should Breaks+Replaces
libnfft3-long2 but in fact it does B+R libnfft3-single2.
https://salsa.debian.org/science-
team/nfft/-/blob/debian/master/debia
The encoured error is due to a mix of ttyd from unstable with
libwebsockets17 from bookworm.
--
Daniel
other issue that I can help with!
Best,
Daniel
Package: alsa-ucm-conf
Version: 1.2.11-1
Severity: serious
Justification: depends on missing package after time_t transition
Dear maintainer,
After the time_t transition, the libasound2 was renamed to libasound2t64, so
the dependencies should be updated.
Regards,
-- System Information:
Debian
On 28.03.24 23:33, Santiago Vila wrote:
If you prefer I could report this build failure in a new report
(or you can also use the clone command so that the bug has a new number,
then close the old bug).
Please report a new bug, with just the relevant info regarding the new
build failure.
We a
As expected:
=== RUN TestQuerierIndexQueriesRace/[m!="0"___name__="metric"]
panic: test timed out after 20m0s
...
FAILgithub.com/prometheus/prometheus/tsdb 1200.016s
On 28.03.24 23:13, Santiago Vila wrote:
Ok, I'm attaching one of my build logs for version 2.45.3+ds-3.
This one was trie
On 28.03.24 15:00, Santiago Vila wrote:
In either case, this is still happening for me in the current version:
Lucas Nussbaum wrote:
FAILED:
1:48: parse error: unexpected character inside braces: '0'
I think you are taking the "FAILED" out of context and misinterpreting
the test output.
On 28.03.24 15:00, Santiago Vila wrote:
Daniel Swarbrick wrote:
* Add new 0022-Support-prometheus-common-0.47.0.patch (Closes: #1064765)
Hello. I don't quite understand how the above fix is related to
the bug itself (but maybe it's because I don't know prometheus internals).
rse.
My bad, I was under the impression mcode was an interpreter backend. Will
fix this with the next upload.
--Daniel
signature.asc
Description: PGP signature
Package: ttyd
Version: 1.7.4-1+b2
Severity: grave
Justification: renders package unusable
Output of systemctl status ttyd
Mar 21 17:59:09 zone-s ttyd[1039170]: [2024/03/21 17:59:09:4449] E:
lws_create_context: failed to load evlib_uv
Mar 21 17:59:09 zone-s ttyd[1039170]: [2024/03/21 17:59:09:444
Package: libisoburn1t64
Version: 1.5.6-1.1+b1
Severity: serious
Tags: patch
Justification: bad depends after time_t transition, uninstalable.
This package shold not depend on the old libisofs and libburn, that got
renamed in the time_t transition.
Attached patch fixes this.
Regards,
Daniel
andby cycle allowing me to gracefully
reboot); I've been using the older kernel since. When I tried to write this bug
report from the newer kernel just now, I could not get the keyboard to work at
all (only in the previous kernel).
Thanks,
Daniel
-- Package-specific info:
** Kernel log: boo
at enabled
> -Werror=implicit-function-declaration. For more information, see
> https://wiki.debian.org/qa.debian.org/FTBFS#A2024-03-13_-Werror.3Dimplicit-function-declaration
It was due to a hardcoded path to libbsd's include directory which seems to
have moved to to a multia
Dear maintainers,
On Thu, 04 May 2023 16:23:10 +0200 Alan Krempler wrote:
> Package: php-smbclient
> Version: 1.0.6-8
> Severity: grave
> Justification: renders package unusable
>
> php-smbclient does not work with samba versions 4.17.5 and above:
> https://github.com/eduardok/libsmbclient-php/i
roblem, so we can
include these fixes in the next release.
Best,
Daniel
From 1aaf4b9d5c10167c1c14394ad940684c7aef65ec Mon Sep 17 00:00:00 2001
From: Daniel Kondor
Date: Thu, 7 Mar 2024 22:39:19 +0100
Subject: [PATCH 1/2] Dbus: do not use deprecated distutils Python module
---
Dbus/inter
Source: petsc
Version: 3.19.6+dfsg1-2.1
Severity: serious
Justification: bad provides
The mentioned packages: libpetsc64-real3.19t64, libpetsc64-complex3.19t64
and libpetsc-real3.19t64 have invalid Provides, affecting the transition.
Regards,
Daniel.
-- System Information:
Debian Release
Source: poppler
Followup-For: Bug #1064282
Control: reopen 1064282
As reported in bug 1065155, the provided patch was incorrect, the
X-Time64-Compat header is set incorrectly to libpoppler-cpp0v5 for all
the library packages.
It appears that bumping prometheus/common to 0.47.0 in the prometheus
go.mod will reproduce the test failure.
prometheus/common 0.46.0 and earlier does not provoke the test failure.
OpenPGP_signature.asc
Description: OpenPGP digital signature
Package: python3-jedi
Followup-For: Bug #1063491
X-Debbugs-Cc: neel...@gmail.com
The 0.19.1+ds1-1 still depends on python3-typeshed. Is that correct?
--nX
-- System Information:
Debian Release: trixie/sid
APT prefers testing
APT policy: (500, 'testing'), (1, 'experimental')
Architecture: am
ile it is in use by another program!
Thanks,
Daniel
-- System Information:
Debian Release: 12.4
APT prefers stable-security
APT policy: (500, 'stable-security'), (500, 'stable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386
Kernel: Linux 6.1.0-17-amd64 (SMP w/4 CP
On Tue, 30 Jan 2024, Samuel Henrique wrote:
Can you tell us which case it is?
Is it confirmed affected or is this a guess?
I believe these are the two cases:
- The public 'struct curl_fileinfo' contains a time_t struct member, used for
FTP wildcard callbacks.
- The public API curl_getdate(
Control: tag -1 pending
Hello,
Bug #1055999 in python-asyncssh reported by you has been fixed in the
Git repository and is awaiting an upload. You can see the commit
message below and you can check the diff of the fix at:
https://salsa.debian.org/python-team/packages/python-asyncssh/-/commit/642
I can confirm version 3.24.40-2 fixes this issue for me.
I prepared a deb patch and filed this upload request with the release team:
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1060774
On Mon, 05 Aug 2019 14:28:47 -0400 Tom Sullivan wrote:
> Package: cdrom
> Severity: grave
> Tags: d-i
> Justification: renders package unusable
>
> Dear Maintainer,
>
> * What led up to the situation?
>
> I had another machine that gave kernel panic while upgrading from Stretch to
> Buster. Use of
On 12/22/23 12:30, Helmut Grohne wrote:
I am happy with all of these changes moving to
unstable and trixie.
applied and uploaded both p-l-metapackages and bfh-metapackages to unstable.
Thanks for your patience.
thank you for all your work and help!
Regards,
Daniel
Hi Helmut
On 12/19/23 15:13, Helmut Grohne wrote:
Based on the work on molly-guard, I'm ataching an updated patch and it
really is a copy of the one on bfh-container #1055509, so see there for
the why its done the way its done.
great, thanks!
I'll test it tomorrow and upload.
Regards,
Daniel
t;ast" standard library in Python
3.8+. Thus, prospector is currently uninstallable.
Regards, Daniel
-- System Information:
Debian Release: trixie/sid
APT prefers unstable
APT policy: (500, 'unstable'), (500, 'testing')
Architecture: amd64 (x86_64)
Kernel: Linux 6.5.
://gitlab.gnome.org/GNOME/NetworkManager-openconnect/-/issues/106
https://gitlab.gnome.org/GNOME/gnome-control-center/-/issues/2499
Regards, Daniel
- -- System Information:
Debian Release: trixie/sid
APT prefers stable-updates
APT policy: (500, 'stable-updates'), (500, 'stab
Package: netatalk
Version: 3.1.12~ds-3
Severity: critical
Tags: security
Justification: root security hole
X-Debbugs-Cc: pkg-netatalk-de...@alioth-lists.debian.net, Debian Security Team
Under very specific circumstances, netatalk can be tricked into copying a
symlink or other malicious file fro
close 1042276 3.0.0+dfsg-1
thanks
We're now depending on g++-12 explicitly.
available from:
> http://qa-logs.debian.net/2023/09/25/yosys_0.33-5_unstable.log
Is the buildinfo file for the rebuild available somewhere too? I'd like to
diff the build environment against what the buildds had.
Thanks,
--Daniel
signature.asc
Description: PGP signature
Please note: The vulnerability also affects 3.1.12~ds-8 in oldstable, and
3.1.15~ds-3 in unstable.
stable isn't distributing a netatalk package.
Package: netatalk
Version: 3.1.12~ds-3
Severity: critical
Tags: security
Justification: root security hole
A 0-day vulnerability patch has been published for the upstream project.
The CVE record has not been made public yet, but this is the body of the
advisory for the record:
A Type Confusion v
changing any distro-provided files.
In practice this means that each configuration file FOO is loaded
from /usr/lib/iproute2/FOO unless /etc/iproute2/FOO exists.
but moving the config files from /etc/iproute to /usr/lib is
misguided and should be overriden in your Debian package.
Thanks,
--Daniel
Hey,
Adding Lidong...
Sebastian, Lidong is working on a fix for this issue.
Lidong, please keep Sebastain in the loop.
Daniel
On Sat, Sep 09, 2023 at 03:41:55PM +0200, Sebastian Andrzej Siewior wrote:
> Package: grub2
> Version: 2.12~rc1-9
> Severity: Serious
> control: forwar
On Wed, 26 Jul 2023 22:08:15 +0200 Lucas Nussbaum wrote:
> Relevant part (hopefully):
> > mkdir -p temp/zic/2023c temp/zdump/2023c
> > cp -RL /usr/share/zoneinfo/posix/* temp/zic/2023c/
> > cp: cannot stat '/usr/share/zoneinfo/posix/*': No such file or
directory
> > make[1]: *** [debian/rules:5
a fairly big undertaking, especially if clean and atomic patches are
required for each...
I was really hoping the batch approach would be accepted.
That said I can definitely create the individual bug tickets for starters and
we can take it from there. Let me set aside some time next week for this.
>
> Kind regards, and thanks a lot for looking into this,
>
> - Jonas
>
You're welcome!
Daniel
To add the justification for the critical severity of this ticket:
At least 6 of the 9 vulnerabilities grant theoretical root access of a Debian
system running non-patched netatalk.
CVE-2022-43634, CVE-2022-23124, CVE-2022-23123, CVE-2022-23122, CVE-2022-23121,
CVE-2022-0194
Package: netatalk
Version: 3.1.12~ds-8
Severity: critical
Tags: patch security
Justification: root security hole
X-Debbugs-Cc: pkg-netatalk-de...@alioth-lists.debian.net, Debian Security Team
Nine CVE security advisories were addressed in netatalk upstream
releases between 3.1.13 and 3.1.15. The
On 25.08.23 19:40, Mathias Gibbens wrote:
Something has changed in sid's golang environment since August 4
which is causing dh-make-golang to fail to determine a package's
dependencies and generate a correct d/control. For example, this worked
fine on August 4 but now fails:
It's probably al
For the record, I have filed a request with the Release Team now to
get the green light to upload Bullseye packages. See:
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1049325
Hi, it looks like this bug was introduced in the suggested patch for
#1032186 [1].
I've attached a simple patch which rearranges the conditionals to make
sure the variables containing the Kernel and Initrd names are populated
even if the command is "remove".
Da
in xml files not only 'disk type' have to be changed to 'block' but also
'source' to 'dev'
Can be closed as not a bug
--
Daniel
Package: libvirt-clients
Version: 9.0.0-4
Severity: grave
Justification: renders package unusable
The xml configuration file was working well on Debian 11. After
upgrading to Bookworm I get this error, VM doesn't start:
virsh # start UTM
erreur :Failed to start domain 'UTM'
erreur :internal err
Hello,
I can confirm this, this issue can be closed.
- Daniel
On 7/29/23 14:13, Ervin Hegedüs wrote:
Seems like this bug is fixed.
# apt install libnginx-mod-http-modsecurity --default-release bookworm
Reading package lists... Done
Building dependency tree... Done
Reading state information
Package: bolt
Version: 1:16.0-57~exp2
Severity: critical
Justification: breaks unrelated software
X-Debbugs-Cc: neel...@gmail.com
The new dependency package from llvm-defaults steals the name from the old
thunderbolt package.
Control: tag -1 pending
Hello,
Bug #1026650 in golang-github-census-instrumentation-opencensus-proto reported
by you has been fixed in the
Git repository and is awaiting an upload. You can see the commit
message below and you can check the diff of the fix at:
https://salsa.debian.org/go-team/pa
between testing and unstable. Also the error message doesn't
sound like prompt-toolkit is involved here at all.
Regards,
Daniel
ly in Debian available version of haproxy-log-analysis is 7 years
old. There have been several releases by upstream since then. The latest was
version 5.1.0 released on December 3rd, 2022.
Please update haproxy-log-analysis so that we have a working version in Debian
again.
Thank you and kind regards,
Daniel
-- System Information:
Versions of packages haproxy-log-analysis depends on:
ii python3 3.9.2-3
pn python3-haproxy-log-analysis
haproxy-log-analysis recommends no packages.
ck look and concluded that they shouldn't interfere with the CVE
patches.
I'd be happy to try to achieve the "upload to bullseye-security" if
you all can give me some pointers. This is all new to me.
Best regards,
Daniel
Hi Salvatore--
On Fri 2023-06-02 21:20:50 +0200, Salvatore Bonaccorso wrote:
> Thanks for having a closer look and for your assessment. Then I
> believe we can have a fix scheduled via respective point releases, I
> do not see an urgency for it requiring a DSA. Initially I was not
> completely sur
e's the patch against v4.3 that i intend to send to
bullseye-security:
From: Daniel Kahn Gillmor
Date: Thu, 1 Jun 2023 16:12:50 -0400
Subject: Resolve CVE-2023-30570
see https://libreswan.org/security/CVE-2023-30570/CVE-2023-30570.txt
This patch was ported from
https://libreswan.org/secur
1 - 100 of 1054 matches
Mail list logo