Bug#1010422: Bug#1011265: Britney fails to pin complete set in "Provides" api transitions [Was: Bug#1010422: transition: r-api-bioc-3.15]

2022-05-20 Thread Nilesh Patra
Hi Graham, I did some work to cleanup the rest stuff meanwhile, and need your help to ignore some of the CI temporarily to complete the migration; and also because unstable counterparts pass. I have pasted a list at the end of this email, please see to it. -- Best, Nilesh Package

Bug#1011369: transition: gromacs

2022-05-20 Thread Nicholas Breen
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: transition This is perhaps more of a "recommended best practice" request than a transition request. gromacs has an upcoming library transition, staged in experimental, and its next upload to sid

Bug#1011365: bullseye-pu: package nvidia-cuda-toolkit/11.2.2-3+deb11u2

2022-05-20 Thread Andreas Beckmann
Package: release.debian.org Severity: normal Tags: bullseye User: release.debian@packages.debian.org Usertags: pu Hi, the nvidia-cuda-toolkit 11.2.2-3+deb11u1 bullseye-pu update unfortunately updated the bundled openjdk-8 binary snapshot to a version not runnable on bullseye since it added

Bug#1011363: transition: dav1d

2022-05-20 Thread Sebastian Ramacher
Control: tags -1 confirmed On 2022-05-20 23:22:41 +0200, Dylan Aïssi wrote: > Package: release.debian.org > Severity: normal > User: release.debian@packages.debian.org > Usertags: transition > > Dear Release Team, > > Please schedule a transition slot for dav1d. > > The auto-generated ben

Processed: Re: Bug#1011363: transition: dav1d

2022-05-20 Thread Debian Bug Tracking System
Processing control commands: > tags -1 confirmed Bug #1011363 [release.debian.org] transition: dav1d Added tag(s) confirmed. -- 1011363: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1011363 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems

Bug#1011363: transition: dav1d

2022-05-20 Thread Dylan Aïssi
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: transition Dear Release Team, Please schedule a transition slot for dav1d. The auto-generated ben tracker looks good: https://release.debian.org/transitions/html/auto-dav1d.html All reverse deps

Bug#1011360: buster-pu: package python-scrapy/1.5.1-1+deb10u1

2022-05-20 Thread Stefano Rivera
Package: release.debian.org Severity: normal Tags: buster User: release.debian@packages.debian.org Usertags: pu X-Debbugs-Cc: mouzan...@gmail.com, w...@debian.org [ Reason ] Hi, there were some security issues in python-scrapy, that were deemed no-DSA [ Impact ] Known security issues, with

Bug#1011359: bullseye-pu: package python-scrapy/2.4.1-2+deb11u1

2022-05-20 Thread Stefano Rivera
Package: release.debian.org Severity: normal Tags: bullseye User: release.debian@packages.debian.org Usertags: pu X-Debbugs-Cc: mouzan...@gmail.com, w...@debian.org [ Reason ] Hi, there were some security issues in python-scrapy, that were deemed no-DSA [ Impact ] Known security issues, with

Bug#1011201: marked as done (nmu: chatty_0.6.3-1)

2022-05-20 Thread Debian Bug Tracking System
Your message dated Fri, 20 May 2022 19:01:41 +0200 with message-id <0c8d1515fca69e10398dd13db0a09ee70cccbf8e.ca...@fortysixandtwo.eu> and subject line Re: [Debian-on-mobile-maintainers] Bug#1011166: Bug#1011166: pidgin breaks chatty autopkgtest: error while loading shared libraries:

Bug#1011345: transition: rakudo

2022-05-20 Thread M. Zhou
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: transition Dear release team, We have uploaded rakudo 2022.04 to experimental, and would like to start the transition and rebuild packages Ben file: title = "rakudo"; is_affected = .depends ~

Bug#1011331: bullseye-pu: package node-raw-body/2.4.1-2+deb11u1

2022-05-20 Thread Yadd
Package: release.debian.org Severity: normal Tags: bullseye User: release.debian@packages.debian.org Usertags: pu X-Debbugs-Cc: michael.lesci...@uhn.ca, secur...@debian.org [ Reason ] node-raw-body embeds a patch that creates a Denial-of-Service vulnerability into node-express. [ Impact ]