Bug#1033674: marked as done (unblock: linux/6.1.20-1)

2023-03-29 Thread Debian Bug Tracking System
Your message dated Thu, 30 Mar 2023 08:44:59 +0200 with message-id and subject line Re: Bug#1033674: unblock: linux/6.1.20-1 has caused the Debian Bug report #1033674, regarding unblock: linux/6.1.20-1 to be marked as done. This means that you claim that the problem has been dealt with. If this i

Re: Inquiry about Debian Rootfs Construction

2023-03-29 Thread Paul Gevers
Hi, On 29-03-2023 04:06, z Spring wrote: I hope this message finds you well. I am writing to inquire about the construction of Debian Rootfs. I was wondering if you could kindly provide some information on how your team constructs this system, and whether the method of construction ha

Bug#1033687: unblock: debian-pan/0.4

2023-03-29 Thread Andreas Tille
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock X-Debbugs-Cc: debian-...@packages.debian.org, debian-pan-maintain...@alioth-lists.debian.net, pi...@debian.org Control: affects -1 + src:debian-pan Please unblock package debian-pan (Pleas

Processed: unblock: debian-pan/0.4

2023-03-29 Thread Debian Bug Tracking System
Processing control commands: > affects -1 + src:debian-pan Bug #1033687 [release.debian.org] unblock: debian-pan/0.4 Added indication that 1033687 affects src:debian-pan -- 1033687: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033687 Debian Bug Tracking System Contact ow...@bugs.debian.org

Bug#1033683: unblock: libitext-java/2.1.7-14

2023-03-29 Thread tony mancill
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock X-Debbugs-Cc: libitext-j...@packages.debian.org Control: affects -1 + src:libitext-java Please unblock package libitext-java [ Reason ] src:libitext-java 2.1.7-14 no longer builds binary li

Processed: unblock: libitext-java/2.1.7-14

2023-03-29 Thread Debian Bug Tracking System
Processing control commands: > affects -1 + src:libitext-java Bug #1033683 [release.debian.org] unblock: libitext-java/2.1.7-14 Added indication that 1033683 affects src:libitext-java -- 1033683: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033683 Debian Bug Tracking System Contact ow...@b

Bug#1033682: unblock tomboy-ng: 0.36a

2023-03-29 Thread David Bannon
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock Please unblock package tomboy-ng v0.36a [ Reason ] Poor testing on my part lead to the use of bad colors for dark themes with version 0.36 currently in Bookworm. This relates to tomboy-ng

Bug#1031587: [request-tracker-maintainers] Bug#1031587: Handling of the request-tracker4 -> request-tracker5 transition in bookworm

2023-03-29 Thread Dominic Hargreaves
On Mon, Mar 20, 2023 at 11:06:49PM +0100, Sebastian Ramacher wrote: > Hi Dominic > > On 2023-02-27 15:50:05 +, Dominic Hargreaves wrote: > > On Thu, Feb 23, 2023 at 04:54:33PM +0100, Paul Gevers wrote: > > > Control: tags -1 moreinfo > > > > > > Hi, > > > > > > On 20-02-2023 13:09, Dominic H

Re: Situation for redis for bookworm?

2023-03-29 Thread Chris Lamb
Salvatore Bonaccorso wrote: > I do not think I have any special weight more on doing it ;-). If you > can ask with a bugreport for an unblock that would be great, thank you > Chris. Unblock request filed as #1033677. Regards, -- ,''`. : :' : Chris Lamb `. `'` la...@d

Bug#1033674: unblock: linux/6.1.20-1

2023-03-29 Thread Cyril Brulebois
Salvatore Bonaccorso (2023-03-29): > Thus please unblock the current version to testing (and age it > accordingly). > > unblock linux/6.1.20-1 ACK on the unblock/age-days 10 request for the d-i team, happy to build the installer against it. :) Cheers, -- Cyril Brulebois (k...@debian.org)

Bug#1033676: unblock: xen/4.17.0+74-g3eac216e6e-1 (pre-approval)

2023-03-29 Thread Maximilian Engelhardt
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock X-Debbugs-Cc: x...@packages.debian.org, m...@daemonizer.de, t...@security.debian.org Control: affects -1 + src:xen Please approve an upload of xen to unstable and later unblock package xen.

Processed: unblock: xen/4.17.0+74-g3eac216e6e-1 (pre-approval)

2023-03-29 Thread Debian Bug Tracking System
Processing control commands: > affects -1 + src:xen Bug #1033676 [release.debian.org] unblock: xen/4.17.0+74-g3eac216e6e-1 (pre-approval) Added indication that 1033676 affects src:xen -- 1033676: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033676 Debian Bug Tracking System Contact ow...@

Bug#1033614: marked as done (unblock: zfs-linux/2.1.9-3)

2023-03-29 Thread Debian Bug Tracking System
Your message dated Wed, 29 Mar 2023 20:39:15 + with message-id and subject line unblock zfs-linux has caused the Debian Bug report #1033614, regarding unblock: zfs-linux/2.1.9-3 to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is

Bug#1033674: unblock: linux/6.1.20-1

2023-03-29 Thread Salvatore Bonaccorso
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock X-Debbugs-Cc: li...@packages.debian.org, k...@debian.org, car...@debian.org Control: affects -1 + src:linux Hi release team, Please unblock package linux The last update of src:linux did i

Processed: unblock: linux/6.1.20-1

2023-03-29 Thread Debian Bug Tracking System
Processing control commands: > affects -1 + src:linux Bug #1033674 [release.debian.org] unblock: linux/6.1.20-1 Added indication that 1033674 affects src:linux -- 1033674: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033674 Debian Bug Tracking System Contact ow...@bugs.debian.org with prob

Processed: Re: Bug#1033439: pre-unblock: monitoring-plugins/2.3.3-5

2023-03-29 Thread Debian Bug Tracking System
Processing control commands: > tags -1 moreinfo Bug #1033439 [release.debian.org] pre-unblock: monitoring-plugins/2.3.3-5 Ignoring request to alter tags of bug #1033439 to the same tags previously set -- 1033439: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033439 Debian Bug Tracking Syste

Bug#1033439: pre-unblock: monitoring-plugins/2.3.3-5

2023-03-29 Thread Sebastian Ramacher
Control: tags -1 moreinfo On 2023-03-27 16:13:50 +0200, Jan Wagner wrote: > Hi, > > Am 27.03.23 um 08:28 schrieb Jan Wagner: > > here are the upstream fixes, related upstream CI pipelines and issues: > > while we are at fixing bugs. > > I'd also like to include > https://patch-diff.githubuserc

Bug#1033573: marked as done (unblock: ruby3.1/3.1.2-7)

2023-03-29 Thread Debian Bug Tracking System
Your message dated Wed, 29 Mar 2023 20:19:57 + with message-id and subject line unblock ruby3.1 has caused the Debian Bug report #1033573, regarding unblock: ruby3.1/3.1.2-7 to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now

Bug#1033668: marked as done (unblock: xorg-server/2:21.1.7-2)

2023-03-29 Thread Debian Bug Tracking System
Your message dated Wed, 29 Mar 2023 20:21:00 + with message-id and subject line unblock xorg-server has caused the Debian Bug report #1033668, regarding unblock: xorg-server/2:21.1.7-2 to be marked as done. This means that you claim that the problem has been dealt with. If this is not the cas

Bug#1033442: marked as done (unblock: golang-go.opencensus/0.24.0-1)

2023-03-29 Thread Debian Bug Tracking System
Your message dated Wed, 29 Mar 2023 20:51:37 +0200 with message-id and subject line Re: Bug#1033442: unblock: golang-go.opencensus/0.24.0-1 has caused the Debian Bug report #1033442, regarding unblock: golang-go.opencensus/0.24.0-1 to be marked as done. This means that you claim that the problem

Bug#1033670: unblock: xwayland/2:22.1.9-1

2023-03-29 Thread Julien Cristau
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock X-Debbugs-Cc: jcris...@debian.org Please unblock package xwayland [ Reason ] CVE-2023-1393 [ Risks ] Arguably we could have cherry-picked just the CVE fix but the rest seems reasonably low

Bug#1033669: bullseye-pu: package libdatetime-timezone-perl/1:2.47-1+2023c

2023-03-29 Thread gregor herrmann
Package: release.debian.org Severity: normal Tags: bullseye User: release.debian@packages.debian.org Usertags: pu X-Debbugs-Cc: libdatetime-timezone-p...@packages.debian.org, debian-p...@lists.debian.org Control: affects -1 + src:libdatetime-timezone-perl -BEGIN PGP SIGNED MESSAGE- Ha

Processed: bullseye-pu: package libdatetime-timezone-perl/1:2.47-1+2023c

2023-03-29 Thread Debian Bug Tracking System
Processing control commands: > affects -1 + src:libdatetime-timezone-perl Bug #1033669 [release.debian.org] bullseye-pu: package libdatetime-timezone-perl/1:2.47-1+2023c Added indication that 1033669 affects src:libdatetime-timezone-perl -- 1033669: https://bugs.debian.org/cgi-bin/bugreport.cgi

Bug#1033668: unblock: xorg-server/2:21.1.7-2

2023-03-29 Thread Julien Cristau
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock X-Debbugs-Cc: jcris...@debian.org Please unblock package xorg-server [ Reason ] CVE-2023-1393 [ Risks ] Simple patch to reset a pointer to freed memory. [ Checklist ] [x] all changes ar

Processed: unblock: libdatetime-timezone-perl/1:2.60-1+2023c

2023-03-29 Thread Debian Bug Tracking System
Processing control commands: > affects -1 + src:libdatetime-timezone-perl Bug #1033664 [release.debian.org] unblock: libdatetime-timezone-perl/1:2.60-1+2023c Added indication that 1033664 affects src:libdatetime-timezone-perl -- 1033664: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033664

Bug#1033664: unblock: libdatetime-timezone-perl/1:2.60-1+2023c

2023-03-29 Thread gregor herrmann
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock X-Debbugs-Cc: libdatetime-timezone-p...@packages.debian.org, debian-p...@lists.debian.org Control: affects -1 + src:libdatetime-timezone-perl -BEGIN PGP SIGNED MESSAGE- Hash: SHA512

Bug#1033660: marked as done (unblock: pydle/0.9.4-4)

2023-03-29 Thread Debian Bug Tracking System
Your message dated Wed, 29 Mar 2023 16:56:21 + with message-id and subject line unblock pydle has caused the Debian Bug report #1033660, regarding unblock: pydle/0.9.4-4 to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now you

Bug#1033638: marked as done (unblock: pocl/3.1-3)

2023-03-29 Thread Debian Bug Tracking System
Your message dated Wed, 29 Mar 2023 17:27:34 +0100 with message-id and subject line Re: Bug#1033638: unblock: pocl/3.1-3 has caused the Debian Bug report #1033638, regarding unblock: pocl/3.1-3 to be marked as done. This means that you claim that the problem has been dealt with. If this is not th

Bug#1033660: unblock: pydle/0.9.4-4

2023-03-29 Thread Bastian Germann
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock X-Debbugs-Cc: py...@packages.debian.org Control: affects -1 + src:pydle Please unblock package pydle [ Reason ] Fixes FTBFS #1031974. [ Impact ] pydle will be auto-removed from bookworm w

Processed: unblock: pydle/0.9.4-4

2023-03-29 Thread Debian Bug Tracking System
Processing control commands: > affects -1 + src:pydle Bug #1033660 [release.debian.org] unblock: pydle/0.9.4-4 Added indication that 1033660 affects src:pydle -- 1033660: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033660 Debian Bug Tracking System Contact ow...@bugs.debian.org with probl

Bug#1033653: bullseye-pu: package lemonldap-ng/2.0.11+ds-4+deb11u

2023-03-29 Thread Yadd
Package: release.debian.org Severity: normal Tags: bullseye User: release.debian@packages.debian.org Usertags: pu X-Debbugs-Cc: lemonldap...@packages.debian.org, secur...@debian.org Control: affects -1 + src:lemonldap-ng [ Reason ] lemonldap-ng is vulnarable to a second factor bypass when used

Processed: bullseye-pu: package lemonldap-ng/2.0.11+ds-4+deb11u

2023-03-29 Thread Debian Bug Tracking System
Processing control commands: > affects -1 + src:lemonldap-ng Bug #1033653 [release.debian.org] bullseye-pu: package lemonldap-ng/2.0.11+ds-4+deb11u Added indication that 1033653 affects src:lemonldap-ng -- 1033653: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033653 Debian Bug Tracking Sy

Re: Situation for redis for bookworm?

2023-03-29 Thread Salvatore Bonaccorso
Hi Chris, On Wed, Mar 29, 2023 at 01:00:20AM +0100, Chris Lamb wrote: > Dear all, > > > The new version does not have any further regressions, as per > > https://qa.debian.org/excuses.php?package=redis. So I think that > > would be welcome to resolve all the CVEs still affecting bookworm. > > > >

Processed: unblock: pocl/3.1-3

2023-03-29 Thread Debian Bug Tracking System
Processing control commands: > block -1 with 1032887 Bug #1033638 [release.debian.org] unblock: pocl/3.1-3 1033638 was not blocked by any bugs. 1033638 was not blocking any bugs. Added blocking bug(s) of 1033638: 1032887 -- 1033638: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033638 Debia

Bug#1033638: unblock: pocl/3.1-3

2023-03-29 Thread Andreas Beckmann
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock Control: block -1 with 1032887 Please unblock package pocl [ Reason ] build pocl against llvm-15 insteal of llvm-14 this is blocked by llvm-toolchain-15 since it picked up a dependency on t

NEW changes in stable-new

2023-03-29 Thread Debian FTP Masters
Processing changes file: ceph_14.2.21-1+deb11u1_source.changes REJECT Processing changes file: dino-im_0.2.0-3+deb11u1_source.changes ACCEPT Processing changes file: dino-im_0.2.0-3+deb11u1_all-buildd.changes ACCEPT Processing changes file: dino-im_0.2.0-3+deb11u1_amd64-buildd.changes ACCEP

Bug#1033620: marked as done (unblock: python-scrapy/2.8.0-2)

2023-03-29 Thread Debian Bug Tracking System
Your message dated Wed, 29 Mar 2023 07:29:04 + with message-id and subject line unblock python-scrapy has caused the Debian Bug report #1033620, regarding unblock: python-scrapy/2.8.0-2 to be marked as done. This means that you claim that the problem has been dealt with. If this is not the ca