Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
X-Debbugs-Cc: 1035...@bugs.debian.org, j...@packages.debian.org
Control: affects -1 + src:jed
Please unblock package jed.
The version in unstable fixes the RC bug #1036096. This bug was int
Processing control commands:
> affects -1 + src:jed
Bug #1036787 [release.debian.org] unblock: jed/0.99.20~pre.178+dfsg-6
Added indication that 1036787 affects src:jed
--
1036787: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036787
Debian Bug Tracking System
Contact ow...@bugs.debian.org w
First of all trapperkeeper-webserver-jetty9-clojure should add a build-
dependency on logback to detect such regressions in advance.
#1036250 is mainly a logback problem, not a tomcat problem. I still would like
to hear Emmanuel's opinion. We still could revert to libtomcat9-java, if we
don't find
Le 2023-05-25 à 17 h 41, Martin Hostettler a écrit :
Quoting from J�r�me Charaoui in (#1036250):
I did further tests with puppetserver, which is a downstream dependency
of trapperkeeper-webserver-jetty9-clojure and unfortunately, the web
requests (access) logging remains broken. There are no wa
I was asked to send a update to this bug from my notes/open tabs.
>From what i can see this is still a problem and it is getting very late
to fix all the fallout.
There are still 2 packages that are not fixed for this.
src:trapperkeeper-webserver-jetty9-clojure (#1036250) which is as far as
I un
Sorry, that should have been #1036249.
signature.asc
Description: This is a digitally signed message part
Control: tags -1 patch
Hello,
I have been working on #1036159 and before I go ahead with my solution I would
like to hear your opinion whether this is acceptable.
Apparently closure-compiler embeds rhino classes and thus every time rhino is
updated, closure-compiler must be rebuilt too. I did ju
Your message dated Thu, 25 May 2023 21:00:10 +
with message-id
and subject line unblock libreoffice
has caused the Debian Bug report #1036766,
regarding unblock: libreoffice/4:7.4.5-3
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case
Your message dated Thu, 25 May 2023 19:33:16 +
with message-id
and subject line unblock mmdebstrap
has caused the Debian Bug report #1035975,
regarding [pre-approval] unblock: mmdebstrap/1.3.5-X
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is n
Your message dated Thu, 25 May 2023 19:04:29 +
with message-id
and subject line unblock sxmo-utils
has caused the Debian Bug report #1036720,
regarding unblock: sxmo-utils/1.12.0-7
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it
Your message dated Thu, 25 May 2023 19:03:44 +
with message-id
and subject line unblock manaplus
has caused the Debian Bug report #1036675,
regarding unblock: manaplus/2.1.3.17-5
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it i
Your message dated Thu, 25 May 2023 19:03:29 +
with message-id
and subject line unblock swtpm
has caused the Debian Bug report #1036772,
regarding unblock: swtpm/0.7.1-1.3
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now y
Your message dated Thu, 25 May 2023 19:00:26 +
with message-id
and subject line unblock samba
has caused the Debian Bug report #1036741,
regarding unblock: samba/2:4.17.8+dfsg-2
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is
Your message dated Thu, 25 May 2023 19:01:55 +
with message-id
and subject line unblock rnp
has caused the Debian Bug report #1036721,
regarding unblock: rnp/0.16.3-1
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your r
Your message dated Thu, 25 May 2023 19:01:29 +
with message-id
and subject line unblock reserialize
has caused the Debian Bug report #1036710,
regarding unblock: reserialize/20220929-2
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the cas
Package: release.debian.org
Control: affects -1 + src:swtpm
X-Debbugs-Cc: sw...@packages.debian.org
User: release.debian@packages.debian.org
Usertags: unblock
Severity: normal
Please unblock package swtpm.
[ Reason ]
Fix for RC bugs #1035460 and #1036101.
[ Impact ]
FTBFS and missing depend
Processing control commands:
> affects -1 + src:swtpm
Bug #1036772 [release.debian.org] unblock: swtpm/0.7.1-1.3
Added indication that 1036772 affects src:swtpm
--
1036772: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036772
Debian Bug Tracking System
Contact ow...@bugs.debian.org with pro
Your message dated Thu, 25 May 2023 18:18:16 +0200
with message-id
and subject line Re: Bug#1036762: unblock: apt/2.6.1
has caused the Debian Bug report #1036762,
regarding unblock: apt/2.6.1
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the
Your message dated Thu, 25 May 2023 18:16:26 +0200
with message-id
and subject line Re: Bug#1036164: nmu: fcitx5-zhuyin_5.0.11-1
has caused the Debian Bug report #1036164,
regarding nmu: fcitx5-zhuyin_5.0.11-1
to be marked as done.
This means that you claim that the problem has been dealt with.
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
X-Debbugs-Cc: libreoff...@packages.debian.org, t...@security.debian.org
Control: affects -1 + src:libreoffice
Please unblock package libreoffice
[ Reason ]
1. Main reason is CVE-2023-2255 a
Processing control commands:
> affects -1 + src:libreoffice
Bug #1036766 [release.debian.org] unblock: libreoffice/4:7.4.5-3
Added indication that 1036766 affects src:libreoffice
--
1036766: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036766
Debian Bug Tracking System
Contact ow...@bugs.d
Your message dated Thu, 25 May 2023 17:06:20 +0200
with message-id
and subject line Re: Bug#1036757: unblock:
debian-security-support/1:12+2023.05.12
has caused the Debian Bug report #1036757,
regarding unblock: debian-security-support/1:12+2023.05.12
to be marked as done.
This means that you cl
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
X-Debbugs-Cc: a...@packages.debian.org, juli...@ubuntu.com
Control: affects -1 + src:apt
Please unblock package apt
As requested adding back adduser dep.
+ Changed the .gitlab-ci and debia
Processing control commands:
> affects -1 + src:apt
Bug #1036762 [release.debian.org] unblock: apt/2.6.1
Added indication that 1036762 affects src:apt
--
1036762: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036762
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
X-Debbugs-Cc: klebor...@packages.debian.org
Control: affects -1 + src:kleborate
Please unblock package kleborate
[ Reason ]
kleborate is affected by the release critical upgrade bug
#103674
Processing control commands:
> affects -1 + src:kleborate
Bug #1036761 [release.debian.org] unblock: kleborate/2.3.1-2
Added indication that 1036761 affects src:kleborate
--
1036761: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036761
Debian Bug Tracking System
Contact ow...@bugs.debian.or
Processing control commands:
> affects -1 + src:heat-cfntools
Bug #1036759 [release.debian.org] unblock: heat-cfntools/1.4.2-3
Added indication that 1036759 affects src:heat-cfntools
--
1036759: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036759
Debian Bug Tracking System
Contact ow...@bu
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
X-Debbugs-Cc: heat-cfnto...@packages.debian.org
Control: affects -1 + src:heat-cfntools
Please unblock package heat-cfntools
[ Reason ]
The fix packages the missing code of heat-cfntools.
Processing control commands:
> affects -1 + src:cloud-initramfs-tools
Bug #1036758 [release.debian.org] unblock: cloud-initramfs-tools/0.18.debian13
Added indication that 1036758 affects src:cloud-initramfs-tools
--
1036758: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036758
Debian Bug Tr
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
X-Debbugs-Cc: cloud-initramfs-to...@packages.debian.org
Control: affects -1 + src:cloud-initramfs-tools
Please unblock package cloud-initramfs-tools
[ Reason ]
This fixes the path to udevad
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
Please unblock package debian-security-support to update the status
of security-support in bookworm. The debdiff is trivial:
$ debdiff debian-security-support_12+2023.05.04.dsc
debian-secu
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
X-Debbugs-Cc: debian-scie...@packages.debian.org,
debian-scie...@lists.debian.org
Control: affects -1 + src:debian-science
Please unblock package debian-science
[ Reason ]
This is the usua
Processing control commands:
> affects -1 + src:debian-science
Bug #1036753 [release.debian.org] unblock: debian-science/1.14.5
Added indication that 1036753 affects src:debian-science
--
1036753: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036753
Debian Bug Tracking System
Contact ow...@
On Thu, 25 May 2023 at 11:04, Johannes Schauer Marin Rodrigues
wrote:
>
> Hi,
>
> Quoting Luca Boccassi (2023-05-24 10:52:08)
> > Regarding dash, would it be possible for the autopkgtest to support both the
> > versions in unstable and experimental, so that it works and you can get it
> > unblocke
Hi,
Quoting Luca Boccassi (2023-05-24 10:52:08)
> Regarding dash, would it be possible for the autopkgtest to support both the
> versions in unstable and experimental, so that it works and you can get it
> unblocked?
yes. The current version in unstable does exactly that. But as the dash unblock
On Wed, May 24, 2023 at 10:05:19PM +0100, Adam D. Barratt wrote:
> Great. That's now
> https://lists.debian.org/debian-stable-announce/2023/05/msg0.html
awesome, thank you!
--
cheers,
Holger
⢀⣴⠾⠻⢶⣦⠀
⣾⠁⢠⠒⠀⣿⡁ holger@(debian|reproducible-builds|layer-acht).org
⢿⡄⠘⠷⠚⠋⠀ OpenPGP:
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
Please unblock package udm
[ Reason ]
Due to a recent change in lazarus, the package could no longer be built.
[ Impact ]
The user would not be able to build the package.
[ Tests ]
As th
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
Please unblock package libricohcamerasdk
[ Reason ]
Due to some magic in debhelper/ldconfig a link to nowhere remained on the
computer.
This link will be removed in postinst/postrm now.
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
Please unblock package osmo-iuh
[ Reason ]
The current version has a superficial autopkgtest that failed.
The new version still has a superficial autopkgtest but this
no longer fails.
[ I
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
X-Debbugs-Cc: qtbase-opensource-src-g...@packages.debian.org
Control: affects -1 + src:qtbase-opensource-src-gles
Please unblock package qtbase-opensource-src-gles.
[ Reason ]
* Fixes for t
Processing control commands:
> affects -1 + src:qtbase-opensource-src-gles
Bug #1036745 [release.debian.org] unblock:
qtbase-opensource-src-gles/5.15.8+dfsg-3
Added indication that 1036745 affects src:qtbase-opensource-src-gles
--
1036745: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=10367
41 matches
Mail list logo