Bug#1036885: unblock: hipsparse/5.3.3+dfsg-2

2023-05-31 Thread Paul Gevers
control: tags -1 moreinfo Hi Christian, On 31-05-2023 20:05, Christian Kastner wrote: I'm willing to do what it takes to get this fixed in testing, but I'm not sure which solution, if any, is agreeable to the RT: (6) Alternatives? Please upload hipsparse to tpu (targeting bookworm in the c

Processed: Re: Bug#1036885: unblock: hipsparse/5.3.3+dfsg-2

2023-05-31 Thread Debian Bug Tracking System
Processing control commands: > tags -1 moreinfo Bug #1036885 [release.debian.org] unblock: hipsparse/5.3.3+dfsg-2 Added tag(s) moreinfo. -- 1036885: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036885 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems

Processed: Re: Bug#1036713: unblock: xserver-xorg-video-geode/2.11.21-1

2023-05-31 Thread Debian Bug Tracking System
Processing control commands: > tags -1 moreinfo Bug #1036713 [release.debian.org] unblock: xserver-xorg-video-geode/2.11.21-1 Added tag(s) moreinfo. -- 1036713: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036713 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems

Bug#1036713: unblock: xserver-xorg-video-geode/2.11.21-1

2023-05-31 Thread Paul Gevers
control: tags -1 moreinfo On 24-05-2023 18:44, Martin-Éric Racine wrote: 1) Ensure build from source on recent autoconf. What does this mean? Does it now FTBFS? (I checked on reproducible builds, but that doesn't seem to be the case). Without an extremely good reason I'm currently not seein

Bug#1036977: bullseye-pu: package jqueryui/1.12.1+dfsg-8+deb11u2

2023-05-31 Thread Yadd
On 5/31/23 23:30, Salvatore Bonaccorso wrote: Hi Yadd, On Wed, May 31, 2023 at 03:13:06PM +0400, Yadd wrote: Package: release.debian.org Severity: normal Tags: bullseye User: release.debian@packages.debian.org Usertags: pu X-Debbugs-Cc: jquer...@packages.debian.org Control: affects -1 + src

Bug#1036896: marked as done (unblock: vdr-plugin-xineliboutput/2.2.0+git20211212-2.2)

2023-05-31 Thread Debian Bug Tracking System
Your message dated Wed, 31 May 2023 22:46:55 + with message-id and subject line unblock vdr-plugin-xineliboutput has caused the Debian Bug report #1036896, regarding unblock: vdr-plugin-xineliboutput/2.2.0+git20211212-2.2 to be marked as done. This means that you claim that the problem has be

Bug#1036889: marked as done (unblock: ignition-physics/5.1.0+ds1-4.1)

2023-05-31 Thread Debian Bug Tracking System
Your message dated Wed, 31 May 2023 22:45:01 + with message-id and subject line unblock ignition-physics has caused the Debian Bug report #1036889, regarding unblock: ignition-physics/5.1.0+ds1-4.1 to be marked as done. This means that you claim that the problem has been dealt with. If this i

Bug#1036883: marked as done (unblock: inventor/2.1.5-10+dfsg-2)

2023-05-31 Thread Debian Bug Tracking System
Your message dated Wed, 31 May 2023 22:46:03 + with message-id and subject line unblock inventor has caused the Debian Bug report #1036883, regarding unblock: inventor/2.1.5-10+dfsg-2 to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case

Processed: unblock: forensics-extra/2.45

2023-05-31 Thread Debian Bug Tracking System
Processing control commands: > affects -1 + src:forensics-extra Bug #1037003 [release.debian.org] unblock: forensics-extra/2.45 Added indication that 1037003 affects src:forensics-extra -- 1037003: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1037003 Debian Bug Tracking System Contact ow...

Bug#1037003: unblock: forensics-extra/2.45

2023-05-31 Thread Joao Eriberto Mota Filho
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock X-Debbugs-Cc: forensics-ex...@packages.debian.org Control: affects -1 + src:forensics-extra Please unblock package forensics-extra [ Reason ] forensics-extra (like forensics-all) is a metap

Processed: unblock: forensics-all/3.45

2023-05-31 Thread Debian Bug Tracking System
Processing control commands: > affects -1 + src:forensics-all Bug #1037002 [release.debian.org] unblock: forensics-all/3.45 Added indication that 1037002 affects src:forensics-all -- 1037002: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1037002 Debian Bug Tracking System Contact ow...@bugs.

Bug#1037002: unblock: forensics-all/3.45

2023-05-31 Thread Joao Eriberto Mota Filho
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock X-Debbugs-Cc: forensics-...@packages.debian.org Control: affects -1 + src:forensics-all Please unblock package forensics-all. [ Reason ] forensics-all (like forensics-extra) is a metapackag

Bug#1037000: unblock: crowdsec/1.4.6-4 and bouncers

2023-05-31 Thread Cyril Brulebois
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock Hi! Please unblock packages crowdsec, crowdsec-custom-bouncer, and crowdsec-firewall-bouncer. I'm filing a single unblock request since all three packages are entangled, and Paul suggested

Processed: your mail

2023-05-31 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > affects 1036591 forensics-all forensics-extra Bug #1036591 {Done: Leandro Cunha } [reaver] reaver: segmentation fault Added indication that 1036591 affects forensics-all and forensics-extra > affects 1036809 forensics-all forensics-extra Bug #103

Bug#1036867: marked as done (unblock: qt6-base/6.4.2+dfsg-10)

2023-05-31 Thread Debian Bug Tracking System
Your message dated Wed, 31 May 2023 22:09:27 +0200 with message-id <64ef3095-e5eb-6a54-d48c-fbe1e5ec5...@debian.org> and subject line Re: Bug#1036867: unblock: qt6-base/6.4.2+dfsg-10 has caused the Debian Bug report #1036867, regarding unblock: qt6-base/6.4.2+dfsg-10 to be marked as done. This mea

Bug#1036864: marked as done (unblock: soapysdr/0.8.1-3)

2023-05-31 Thread Debian Bug Tracking System
Your message dated Wed, 31 May 2023 22:06:39 +0200 with message-id and subject line Re: Bug#1036864: unblock: soapysdr/0.8.1-3 has caused the Debian Bug report #1036864, regarding unblock: soapysdr/0.8.1-3 to be marked as done. This means that you claim that the problem has been dealt with. If th

Bug#1036954: marked as done (RM: matrix-synapse/1.78.0-1)

2023-05-31 Thread Debian Bug Tracking System
Your message dated Wed, 31 May 2023 22:03:23 +0200 with message-id <7e3e9226-c82d-a752-cde2-a516f1b7f...@debian.org> and subject line Re: Bug#1036954: RM: matrix-synapse/1.78.0-1 has caused the Debian Bug report #1036954, regarding RM: matrix-synapse/1.78.0-1 to be marked as done. This means that

Bug#1036852: marked as done (unblock: r-cran-pander/0.6.5+dfsg-3)

2023-05-31 Thread Debian Bug Tracking System
Your message dated Wed, 31 May 2023 21:59:29 +0200 with message-id <5e8ba39a-3a6b-26cd-92b2-a43d6d910...@debian.org> and subject line Re: Bug#1036852: unblock: r-cran-pander/0.6.5+dfsg-3 has caused the Debian Bug report #1036852, regarding unblock: r-cran-pander/0.6.5+dfsg-3 to be marked as done.

Bug#1036801: marked as done (unblock: curl/7.88.1-10)

2023-05-31 Thread Debian Bug Tracking System
Your message dated Wed, 31 May 2023 21:54:30 +0200 with message-id <40867e5e-cbda-b256-9559-75e68d9fc...@debian.org> and subject line Re: Bug#1036801: unblock: curl/7.88.1-10 has caused the Debian Bug report #1036801, regarding unblock: curl/7.88.1-10 to be marked as done. This means that you clai

Bug#1036307: marked as done (unblock: ufw/0.36.2-1)

2023-05-31 Thread Debian Bug Tracking System
Your message dated Wed, 31 May 2023 21:50:53 +0200 with message-id <996bc79d-d74d-3664-38c1-2777b45f2...@debian.org> and subject line Re: Bug#1036307: unblock: ufw/0.36.2-1 has caused the Debian Bug report #1036307, regarding unblock: ufw/0.36.2-1 to be marked as done. This means that you claim th

Bug#1036977: bullseye-pu: package jqueryui/1.12.1+dfsg-8+deb11u2

2023-05-31 Thread Salvatore Bonaccorso
Hi Yadd, On Wed, May 31, 2023 at 03:13:06PM +0400, Yadd wrote: > Package: release.debian.org > Severity: normal > Tags: bullseye > User: release.debian@packages.debian.org > Usertags: pu > X-Debbugs-Cc: jquer...@packages.debian.org > Control: affects -1 + src:jqueryui > > [ Reason ] > jqueryu

Processed: Re: Bug#1036957: unblock: openssl/3.0.8-1

2023-05-31 Thread Debian Bug Tracking System
Processing control commands: > tags -1 d-i Bug #1036957 [release.debian.org] unblock: openssl/3.0.9-1 Added tag(s) d-i. -- 1036957: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036957 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems

Bug#1036957: unblock: openssl/3.0.8-1

2023-05-31 Thread Paul Gevers
Control: tags -1 d-i Hi kibi, Can you have a look at this onblock request? It's blocked on your block-udeb. Paul On 30-05-2023 22:52, Sebastian Andrzej Siewior wrote: control: retitle -1 unblock: openssl/3.0.9-1 On 2023-05-30 22:16:53 [+0200], To sub...@bugs.debian.org wrote: Please unbl

Bug#1036885: unblock: hipsparse/5.3.3+dfsg-2

2023-05-31 Thread Christian Kastner
On 2023-05-31 19:28, Adam D. Barratt wrote: > In the versions in testing, both packages only built for amd64. In > unstable, they have also built for arm64. Migrating the arm64 hipsparse > binaries from unstable therefore requires migrating a version of > rocsparse with arm64 binaries. Oh, that's

Bug#1036914: [Debian-on-mobile-maintainers] Bug#1036914: unblock: librem5-flash-image/0.0.3-1

2023-05-31 Thread Evangelos Ribeiro Tzaras
On Mon, 2023-05-29 at 13:15 +0200, Guido Günther wrote: > [ Other info ] > I apologize for being late here, I simply missed that the version > is outdated. I could have backported the patch but just using the > upstream version (which didn't bring any other features) seemed more > reasonable here

Bug#1036885: unblock: hipsparse/5.3.3+dfsg-2

2023-05-31 Thread Adam D. Barratt
On Wed, 2023-05-31 at 19:09 +0200, Christian Kastner wrote: > I can't see why rocsparse 5.3.0+dfsg-3 would > block > hipsparse? The Depends and Build-Depends aren't versioned. In the versions in testing, both packages only built for amd64. In unstable, they have also built for arm64. Migrating the

Bug#1036885: unblock: hipsparse/5.3.3+dfsg-2

2023-05-31 Thread Christian Kastner
Hi Graham, On 2023-05-31 08:58, Graham Inggs wrote: > Hi Christian > > On Sun, 28 May 2023 at 18:48, Christian Kastner wrote: >> unblock hipsparse/5.3.3+dfsg-2 > > The debdiff looks good to me, however the migration of > hipsparse/5.3.3+dfsg-2 appears to be blocked by rocsparse/5.3.0+dfsg-3 > [

Bug#1036989: unblock: needrestart/3.6-4

2023-05-31 Thread Patrick Matthäi
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock X-Debbugs-Cc: tho...@fiasko-nw.net Please unblock package needrestart [ Reason ] In the past I have used the wrong version number, to remove a leftover config file. Also this update should

Bug#1036984: unblock: packagekit/1.2.6-5

2023-05-31 Thread Matthias Klumpp
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock Please unblock package packagekit. [ Reason ] Three things fixed: * A tiny memory leak has been addressed * The daemon package now recommends the tools package again, this was changed late

Bug#1036983: bookworm-pu: package workflow/0.10.5-2

2023-05-31 Thread Lin Qigang
Package: release.debian.org Severity: normal Tags: bookworm User: release.debian@packages.debian.org Usertags: pu Dear release team, I would like to upload a new version of workflow (0.10.5-2) which fixes two bugs in the package that are currently marking it for autoremoval. I have just up

Bug#1036982: unblock: debspawn/0.6.2-1

2023-05-31 Thread Matthias Klumpp
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock Please unblock package debspawn. [ Reason ] Packaging of the 0.6.2 bugfix release which contains three changes only: * Fixes issue where users could not build packages against NotAutomatic

Bug#1036980: unblock: jquery-minicolors/2.3.5+dfsg-4

2023-05-31 Thread Yadd
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock X-Debbugs-Cc: jquery-minicol...@packages.debian.org Control: affects -1 + src:jquery-minicolors Please unblock package jquery-minicolors [ Reason ] jquery-minicolor is vulnerable to a cross

Processed: unblock: jquery-minicolors/2.3.5+dfsg-4

2023-05-31 Thread Debian Bug Tracking System
Processing control commands: > affects -1 + src:jquery-minicolors Bug #1036980 [release.debian.org] unblock: jquery-minicolors/2.3.5+dfsg-4 Added indication that 1036980 affects src:jquery-minicolors -- 1036980: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036980 Debian Bug Tracking System

Bug#1036979: unblock: appstream/0.16.1-2

2023-05-31 Thread Matthias Klumpp
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock Please unblock package appstream. [ Reason ] Backports a few fixes from the 0.16.2 release: * Fixes two crashes that can happen when the tool is fed invalid or unexpected input * Correctl

Bug#1036978: bookworm-pu: package node-undici/5.15.0+dfsg1+~cs20.10.9.3-1+deb12u1

2023-05-31 Thread Yadd
Package: release.debian.org Severity: normal Tags: bookworm User: release.debian@packages.debian.org Usertags: pu X-Debbugs-Cc: node-und...@packages.debian.org Control: affects -1 + src:node-undici [ Reason ] node-undici is vulnerable to: * CVE-2023-23936: "Host" HTTP header isn't protected a

Processed: bookworm-pu: package node-undici/5.15.0+dfsg1+~cs20.10.9.3-1+deb12u1

2023-05-31 Thread Debian Bug Tracking System
Processing control commands: > affects -1 + src:node-undici Bug #1036978 [release.debian.org] bookworm-pu: package node-undici/5.15.0+dfsg1+~cs20.10.9.3-1+deb12u1 Added indication that 1036978 affects src:node-undici -- 1036978: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036978 Debian B

Processed: retitle 1032994 to bookworm-pu: package node-webpack/5.75.0+dfsg+~cs17.16.14-1+deb12u1 ...

2023-05-31 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > retitle 1032994 bookworm-pu: package > node-webpack/5.75.0+dfsg+~cs17.16.14-1+deb12u1 Bug #1032994 [release.debian.org] unblock: node-webpack/5.76.1+dfsg1+~cs17.16.16-1 Changed Bug title to 'bookworm-pu: package node-webpack/5.75.0+dfsg+~cs17.1

Processed: bullseye-pu: package jqueryui/1.12.1+dfsg-8+deb11u2

2023-05-31 Thread Debian Bug Tracking System
Processing control commands: > affects -1 + src:jqueryui Bug #1036977 [release.debian.org] bullseye-pu: package jqueryui/1.12.1+dfsg-8+deb11u2 Added indication that 1036977 affects src:jqueryui -- 1036977: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036977 Debian Bug Tracking System Cont

Bug#1036977: bullseye-pu: package jqueryui/1.12.1+dfsg-8+deb11u2

2023-05-31 Thread Yadd
Package: release.debian.org Severity: normal Tags: bullseye User: release.debian@packages.debian.org Usertags: pu X-Debbugs-Cc: jquer...@packages.debian.org Control: affects -1 + src:jqueryui [ Reason ] jqueryui is potentially vulnerable to cross-site scripting (CVE-2022-31160) [ Impact ] Low

Bug#1036976: bullseye-pu: package grunt/1.3.0-1+deb11u2

2023-05-31 Thread Yadd
Package: release.debian.org Severity: normal Tags: bullseye User: release.debian@packages.debian.org Usertags: pu X-Debbugs-Cc: gr...@packages.debian.org Control: affects -1 + src:grunt [ Reason ] file.copy operations in GruntJS are vulnerable to a TOCTOU race condition leading to arbitrary fi

Processed: bullseye-pu: package grunt/1.3.0-1+deb11u2

2023-05-31 Thread Debian Bug Tracking System
Processing control commands: > affects -1 + src:grunt Bug #1036976 [release.debian.org] bullseye-pu: package grunt/1.3.0-1+deb11u2 Added indication that 1036976 affects src:grunt -- 1036976: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036976 Debian Bug Tracking System Contact ow...@bugs.d

Bug#1036975: bullseye-pu: package node-url-parse/1.5.3-1+deb11u2

2023-05-31 Thread Yadd
Package: release.debian.org Severity: normal Tags: bullseye User: release.debian@packages.debian.org Usertags: pu X-Debbugs-Cc: node-url-pa...@packages.debian.org Control: affects -1 + src:node-url-parse [ Reason ] node-url-parse is vulnerable to authorization bypass through user-controlled ke

Processed: bullseye-pu: package node-url-parse/1.5.3-1+deb11u2

2023-05-31 Thread Debian Bug Tracking System
Processing control commands: > affects -1 + src:node-url-parse Bug #1036975 [release.debian.org] bullseye-pu: package node-url-parse/1.5.3-1+deb11u2 Added indication that 1036975 affects src:node-url-parse -- 1036975: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036975 Debian Bug Tracking

Processed: unblock: syncthing-gtk/0.9.4.4+ds+git20221205+12a9702d29ab-2

2023-05-31 Thread Debian Bug Tracking System
Processing control commands: > affects -1 + src:syncthing-gtk Bug #1036969 [release.debian.org] unblock: syncthing-gtk/0.9.4.4+ds+git20221205+12a9702d29ab-2 Added indication that 1036969 affects src:syncthing-gtk -- 1036969: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036969 Debian Bug T

Bug#1036969: unblock: syncthing-gtk/0.9.4.4+ds+git20221205+12a9702d29ab-2

2023-05-31 Thread Andrej Shadura
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock X-Debbugs-Cc: syncthing-...@packages.debian.org Control: affects -1 + src:syncthing-gtk Please unblock package syncthing-gtk Syncthing-GTK has been hardcoding a non-PEP-440-compliant versio

Bug#1036885: unblock: hipsparse/5.3.3+dfsg-2

2023-05-31 Thread Graham Inggs
Hi Christian On Sun, 28 May 2023 at 18:48, Christian Kastner wrote: > unblock hipsparse/5.3.3+dfsg-2 The debdiff looks good to me, however the migration of hipsparse/5.3.3+dfsg-2 appears to be blocked by rocsparse/5.3.0+dfsg-3 [1]. Migrates after: rocsparse Migration status for hipsparse (5.3.3