control: tags -1 moreinfo
Hi Christian,
On 31-05-2023 20:05, Christian Kastner wrote:
I'm willing to do what it takes to get this fixed in testing, but I'm
not sure which solution, if any, is agreeable to the RT:
(6) Alternatives?
Please upload hipsparse to tpu (targeting bookworm in the c
Processing control commands:
> tags -1 moreinfo
Bug #1036885 [release.debian.org] unblock: hipsparse/5.3.3+dfsg-2
Added tag(s) moreinfo.
--
1036885: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036885
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
Processing control commands:
> tags -1 moreinfo
Bug #1036713 [release.debian.org] unblock: xserver-xorg-video-geode/2.11.21-1
Added tag(s) moreinfo.
--
1036713: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036713
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
control: tags -1 moreinfo
On 24-05-2023 18:44, Martin-Éric Racine wrote:
1) Ensure build from source on recent autoconf.
What does this mean? Does it now FTBFS? (I checked on reproducible
builds, but that doesn't seem to be the case).
Without an extremely good reason I'm currently not seein
On 5/31/23 23:30, Salvatore Bonaccorso wrote:
Hi Yadd,
On Wed, May 31, 2023 at 03:13:06PM +0400, Yadd wrote:
Package: release.debian.org
Severity: normal
Tags: bullseye
User: release.debian@packages.debian.org
Usertags: pu
X-Debbugs-Cc: jquer...@packages.debian.org
Control: affects -1 + src
Your message dated Wed, 31 May 2023 22:46:55 +
with message-id
and subject line unblock vdr-plugin-xineliboutput
has caused the Debian Bug report #1036896,
regarding unblock: vdr-plugin-xineliboutput/2.2.0+git20211212-2.2
to be marked as done.
This means that you claim that the problem has be
Your message dated Wed, 31 May 2023 22:45:01 +
with message-id
and subject line unblock ignition-physics
has caused the Debian Bug report #1036889,
regarding unblock: ignition-physics/5.1.0+ds1-4.1
to be marked as done.
This means that you claim that the problem has been dealt with.
If this i
Your message dated Wed, 31 May 2023 22:46:03 +
with message-id
and subject line unblock inventor
has caused the Debian Bug report #1036883,
regarding unblock: inventor/2.1.5-10+dfsg-2
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case
Processing control commands:
> affects -1 + src:forensics-extra
Bug #1037003 [release.debian.org] unblock: forensics-extra/2.45
Added indication that 1037003 affects src:forensics-extra
--
1037003: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1037003
Debian Bug Tracking System
Contact ow...
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
X-Debbugs-Cc: forensics-ex...@packages.debian.org
Control: affects -1 + src:forensics-extra
Please unblock package forensics-extra
[ Reason ]
forensics-extra (like forensics-all) is a metap
Processing control commands:
> affects -1 + src:forensics-all
Bug #1037002 [release.debian.org] unblock: forensics-all/3.45
Added indication that 1037002 affects src:forensics-all
--
1037002: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1037002
Debian Bug Tracking System
Contact ow...@bugs.
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
X-Debbugs-Cc: forensics-...@packages.debian.org
Control: affects -1 + src:forensics-all
Please unblock package forensics-all.
[ Reason ]
forensics-all (like forensics-extra) is a metapackag
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
Hi!
Please unblock packages crowdsec, crowdsec-custom-bouncer, and
crowdsec-firewall-bouncer.
I'm filing a single unblock request since all three packages are
entangled, and Paul suggested
Processing commands for cont...@bugs.debian.org:
> affects 1036591 forensics-all forensics-extra
Bug #1036591 {Done: Leandro Cunha } [reaver] reaver:
segmentation fault
Added indication that 1036591 affects forensics-all and forensics-extra
> affects 1036809 forensics-all forensics-extra
Bug #103
Your message dated Wed, 31 May 2023 22:09:27 +0200
with message-id <64ef3095-e5eb-6a54-d48c-fbe1e5ec5...@debian.org>
and subject line Re: Bug#1036867: unblock: qt6-base/6.4.2+dfsg-10
has caused the Debian Bug report #1036867,
regarding unblock: qt6-base/6.4.2+dfsg-10
to be marked as done.
This mea
Your message dated Wed, 31 May 2023 22:06:39 +0200
with message-id
and subject line Re: Bug#1036864: unblock: soapysdr/0.8.1-3
has caused the Debian Bug report #1036864,
regarding unblock: soapysdr/0.8.1-3
to be marked as done.
This means that you claim that the problem has been dealt with.
If th
Your message dated Wed, 31 May 2023 22:03:23 +0200
with message-id <7e3e9226-c82d-a752-cde2-a516f1b7f...@debian.org>
and subject line Re: Bug#1036954: RM: matrix-synapse/1.78.0-1
has caused the Debian Bug report #1036954,
regarding RM: matrix-synapse/1.78.0-1
to be marked as done.
This means that
Your message dated Wed, 31 May 2023 21:59:29 +0200
with message-id <5e8ba39a-3a6b-26cd-92b2-a43d6d910...@debian.org>
and subject line Re: Bug#1036852: unblock: r-cran-pander/0.6.5+dfsg-3
has caused the Debian Bug report #1036852,
regarding unblock: r-cran-pander/0.6.5+dfsg-3
to be marked as done.
Your message dated Wed, 31 May 2023 21:54:30 +0200
with message-id <40867e5e-cbda-b256-9559-75e68d9fc...@debian.org>
and subject line Re: Bug#1036801: unblock: curl/7.88.1-10
has caused the Debian Bug report #1036801,
regarding unblock: curl/7.88.1-10
to be marked as done.
This means that you clai
Your message dated Wed, 31 May 2023 21:50:53 +0200
with message-id <996bc79d-d74d-3664-38c1-2777b45f2...@debian.org>
and subject line Re: Bug#1036307: unblock: ufw/0.36.2-1
has caused the Debian Bug report #1036307,
regarding unblock: ufw/0.36.2-1
to be marked as done.
This means that you claim th
Hi Yadd,
On Wed, May 31, 2023 at 03:13:06PM +0400, Yadd wrote:
> Package: release.debian.org
> Severity: normal
> Tags: bullseye
> User: release.debian@packages.debian.org
> Usertags: pu
> X-Debbugs-Cc: jquer...@packages.debian.org
> Control: affects -1 + src:jqueryui
>
> [ Reason ]
> jqueryu
Processing control commands:
> tags -1 d-i
Bug #1036957 [release.debian.org] unblock: openssl/3.0.9-1
Added tag(s) d-i.
--
1036957: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036957
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
Control: tags -1 d-i
Hi kibi,
Can you have a look at this onblock request? It's blocked on your
block-udeb.
Paul
On 30-05-2023 22:52, Sebastian Andrzej Siewior wrote:
control: retitle -1 unblock: openssl/3.0.9-1
On 2023-05-30 22:16:53 [+0200], To sub...@bugs.debian.org wrote:
Please unbl
On 2023-05-31 19:28, Adam D. Barratt wrote:
> In the versions in testing, both packages only built for amd64. In
> unstable, they have also built for arm64. Migrating the arm64 hipsparse
> binaries from unstable therefore requires migrating a version of
> rocsparse with arm64 binaries.
Oh, that's
On Mon, 2023-05-29 at 13:15 +0200, Guido Günther wrote:
> [ Other info ]
> I apologize for being late here, I simply missed that the version
> is outdated. I could have backported the patch but just using the
> upstream version (which didn't bring any other features) seemed more
> reasonable here
On Wed, 2023-05-31 at 19:09 +0200, Christian Kastner wrote:
> I can't see why rocsparse 5.3.0+dfsg-3 would
> block
> hipsparse? The Depends and Build-Depends aren't versioned.
In the versions in testing, both packages only built for amd64. In
unstable, they have also built for arm64. Migrating the
Hi Graham,
On 2023-05-31 08:58, Graham Inggs wrote:
> Hi Christian
>
> On Sun, 28 May 2023 at 18:48, Christian Kastner wrote:
>> unblock hipsparse/5.3.3+dfsg-2
>
> The debdiff looks good to me, however the migration of
> hipsparse/5.3.3+dfsg-2 appears to be blocked by rocsparse/5.3.0+dfsg-3
> [
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
X-Debbugs-Cc: tho...@fiasko-nw.net
Please unblock package needrestart
[ Reason ]
In the past I have used the wrong version number, to remove a leftover config
file.
Also this update should
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
Please unblock package packagekit.
[ Reason ]
Three things fixed:
* A tiny memory leak has been addressed
* The daemon package now recommends the tools package again, this was
changed late
Package: release.debian.org
Severity: normal
Tags: bookworm
User: release.debian@packages.debian.org
Usertags: pu
Dear release team,
I would like to upload a new version of workflow (0.10.5-2) which fixes
two bugs in the package that are currently marking it for autoremoval. I
have just up
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
Please unblock package debspawn.
[ Reason ]
Packaging of the 0.6.2 bugfix release which contains three changes only:
* Fixes issue where users could not build packages against
NotAutomatic
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
X-Debbugs-Cc: jquery-minicol...@packages.debian.org
Control: affects -1 + src:jquery-minicolors
Please unblock package jquery-minicolors
[ Reason ]
jquery-minicolor is vulnerable to a cross
Processing control commands:
> affects -1 + src:jquery-minicolors
Bug #1036980 [release.debian.org] unblock: jquery-minicolors/2.3.5+dfsg-4
Added indication that 1036980 affects src:jquery-minicolors
--
1036980: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036980
Debian Bug Tracking System
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
Please unblock package appstream.
[ Reason ]
Backports a few fixes from the 0.16.2 release:
* Fixes two crashes that can happen when the tool is fed invalid or
unexpected input
* Correctl
Package: release.debian.org
Severity: normal
Tags: bookworm
User: release.debian@packages.debian.org
Usertags: pu
X-Debbugs-Cc: node-und...@packages.debian.org
Control: affects -1 + src:node-undici
[ Reason ]
node-undici is vulnerable to:
* CVE-2023-23936: "Host" HTTP header isn't protected a
Processing control commands:
> affects -1 + src:node-undici
Bug #1036978 [release.debian.org] bookworm-pu: package
node-undici/5.15.0+dfsg1+~cs20.10.9.3-1+deb12u1
Added indication that 1036978 affects src:node-undici
--
1036978: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036978
Debian B
Processing commands for cont...@bugs.debian.org:
> retitle 1032994 bookworm-pu: package
> node-webpack/5.75.0+dfsg+~cs17.16.14-1+deb12u1
Bug #1032994 [release.debian.org] unblock:
node-webpack/5.76.1+dfsg1+~cs17.16.16-1
Changed Bug title to 'bookworm-pu: package
node-webpack/5.75.0+dfsg+~cs17.1
Processing control commands:
> affects -1 + src:jqueryui
Bug #1036977 [release.debian.org] bullseye-pu: package
jqueryui/1.12.1+dfsg-8+deb11u2
Added indication that 1036977 affects src:jqueryui
--
1036977: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036977
Debian Bug Tracking System
Cont
Package: release.debian.org
Severity: normal
Tags: bullseye
User: release.debian@packages.debian.org
Usertags: pu
X-Debbugs-Cc: jquer...@packages.debian.org
Control: affects -1 + src:jqueryui
[ Reason ]
jqueryui is potentially vulnerable to cross-site scripting
(CVE-2022-31160)
[ Impact ]
Low
Package: release.debian.org
Severity: normal
Tags: bullseye
User: release.debian@packages.debian.org
Usertags: pu
X-Debbugs-Cc: gr...@packages.debian.org
Control: affects -1 + src:grunt
[ Reason ]
file.copy operations in GruntJS are vulnerable to a TOCTOU race condition
leading to arbitrary fi
Processing control commands:
> affects -1 + src:grunt
Bug #1036976 [release.debian.org] bullseye-pu: package grunt/1.3.0-1+deb11u2
Added indication that 1036976 affects src:grunt
--
1036976: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036976
Debian Bug Tracking System
Contact ow...@bugs.d
Package: release.debian.org
Severity: normal
Tags: bullseye
User: release.debian@packages.debian.org
Usertags: pu
X-Debbugs-Cc: node-url-pa...@packages.debian.org
Control: affects -1 + src:node-url-parse
[ Reason ]
node-url-parse is vulnerable to authorization bypass through
user-controlled ke
Processing control commands:
> affects -1 + src:node-url-parse
Bug #1036975 [release.debian.org] bullseye-pu: package
node-url-parse/1.5.3-1+deb11u2
Added indication that 1036975 affects src:node-url-parse
--
1036975: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036975
Debian Bug Tracking
Processing control commands:
> affects -1 + src:syncthing-gtk
Bug #1036969 [release.debian.org] unblock:
syncthing-gtk/0.9.4.4+ds+git20221205+12a9702d29ab-2
Added indication that 1036969 affects src:syncthing-gtk
--
1036969: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036969
Debian Bug T
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
X-Debbugs-Cc: syncthing-...@packages.debian.org
Control: affects -1 + src:syncthing-gtk
Please unblock package syncthing-gtk
Syncthing-GTK has been hardcoding a non-PEP-440-compliant versio
Hi Christian
On Sun, 28 May 2023 at 18:48, Christian Kastner wrote:
> unblock hipsparse/5.3.3+dfsg-2
The debdiff looks good to me, however the migration of
hipsparse/5.3.3+dfsg-2 appears to be blocked by rocsparse/5.3.0+dfsg-3
[1].
Migrates after: rocsparse
Migration status for hipsparse (5.3.3
46 matches
Mail list logo