tch-pu: package
debian-security-support/2020.06.21~deb9u1
Added tag(s) pending; removed tag(s) confirmed.
> thanks
Stopping processing here.
Please contact me if you need assistance.
--
964813: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=964813
Debian Bug Tracking System
C
On Fri, Jul 10, 2020 at 07:55:09PM +0100, Adam D. Barratt wrote:
> > I'd like to update debian-security-support in stretch to
> > 2020.06.21~deb9u1
> Please go ahead.
thanks, uploaded.
--
cheers,
Control: tags -1 + confirmed
On Fri, 2020-07-10 at 20:31 +0200, Holger Levsen wrote:
> I'd like to update debian-security-support in stretch to
> 2020.06.21~deb9u1
> with the following changes to document the state of security support
> today:
>
> $ debdiff debian-security-
Processing control commands:
> tags -1 + confirmed
Bug #964813 [release.debian.org] stretch-pu: package
debian-security-support/2020.06.21~deb9u1
Added tag(s) confirmed.
--
964813: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=964813
Debian Bug Tracking System
Contact ow...@bugs.debian.
Package: release.debian.org
Severity: normal
Tags: stretch
User: release.debian@packages.debian.org
Usertags: pu
hi,
I'd like to update debian-security-support in stretch to 2020.06.21~deb9u1
with the following changes to document the state of security support today:
$ debdiff debian
e.
--
cheers,
Holger
---
holger@(debian|reproducible-builds|layer-acht).org
PGP fingerprint: B8BF 5413 7B09 D35C F026 FE9D 091A B856 069A AA1C
signature.asc
Description: PGP signature
Processing control commands:
> tags -1 + confirmed
Bug #964808 [release.debian.org] buster-pu: package
debian-security-support/2020.04.16~deb10u3
Added tag(s) confirmed.
--
964808: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=964808
Debian Bug Tracking System
Contact ow...@bugs.debian.
Control: tags -1 + confirmed
On Fri, 2020-07-10 at 19:46 +0200, Emilio Pozuelo Monfort wrote:
> On 10/07/2020 19:38, Holger Levsen wrote:
> > I'd like to update debian-security-support in buster to
> > 2020.04.16~deb10u3, mostly to be able to upload 2020.04.16~deb9u3
> >
On Fri, Jul 10, 2020 at 07:46:59PM +0200, Emilio Pozuelo Monfort wrote:
> > -debian-security-support (2020.04.16~deb10u2) buster; urgency=medium
> > +debian-security-support (2020.06.21~deb10u3) buster; urgency=medium
> Minor nitpick. Shouldn't that be 2020.06.21~deb10u1 ?
no, it's
On 10/07/2020 19:38, Holger Levsen wrote:
> Package: release.debian.org
> Severity: normal
> Tags: buster
> User: release.debian@packages.debian.org
> Usertags: pu
>
> Hi,
>
> I'd like to update debian-security-support in buster to 2020.04.16~deb10u3,
> mostly t
Package: release.debian.org
Severity: normal
Tags: buster
User: release.debian@packages.debian.org
Usertags: pu
Hi,
I'd like to update debian-security-support in buster to 2020.04.16~deb10u3,
mostly to be able to upload 2020.04.16~deb9u3 to stretch and keep the version
constraints between
package release.debian.org
tags 964740 = buster pending
thanks
Hi,
The upload referenced by this bug report has been flagged for acceptance into
the proposed-updates queue for Debian buster.
Thanks for your contribution!
Upload details
==
Package: debian-ports-archive-keyring
ter-pu: package
debian-ports-archive-keyring/2019.11.05~deb10u1
Added tag(s) pending.
> thanks
Stopping processing here.
Please contact me if you need assistance.
--
964740: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=964740
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
Package: release.debian.org
Severity: normal
Tags: buster
User: release.debian@packages.debian.org
Usertags: pu
Hi,
The debian-ports-archive-keyring in buster has the 2020 archive key
expired, as it was wrongly created off by one year. This has been fixed
in testing/sid for some time already
ter-pu: package openstack-debian-images/1.36
Added tag(s) pending; removed tag(s) confirmed.
> thanks
Stopping processing here.
Please contact me if you need assistance.
--
961833: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=961833
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
package release.debian.org
tags 961833 = buster pending
thanks
Hi,
The upload referenced by this bug report has been flagged for acceptance into
the proposed-updates queue for Debian buster.
Thanks for your contribution!
Upload details
==
Package: openstack-debian-images
Version
Control: tags -1 + confirmed
On Sat, 2020-05-30 at 01:57 +0200, Thomas Goirand wrote:
> tl;dr: if not using a DHCP to boot VMs, cloud-init would get the DNS
> addresses from the configdrive, which only works if resolvconf is
> installed. The attached patch fixes this.
>
Please go ahead.
Processing control commands:
> tags -1 + confirmed
Bug #961833 [release.debian.org] buster-pu: package openstack-debian-images/1.36
Added tag(s) confirmed.
--
961833: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=961833
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
> Adrian filed a rc bug in November 2019 which received no
>> maintainer response, however the package was not autoremoved from
>> testing due to aufs and aufs-tools being considered a "key
>> packages" due to high popcon. This popcon actually seems to be
>> g
t; updated.
There's basically none. I'd like to establish one.
--
cheers,
Holger
---
holger@(debian|reproducible-builds|layer-acht).org
PGP fingerprint: B8BF 5413 7B09 D35C F026 FE9D 091A B
addresses from the configdrive, which only works if resolvconf is
> installed. The attached patch fixes this.
>
> I'd like to add the "resolvconf" package to the official Debian OpenStack
> image for Buster. Doing so is done by simply adding the package to the list
> in o
Hi Holger,
> i just dont think releasing d-s-s updates via point releases makes sense.
> and often they also dont warrant a security/lts update as they come with
> DSAs/DLAs and mostly the d-s-s updates are based on DSA/DLAs and thus such
> DSA/DLAs would just refer to the other ones.
May I ask
hi,
what do you (SRM folks) think about releasing debian-security-support updates
via (old)stable-updates (once the version in sid is in testing, obviously)?
right now buster is up to date via the last point release but the package
in buster is not new enough to have the latest status
patch fixes this.
I'd like to add the "resolvconf" package to the official Debian OpenStack
image for Buster. Doing so is done by simply adding the package to the list
in openstack-debian-images/1.36. See attached debdiff. Once the package
reaches Buster, the new OpenStack image wi
Mick Ab wrote:
> https://www.phoronix.com/scan.php?page=article=3900x-linux-distros=1
>
> The above article shows that Debian 10.0 works okay with a third generation
> Ryzen CPU.
>
> I understood that there were problems with Buster using third generation
> Ryzen.
>
https://www.phoronix.com/scan.php?page=article=3900x-linux-distros=1
The above article shows that Debian 10.0 works okay with a third generation
Ryzen CPU.
I understood that there were problems with Buster using third generation
Ryzen.
Has this problem been overcome by installing AMD firmware
https://www.phoronix.com/scan.php?page=article=3900x-linux-distros=1
The above article shows that Debian 10.0 will work with a third generation
Ryzen CPU.
I understood that the stable release of Buster had problems with such CPUs.
Has the problem been overcome by installing appropriate AMD
> > > aufs and aufs-tools being considered a "key packages" due to high popcon.
> > > This popcon actually seems to be growing in both absolute and percentage
> > > terms. I presume the high popcon is due to some deriviative (hence
> > > debia
ges" due to high popcon. This
> > popcon actually seems to be growing in both absolute and percentage terms.
> > I presume the high popcon is due to some deriviative (hence
> > debian-derivatives and debian-live in cc) using aufs in their live image
> > builds (as far as I can
r the package was not autoremoved from testing due to
> aufs and aufs-tools being considered a "key packages" due to high
> popcon. This popcon actually seems to be growing in both absolute and
> percentage terms. I presume the high popcon is due to some deriviative
> (hen
gh popcon. This popcon
> actually seems to be growing in both absolute and percentage terms. I presume
> the high popcon is due to some deriviative (hence debian-derivatives and
> debian-live in cc) using aufs in their live image builds (as far as I can
> tell debian's own live im
" due to high popcon. This popcon actually seems to be growing in
both absolute and percentage terms. I presume the high popcon is due to some deriviative
(hence debian-derivatives and debian-live in cc) using aufs in their live image builds
(as far as I can tell debian's own live images s
Your message dated Sat, 09 May 2020 11:53:52 +0100
with message-id
and subject line Closing requests included in 10.4 point release
has caused the Debian Bug report #959101,
regarding buster-pu: package debian-security-support/2020.04.16~deb10u2
to be marked as done.
This means that you claim
Your message dated Sat, 09 May 2020 11:53:52 +0100
with message-id
and subject line Closing requests included in 10.4 point release
has caused the Debian Bug report #956861,
regarding buster-pu: package debian-edu-config/2.10.65+deb10u5
to be marked as done.
This means that you claim
package release.debian.org
tags 959101 = buster pending
thanks
Hi,
The upload referenced by this bug report has been flagged for acceptance into
the proposed-updates queue for Debian buster.
Thanks for your contribution!
Upload details
==
Package: debian-security-support
Version
ter-pu: package
debian-security-support/2020.04.16~deb10u2
Added tag(s) pending; removed tag(s) confirmed.
> thanks
Stopping processing here.
Please contact me if you need assistance.
--
959101: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=959101
Debian Bug Tracking System
C
rs,
Holger
---
holger@(debian|reproducible-builds|layer-acht).org
PGP fingerprint: B8BF 5413 7B09 D35C F026 FE9D 091A B856 069A AA1C
diff -Nru debian-security-support-2020.04.16/debian/changelog debian-security-support-2020.04.16~deb10u2/debian/changelog
--- debia
Processing control commands:
> tags -1 + confirmed
Bug #959101 [release.debian.org] buster-pu: package
debian-security-support/2020.04.16~deb10u2
Added tag(s) confirmed.
--
959101: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=959101
Debian Bug Tracking System
Contact ow...@bugs.debian.
Control: tags -1 + confirmed
On Wed, 2020-04-29 at 13:26 +0200, Holger Levsen wrote:
> I'd like to update debian-security-support in buster, preferedly to
> the version in bullseye (modulo changelog entry), as I think the
> changes are safe and sane also because this will make
Package: release.debian.org
Severity: normal
Tags: buster
User: release.debian@packages.debian.org
Usertags: pu
Hi,
I'd like to update debian-security-support in buster, preferedly to the version
in bullseye (modulo changelog entry), as I think the changes are safe and sane
also because
ter-pu: package
debian-edu-config/2.10.65+deb10u5
Added tag(s) pending; removed tag(s) confirmed.
> thanks
Stopping processing here.
Please contact me if you need assistance.
--
956861: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=956861
Debian Bug Tracking System
Contact ow...@bugs.d
package release.debian.org
tags 956861 = buster pending
thanks
Hi,
The upload referenced by this bug report has been flagged for acceptance into
the proposed-updates queue for Debian buster.
Thanks for your contribution!
Upload details
==
Package: debian-edu-config
Version
On Tue, Apr 21, 2020 at 07:16:45PM +0100, Adam D. Barratt wrote:
> Please go ahead; thanks.
thanks, uploaded.
--
cheers,
Holger
---
holger@(debian|reproducible-builds|layer-acht).org
Processing control commands:
> tags -1 + confirmed
Bug #956861 [release.debian.org] buster-pu: package
debian-edu-config/2.10.65+deb10u5
Added tag(s) confirmed.
--
956861: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=956861
Debian Bug Tracking System
Contact ow...@bugs.debian.
Control: tags -1 + confirmed
On Thu, 2020-04-16 at 02:41 +0200, Holger Levsen wrote:
> debian-edu-config (2.10.65+deb10u5) buster; urgency=medium
>
> [ Wolfgang Schweer ]
> * Add policies files for Firefox-ESR and Thunderbird to fix the
> TLS/SSL setup.
> This makes su
Holger
---
holger@(debian|reproducible-builds|layer-acht).org
PGP fingerprint: B8BF 5413 7B09 D35C F026 FE9D 091A B856 069A AA1C
signature.asc
Description: PGP signature
Package: release.debian.org
Severity: normal
Tags: buster
User: release.debian@packages.debian.org
Usertags: pu
Dear SRMs,
we would like the following two 'important' bugs in buster:
debian-edu-config (2.10.65+deb10u5) buster; urgency=medium
[ Wolfgang Schweer ]
* Add policies files
Hi,
On 11-04-2020 17:59, Mattia Rizzolo wrote:
> there are plans
> (I don't know at which point they are) to *also* consider failing
> autopkgtest in testing as RC.
This already happened last year, see
https://lists.debian.org/debian-devel-announce/2019/07/msg2.html
[All autopkgtest
mark.
--
regards,
Mattia Rizzolo
GPG Key: 66AE 2B4A FCCF 3F52 DA18 4D18 4B04 3FCD B944 4540 .''`.
More about me: https://mapreri.org : :' :
Launchpad user: https://launchpad.net/~mapreri `. `'`
Debian QA page: https://qa.debian.org/develope
Le 10/04/2020 à 18:47, peter green a écrit :
(note: these are my observations as a maintainer of a derivative)
The rust ecosystem in Debian
recently had (and I expect still has) trouble to properly migrate to
testing
Indeed there are still issues, most notablly IMO that firefox-esr's
build
(note: these are my observations as a maintainer of a derivative)
The rust ecosystem in Debian
recently had (and I expect still has) trouble to properly migrate to
testing
Indeed there are still issues, most notablly IMO that firefox-esr's
build-dependencies have been unsatisfiable in testing
Hi,
I'm not sure if this is the proper list to send this to, but I would
like to bring attention to
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=950578 and its
associated patch, as we believe this is all that stands between the next
Debian release and its ability to be used for netinst
h packages into the archive.
> > (once this is accepted I'll upload to jessie-security and be done.)
finally uploaded this now too as well, and released DLA-2103-1.
IOW: jessie, stretch and buster now have "the same" version of
debian-sec
UNSUBSCRIBE
On Mon, 3 Feb 2020, 22:40 Adam D. Barratt, wrote:
>
> ----
> Debian Stable Updates Announcement SUA 177-1
> https://www.debian.org/
> debian-release@lists.debian.org
> <https://www.debi
Your message dated Sat, 08 Feb 2020 14:21:36 +
with message-id
and subject line Closing requests included in 10.3 point release
has caused the Debian Bug report #950257,
regarding buster-pu: package debian-edu-config/2.10.65+deb10u4
to be marked as done.
This means that you claim
Your message dated Sat, 08 Feb 2020 14:21:36 +
with message-id
and subject line Closing requests included in 10.3 point release
has caused the Debian Bug report #946960,
regarding buster-pu: package debian-security-support/2019.12.12~deb10u1
to be marked as done.
This means that you claim
On Thu, Jan 30, 2020 at 10:41:56PM +, Holger Levsen wrote:
> On Thu, Jan 30, 2020 at 07:41:32PM +, Holger Levsen wrote:
> > I'll upload 2019.12.12~deb9u2 then which is lower than what's in
> > buster-pu currently and will be in buster soon. (2019.12.12~deb10u1)
>
> uploaded now.
>
>
cheers,
Holger
---
holger@(debian|reproducible-builds|layer-acht).org
PGP fingerprint: B8BF 5413 7B09 D35C F026 FE9D 091A B856 069A AA1C
signature.asc
Description: PGP signature
ter-pu: package
debian-edu-config/2.10.65+deb10u4
Added tag(s) pending.
> thanks
Stopping processing here.
Please contact me if you need assistance.
--
950257: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=950257
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
package release.debian.org
tags 950257 = buster pending
thanks
Hi,
The upload referenced by this bug report has been flagged for acceptance into
the proposed-updates queue for Debian buster.
Thanks for your contribution!
Upload details
==
Package: debian-edu-config
Version
Holger
---
holger@(debian|reproducible-builds|layer-acht).org
PGP fingerprint: B8BF 5413 7B09 D35C F026 FE9D 091A B856 069A AA1C
signature.asc
Description: PGP signature
Package: release.debian.org
Severity: normal
Tags: buster
User: release.debian@packages.debian.org
Usertags: pu
Dear Release Team,
on behalf of the Debian Edu team, I just uploaded a fix for Debian bug #941001
to buster (2.10.65+deb10u4).
>From the changelog:
+ [ Dominik Geo
package release.debian.org
tags 946960 = buster pending
thanks
Hi,
The upload referenced by this bug report has been flagged for acceptance into
the proposed-updates queue for Debian buster.
Thanks for your contribution!
Upload details
==
Package: debian-security-support
Version
ter-pu: package
debian-security-support/2019.12.12~deb10u1
Added tag(s) pending; removed tag(s) confirmed.
> thanks
Stopping processing here.
Please contact me if you need assistance.
--
946960: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=946960
Debian Bug Tracking System
C
n uploaded to
Debian unstable yesterday. Do you think this needs to be fixed for
Debian (old)stable too?
Regards,
Hilmar
--
sigfault
#206401 http://counter.li.org
signature.asc
Description: OpenPGP digital signature
On Mon, Dec 30, 2019 at 09:08:36PM +, Adam D. Barratt wrote:
> Please go ahead.
uploaded now, thanks.
--
cheers,
Holger
---
holger@(debian|reproducible-builds|layer-acht).org
Processing control commands:
> tags -1 + confirmed
Bug #946960 [release.debian.org] buster-pu: package
debian-security-support/2019.12.12~deb10u1
Added tag(s) confirmed.
--
946960: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=946960
Debian Bug Tracking System
Contact ow...@bugs.debian.
Control: tags -1 + confirmed
On Wed, 2019-12-18 at 14:55 +0100, Holger Levsen wrote:
> * security-support-limited: point to
> https://www.debian.org/releases/ \
> buster/amd64/release-notes/ch-information.en.html#golang-static-
> linking
> for golang* packages.
> * Remove nodejs from
Package: release.debian.org
Severity: normal
Tags: buster
User: release.debian@packages.debian.org
Usertags: pu
hi,
we'd like to update debian-security-support to 2019.12.12~deb10u1 to bring
these changes to buster:
* security-support-limited: point to https://www.debian.org/releases
On Thu, Nov 28, 2019 at 12:03:25PM +, Holger Levsen wrote:
> - for stretch, I will upload to stretch-security and that's it.
Sounds good, I'll take care of releasing that.
Cheers,
Moritz
On Wed, Nov 27, 2019 at 11:18:47AM +0100, Moritz Muehlenhoff wrote:
> We already had a DSA announcing Chromium EOL for stretch (
> https://lists.debian.org/debian-security-announce/2019/msg00214.html),
> as such let's simply install an updated debian-security-support to
> stre
000, Holger Levsen wrote:
> > > > - or should debian-security-support follow the normal point release
> > > > schedule, which AIUI currently has the unfortunate drawback that no
> > > > stretch point release is planned anymore (??)
> > >
> &g
Hi Holger,
On Tue, Nov 26, 2019 at 01:03:00PM +, Holger Levsen wrote:
> On Sun, Nov 24, 2019 at 08:27:40PM +, Adam D. Barratt wrote:
> > On Sun, 2019-11-24 at 18:42 +, Holger Levsen wrote:
> > > - or should debian-security-support follow the normal point release
>
On Sun, Nov 24, 2019 at 08:27:40PM +, Adam D. Barratt wrote:
> On Sun, 2019-11-24 at 18:42 +, Holger Levsen wrote:
> > - or should debian-security-support follow the normal point release
> > schedule, which AIUI currently has the unfortunate drawback that no
> >
On Sun, 2019-11-24 at 18:42 +, Holger Levsen wrote:
> - or should debian-security-support follow the normal point release
> schedule, which AIUI currently has the unfortunate drawback that no
> stretch point release is planned anymore (??)
Addressing just this point right now, I am
omium updates or switch to firefox, which continues to be
supported in the oldstable release."
This info was then included in the 2019.11.16 upload of debian-security-support
to unstable with this change:
* Add chromium to security-support-ended.deb9.
Currently we have:
debian-securi
Your message dated Sat, 16 Nov 2019 10:08:47 +
with message-id
<83c9ffab6f08361485f70dda4733a7a24aeec09b.ca...@adam-barratt.org.uk>
and subject line Closing bugs for 10.2 point release fixes
has caused the Debian Bug report #944238,
regarding buster-pu: package debian-edu-config/2
ter-pu: package
debian-edu-config/2.10.65+deb10u2
Added tag(s) pending; removed tag(s) confirmed.
> thanks
Stopping processing here.
Please contact me if you need assistance.
--
944238: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=944238
Debian Bug Tracking System
Contact ow...@bugs.d
package release.debian.org
tags 944238 = buster pending
thanks
Hi,
The upload referenced by this bug report has been flagged for acceptance into
the proposed-updates queue for Debian buster.
Thanks for your contribution!
Upload details
==
Package: debian-edu-config
Version
On Fri, Nov 08, 2019 at 10:10:54PM +, Adam D. Barratt wrote:
> Control: tags -1 + confirmed
[...]
> Please go ahead.
thanks, uploaded.
--
cheers,
Holger
---
holger@(debian|reprod
Processing control commands:
> tags -1 + confirmed
Bug #944238 [release.debian.org] buster-pu: package
debian-edu-config/2.10.65+deb10u2
Added tag(s) confirmed.
--
944238: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=944238
Debian Bug Tracking System
Contact ow...@bugs.debian.
Control: tags -1 + confirmed
On Wed, 2019-11-06 at 22:22 +0800, Holger Levsen wrote:
> We'd like to update debian-edu-config in buster to fix one important
> (#944013 debian-edu-config: adjusted ini files needed to match
> changed behaviour of firefox-esr 68.2.0esr) and one n
On Wed, Nov 06, 2019 at 10:22:21PM +0800, Holger Levsen wrote:
> We'd like to update debian-edu-config in buster to fix one important
> (#944013 debian-edu-config: adjusted ini files needed to match changed
> behaviour of firefox-esr 68.2.0esr) and one normal bug:
I forgot t
Package: release.debian.org
Severity: normal
Tags: buster
User: release.debian@packages.debian.org
Usertags: pu
We'd like to update debian-edu-config in buster to fix one important
(#944013 debian-edu-config: adjusted ini files needed to match changed
behaviour of firefox-esr 68.2.0esr
Hi,
Hector Oron writes:
> I would like to support Debian Linux kernel team by doing kernel
> package uploads.
Related to Linux uploads: I've added an exception to allow source-only
uploads to NEW for src:linux. Feel free to try.
Ansgar
Hi,
What is the current workflow of the patch propagation from linux mainline
to debian stable kernel versions? are the downstream debian kernels rebased
against the latest mainline kernel version or are they just rebased against
the lts upstream version from which the debian kernel was initially
Hi,
On Sun, Oct 20, 2019 at 02:27:21PM +0100, Ben Hutchings wrote:
> On Sun, 2019-10-20 at 13:58 +0200, Hector Oron wrote:
> > Hello,
> >
> > I would like to support Debian Linux kernel team by doing kernel
> > package uploads.
> >
> > Initially, I wou
On Sun, 2019-10-20 at 13:58 +0200, Hector Oron wrote:
> Hello,
>
> I would like to support Debian Linux kernel team by doing kernel
> package uploads.
>
> Initially, I would like to attempt timely (weekly or bi-weekly, it
> has not been discussed yet) updates for Debian
Hello,
I would like to support Debian Linux kernel team by doing kernel
package uploads.
Initially, I would like to attempt timely (weekly or bi-weekly, it
has not been discussed yet) updates for Debian Linux kernel package in
SID and see how that works.
In anycase, I would like to give
795
> tags 941795 + bullseye sid
Bug #941795 [src:ruby-gnome] ruby-gnome: gio2 autopkgtest fails with
gobject-introspection 1.62
Added tag(s) sid and bullseye.
> user debian...@lists.debian.org
Setting user to debian...@lists.debian.org (was s...@debian.org).
> usertags 941795 + regressio
Processing commands for cont...@bugs.debian.org:
> user debian...@lists.debian.org
Setting user to debian...@lists.debian.org (was s...@debian.org).
> usertags 941487 + regression
There were no usertags set.
Usertags are now: regression.
> affects 941487 + src:glib2.0
Bug #941487 [
Your message dated Fri, 20 Sep 2019 20:04:10 +0200
with message-id <6e804e06-5ea5-57d9-0fe4-74a750e6e...@debian.org>
and subject line Re: Code name spelling (upper/lower) is used inconsistently in
Debian communication/documentation
has caused the Debian Bug report #927680,
regarding Cod
la 14. syysk. 2019 klo 16.57 Adam D. Barratt
(a...@adam-barratt.org.uk) kirjoitti:
>
> On Fri, 2019-09-13 at 21:10 +0300, Otto Kekäläinen wrote:
> > To clarify, 10.3.18 has been uploaded to Debian unstable. Issue is
> > still open for Buster and Stretch.
>
> Is the
On Fri, 2019-09-13 at 21:10 +0300, Otto Kekäläinen wrote:
> To clarify, 10.3.18 has been uploaded to Debian unstable. Issue is
> still open for Buster and Stretch.
Is there a likely ETA for when this might be resolvable?
If you could prepare (preferably targeted) updates via the usual p-
Your message dated Sat, 07 Sep 2019 14:34:49 +0100
with message-id
and subject line Closing bugs for fixes including in 10.1 point release
has caused the Debian Bug report #938975,
regarding buster-pu: package debian-edu-doc/2.10.19~deb10u1
to be marked as done.
This means that you claim
Your message dated Sat, 07 Sep 2019 14:34:49 +0100
with message-id
and subject line Closing bugs for fixes including in 10.1 point release
has caused the Debian Bug report #935776,
regarding buster-pu: [pre-upload approval of] package
debian-edu-config/2.10.65+deb10u1
to be marked as done
Your message dated Sat, 07 Sep 2019 14:34:49 +0100
with message-id
and subject line Closing bugs for fixes including in 10.1 point release
has caused the Debian Bug report #932069,
regarding buster-pu: calamares-settings-debian 10.0.20-1+deb10u1
to be marked as done.
This means that you claim
Copying to debian-release@
Please help reduce unnecessary bureaucracy and paperwork for general Debian
packagers.
X
Ximin Luo:
> Julian Gilbey:
>> [..]
>>
>> ~
>> No binary maintainer uploads for bullseye
>> =
>&
On Mon, Sep 2, 2019 at 2:48 AM Ilari Jääskeläinen wrote:
> best wishes for debian stretch, I hope the best possible patience and
> discipline accomplishing the future.
According to the release team's website the stretch 9.10 release is
scheduled for 2019-09-07 (this w
best wishes for debian stretch, I hope the best possible patience and
discipline accomplishing the future.
701 - 800 of 3483 matches
Mail list logo