Processed: debian-security-support 2020.06.21~deb9u1 flagged for acceptance

2020-07-11 Thread Debian Bug Tracking System
tch-pu: package debian-security-support/2020.06.21~deb9u1 Added tag(s) pending; removed tag(s) confirmed. > thanks Stopping processing here. Please contact me if you need assistance. -- 964813: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=964813 Debian Bug Tracking System C

Bug#964813: stretch-pu: package debian-security-support/2020.06.21~deb9u1

2020-07-10 Thread Holger Levsen
On Fri, Jul 10, 2020 at 07:55:09PM +0100, Adam D. Barratt wrote: > > I'd like to update debian-security-support in stretch to > > 2020.06.21~deb9u1 > Please go ahead. thanks, uploaded. -- cheers,

Bug#964813: stretch-pu: package debian-security-support/2020.06.21~deb9u1

2020-07-10 Thread Adam D. Barratt
Control: tags -1 + confirmed On Fri, 2020-07-10 at 20:31 +0200, Holger Levsen wrote: > I'd like to update debian-security-support in stretch to > 2020.06.21~deb9u1 > with the following changes to document the state of security support > today: > > $ debdiff debian-security-

Processed: Re: Bug#964813: stretch-pu: package debian-security-support/2020.06.21~deb9u1

2020-07-10 Thread Debian Bug Tracking System
Processing control commands: > tags -1 + confirmed Bug #964813 [release.debian.org] stretch-pu: package debian-security-support/2020.06.21~deb9u1 Added tag(s) confirmed. -- 964813: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=964813 Debian Bug Tracking System Contact ow...@bugs.debian.

Bug#964813: stretch-pu: package debian-security-support/2020.06.21~deb9u1

2020-07-10 Thread Holger Levsen
Package: release.debian.org Severity: normal Tags: stretch User: release.debian@packages.debian.org Usertags: pu hi, I'd like to update debian-security-support in stretch to 2020.06.21~deb9u1 with the following changes to document the state of security support today: $ debdiff debian

Bug#964808: buster-pu: package debian-security-support/2020.04.16~deb10u3

2020-07-10 Thread Holger Levsen
e. -- cheers, Holger --- holger@(debian|reproducible-builds|layer-acht).org PGP fingerprint: B8BF 5413 7B09 D35C F026 FE9D 091A B856 069A AA1C signature.asc Description: PGP signature

Processed: Re: Bug#964808: buster-pu: package debian-security-support/2020.04.16~deb10u3

2020-07-10 Thread Debian Bug Tracking System
Processing control commands: > tags -1 + confirmed Bug #964808 [release.debian.org] buster-pu: package debian-security-support/2020.04.16~deb10u3 Added tag(s) confirmed. -- 964808: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=964808 Debian Bug Tracking System Contact ow...@bugs.debian.

Bug#964808: buster-pu: package debian-security-support/2020.04.16~deb10u3

2020-07-10 Thread Adam D. Barratt
Control: tags -1 + confirmed On Fri, 2020-07-10 at 19:46 +0200, Emilio Pozuelo Monfort wrote: > On 10/07/2020 19:38, Holger Levsen wrote: > > I'd like to update debian-security-support in buster to > > 2020.04.16~deb10u3, mostly to be able to upload 2020.04.16~deb9u3 > >

Bug#964808: buster-pu: package debian-security-support/2020.04.16~deb10u3

2020-07-10 Thread Holger Levsen
On Fri, Jul 10, 2020 at 07:46:59PM +0200, Emilio Pozuelo Monfort wrote: > > -debian-security-support (2020.04.16~deb10u2) buster; urgency=medium > > +debian-security-support (2020.06.21~deb10u3) buster; urgency=medium > Minor nitpick. Shouldn't that be 2020.06.21~deb10u1 ? no, it's

Bug#964808: buster-pu: package debian-security-support/2020.04.16~deb10u3

2020-07-10 Thread Emilio Pozuelo Monfort
On 10/07/2020 19:38, Holger Levsen wrote: > Package: release.debian.org > Severity: normal > Tags: buster > User: release.debian@packages.debian.org > Usertags: pu > > Hi, > > I'd like to update debian-security-support in buster to 2020.04.16~deb10u3, > mostly t

Bug#964808: buster-pu: package debian-security-support/2020.04.16~deb10u3

2020-07-10 Thread Holger Levsen
Package: release.debian.org Severity: normal Tags: buster User: release.debian@packages.debian.org Usertags: pu Hi, I'd like to update debian-security-support in buster to 2020.04.16~deb10u3, mostly to be able to upload 2020.04.16~deb9u3 to stretch and keep the version constraints between

Bug#964740: debian-ports-archive-keyring 2019.11.05~deb10u1 flagged for acceptance

2020-07-09 Thread Adam D Barratt
package release.debian.org tags 964740 = buster pending thanks Hi, The upload referenced by this bug report has been flagged for acceptance into the proposed-updates queue for Debian buster. Thanks for your contribution! Upload details == Package: debian-ports-archive-keyring

Processed: debian-ports-archive-keyring 2019.11.05~deb10u1 flagged for acceptance

2020-07-09 Thread Debian Bug Tracking System
ter-pu: package debian-ports-archive-keyring/2019.11.05~deb10u1 Added tag(s) pending. > thanks Stopping processing here. Please contact me if you need assistance. -- 964740: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=964740 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems

Bug#964740: buster-pu: package debian-ports-archive-keyring/2019.11.05~deb10u1

2020-07-09 Thread Aurelien Jarno
Package: release.debian.org Severity: normal Tags: buster User: release.debian@packages.debian.org Usertags: pu Hi, The debian-ports-archive-keyring in buster has the 2020 archive key expired, as it was wrongly created off by one year. This has been fixed in testing/sid for some time already

Processed: openstack-debian-images 1.36+deb10u1 flagged for acceptance

2020-07-09 Thread Debian Bug Tracking System
ter-pu: package openstack-debian-images/1.36 Added tag(s) pending; removed tag(s) confirmed. > thanks Stopping processing here. Please contact me if you need assistance. -- 961833: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=961833 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems

Bug#961833: openstack-debian-images 1.36+deb10u1 flagged for acceptance

2020-07-09 Thread Adam D Barratt
package release.debian.org tags 961833 = buster pending thanks Hi, The upload referenced by this bug report has been flagged for acceptance into the proposed-updates queue for Debian buster. Thanks for your contribution! Upload details == Package: openstack-debian-images Version

Bug#961833: buster-pu: package openstack-debian-images/1.36

2020-07-02 Thread Adam D. Barratt
Control: tags -1 + confirmed On Sat, 2020-05-30 at 01:57 +0200, Thomas Goirand wrote: > tl;dr: if not using a DHCP to boot VMs, cloud-init would get the DNS > addresses from the configdrive, which only works if resolvconf is > installed. The attached patch fixes this. > Please go ahead.

Processed: Re: Bug#961833: buster-pu: package openstack-debian-images/1.36

2020-07-02 Thread Debian Bug Tracking System
Processing control commands: > tags -1 + confirmed Bug #961833 [release.debian.org] buster-pu: package openstack-debian-images/1.36 Added tag(s) confirmed. -- 961833: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=961833 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems

Re: Bug#948087: future of aufs in Debian.

2020-06-20 Thread Jan Luca Naumann
> Adrian filed a rc bug in November 2019 which received no >> maintainer response, however the package was not autoremoved from >> testing due to aufs and aufs-tools being considered a "key >> packages" due to high popcon. This popcon actually seems to be >> g

Re: maintaining debian-security-support in stable, oldstable (and oldoldstable)

2020-06-10 Thread Holger Levsen
t; updated. There's basically none. I'd like to establish one. -- cheers, Holger --- holger@(debian|reproducible-builds|layer-acht).org PGP fingerprint: B8BF 5413 7B09 D35C F026 FE9D 091A B

Bug#961833: buster-pu: package openstack-debian-images/1.36

2020-06-08 Thread Thomas Goirand
addresses from the configdrive, which only works if resolvconf is > installed. The attached patch fixes this. > > I'd like to add the "resolvconf" package to the official Debian OpenStack > image for Buster. Doing so is done by simply adding the package to the list > in o

Re: maintaining debian-security-support in stable, oldstable (and oldoldstable)

2020-05-31 Thread Chris Hofstaedtler
Hi Holger, > i just dont think releasing d-s-s updates via point releases makes sense. > and often they also dont warrant a security/lts update as they come with > DSAs/DLAs and mostly the d-s-s updates are based on DSA/DLAs and thus such > DSA/DLAs would just refer to the other ones. May I ask

maintaining debian-security-support in stable, oldstable (and oldoldstable)

2020-05-30 Thread Holger Levsen
hi, what do you (SRM folks) think about releasing debian-security-support updates via (old)stable-updates (once the version in sid is in testing, obviously)? right now buster is up to date via the last point release but the package in buster is not new enough to have the latest status

Bug#961833: buster-pu: package openstack-debian-images/1.36

2020-05-29 Thread Thomas Goirand
patch fixes this. I'd like to add the "resolvconf" package to the official Debian OpenStack image for Buster. Doing so is done by simply adding the package to the list in openstack-debian-images/1.36. See attached debdiff. Once the package reaches Buster, the new OpenStack image wi

Re: Debian 10.0 works with third generation Ryzen

2020-05-29 Thread Dan Ritter
Mick Ab wrote: > https://www.phoronix.com/scan.php?page=article=3900x-linux-distros=1 > > The above article shows that Debian 10.0 works okay with a third generation > Ryzen CPU. > > I understood that there were problems with Buster using third generation > Ryzen. >

Debian 10.0 works with third generation Ryzen

2020-05-29 Thread Mick Ab
https://www.phoronix.com/scan.php?page=article=3900x-linux-distros=1 The above article shows that Debian 10.0 works okay with a third generation Ryzen CPU. I understood that there were problems with Buster using third generation Ryzen. Has this problem been overcome by installing AMD firmware

Debian 10.0 works with 3rd generation Ryzen

2020-05-29 Thread Mick Ab
https://www.phoronix.com/scan.php?page=article=3900x-linux-distros=1 The above article shows that Debian 10.0 will work with a third generation Ryzen CPU. I understood that the stable release of Buster had problems with such CPUs. Has the problem been overcome by installing appropriate AMD

Re: future of aufs in Debian.

2020-05-28 Thread Adrian Bunk
> > > aufs and aufs-tools being considered a "key packages" due to high popcon. > > > This popcon actually seems to be growing in both absolute and percentage > > > terms. I presume the high popcon is due to some deriviative (hence > > > debia

Re: future of aufs in Debian.

2020-05-27 Thread Noah Meyerhans
ges" due to high popcon. This > > popcon actually seems to be growing in both absolute and percentage terms. > > I presume the high popcon is due to some deriviative (hence > > debian-derivatives and debian-live in cc) using aufs in their live image > > builds (as far as I can

Re: Bug#948087: future of aufs in Debian.

2020-05-26 Thread Jan Luca Naumann
r the package was not autoremoved from testing due to > aufs and aufs-tools being considered a "key packages" due to high > popcon. This popcon actually seems to be growing in both absolute and > percentage terms. I presume the high popcon is due to some deriviative > (hen

Re: future of aufs in Debian.

2020-05-26 Thread Adrian Bunk
gh popcon. This popcon > actually seems to be growing in both absolute and percentage terms. I presume > the high popcon is due to some deriviative (hence debian-derivatives and > debian-live in cc) using aufs in their live image builds (as far as I can > tell debian's own live im

future of aufs in Debian.

2020-05-26 Thread peter green
" due to high popcon. This popcon actually seems to be growing in both absolute and percentage terms. I presume the high popcon is due to some deriviative (hence debian-derivatives and debian-live in cc) using aufs in their live image builds (as far as I can tell debian's own live images s

Bug#959101: marked as done (buster-pu: package debian-security-support/2020.04.16~deb10u2)

2020-05-09 Thread Debian Bug Tracking System
Your message dated Sat, 09 May 2020 11:53:52 +0100 with message-id and subject line Closing requests included in 10.4 point release has caused the Debian Bug report #959101, regarding buster-pu: package debian-security-support/2020.04.16~deb10u2 to be marked as done. This means that you claim

Bug#956861: marked as done (buster-pu: package debian-edu-config/2.10.65+deb10u5)

2020-05-09 Thread Debian Bug Tracking System
Your message dated Sat, 09 May 2020 11:53:52 +0100 with message-id and subject line Closing requests included in 10.4 point release has caused the Debian Bug report #956861, regarding buster-pu: package debian-edu-config/2.10.65+deb10u5 to be marked as done. This means that you claim

Bug#959101: debian-security-support 2020.04.16~deb10u2 flagged for acceptance

2020-05-02 Thread Adam D Barratt
package release.debian.org tags 959101 = buster pending thanks Hi, The upload referenced by this bug report has been flagged for acceptance into the proposed-updates queue for Debian buster. Thanks for your contribution! Upload details == Package: debian-security-support Version

Processed: debian-security-support 2020.04.16~deb10u2 flagged for acceptance

2020-05-02 Thread Debian Bug Tracking System
ter-pu: package debian-security-support/2020.04.16~deb10u2 Added tag(s) pending; removed tag(s) confirmed. > thanks Stopping processing here. Please contact me if you need assistance. -- 959101: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=959101 Debian Bug Tracking System C

Bug#959101: buster-pu: package debian-security-support/2020.04.16~deb10u2

2020-05-02 Thread Holger Levsen
rs, Holger --- holger@(debian|reproducible-builds|layer-acht).org PGP fingerprint: B8BF 5413 7B09 D35C F026 FE9D 091A B856 069A AA1C diff -Nru debian-security-support-2020.04.16/debian/changelog debian-security-support-2020.04.16~deb10u2/debian/changelog --- debia

Processed: Re: Bug#959101: buster-pu: package debian-security-support/2020.04.16~deb10u2

2020-05-01 Thread Debian Bug Tracking System
Processing control commands: > tags -1 + confirmed Bug #959101 [release.debian.org] buster-pu: package debian-security-support/2020.04.16~deb10u2 Added tag(s) confirmed. -- 959101: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=959101 Debian Bug Tracking System Contact ow...@bugs.debian.

Bug#959101: buster-pu: package debian-security-support/2020.04.16~deb10u2

2020-05-01 Thread Adam D. Barratt
Control: tags -1 + confirmed On Wed, 2020-04-29 at 13:26 +0200, Holger Levsen wrote: > I'd like to update debian-security-support in buster, preferedly to > the version in bullseye (modulo changelog entry), as I think the > changes are safe and sane also because this will make

Bug#959101: buster-pu: package debian-security-support/2020.04.16~deb10u2

2020-04-29 Thread Holger Levsen
Package: release.debian.org Severity: normal Tags: buster User: release.debian@packages.debian.org Usertags: pu Hi, I'd like to update debian-security-support in buster, preferedly to the version in bullseye (modulo changelog entry), as I think the changes are safe and sane also because

Processed: debian-edu-config 2.10.65+deb10u5 flagged for acceptance

2020-04-25 Thread Debian Bug Tracking System
ter-pu: package debian-edu-config/2.10.65+deb10u5 Added tag(s) pending; removed tag(s) confirmed. > thanks Stopping processing here. Please contact me if you need assistance. -- 956861: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=956861 Debian Bug Tracking System Contact ow...@bugs.d

Bug#956861: debian-edu-config 2.10.65+deb10u5 flagged for acceptance

2020-04-25 Thread Adam D Barratt
package release.debian.org tags 956861 = buster pending thanks Hi, The upload referenced by this bug report has been flagged for acceptance into the proposed-updates queue for Debian buster. Thanks for your contribution! Upload details == Package: debian-edu-config Version

Bug#956861: buster-pu: package debian-edu-config/2.10.65+deb10u5

2020-04-22 Thread Holger Levsen
On Tue, Apr 21, 2020 at 07:16:45PM +0100, Adam D. Barratt wrote: > Please go ahead; thanks. thanks, uploaded. -- cheers, Holger --- holger@(debian|reproducible-builds|layer-acht).org

Processed: Re: Bug#956861: buster-pu: package debian-edu-config/2.10.65+deb10u5

2020-04-21 Thread Debian Bug Tracking System
Processing control commands: > tags -1 + confirmed Bug #956861 [release.debian.org] buster-pu: package debian-edu-config/2.10.65+deb10u5 Added tag(s) confirmed. -- 956861: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=956861 Debian Bug Tracking System Contact ow...@bugs.debian.

Bug#956861: buster-pu: package debian-edu-config/2.10.65+deb10u5

2020-04-21 Thread Adam D. Barratt
Control: tags -1 + confirmed On Thu, 2020-04-16 at 02:41 +0200, Holger Levsen wrote: > debian-edu-config (2.10.65+deb10u5) buster; urgency=medium > > [ Wolfgang Schweer ] > * Add policies files for Firefox-ESR and Thunderbird to fix the > TLS/SSL setup. > This makes su

Bug#956861: buster-pu: package debian-edu-config/2.10.65+deb10u5

2020-04-16 Thread Holger Levsen
Holger --- holger@(debian|reproducible-builds|layer-acht).org PGP fingerprint: B8BF 5413 7B09 D35C F026 FE9D 091A B856 069A AA1C signature.asc Description: PGP signature

Bug#956861: buster-pu: package debian-edu-config/2.10.65+deb10u5

2020-04-15 Thread Holger Levsen
Package: release.debian.org Severity: normal Tags: buster User: release.debian@packages.debian.org Usertags: pu Dear SRMs, we would like the following two 'important' bugs in buster: debian-edu-config (2.10.65+deb10u5) buster; urgency=medium [ Wolfgang Schweer ] * Add policies files

Re: state of the rust ecosystem (and particularly rust-cbindgen) in Debian (was: Requesting backport of cbindgen > 0.10.0 to buster)

2020-04-11 Thread Paul Gevers
Hi, On 11-04-2020 17:59, Mattia Rizzolo wrote: > there are plans > (I don't know at which point they are) to *also* consider failing > autopkgtest in testing as RC. This already happened last year, see https://lists.debian.org/debian-devel-announce/2019/07/msg2.html [All autopkgtest

Re: state of the rust ecosystem (and particularly rust-cbindgen) in Debian (was: Requesting backport of cbindgen > 0.10.0 to buster)

2020-04-11 Thread Mattia Rizzolo
mark. -- regards, Mattia Rizzolo GPG Key: 66AE 2B4A FCCF 3F52 DA18 4D18 4B04 3FCD B944 4540 .''`. More about me: https://mapreri.org : :' : Launchpad user: https://launchpad.net/~mapreri `. `'` Debian QA page: https://qa.debian.org/develope

Re: [Pkg-rust-maintainers] state of the rust ecosystem (and particularly rust-cbindgen) in Debian (was: Requesting backport of cbindgen > 0.10.0 to buster)

2020-04-10 Thread Sylvestre Ledru
Le 10/04/2020 à 18:47, peter green a écrit : (note: these are my observations as a maintainer of a derivative) The rust ecosystem in Debian recently had (and I expect still has) trouble to properly migrate to testing Indeed there are still issues, most notablly IMO that firefox-esr's build

state of the rust ecosystem (and particularly rust-cbindgen) in Debian (was: Requesting backport of cbindgen > 0.10.0 to buster)

2020-04-10 Thread peter green
(note: these are my observations as a maintainer of a derivative) The rust ecosystem in Debian recently had (and I expect still has) trouble to properly migrate to testing Indeed there are still issues, most notablly IMO that firefox-esr's build-dependencies have been unsatisfiable in testing

Bug#950578: Add Raspberry Pi 4 netinst support for next Debian release

2020-02-25 Thread Pete Batard
Hi, I'm not sure if this is the proper list to send this to, but I would like to bring attention to https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=950578 and its associated patch, as we believe this is all that stands between the next Debian release and its ability to be used for netinst

Re: on updating debian-security-support in stable and oldstable (due to DSA-4562-1)

2020-02-13 Thread Holger Levsen
h packages into the archive. > > (once this is accepted I'll upload to jessie-security and be done.) finally uploaded this now too as well, and released DLA-2103-1. IOW: jessie, stretch and buster now have "the same" version of debian-sec

Re: [SUA 177-1] Upcoming Debian 10 Update (10.3)

2020-02-09 Thread Jacek Rz
UNSUBSCRIBE On Mon, 3 Feb 2020, 22:40 Adam D. Barratt, wrote: > > ---- > Debian Stable Updates Announcement SUA 177-1 > https://www.debian.org/ > debian-release@lists.debian.org > <https://www.debi

Bug#950257: marked as done (buster-pu: package debian-edu-config/2.10.65+deb10u4)

2020-02-08 Thread Debian Bug Tracking System
Your message dated Sat, 08 Feb 2020 14:21:36 + with message-id and subject line Closing requests included in 10.3 point release has caused the Debian Bug report #950257, regarding buster-pu: package debian-edu-config/2.10.65+deb10u4 to be marked as done. This means that you claim

Bug#946960: marked as done (buster-pu: package debian-security-support/2019.12.12~deb10u1)

2020-02-08 Thread Debian Bug Tracking System
Your message dated Sat, 08 Feb 2020 14:21:36 + with message-id and subject line Closing requests included in 10.3 point release has caused the Debian Bug report #946960, regarding buster-pu: package debian-security-support/2019.12.12~deb10u1 to be marked as done. This means that you claim

Re: on updating debian-security-support in stable and oldstable (due to DSA-4562-1)

2020-01-31 Thread Moritz Mühlenhoff
On Thu, Jan 30, 2020 at 10:41:56PM +, Holger Levsen wrote: > On Thu, Jan 30, 2020 at 07:41:32PM +, Holger Levsen wrote: > > I'll upload 2019.12.12~deb9u2 then which is lower than what's in > > buster-pu currently and will be in buster soon. (2019.12.12~deb10u1) > > uploaded now. > >

Re: on updating debian-security-support in stable and oldstable (due to DSA-4562-1)

2020-01-30 Thread Holger Levsen
cheers, Holger --- holger@(debian|reproducible-builds|layer-acht).org PGP fingerprint: B8BF 5413 7B09 D35C F026 FE9D 091A B856 069A AA1C signature.asc Description: PGP signature

Processed: debian-edu-config 2.10.65+deb10u4 flagged for acceptance

2020-01-30 Thread Debian Bug Tracking System
ter-pu: package debian-edu-config/2.10.65+deb10u4 Added tag(s) pending. > thanks Stopping processing here. Please contact me if you need assistance. -- 950257: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=950257 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems

Bug#950257: debian-edu-config 2.10.65+deb10u4 flagged for acceptance

2020-01-30 Thread Adam D Barratt
package release.debian.org tags 950257 = buster pending thanks Hi, The upload referenced by this bug report has been flagged for acceptance into the proposed-updates queue for Debian buster. Thanks for your contribution! Upload details == Package: debian-edu-config Version

Re: on updating debian-security-support in stable and oldstable (due to DSA-4562-1)

2020-01-30 Thread Holger Levsen
Holger --- holger@(debian|reproducible-builds|layer-acht).org PGP fingerprint: B8BF 5413 7B09 D35C F026 FE9D 091A B856 069A AA1C signature.asc Description: PGP signature

Bug#950257: buster-pu: package debian-edu-config/2.10.65+deb10u4

2020-01-30 Thread Mike Gabriel
Package: release.debian.org Severity: normal Tags: buster User: release.debian@packages.debian.org Usertags: pu Dear Release Team, on behalf of the Debian Edu team, I just uploaded a fix for Debian bug #941001 to buster (2.10.65+deb10u4). >From the changelog: + [ Dominik Geo

Bug#946960: debian-security-support 2019.12.12~deb10u1 flagged for acceptance

2020-01-25 Thread Adam D Barratt
package release.debian.org tags 946960 = buster pending thanks Hi, The upload referenced by this bug report has been flagged for acceptance into the proposed-updates queue for Debian buster. Thanks for your contribution! Upload details == Package: debian-security-support Version

Processed: debian-security-support 2019.12.12~deb10u1 flagged for acceptance

2020-01-25 Thread Debian Bug Tracking System
ter-pu: package debian-security-support/2019.12.12~deb10u1 Added tag(s) pending; removed tag(s) confirmed. > thanks Stopping processing here. Please contact me if you need assistance. -- 946960: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=946960 Debian Bug Tracking System C

Fix for proftp "bug 4385" in Debian (old)stable?

2020-01-23 Thread Hilmar Preuße
n uploaded to Debian unstable yesterday. Do you think this needs to be fixed for Debian (old)stable too? Regards, Hilmar -- sigfault #206401 http://counter.li.org signature.asc Description: OpenPGP digital signature

Bug#946960: buster-pu: package debian-security-support/2019.12.12~deb10u1

2020-01-21 Thread Holger Levsen
On Mon, Dec 30, 2019 at 09:08:36PM +, Adam D. Barratt wrote: > Please go ahead. uploaded now, thanks. -- cheers, Holger --- holger@(debian|reproducible-builds|layer-acht).org

Processed: Re: Bug#946960: buster-pu: package debian-security-support/2019.12.12~deb10u1

2019-12-30 Thread Debian Bug Tracking System
Processing control commands: > tags -1 + confirmed Bug #946960 [release.debian.org] buster-pu: package debian-security-support/2019.12.12~deb10u1 Added tag(s) confirmed. -- 946960: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=946960 Debian Bug Tracking System Contact ow...@bugs.debian.

Bug#946960: buster-pu: package debian-security-support/2019.12.12~deb10u1

2019-12-30 Thread Adam D. Barratt
Control: tags -1 + confirmed On Wed, 2019-12-18 at 14:55 +0100, Holger Levsen wrote: > * security-support-limited: point to > https://www.debian.org/releases/ \ > buster/amd64/release-notes/ch-information.en.html#golang-static- > linking > for golang* packages. > * Remove nodejs from

Bug#946960: buster-pu: package debian-security-support/2019.12.12~deb10u1

2019-12-18 Thread Holger Levsen
Package: release.debian.org Severity: normal Tags: buster User: release.debian@packages.debian.org Usertags: pu hi, we'd like to update debian-security-support to 2019.12.12~deb10u1 to bring these changes to buster: * security-support-limited: point to https://www.debian.org/releases

Re: on updating debian-security-support in stable and oldstable (due to DSA-4562-1)

2019-11-28 Thread Moritz Muehlenhoff
On Thu, Nov 28, 2019 at 12:03:25PM +, Holger Levsen wrote: > - for stretch, I will upload to stretch-security and that's it. Sounds good, I'll take care of releasing that. Cheers, Moritz

Re: on updating debian-security-support in stable and oldstable (due to DSA-4562-1)

2019-11-28 Thread Holger Levsen
On Wed, Nov 27, 2019 at 11:18:47AM +0100, Moritz Muehlenhoff wrote: > We already had a DSA announcing Chromium EOL for stretch ( > https://lists.debian.org/debian-security-announce/2019/msg00214.html), > as such let's simply install an updated debian-security-support to > stre

Re: on updating debian-security-support in stable and oldstable (due to DSA-4562-1)

2019-11-27 Thread Moritz Muehlenhoff
000, Holger Levsen wrote: > > > > - or should debian-security-support follow the normal point release > > > > schedule, which AIUI currently has the unfortunate drawback that no > > > > stretch point release is planned anymore (??) > > > > &g

Re: on updating debian-security-support in stable and oldstable (due to DSA-4562-1)

2019-11-27 Thread Salvatore Bonaccorso
Hi Holger, On Tue, Nov 26, 2019 at 01:03:00PM +, Holger Levsen wrote: > On Sun, Nov 24, 2019 at 08:27:40PM +, Adam D. Barratt wrote: > > On Sun, 2019-11-24 at 18:42 +, Holger Levsen wrote: > > > - or should debian-security-support follow the normal point release >

Re: on updating debian-security-support in stable and oldstable (due to DSA-4562-1)

2019-11-26 Thread Holger Levsen
On Sun, Nov 24, 2019 at 08:27:40PM +, Adam D. Barratt wrote: > On Sun, 2019-11-24 at 18:42 +, Holger Levsen wrote: > > - or should debian-security-support follow the normal point release > > schedule, which AIUI currently has the unfortunate drawback that no > >

Re: on updating debian-security-support in stable and oldstable (due to DSA-4562-1)

2019-11-24 Thread Adam D. Barratt
On Sun, 2019-11-24 at 18:42 +, Holger Levsen wrote: > - or should debian-security-support follow the normal point release > schedule, which AIUI currently has the unfortunate drawback that no > stretch point release is planned anymore (??) Addressing just this point right now, I am

on updating debian-security-support in stable and oldstable (due to DSA-4562-1)

2019-11-24 Thread Holger Levsen
omium updates or switch to firefox, which continues to be supported in the oldstable release." This info was then included in the 2019.11.16 upload of debian-security-support to unstable with this change: * Add chromium to security-support-ended.deb9. Currently we have: debian-securi

Bug#944238: marked as done (buster-pu: package debian-edu-config/2.10.65+deb10u2)

2019-11-16 Thread Debian Bug Tracking System
Your message dated Sat, 16 Nov 2019 10:08:47 + with message-id <83c9ffab6f08361485f70dda4733a7a24aeec09b.ca...@adam-barratt.org.uk> and subject line Closing bugs for 10.2 point release fixes has caused the Debian Bug report #944238, regarding buster-pu: package debian-edu-config/2

Processed: debian-edu-config 2.10.65+deb10u2 flagged for acceptance

2019-11-09 Thread Debian Bug Tracking System
ter-pu: package debian-edu-config/2.10.65+deb10u2 Added tag(s) pending; removed tag(s) confirmed. > thanks Stopping processing here. Please contact me if you need assistance. -- 944238: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=944238 Debian Bug Tracking System Contact ow...@bugs.d

Bug#944238: debian-edu-config 2.10.65+deb10u2 flagged for acceptance

2019-11-09 Thread Adam D Barratt
package release.debian.org tags 944238 = buster pending thanks Hi, The upload referenced by this bug report has been flagged for acceptance into the proposed-updates queue for Debian buster. Thanks for your contribution! Upload details == Package: debian-edu-config Version

Bug#944238: buster-pu: package debian-edu-config/2.10.65+deb10u2

2019-11-08 Thread Holger Levsen
On Fri, Nov 08, 2019 at 10:10:54PM +, Adam D. Barratt wrote: > Control: tags -1 + confirmed [...] > Please go ahead. thanks, uploaded. -- cheers, Holger --- holger@(debian|reprod

Processed: Re: Bug#944238: buster-pu: package debian-edu-config/2.10.65+deb10u2

2019-11-08 Thread Debian Bug Tracking System
Processing control commands: > tags -1 + confirmed Bug #944238 [release.debian.org] buster-pu: package debian-edu-config/2.10.65+deb10u2 Added tag(s) confirmed. -- 944238: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=944238 Debian Bug Tracking System Contact ow...@bugs.debian.

Bug#944238: buster-pu: package debian-edu-config/2.10.65+deb10u2

2019-11-08 Thread Adam D. Barratt
Control: tags -1 + confirmed On Wed, 2019-11-06 at 22:22 +0800, Holger Levsen wrote: > We'd like to update debian-edu-config in buster to fix one important > (#944013 debian-edu-config: adjusted ini files needed to match > changed behaviour of firefox-esr 68.2.0esr) and one n

Bug#944238: buster-pu: package debian-edu-config/2.10.65+deb10u2

2019-11-06 Thread Holger Levsen
On Wed, Nov 06, 2019 at 10:22:21PM +0800, Holger Levsen wrote: > We'd like to update debian-edu-config in buster to fix one important > (#944013 debian-edu-config: adjusted ini files needed to match changed > behaviour of firefox-esr 68.2.0esr) and one normal bug: I forgot t

Bug#944238: buster-pu: package debian-edu-config/2.10.65+deb10u2

2019-11-06 Thread Holger Levsen
Package: release.debian.org Severity: normal Tags: buster User: release.debian@packages.debian.org Usertags: pu We'd like to update debian-edu-config in buster to fix one important (#944013 debian-edu-config: adjusted ini files needed to match changed behaviour of firefox-esr 68.2.0esr

Re: Debian Linux kernel uploads

2019-10-22 Thread Ansgar
Hi, Hector Oron writes: > I would like to support Debian Linux kernel team by doing kernel > package uploads. Related to Linux uploads: I've added an exception to allow source-only uploads to NEW for src:linux. Feel free to try. Ansgar

debian patches from upstream

2019-10-21 Thread M. F. Ghani
Hi, What is the current workflow of the patch propagation from linux mainline to debian stable kernel versions? are the downstream debian kernels rebased against the latest mainline kernel version or are they just rebased against the lts upstream version from which the debian kernel was initially

Re: Debian Linux kernel uploads

2019-10-20 Thread Salvatore Bonaccorso
Hi, On Sun, Oct 20, 2019 at 02:27:21PM +0100, Ben Hutchings wrote: > On Sun, 2019-10-20 at 13:58 +0200, Hector Oron wrote: > > Hello, > > > > I would like to support Debian Linux kernel team by doing kernel > > package uploads. > > > > Initially, I wou

Re: Debian Linux kernel uploads

2019-10-20 Thread Ben Hutchings
On Sun, 2019-10-20 at 13:58 +0200, Hector Oron wrote: > Hello, > > I would like to support Debian Linux kernel team by doing kernel > package uploads. > > Initially, I would like to attempt timely (weekly or bi-weekly, it > has not been discussed yet) updates for Debian

Debian Linux kernel uploads

2019-10-20 Thread Hector Oron
Hello, I would like to support Debian Linux kernel team by doing kernel package uploads. Initially, I would like to attempt timely (weekly or bi-weekly, it has not been discussed yet) updates for Debian Linux kernel package in SID and see how that works. In anycase, I would like to give

Processed: block 933548 with 941795, tagging 941795, user debian...@lists.debian.org, usertagging 941795

2019-10-05 Thread Debian Bug Tracking System
795 > tags 941795 + bullseye sid Bug #941795 [src:ruby-gnome] ruby-gnome: gio2 autopkgtest fails with gobject-introspection 1.62 Added tag(s) sid and bullseye. > user debian...@lists.debian.org Setting user to debian...@lists.debian.org (was s...@debian.org). > usertags 941795 + regressio

Processed: user debian...@lists.debian.org, usertagging 941487, affects 941487, block 933548 with 941487 ...

2019-10-01 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > user debian...@lists.debian.org Setting user to debian...@lists.debian.org (was s...@debian.org). > usertags 941487 + regression There were no usertags set. Usertags are now: regression. > affects 941487 + src:glib2.0 Bug #941487 [

Bug#927680: marked as done (Code name spelling (upper/lower) is used inconsistently in Debian communication/documentation)

2019-09-20 Thread Debian Bug Tracking System
Your message dated Fri, 20 Sep 2019 20:04:10 +0200 with message-id <6e804e06-5ea5-57d9-0fe4-74a750e6e...@debian.org> and subject line Re: Code name spelling (upper/lower) is used inconsistently in Debian communication/documentation has caused the Debian Bug report #927680, regarding Cod

Re: [debian-mysql] Bug#939866: Bug#939866: mariadb-server-10.1: replication hangs in state "Slave_IO_Running: Preparing" after upgrade from 10.1.38 to 10.1.41

2019-09-16 Thread Otto Kekäläinen
la 14. syysk. 2019 klo 16.57 Adam D. Barratt (a...@adam-barratt.org.uk) kirjoitti: > > On Fri, 2019-09-13 at 21:10 +0300, Otto Kekäläinen wrote: > > To clarify, 10.3.18 has been uploaded to Debian unstable. Issue is > > still open for Buster and Stretch. > > Is the

Re: [debian-mysql] Bug#939866: Bug#939866: mariadb-server-10.1: replication hangs in state "Slave_IO_Running: Preparing" after upgrade from 10.1.38 to 10.1.41

2019-09-14 Thread Adam D. Barratt
On Fri, 2019-09-13 at 21:10 +0300, Otto Kekäläinen wrote: > To clarify, 10.3.18 has been uploaded to Debian unstable. Issue is > still open for Buster and Stretch. Is there a likely ETA for when this might be resolvable? If you could prepare (preferably targeted) updates via the usual p-

Bug#938975: marked as done (buster-pu: package debian-edu-doc/2.10.19~deb10u1)

2019-09-07 Thread Debian Bug Tracking System
Your message dated Sat, 07 Sep 2019 14:34:49 +0100 with message-id and subject line Closing bugs for fixes including in 10.1 point release has caused the Debian Bug report #938975, regarding buster-pu: package debian-edu-doc/2.10.19~deb10u1 to be marked as done. This means that you claim

Bug#935776: marked as done (buster-pu: [pre-upload approval of] package debian-edu-config/2.10.65+deb10u1)

2019-09-07 Thread Debian Bug Tracking System
Your message dated Sat, 07 Sep 2019 14:34:49 +0100 with message-id and subject line Closing bugs for fixes including in 10.1 point release has caused the Debian Bug report #935776, regarding buster-pu: [pre-upload approval of] package debian-edu-config/2.10.65+deb10u1 to be marked as done

Bug#932069: marked as done (buster-pu: calamares-settings-debian 10.0.20-1+deb10u1)

2019-09-07 Thread Debian Bug Tracking System
Your message dated Sat, 07 Sep 2019 14:34:49 +0100 with message-id and subject line Closing bugs for fixes including in 10.1 point release has caused the Debian Bug report #932069, regarding buster-pu: calamares-settings-debian 10.0.20-1+deb10u1 to be marked as done. This means that you claim

Re: [Pkg-rust-maintainers] Your Debian package(s) will not migrate to testing

2019-09-05 Thread Ximin Luo
Copying to debian-release@ Please help reduce unnecessary bureaucracy and paperwork for general Debian packagers. X Ximin Luo: > Julian Gilbey: >> [..] >> >> ~ >> No binary maintainer uploads for bullseye >> = >&

Re: requesting debian stretch 9.10.0 release

2019-09-01 Thread Paul Wise
On Mon, Sep 2, 2019 at 2:48 AM Ilari Jääskeläinen wrote: > best wishes for debian stretch, I hope the best possible patience and > discipline accomplishing the future. According to the release team's website the stretch 9.10 release is scheduled for 2019-09-07 (this w

requesting debian stretch 9.10.0 release

2019-09-01 Thread Ilari Jääskeläinen
best wishes for debian stretch, I hope the best possible patience and discipline accomplishing the future.

<    3   4   5   6   7   8   9   10   11   12   >