Source: vmtk
Version: 1.3+dfsg-2.3
Severity: serious
Your package came up as a candidate for removal from Debian:
- Depends on Python 2 and thus removed from testing since 2019 (current
upstream 1.4 is fixed, though)
- Last maintainer upload in 2016
If you disagree and want to continue to
Source: astk
Version: 1.13.1-2.1
Severity: serious
Your package came up as a candidate for removal from Debian:
- Still depends on Python 2 and thus removed from testing since 2019
- Last maintainer upload in 2014
If you disagree and want to continue to maintain this package,
please just close
Source: skimage
Severity: serious
pillow 8.1.2+dfsg-0.2 backported a few security fixes from pillow 8.2.
One of the changes breaks the autopkgtest/testsuite of skimage:
https://ci.debian.net/data/autopkgtest/testing/amd64/s/skimage/13102974/log.gz
I dug around in skimage git and this appears to
Package: scilab
Severity: important
Tags: security
X-Debbugs-Cc: Debian Security Team
Multiple security issues were found in ezxml, which scilab bundles:
CVE-2021-31598:
https://sourceforge.net/p/ezxml/bugs/28/
CVE-2021-31348 / CVE-2021-31347:
https://sourceforge.net/p/ezxml/bugs/27/
Source: ros-actionlib
Severity: normal
Tags: security
X-Debbugs-Cc: Debian Security Team
This was assigned CVE-2020-10289:
https://github.com/ros/actionlib/pull/171
Cheers,
Moritz
--
debian-science-maintainers mailing list
debian-science-maintainers@alioth-lists.debian.net
Package: meshlab
Severity: serious
The new meshlab FTBFSes on arm64, armel, armhf, ppc64el, s390x.
This also means that on those archs meshlab still uses Qt4.
Cheers,
Moritz
--
debian-science-maintainers mailing list
debian-science-maintainers@alioth-lists.debian.net
Source: sumo
Severity: normal
src/foreign/fontstash/stb_truetype.h is shipped in sumo
The STB files are also available in src:libstb, so please consider switching
to the in-archive copy.
Cheers,
Moritz
--
debian-science-maintainers mailing list
On Wed, Dec 11, 2019 at 09:52:15AM +0100, Thibaut Paumard wrote:
> Le 10/12/2019 à 19:59, Moritz Mühlenhoff a écrit :
> > On Mon, Oct 07, 2019 at 04:51:09PM +0200, Thibaut Paumard wrote:
> >> Dear Jeremy,
> >>
> >> Thanks, I have warned upstream that spydr will be removed if not updated
> >> to
On Wed, Sep 25, 2019 at 07:57:47AM +0200, Andreas Tille wrote:
> Hi,
>
> On Tue, Sep 24, 2019 at 10:48:24PM +0200, Moritz Mühlenhoff wrote:
> > On Tue, Sep 17, 2019 at 12:05:17PM -0300, Lisandro Damián Nicanor Pérez
> > Meyer wrote:
> > > Hi! It seems there is no activity on this bug, should we
On Tue, Jun 04, 2019 at 08:20:33PM +0200, Anton Gladky wrote:
> severity 929597 important
> thanks
>
> The fix from upstream is still not available. I am not feeling
> confident enough to provide a fix for this complex peace
> of code without breaking it.
>
> Also reducing the severity. If the
Source: freeimage
Severity: grave
Tags: security
Please see
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12211
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12212
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12213
Source: opencv
Severity: important
Tags: security
This got fixed in experimental, but given that this won't reach buster, it
would be great if you could cherrypick the isolated patch:
https://github.com/opencv/opencv/issues/10479
Patch:
12 matches
Mail list logo