Bug#1008792: Should vmtk be removed?

2022-04-01 Thread Moritz Muehlenhoff
Source: vmtk Version: 1.3+dfsg-2.3 Severity: serious Your package came up as a candidate for removal from Debian: - Depends on Python 2 and thus removed from testing since 2019 (current upstream 1.4 is fixed, though) - Last maintainer upload in 2016 If you disagree and want to continue to

Bug#1008704: Sould astk be removed?

2022-03-30 Thread Moritz Muehlenhoff
Source: astk Version: 1.13.1-2.1 Severity: serious Your package came up as a candidate for removal from Debian: - Still depends on Python 2 and thus removed from testing since 2019 - Last maintainer upload in 2014 If you disagree and want to continue to maintain this package, please just close

Bug#990204: Failing autopkgtest with pillow 8.1.2+dfsg-0.2/ pillow 8.2

2021-06-22 Thread Moritz Muehlenhoff
Source: skimage Severity: serious pillow 8.1.2+dfsg-0.2 backported a few security fixes from pillow 8.2. One of the changes breaks the autopkgtest/testsuite of skimage: https://ci.debian.net/data/autopkgtest/testing/amd64/s/skimage/13102974/log.gz I dug around in skimage git and this appears to

Bug#989364: scilab: Multiple security issues in ezxml

2021-06-01 Thread Moritz Muehlenhoff
Package: scilab Severity: important Tags: security X-Debbugs-Cc: Debian Security Team Multiple security issues were found in ezxml, which scilab bundles: CVE-2021-31598: https://sourceforge.net/p/ezxml/bugs/28/ CVE-2021-31348 / CVE-2021-31347: https://sourceforge.net/p/ezxml/bugs/27/

Bug#968830: CVE-2020-10289

2020-08-21 Thread Moritz Muehlenhoff
Source: ros-actionlib Severity: normal Tags: security X-Debbugs-Cc: Debian Security Team This was assigned CVE-2020-10289: https://github.com/ros/actionlib/pull/171 Cheers, Moritz -- debian-science-maintainers mailing list debian-science-maintainers@alioth-lists.debian.net

Bug#953062: FTBFS on arm64, armel, armhf, ppc64el, s390x

2020-03-03 Thread Moritz Muehlenhoff
Package: meshlab Severity: serious The new meshlab FTBFSes on arm64, armel, armhf, ppc64el, s390x. This also means that on those archs meshlab still uses Qt4. Cheers, Moritz -- debian-science-maintainers mailing list debian-science-maintainers@alioth-lists.debian.net

Bug#950251: Consider linking against archive version of libstb

2020-01-30 Thread Moritz Muehlenhoff
Source: sumo Severity: normal src/foreign/fontstash/stb_truetype.h is shipped in sumo The STB files are also available in src:libstb, so please consider switching to the in-archive copy. Cheers, Moritz -- debian-science-maintainers mailing list

Bug#885505: bumping severity of pygtk bugs

2019-12-11 Thread Moritz Muehlenhoff
On Wed, Dec 11, 2019 at 09:52:15AM +0100, Thibaut Paumard wrote: > Le 10/12/2019 à 19:59, Moritz Mühlenhoff a écrit : > > On Mon, Oct 07, 2019 at 04:51:09PM +0200, Thibaut Paumard wrote: > >> Dear Jeremy, > >> > >> Thanks, I have warned upstream that spydr will be removed if not updated > >> to

Bug#875150: Should we file a removal bug?

2019-09-25 Thread Moritz Muehlenhoff
On Wed, Sep 25, 2019 at 07:57:47AM +0200, Andreas Tille wrote: > Hi, > > On Tue, Sep 24, 2019 at 10:48:24PM +0200, Moritz Mühlenhoff wrote: > > On Tue, Sep 17, 2019 at 12:05:17PM -0300, Lisandro Damián Nicanor Pérez > > Meyer wrote: > > > Hi! It seems there is no activity on this bug, should we

Bug#929597: CVE-2019-12211 CVE-2019-12212 CVE-2019-12213 CVE-2019-12214

2019-06-04 Thread Moritz Muehlenhoff
On Tue, Jun 04, 2019 at 08:20:33PM +0200, Anton Gladky wrote: > severity 929597 important > thanks > > The fix from upstream is still not available. I am not feeling > confident enough to provide a fix for this complex peace > of code without breaking it. > > Also reducing the severity. If the

Bug#929597: CVE-2019-12211 CVE-2019-12212 CVE-2019-12213 CVE-2019-12214

2019-05-26 Thread Moritz Muehlenhoff
Source: freeimage Severity: grave Tags: security Please see http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12211 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12212 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12213

Bug#924884: CVE-2017-18009

2019-03-17 Thread Moritz Muehlenhoff
Source: opencv Severity: important Tags: security This got fixed in experimental, but given that this won't reach buster, it would be great if you could cherrypick the isolated patch: https://github.com/opencv/opencv/issues/10479 Patch: