Bug#794992: RM: neutron-vpnaas/2015.1.0-2
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: rm The python-sqlalchemy transition was all set to finish today when the maintainer (zigo) uploaded neutron-vpnaas and so set the whole thing back by five days (at least, who knows what else he uploads in the mean time). If we can just remove this one package from testing, then sqlalchemy and the rest of the rdepends will migrate. That'll get rid of the risk of something else getting uploaded and delaying it further. In the meantime, this shouldn't be gone from testing long unless it's otherwise buggy. Scott K -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org Archive: https://lists.debian.org/20150809051855.12117.85945.reportbug@kitterma-E6430
Bug#794989: nmu: xsdcxx_4.0.0-1
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: binnmu nmu xsdcxx_4.0.0-1 . ALL . unstable . -m "Rebuild for new libstdc++6" This is happening because of the libstdc++6 transition. Technically this is only happening because libstdc++6 declared a breaks xsdcxx-4.0.0-1 because of https://bugs.debian.org/cgi- bin/bugreport.cgi?bug=793289 xsd has no library for the change in C++ API to cause trouble with so the g++ bug shouldn't be relevant. I was able to download version in 4.0.0-1, unpacked it manually, and was still able to run the application. For further testing I built my own test binNMU and used it to generate code for libkolabxml Diane -- System Information: Debian Release: stretch/sid APT prefers unstable APT policy: (955, 'unstable'), (950, 'testing'), (500, 'stable-updates'), (500, 'stable') Architecture: amd64 (x86_64) Foreign Architectures: i386 Kernel: Linux 4.0.0-2-amd64 (SMP w/4 CPU cores) Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org Archive: https://lists.debian.org/20150809042212.13027.25746.report...@myrada.ghic.org
I: Bug#794466: Virtualbox might not be suitable for Stretch
Hi Frank and Release Team, >Oracle at this moment maintains a 4.0.x 4.1.x 4.2.x 4.3.x 5.0.x >branches where security fixes seems to be addressed all. > >(virtualbox-ose from o-o-s still needs some pinpoint fixes) virtualbox-ose is at version 3.2.10, and the last release from [1] is 3.2.28, and released two months ago. Does this mean that CVE gets fixed on 3.2.x too? [1] https://www.virtualbox.org/wiki/Changelog-3.2 thanks, Gianfranco -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org Archive: https://lists.debian.org/1473982024.1394279.1439069293649.javamail.ya...@mail.yahoo.com
Re: Bug#794466: Virtualbox might not be suitable for Stretch
On Sat, Aug 08, 2015 at 09:23:31PM +, Gianfranco Costamagna wrote: > Virtualbox suffers of many security issues in Debian, > specially because Upstream (Oracle) refuses to give > patches for CVEs, and (you can see in the Debian bug > 794466 an analysis of the Oracle policy and discussion) > this makes difficult to handle security uploads in stable > releases. > > > The only patch they give for a CVE is "upgrade to the > next version of the stable branch", and extracting patches > from the code is not trivial, specially for such a huge package. You should bring this up with the security team and see whether they are satisfied that previous upstream releases have been of sufficient quality for this to be feasible in the future. -- Jonathan Wiltshire j...@debian.org Debian Developer http://people.debian.org/~jmw 4096R: 0xD3524C51 / 0A55 B7C5 1223 3942 86EC 74C3 5394 479D D352 4C51 signature.asc Description: Digital signature
Re: Bug#794466: Virtualbox might not be suitable for Stretch
Hi Debian Release Team, TLTR: Virtualbox suffers of many security issues in Debian, specially because Upstream (Oracle) refuses to give patches for CVEs, and (you can see in the Debian bug 794466 an analysis of the Oracle policy and discussion) this makes difficult to handle security uploads in stable releases. The only patch they give for a CVE is "upgrade to the next version of the stable branch", and extracting patches from the code is not trivial, specially for such a huge package. My request, based on Markus mail quoted below (something I pondered already, I was just waiting for somebody to do the first move), would be to have a sort of permission to do the updates to newer stable releases in s-p-u. e.g. On oldstable, version 4.1.18-dfsg-2+deb7u5 might become 4.1.30 on stable version 4.3.18 might become 4.3.30 and so on. Oracle at this moment maintains a 4.0.x 4.1.x 4.2.x 4.3.x 5.0.x branches where security fixes seems to be addressed all. (virtualbox-ose from o-o-s still needs some pinpoint fixes) So, even if the debdiff might look scary, we might want to update at least to the correspondant stable branch to fix bugs and security issues. Honestly I *never* found a regression in Virtualbox maintainance releases, neither in backports, and the huge popcon makes difficult to just let the package disappear. I maintain Virtualbox since ~2013 or so, and I can say that the maintainance branches does not require new dependencies (at least they never did, the only build-dependencies we added in maintainance releases were due to packaging bugs that had to be fixed, not something that upstream added) Thanks for your attention, (note: I did not find any reference on google about this sort of exceptions, please feel free to point me on some documentation, if adding -release to the bug is not enough, or feel free to reassing to the best meta package bug) Gianfranco >Hi Gianfranco, >thanks for your summary. > >Although I'm not involved in maintaining virtualbox, still a few >thoughts: > >* What would that mean for Jessie updates? >* Isn't that basically the same problem we have with MySQL, > or even Iceweasel? > >So I think the question is either drop, or work with upstream releases, >from which I'd personally prefer. > >Even popcon isn't too bad: >https://qa.debian.org/popcon.php?package=virtualbox > >Leaving users with the possibility to use upstream packages is also not >very attractive. > >Just me few cents :) >Markus -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org Archive: https://lists.debian.org/674443697.1373720.1439069011956.javamail.ya...@mail.yahoo.com
Bug#794962: wheezy-pu: package openafs/1.6.1-3+deb7u3
Package: release.debian.org Severity: normal Tags: wheezy User: release.debian@packages.debian.org Usertags: pu The security update to the linux kernel (3.2.65-1+deb7u2) changed the KPI by moving d_alias into the d_u union, which causes subsequent (re)build attempts of the openafs kernel module to fail. (Existing openafs kernel modules continued to work due to clever work by the kernel maintainer.) This situation was maintained without great incident until the upload of openafs 1.6.1-3+deb7u3 to the security repo, which cause most people to attempt to build a new openafs kernel module and fail. Two grave bugs (780865 and 794224) reflect that situation. We had to deal with this problem for jessie back in February, but I didn't have enough time to fix it for wheezy then. The jessie updates also included a fix for a bug causing potential data corruption in mmapped files; I included the fix for that (778851) in this w-p-u as well. A debdiff between deb7u3 (from the security repo) and my proposed deb7u4 is attached. -- System Information: Debian Release: stretch/sid APT prefers unstable APT policy: (500, 'unstable') Architecture: amd64 (x86_64) Kernel: Linux 3.16.0-4-amd64 (SMP w/1 CPU core) Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Init: systemd (via /run/systemd/system) diff -Nru openafs-1.6.1/debian/changelog openafs-1.6.1/debian/changelog --- openafs-1.6.1/debian/changelog 2015-07-30 06:27:51.0 -0400 +++ openafs-1.6.1/debian/changelog 2015-08-08 14:23:47.0 -0400 @@ -1,3 +1,12 @@ +openafs (1.6.1-3+deb7u4) wheezy-proposed-updates; urgency=medium + + * Fix the kernel module build when d_alias is in the d_u union +(Closes: #780865, Closes: #794224) +to d_alias being a member of the d_u union. + * Fix potential file corruption of mmapped files (Closes: #778851) + + -- Benjamin Kaduk Sat, 08 Aug 2015 14:19:04 -0400 + openafs (1.6.1-3+deb7u3) wheezy-security; urgency=high * Apply upstream security patches from the 1.6.13 release (thanks to diff -Nru openafs-1.6.1/debian/patches/debian-changes openafs-1.6.1/debian/patches/debian-changes --- openafs-1.6.1/debian/patches/debian-changes 2015-07-30 06:34:05.0 -0400 +++ openafs-1.6.1/debian/patches/debian-changes 2015-08-08 14:27:33.0 -0400 @@ -8,6 +8,16 @@ For full commit history and separated commits, see the packaging Git repository. +--- openafs-1.6.1.orig/acinclude.m4 openafs-1.6.1/acinclude.m4 +@@ -793,6 +793,7 @@ case $AFS_SYSNAME in *_linux* | *_umlinu + AC_CHECK_LINUX_STRUCT([backing_dev_info], [name], + [backing-dev.h]) + AC_CHECK_LINUX_STRUCT([ctl_table], [ctl_name], [sysctl.h]) ++ AC_CHECK_LINUX_STRUCT([dentry], [d_u.d_alias], [dcache.h]) + AC_CHECK_LINUX_STRUCT([inode], [i_alloc_sem], [fs.h]) + AC_CHECK_LINUX_STRUCT([inode], [i_blkbits], [fs.h]) + AC_CHECK_LINUX_STRUCT([inode], [i_blksize], [fs.h]) --- openafs-1.6.1.orig/configure.ac +++ openafs-1.6.1/configure.ac @@ -50,14 +50,20 @@ MAKE_KRB5="#" @@ -47,6 +57,301 @@ RRA_LIB_KRB5_RESTORE]) AC_SUBST([BUILD_KRB5]) AC_SUBST([MAKE_KRB5]) +--- openafs-1.6.1.orig/src/afs/LINUX/osi_compat.h openafs-1.6.1/src/afs/LINUX/osi_compat.h +@@ -27,6 +27,10 @@ + # endif + #endif + ++#if defined(STRUCT_DENTRY_HAS_D_U_D_ALIAS) ++# define d_alias d_u.d_alias ++#endif ++ + #ifndef HAVE_LINUX_DO_SYNC_READ + static inline int + do_sync_read(struct file *fp, char *buf, size_t count, loff_t *offp) { +--- openafs-1.6.1.orig/src/afs/LINUX/osi_prototypes.h openafs-1.6.1/src/afs/LINUX/osi_prototypes.h +@@ -79,6 +79,9 @@ extern void osi_VM_FlushPages(struct vca + extern void osi_VM_Truncate(struct vcache *avc, int alen, + afs_ucred_t *acred); + ++/* osi_vcache.c */ ++extern void osi_ResetRootVCache(afs_uint32 volid); ++ + /* osi_vfsops.c */ + extern void vattr2inode(struct inode *ip, struct vattr *vp); + extern int afs_init_inodecache(void); +--- openafs-1.6.1.orig/src/afs/LINUX/osi_vcache.c openafs-1.6.1/src/afs/LINUX/osi_vcache.c +@@ -13,6 +13,8 @@ + #include "afs/sysincludes.h"/*Standard vendor system headers */ + #include "afsincludes.h"/*AFS-based standard headers */ + ++#include "osi_compat.h" ++ + int + osi_TryEvictVCache(struct vcache *avc, int *slept, int defersleep) { + int code; +@@ -139,3 +141,64 @@ osi_PostPopulateVCache(struct vcache *av + vSetType(avc, VREG); + } + ++/** ++ * osi_ResetRootVCache - Reset the root vcache ++ * Reset the dentry associated with the afs root. ++ * Called from afs_CheckRootVolume when we notice that ++ * the root volume ID has changed. ++ * ++ * @volid: volume ID for the afs root ++ */ ++void ++osi_ResetRootVCache(afs_uint32 volid) ++{ ++struct vrequest *treq = NULL; ++struct vattr vattr; ++cred_t *credp; ++struct dentry *dp; ++struct vcache *vcp; ++struct inode *root = AFSTOV(afs_globalVp); ++ ++afs_rootFid.Fid.Volume = volid; ++afs_rootFid.Fid.Vn
Bug#794940: jessie-pu: package sparse/0.4.5~rc1-2~deb8u1
Package: release.debian.org Severity: normal Tags: jessie User: release.debian@packages.debian.org Usertags: pu sparse FTBFS in jessie and sid since the llvm default version was updated to 3.5. Unfortunately nobody rebuilt contrib and non-free before the release so this was not noticed in time :-( Andreas diff -Nru sparse-0.4.5~rc1/debian/.gitignore sparse-0.4.5~rc1/debian/.gitignore --- sparse-0.4.5~rc1/debian/.gitignore 1970-01-01 01:00:00.0 +0100 +++ sparse-0.4.5~rc1/debian/.gitignore 2015-08-08 13:34:52.0 +0200 @@ -0,0 +1 @@ +!patches diff -Nru sparse-0.4.5~rc1/debian/changelog sparse-0.4.5~rc1/debian/changelog --- sparse-0.4.5~rc1/debian/changelog 2013-06-15 01:10:11.0 +0200 +++ sparse-0.4.5~rc1/debian/changelog 2015-08-08 13:34:52.0 +0200 @@ -1,3 +1,25 @@ +sparse (0.4.5~rc1-2~deb8u1) jessie; urgency=medium + + * QA upload. + * Rebuild for jessie. + + -- Andreas Beckmann Sat, 08 Aug 2015 13:33:23 +0200 + +sparse (0.4.5~rc1-2) unstable; urgency=medium + + [ Andreas Beckmann ] + * QA upload. + * Set maintainer to Debian QA Group. (See #794643) + * Fix Homepage and Vcs-Browser URLs. + * Refresh patch to apply without fuzz. + + [ Uwe Kleine-König ] + * Cherry-pick commit from upstream to fix build failure with llvm-3.5. + * Temporarily build-depend on libedit-dev because llvm-config claims to need +that. (Closes: #793197) + + -- Andreas Beckmann Sat, 08 Aug 2015 13:17:27 +0200 + sparse (0.4.5~rc1-1) unstable; urgency=low [ Uwe Kleine-König ] diff -Nru sparse-0.4.5~rc1/debian/control sparse-0.4.5~rc1/debian/control --- sparse-0.4.5~rc1/debian/control 2013-06-15 01:09:43.0 +0200 +++ sparse-0.4.5~rc1/debian/control 2015-08-08 13:34:52.0 +0200 @@ -1,21 +1,22 @@ Source: sparse -Maintainer: Pierre Habouzit +Maintainer: Debian QA Group Uploaders: Loïc Minier Section: non-free/devel Priority: optional Build-Depends: debhelper (>= 9), libxml2-dev, libgtk2.0-dev, - llvm-dev (>= 1:3.0~) + llvm-dev (>= 1:3.0~), + libedit-dev Standards-Version: 3.9.4 Vcs-Git: git://anonscm.debian.org/collab-maint/sparse.git -Vcs-Browser: http://anonscm.debian.org/gitweb/?p=collab-maint/sparse.git +Vcs-Browser: https://anonscm.debian.org/cgit/collab-maint/sparse.git XS-autobuild: yes +Homepage: https://sparse.wiki.kernel.org/ Package: sparse Architecture: any Depends: ${misc:Depends}, ${shlibs:Depends}, ${perl:Depends} -Homepage: http://sparse.wiki.kernel.org/index.php/Main_Page Description: semantic parser of source files Sparse, the semantic parser, provides a compiler frontend capable of parsing most of ANSI C as well as many GCC extensions, and a collection diff -Nru sparse-0.4.5~rc1/debian/patches/ld-as-needed.patch sparse-0.4.5~rc1/debian/patches/ld-as-needed.patch --- sparse-0.4.5~rc1/debian/patches/ld-as-needed.patch 2013-06-15 00:42:08.0 +0200 +++ sparse-0.4.5~rc1/debian/patches/ld-as-needed.patch 2015-08-08 13:34:52.0 +0200 @@ -37,4 +37,4 @@ +LDFLAGS += -Wl,--no-as-needed $(shell llvm-config --ldflags) -Wl,--as-needed LLVM_CFLAGS := $(shell llvm-config --cflags | sed -e "s/-DNDEBUG//g") LLVM_LIBS := $(shell llvm-config --libs) - PROGRAMS += $(LLVM_PROGS) + LLVM_LIBS += $(shell llvm-config --system-libs 2>/dev/null) diff -Nru sparse-0.4.5~rc1/debian/patches/series sparse-0.4.5~rc1/debian/patches/series --- sparse-0.4.5~rc1/debian/patches/series 2013-06-15 00:49:59.0 +0200 +++ sparse-0.4.5~rc1/debian/patches/series 2015-08-08 13:34:52.0 +0200 @@ -1,3 +1,4 @@ +sparse-llvm-Fix-LLVM-3.5-linker-errors.patch shut-down-upstream-version-detection.patch ld-as-needed.patch pass-down-cflags.patch diff -Nru sparse-0.4.5~rc1/debian/patches/sparse-llvm-Fix-LLVM-3.5-linker-errors.patch sparse-0.4.5~rc1/debian/patches/sparse-llvm-Fix-LLVM-3.5-linker-errors.patch --- sparse-0.4.5~rc1/debian/patches/sparse-llvm-Fix-LLVM-3.5-linker-errors.patch 1970-01-01 01:00:00.0 +0100 +++ sparse-0.4.5~rc1/debian/patches/sparse-llvm-Fix-LLVM-3.5-linker-errors.patch 2015-08-08 13:34:52.0 +0200 @@ -0,0 +1,25 @@ +From: Omar Sandoval +Date: Wed, 24 Sep 2014 14:01:01 -0700 +Subject: [PATCH] sparse-llvm: Fix LLVM 3.5 linker errors + +llvm-config 3.5 no longer lists the non-LLVM libraries needed for linkage when +passed --libs. The --system-libs flag was added for this purpose. This adds +these libraries while silently doing nothing for older versions of LLVM. + +Signed-off-by: Omar Sandoval +Signed-off-by: Christopher Li +Origin: commit:d92353b4eacbac54d693edd62fb565f071e3ba86 +--- + Makefile | 1 + + 1 file changed, 1 insertion(+) + +--- a/Makefile b/Makefile +@@ -87,6 +87,7 @@ $(LLVM_PROGS): LD := g++ + LDFLAGS += $(shell llvm-config --ldflags) + LLVM_CFLAGS := $(shell llvm-config --cflags | sed -e "s/-DNDEBUG//g") + LLVM_LIBS := $(shell llvm-config --libs) ++LLVM_LIBS += $(shell llvm-config --system-libs 2>/dev/null) + PROGRAMS
Processed: severity of 791746 is normal, retitle 791746 to transition: libindi
Processing commands for cont...@bugs.debian.org: > severity 791746 normal Bug #791746 [release.debian.org] FTBFS with GCC 5: changes to symbols file Severity set to 'normal' from 'serious' > retitle 791746 transition: libindi Bug #791746 [release.debian.org] FTBFS with GCC 5: changes to symbols file Changed Bug title to 'transition: libindi' from 'FTBFS with GCC 5: changes to symbols file' > thanks Stopping processing here. Please contact me if you need assistance. -- 791746: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=791746 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org Archive: https://lists.debian.org/handler.s.c.143903198911024.transcr...@bugs.debian.org
Processed: tagging 791170, block 791170 with 777842 777977 778160
Processing commands for cont...@bugs.debian.org: > tags 791170 + pending Bug #791170 [release.debian.org] libsigc++-2.0: library transition is needed when GCC 5 is Added tag(s) pending. > block 791170 with 777842 777977 778160 Bug #791170 [release.debian.org] libsigc++-2.0: library transition is needed when GCC 5 is 791170 was blocked by: 790756 791170 was not blocking any bugs. Added blocking bug(s) of 791170: 777977, 778160, and 777842 > thanks Stopping processing here. Please contact me if you need assistance. -- 791170: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=791170 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org Archive: https://lists.debian.org/handler.s.c.14390314048137.transcr...@bugs.debian.org
Re: Proposal for possible mail to the Qt/KDE team in order to try to help with the transition
On Thu, Aug 6, 2015 at 20:32:21 -0300, Lisandro Damián Nicanor Pérez Meyer wrote: > Dear RT: I prepared: > > https://titanpad.com/diCx29YOqT > > (conveniently ending with "qt") as a possible message to the Qt/KDE team to > try to help with the ongoing transition. It would be just cool if some of you > can review the text and tell me whether it's ok or not. > Seems fine to me. Cheers, Julien signature.asc Description: Digital signature
Processed: user release.debian....@packages.debian.org, usertagging 791746, block 791746 with 790756 ...
Processing commands for cont...@bugs.debian.org: > user release.debian@packages.debian.org Setting user to release.debian@packages.debian.org (was m...@debian.org). > usertags 791746 + transition There were no usertags set. Usertags are now: transition. > block 791746 with 790756 Bug #791746 [libindi] FTBFS with GCC 5: changes to symbols file 791746 was not blocked by any bugs. 791746 was not blocking any bugs. Added blocking bug(s) of 791746: 790756 > reassign 791746 release.debian.org Bug #791746 [libindi] FTBFS with GCC 5: changes to symbols file Bug reassigned from package 'libindi' to 'release.debian.org'. No longer marked as found in versions 0.9.7-1. Ignoring request to alter fixed versions of bug #791746 to the same values previously set > thanks Stopping processing here. Please contact me if you need assistance. -- 791746: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=791746 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org Archive: https://lists.debian.org/handler.s.c.14390301381185.transcr...@bugs.debian.org
Processed: Re: Bug#794925: RM: asciinema/0.9.8-1
Processing control commands: > tag -1 wontfix Bug #794925 [release.debian.org] RM: asciinema/0.9.8-1 Added tag(s) wontfix. > close -1 Bug #794925 [release.debian.org] RM: asciinema/0.9.8-1 Marked Bug as done -- 794925: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=794925 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org Archive: https://lists.debian.org/handler.s.b794925.143902685714677.transcr...@bugs.debian.org
Bug#794925: RM: asciinema/0.9.8-1
Control: tag -1 wontfix Control: close -1 On Sat, Aug 08, 2015 at 04:28:49PM +0800, gustavo panizzo (gfa) wrote: > please do not removal (bug #7942980) , as stated in the bug > a workaround exist to use the package, besides the package > is broken for a change on the public server, > private servers continue to work fine. > > I'm working on a new version of the package but it may take a while as > it changed from python to go. Then please follow up to that bug, don't go opening new ones. (I think you made a mistake in the bug number.) -- Jonathan Wiltshire j...@debian.org Debian Developer http://people.debian.org/~jmw 4096R: 0xD3524C51 / 0A55 B7C5 1223 3942 86EC 74C3 5394 479D D352 4C51 signature.asc Description: Digital signature
Bug#794925: RM: asciinema/0.9.8-1
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: rm please do not removal (bug #7942980) , as stated in the bug a workaround exist to use the package, besides the package is broken for a change on the public server, private servers continue to work fine. I'm working on a new version of the package but it may take a while as it changed from python to go. -- System Information: Debian Release: stretch/sid Architecture: amd64 (x86_64) Foreign Architectures: i386 Kernel: Linux 4.0.0-2-amd64 (SMP w/4 CPU cores) Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Init: systemd (via /run/systemd/system) -- To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org Archive: https://lists.debian.org/20150808082849.6445.30818.reportbug@io
Bug#791170: libsigc++-2.0: library transition may be needed when GCC 5 is the default
Hi, On Fri, 03 Jul 2015 13:12:16 + Matthias Klose wrote: > Package: src:libsigc++-2.0 libsigc++-2.0 has been uploaded in the mean time and built successfully everywhere. The auto tracker at [1] looks ok to me. Please schedule the binNMUs (excluding glibmm2.4, which will get a sourceful upload as glibmm2.4_2.44.0-3. Thanks, Michael [1] https://release.debian.org/transitions/html/auto-libsigc++-2.0.html -- Why is it that all of the instruments seeking intelligent life in the universe are pointed away from Earth? signature.asc Description: OpenPGP digital signature