Bug#986811: python3-adios: leaves alternatives after upgrade from buster: /usr/lib/python3/dist-packages/adios_mpi/adios_mpi.cpython-37m-x86_64-linux-gnu.so -> /etc/alternatives/python-py37-adios-x86_

2021-05-04 Thread Andreas Beckmann
Followup-For: Bug #986811 Control: tag -1 pending Hi, I've just NMUed my fix to DELAYED/3. Please let me know if I should delay it longer. Andreas

Bug#926253: postfixadmin: /usr/share/postfixadmin/lib/../templates_c does not exist on new installation

2021-05-04 Thread Christoph Martin
Thanks for the report. If you can provide a patch I can try to include it in a bugfix release. Christoph Am 02.04.19 um 19:26 schrieb Michael Krieger: > Package: postfixadmin > Version: 3.2.1-2 > Severity: important > > On a new installation of postfixadmin in Buster, >

Bug#986927: libinsighttoolkit4.13: please add Breaks: libinsighttoolkit4.12

2021-05-04 Thread Andreas Beckmann
Followup-For: Bug #986927 Control: tag -1 pending Hi, I've just NMUed the fix to DELAYED/3. Please let me know if I should delay it longer. Andreas

Bug#986819: ukui-session-manager: leaves alternatives after upgrade from buster: /usr/bin/x-session-manager -> /etc/alternatives/x-session-manager -> /usr/bin/ukui-session

2021-05-04 Thread Andreas Beckmann
Followup-For: Bug #986819 Control: tag -1 pending Hi, I've just NMUed the fix to DELAYED/3, please let me know if I should delay it longer. Attached is an updated patch fixing the version number in the preinst s.t. the cleanup also happens if the system was already upgraded to the buggy

Bug#988045: redis: CVE-2021-29477 & CVE-2021-29478

2021-05-04 Thread Chris Lamb
Package: redis Version: 3:3.2.6-3+deb9u3 X-Debbugs-CC: t...@security.debian.org Severity: grave Tags: security Hi, The following vulnerabilities were published for redis. CVE-2021-29477[0]: Vulnerability in the STRALGO LCS command CVE-2021-29478[1]: Vulnerability in the COPY command for

Bug#988044: Acknowledgement (linux-image-5.10.0-0.bpo.4-amd64: Kernel panic due nfsd error: refcount_t: addition on 0; use-after-free)

2021-05-04 Thread Olivier Monaco
Log as an attachment for better reading. -Message d'origine- De : Debian Bug Tracking System Envoyé : mardi 4 mai 2021 10:09 À : Olivier Monaco Objet : Bug#988044: Acknowledgement (linux-image-5.10.0-0.bpo.4-amd64: Kernel panic due nfsd error: refcount_t: addition on 0;

Bug#988044: linux-image-5.10.0-0.bpo.4-amd64: Kernel panic due nfsd error: refcount_t: addition on 0; use-after-free

2021-05-04 Thread Olivier Monaco
Package: src:linux Version: 5.10.19-1~bpo10+1 Severity: important On a virtual machine running a NFS server the following kernel panic occurs: 2021-05-04T02:28:21.051193+02:00 storage-t20 kernel: [1736623.921391] [ cut here ] 2021-05-04T02:28:21.051214+02:00 storage-t20

Bug#988043: crowdsec: erratic test failure on mips64el

2021-05-04 Thread Cyril Brulebois
Source: crowdsec Version: 1.0.9-2 Severity: normal (Documenting my findings with my maintainer hat.) The 1.0.9-1 to 1.0.9-2 upgrade only contains an extra patch to fix a scenario, meaning absolutely no code change. Despite this targeted update, the package FTBFS'd on mips64el due to a test

Bug#988042: kget: Kget ignores pause button, all download run in the background yet.

2021-05-04 Thread Miguel S.
Package: kget Version: 4:20.12.2-1 Severity: normal Dear Maintainer, Kget ignores pause button, all download run in the background yet, I think this bug. -- System Information: Debian Release: bullseye/sid APT prefers testing APT policy: (500, 'testing') Architecture: amd64 (x86_64)

Bug#988041: dpkg-cross source ships binaries without the corresponding source

2021-05-04 Thread Aurelien Jarno
Package: dpkg-cross Version: 2.6.17 Severity: serious dpkg-cross source contains at the following .deb files: - gcc-10-i686-linux-gnu-amd64-cross_10.2.1-6cross1_all.deb - gcc-10-i686-linux-gnu_10.2.1-6cross1_amd64.deb Those files have been added in version 2.6.16, and it seems it was just a

Bug#988040: unblock: debian-med/3.7

2021-05-04 Thread Andreas Tille
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock X-Debbugs-Cc: Debian Med Packaging Team Please unblock package debian-med As in all release processes we need to update metapackages of Blends to reflect the packaging pool (after late

<    1   2