Package: simutrans
Version: 121.0-1
Severity: normal
X-Debbugs-Cc: ni...@thykier.net
Hi,
Attempting to use the `Load Scenario` feature to play any of the
built-in scenarios (such as `book-empire`) fails with a dialog box
saying "Loading scenario script failed". On stdout from simutrans, it
Ian Jackson wrote:
> Arrange not to write anything into linux.uml until some output has
> appeared. That seems to work OK for me, leading me to think it's not
> a general lossage bug, but only happens if there is input to be read
> when linux.uml starts up its consoles.
FWIW, I've pushed to
Package: security-tracker
Severity: normal
Hi everyone!
In [DSA-4957-1], a number of CVEs are listed as fixed in trafficserver
for buster: CVE-2021-27577 CVE-2021-32566 CVE-2021-32567 CVE-2021-35474
CVE-2021-32565 .
However, the last one [CVE-2021-32565] is not present in the
corresponding [DSA
On Sat, 14 Aug 2021 08:28:41 + Roman Fiedler
wrote:
Package: bridge-utils
Version: 1.7-1
Severity: serious
When running "brctl addbr" and "ip link set [if] address" immediately
afterwards, the second command will fail to apply the address
change. This is somehow annoying as the MAC would
Package: coreutils
Version: 8.32-4
Severity: normal
File: /usr/bin/printf
Dear Maintainer,
Consider the following invocation:
/bin/printf "%q" $'\001'\'$'\001'
(i.e. 1st=dollar+letter q, 2nd=byte 1+apostrophe+byte 1)
What do you expect the output to be? I'd expect something like
Hi Matthew,
On 09-08-2021 22:53, Matthew Vernon wrote:
> Not currently (I imagine something like it will end up there
> eventually); I think it warrants being in the release notes because it's
> quite a significant change from Buster (where non-systemd inits were
> largely unusable on desktop
Ian Jackson wrote:
> psusan(1) suggests this:
[...]
> I think it would be best to change the example to explicitly set PATH
> to avoid this bug.
Upstream commit 9983ff53d5a3d59d58030be0cd46a30eb5da5abc makes this
change.
Cheers,
Simon
--
import hashlib; print((lambda p,q,g,y,r,s,m: (lambda
Package: bridge-utils
Version: 1.7-1
Severity: serious
When running "brctl addbr" and "ip link set [if] address" immediately
afterwards, the second command will fail to apply the address
change. This is somehow annoying as the MAC would be used in
security related filtering and monitoring of the
Control: reopen -1
Control: tags -1 + fixed-in-experimental
I am hereby reopening this bug report and tagging it accordingly. The
fixed version was uploaded to experimental and the version currently in
sid and testing is impacted by the bug.
Rafael Laboissière
Package: installation-reports
Severity: normal
Boot method: USB
Image version: debian-live-11.0.0-amd64-xfce.iso release candidate, 2021-08-14
Date: 2021-08-14 approx 18:30 UTC
Machine: Lenovo Thinkpad X201, booted using BIOS
Partitions:
(transcribed by hand, might not be 100% accurate -
X-Debbugs-CC: Roman Fiedler , Michael Tokarev
As stated in the documentation, bridge-utils recently added support
for the "bridge_hw" directive which allows you define a MAC address
for a bridge interface. Changing your stanza to just this should
already work:
iface virtbr0 inet static
Package: calamares
Severity: critical
Justification: breaks the whole system
X-Debbugs-Cc: itsvaporw...@icloud.com
Dear Maintainer,
I was testing Debian 11 Bullseye on a Thinkpad T530 with UEFI/GPT and LVM. When
the new volume group was being created, the error 'Create a new partition table
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On Wed, 11 Feb 2009 11:11:57 -0200 Gustavo Noronha Silva wrote:
> Package: apt-listchanges
> Version: 2.83
> Severity: important
>
> The GTK+ frontend has a very bad behavior: it will display a window
> and quickly close it if there is nothing to
Package: 0ad
Version: 0.0.23.1-5+b1
Severity: important
Dear Maintainer,
*** Reporter, please consider answering these questions, where appropriate ***
* What led up to the situation?
Failed to install
* What exactly did you do (or not do) that was effective (or
Source: rust-tar
Version: 0.4.26-1
Severity: important
Tags: security upstream
Forwarded: https://github.com/alexcrichton/tar-rs/issues/238
X-Debbugs-Cc: car...@debian.org, Debian Security Team
Hi,
The following vulnerability was published for rust-tar.
CVE-2021-38511[0]:
| An issue was
Hello,
Thanks for your swift reply and really helpful information!
Dennis Filder writes:
> X-Debbugs-CC: Roman Fiedler , Michael Tokarev
>
>
> As stated in the documentation, bridge-utils recently added support
> for the "bridge_hw" directive which allows you define a MAC address
> for a
On Sat, 14 Aug 2021 at 19:37:37 +0100, Simon McVittie wrote:
> While working through the debian-cd testing checklist I tried to install
> from the copy of d-i on the XFCE live image, onto a (degraded) RAID1 array
> with a single JFS partition that is the root filesystem.
I retried installation
On Sat, Aug 14, 2021 at 05:50:47PM +0100, Steve McIntyre wrote:
>
>Starting in BIOS mode on a kde i386 live image. The existing disk on
>my test system has an LVM setup on it. I've told calamares to wipe the
>whole disk and do a fresh installation, but it looks like the code to
>work out the
On Fri, Aug 13, 2021 at 02:21:21PM +0200, Fabrice Creuzot wrote:
> Okay, so I tried to build all binary packages from one source package.
> Not sure if it's the good way.
>
> It builds those binary packages:
> awf-gtk2 - A widget factory is a theme preview application for GTK
> awf-gtk3 - A
Package: libtpm2-pkcs11-1
Version: 1.5.0-4
Severity: wishlist
X-Debbugs-Cc: nicolas.iooss_debb...@m4x.org
Dear Maintainer,
When trying to use p11-kit with tpm2-pkcs11, p11-kit does not find any
PKCS#11 token. This is because there is not file for tpm2-pkcs11 in
/usr/share/p11-kit/modules/.
Package: installation-reports
Severity: important
X-Debbugs-Cc: isy-deb...@koipond.org.uk
(Please provide enough information to help the Debian
maintainers evaluate the report efficiently - e.g., by filling
in the sections below.)
Boot method: USB
Image version: 11.0.0 amd64 netinst
Date:
Source: alpine
Version: 2.24+dfsg1-1
Severity: important
Tags: security upstream
X-Debbugs-Cc: car...@debian.org, Debian Security Team
Control: found -1 2.21+dfsg1-1.1
Hi,
The following vulnerability was published for alpine.
CVE-2021-38370[0]:
| In Alpine through 2.24, untagged responses from
Source: exim4
Version: 4.94.2-7
Severity: important
Tags: security upstream
X-Debbugs-Cc: car...@debian.org, Debian Security Team
Hi,
The following vulnerability was published for exim4, this is to start
tracking the issue downstream for us. Note that at time of writing [2]
gives still a 404.
X-Debbugs-CC: Roman Fiedler
On Sat, Aug 14, 2021 at 08:18:00PM +, Roman Fiedler wrote:
> > iface virtbr0 inet static
> > address 192.168.1.1
> > netmask 255.255.255.0
> > bridge_hw 86:aa:aa:aa:aa:aa
>
> Weird, using the configuration from above will result in:
>
> $
Source: wolfssl
Version: 4.6.0-3
Severity: important
Tags: security upstream
X-Debbugs-Cc: car...@debian.org, Debian Security Team
Hi,
The following vulnerability was published for wolfssl.
CVE-2021-38597[0]:
| wolfSSL before 4.8.1 incorrectly skips OCSP verification in certain
| situations of
On 2021-08-08 10:17:06, Brian Thompson wrote:
>> I personally find that "gh" is quite short name for a package that
>> will go into a general purpose software catalog like Debian repository. Would
>> you mind choosing something like "github-cli" as source and binary
>> package name and mentioning
On 0814, Paul Wise wrote:
>
>Could also add a Provides: gh so it is installable with the short name.
>
>I would definitely like to have this in Debian, but can't help with it.
>
This would be ideal. Is there any benefit of renaming the package to
something other than "gh"? I can help with this
Control: reassign -1 cinnamon
Isabelle Simpkins wrote (Sat, 14 Aug 2021 20:59:19
+0100):
> Package: installation-reports
> Severity: important
> X-Debbugs-Cc: isy-deb...@koipond.org.uk
>
> (Please provide enough information to help the Debian
> maintainers evaluate the report efficiently -
On 2021-08-14 Salvatore Bonaccorso wrote:
> Source: exim4
> Version: 4.94.2-7
> Severity: important
> Tags: security upstream
> X-Debbugs-Cc: car...@debian.org, Debian Security Team
>
> Hi,
> The following vulnerability was published for exim4, this is to start
> tracking the issue downstream
29 matches
Mail list logo