Hi,
I can confirm that despite what is stated on
/usr/share/doc/virtualenvwrapper/README.Debian,
virtualenvwrapper_4.8.4-4, doesn't install
/etc/bash_completion.d/virtualenvwrapper, as it was the case in the
version found on Buster (4.3.1-2).
Regards,
David Polverari.
Package: wnpp
Severity: wishlist
Owner: David da Silva Polverari
* Package name: firewalk
Version : 5.0
Upstream Author : Mike D. Schiffman
David E. Goldsmith
* URL : http://packetfactory.openwall.net/projects/firewalk/
* License : BSD
On Wed, Aug 12, 2020 at 07:11:35PM +0200, Andreas Metzler wrote:
> this bug tracks the fact that the changes in the NMU have NOT been
> integrated into a maintainer upload. So it should stay open until that
> has happened, afaik.
>
Hi Andreas,
I'm not sure if I follow, but from what I see, you
On Thu, Aug 13, 2020 at 06:29:34PM +0200, Andreas Metzler wrote:
Hi Andreas,
> Reopening seems to be make-work if you are in the process of adopting
> anyway. ;-)
Ok! :)
> cu Andreas
>
>
> [1] Worried is too strong. But the rationale for closing made no sense. I
> submitted a bugreport with
autoreconf' because it is default since DH 10.
* debian/salsa-ci.yml: added to provide CI tests for Salsa.
* debian/tests/control: created to provide trivial CI tests.
* debian/watch: bumped to version 4.
Regards,
--
David da Silva Polverari
s: removed redundant '--with autoreconf' dh parameter.
* debian/salsa-ci.yml: added to provide CI tests for Salsa.
* debian/tests/control: added to perform a trivial CI test.
* debian/upstream/metadata: created.
* debian/watch: using a secure URI.
Regards,
--
David da Silva Polverari
f' because it is default since DH 10.
* debian/salsa-ci.yml: added to provide CI tests for Salsa.
* debian/tests/control: created to provide trivial CI tests.
* debian/upstream/metadata: created.
* debian/watch: bumped to version 4.
Regards,
--
David da Silva Polverari
.sh before
dh_auto_configure.
- Removed useless DEB_BUILD_MAINT_OPTIONS export.
* debian/salsa-ci.yml: added to provide CI tests for Salsa.
* debian/upstream/metadata: created.
* debian/watch:
- Bumped to version 4.
- Updated the source address.
Regards,
--
David da Silva Polverari
-guid.patch
+and fix-gcc9-werrors.patch to fix FTBFS with GCC 9. Thanks to Matthias
+Klose . (Closes: #925672)
+
+ -- David da Silva Polverari Tue, 09 Jun 2020 17:31:58 -0500
+
efivar (37-2) unstable; urgency=medium
* Cherry-pick fix from upstream:
diff -Nru efivar-37/debian/patches/fix-gcc9
On Wed, Jun 10, 2020 at 07:32:36PM +, mario.limoncie...@dell.com wrote:
> I don't have a concern to this, but would you mind also submitting
> it to Salsa and linking back so we can get it into VCS?
>
I have sent a merge request [1] on Salsa with the changes included on
the NMU. I branched it
/60_bts925782_ftbfs_with_gcc_9.patch: added to fix FTBFS
+with GCC-9. Thanks to Joachim Reichel . (Closes:
+#925782)
+
+ -- David da Silva Polverari Thu, 11 Jun 2020 00:33:53 -0500
+
mp3check (0.8.7-3) unstable; urgency=medium
[ Helmut Grohne ]
diff -Nru mp3check-0.8.7/debian/patches
3.0/debian/changelog 2020-12-04 21:22:18.0 +
@@ -1,3 +1,10 @@
+pngcheck (2.3.0-7+deb10u1) buster-security; urgency=high
+
+ * debian/patches/60-fix-buffer-overflow.patch: added to fix CVE-2020-27818.
+Thanks to Salvatore Bonaccorso . (Closes: #976350)
+
+ -- David da Silva Polverari
) unstable; urgency=medium
.
* debian/patches/60-fix-buffer-overflow.patch: added to fix CVE-2020-27818.
Thanks to Salvatore Bonaccorso . (Closes: #976350)
Regards,
--
David da Silva Polverari
Hi,
I have prepared a new Debian revision for the package on unstable,
containing the fix for the vulnerability. I uploaded it to mentors [1],
as I have no uploading rights to the archive, and opened an RFS [2].
Should I wait until the bug is closed on unstable before I prepare a
revision to
Package: src:linux
Version: 6.1.52-1
Severity: important
Dear Maintainer(s),
After upgrading the kernel from linux-image-6.1.0-11-amd64 (6.1.38-4) to
linux-image-6.1.0-12-amd64 (6.1.52-1) from bookworm-security on my
laptop (a Dell XPS 9560), the kernel fails to find the nvme disk, making
it
Package: wnpp
Severity: wishlist
Owner: David da Silva Polverari
X-Debbugs-Cc: debian-de...@lists.debian.org
* Package name: openmrac-data
Version : 1.1
Upstream Contact: Vojtěch Salajka
* URL : https://github.com/Franticware/OpenMRac-data
* License : CC0
/readpe/issues/182
[3] https://tracker.debian.org/pkg/readpe
[4] https://bugs.debian.org/1050056
[5] https://bugs.debian.org/1050055
Regards,
--
⢀⣴⠾⠻⢶⣦⠀ David da Silva Polverari
⣾⠁⢠⠒⠀⣿⡁
⢿⡄⠘⠷⠚⠋⠀ Debian: The universal operating system
⠈⠳⣄
signature.asc
Description: PGP signature
On Sat, Sep 16, 2023 at 11:15:42PM +0200, Salvatore Bonaccorso wrote:
>
> Can you verify if it's this issue known upstream?
>
> https://lore.kernel.org/regressions/5dhv0s.d0f751zf65...@gmail.com/
>
Yes, it is the same issue. Sorry for taking too long to reply. I was
juggling with low partition
Source: forensics-extra
Version: 2.44
Severity: normal
Dear Maintainer(s),
Your package depends on pev, but it has been renamed to readpe due to
upstream changes.
readpe is still in experimental. I will wait 15 days before uploading it
to unstable. If you need more time, please let me know.
Source: libz-mingw-w64
Version: 1.2.13+dfsg-1
Severity: normal
Dear Maintainer(s),
Your package build-depends on pev, but it has been renamed to readpe due
to upstream changes.
readpe is still in experimental. I will wait 15 days before uploading it
to unstable. Please let me know if you need
Hi,
I adjusted the affected versions in the BTS, but I couldn't find any
patch for it. The reference to buffer overflows seem related to
CVE-2020-27818, so I wonder whether it is a duplicate or not.
If it is, it was already closed in [1].
[1] CVE-2020-27818
Regards,
David
Sorry, I made a mistake when trying to send the link to the closed bug
[1]. You can find the right link below.
[1] https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=976350
Regards,
David.
fixed 1021278 3.0.2-2
thanks
1,3 +1,11 @@
+pev (0.81-3+deb11u1) bullseye; urgency=medium
+
+ * debian/patches/0002-fix-bo-pe_exports.patch: created to fix a buffer
+overflow vulnerability present on libpe's pe_exports function
+(CVE-2021-45423). (Closes: #1034725)
+
+ -- David da Silva Polverari Sat, 22 Apr 2023
20:48
2023-04-22 19:41:47.0 +
@@ -1,3 +1,17 @@
+pev (0.81-9) unstable; urgency=medium
+
+ [ Debian Janitor ]
+ * Use secure URI in Homepage field.
+ * Update standards version to 4.6.2, no changes needed.
+
+ [ David da Silva Polverari ]
+ * debian/copyright: updated packaging copyright
by pev utilities can trigger arbitrary code execution. (Closes: #1034725)
+
+ -- David da Silva Polverari Sat, 22 Apr 2023
20:48:00 +
+
pev (0.81-3) unstable; urgency=medium
* QA upload.
diff -Nru pev-0.81/debian/patches/0002-fix-bo-pe_exports.patch
pev-0.81/debian/patches/00
Package: wnpp
Severity: wishlist
Owner: David da Silva Polverari
X-Debbugs-Cc: debian-de...@lists.debian.org
* Package name: readpe
Version : 0.82
Upstream Contact: https://github.com/mentebinaria/readpe/issues
* URL : https://github.com/mentebinaria/readpe
* License
Package: qa.debian.org
Severity: normal
User: qa.debian@packages.debian.org
Usertags: udd
Hi,
When using https://udd.debian.org/patches.cgi, I notice that whenever
the Forwarded field contains anything other than "no", "not-needed",
"yes" or an URL, it gets marked as invalid.
That includes
the file was reintroduced.
--
⢀⣴⠾⠻⢶⣦⠀ David da Silva Polverari
⣾⠁⢠⠒⠀⣿⡁
⢿⡄⠘⠷⠚⠋⠀ Debian: The universal operating system
⠈⠳⣄
/lib/libpe/include/libpe/context.h?ref_type=heads#L72
[4]
https://salsa.debian.org/pkg-security-team/readpe/-/blob/debian/master/src/pescan.c?ref_type=heads#L372
Regards,
--
⢀⣴⠾⠻⢶⣦⠀ David da Silva Polverari
⣾⠁⢠⠒⠀⣿⡁
⢿⡄⠘⠷⠚⠋⠀ Debian: The universal operating system
⠈⠳⣄
Package: wnpp
Severity: wishlist
Owner: David da Silva Polverari
X-Debbugs-Cc: debian-de...@lists.debian.org
* Package name: voacapl
Version : 0.7.6
Upstream Contact: James Watson
* URL : https://github.com/jawatson/voacapl
* License : special (public domain
Package: wnpp
Severity: wishlist
Owner: David da Silva Polverari
X-Debbugs-Cc: debian-de...@lists.debian.org
* Package name: pythonprop
Version : 0.30.1
Upstream Contact: James Watson
* URL : https://github.com/jawatson/pythonprop
* License : GPL-2
On Mon, Jan 29, 2024 at 04:45:59PM +0100, Filip Hroch wrote:
> Dear Release Team,
>
> may I ask you to rebuild pngcheck package against to
> the current version of zlib?
>
> I'm maintainer of fitspng package having bug #1059970,
> and I found that the bug is not related on fitspng itself.
>
33 matches
Mail list logo