Your message dated Sat, 16 Jul 2022 04:49:06 +
with message-id
and subject line Bug#1014759: fixed in libgd2 2.3.3-6
has caused the Debian Bug report #1014759,
regarding libgd-dev: Missing dependency on libwebp-dev?
to be marked as done.
This means that you claim that the problem has been dea
Processing commands for cont...@bugs.debian.org:
> severity 1014759 serious
Bug #1014759 [libgd-dev] libgd-dev: Missing dependency on libwebp-dev?
Severity set to 'serious' from 'important'
> tags 1014759 ftbfs
Bug #1014759 [libgd-dev] libgd-dev: Missing dependency on libwebp-dev?
Added tag(s) ftb
Your message dated Sat, 16 Jul 2022 00:38:45 +
with message-id
and subject line Bug#990419: fixed in puppetdb 7.10.1-1
has caused the Debian Bug report #990419,
regarding CVE-2021-27021
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the ca
Your message dated Sat, 16 Jul 2022 00:03:59 +
with message-id
and subject line Bug#1014368: fixed in util-linux 2.38-5
has caused the Debian Bug report #1014368,
regarding dmesg: --human output not paged if less not installed
to be marked as done.
This means that you claim that the problem h
Control: tag -1 pending
Hello,
Bug #1014368 in util-linux reported by you has been fixed in the
Git repository and is awaiting an upload. You can see the commit
message below and you can check the diff of the fix at:
https://salsa.debian.org/debian/util-linux/-/commit/edac2dfde23ccd3066ac54ad635
Processing control commands:
> tag -1 pending
Bug #1014368 [util-linux] dmesg: --human output not paged if less not installed
Added tag(s) pending.
--
1014368: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014368
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
Source: ring
X-Debbugs-CC: t...@security.debian.org
Severity: grave
Tags: security
Hi,
The following vulnerabilities were published for ring.
CVE-2021-32686[0]:
| PJSIP is a free and open source multimedia communication library
| written in C language implementing standard based protocols such a
Your message dated Fri, 15 Jul 2022 21:43:47 +0200
with message-id
and subject line fixed long back
has caused the Debian Bug report #979563,
regarding rugged/libgit2 1.x breaks gitlab
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it
Your message dated Fri, 15 Jul 2022 19:19:04 +
with message-id
and subject line Bug#1014066: fixed in ghc 9.0.2-3
has caused the Debian Bug report #1014066,
regarding ghc: FTBFS on mipsel: out of memory
to be marked as done.
This means that you claim that the problem has been dealt with.
If t
Processing commands for cont...@bugs.debian.org:
> tags 1014976 + upstream
Bug #1014976 [src:asterisk] asterisk: CVE-2022-24764 CVE-2022-24763
CVE-2022-24786 CVE-2022-24792 CVE-2022-24793
Added tag(s) upstream.
> tags 1014980 + upstream
Bug #1014980 [src:tinyexr] tinyexr: CVE-2018-12688 CVE-2018-
close 997298
thanks
autopkgstests are now passing, from the traceback it looks like it was a problem
with astroid, now fixed
Processing commands for cont...@bugs.debian.org:
> close 997298
Bug #997298 [src:python-requirements-detector] python-requirements-detector:
FTBFS: dh_auto_test: error: pybuild --test --test-nose -i python{version} -p
3.9 returned exit code 13
Marked Bug as done
> thanks
Stopping processing here
Processing commands for cont...@bugs.debian.org:
> reassign 1002361 python-testing.common.database
Bug #1002361 {Done: Sandro Tosi }
[src:python-testing.postgresql] python-testing.postgresql: FTBFS: dh_auto_test:
error: pybuild --test --test-nose -i python{version} -p "3.10 3.9" returned
exit c
Your message dated Fri, 15 Jul 2022 17:19:10 +
with message-id
and subject line Bug#979427: fixed in libnet-ipaddress-perl 1.10-4
has caused the Debian Bug report #979427,
regarding src:libnet-ipaddress-perl: invalid maintainer address
to be marked as done.
This means that you claim that the
Dear maintainers,
more recent versions than the one packaged in Debian no longer use
JDK 1.8 according to README.md that comes bundled with the upstream
tarballs. Moreover, now it seems to depend on JDK 11 or newer.
Beginning with version 2020.3, the build system relies on JDK 11. The
newest
Source: apache-jena
X-Debbugs-CC: t...@security.debian.org
Severity: grave
Tags: security
Hi,
The following vulnerabilities were published for apache-jena.
Unfortunately the Apache security process is quite poor and limited
information gets made available, so it might be needed to reach out
to u
Source: libde265
X-Debbugs-CC: t...@security.debian.org
Severity: grave
Tags: security
Hi,
The following vulnerabilities were published for libde265.
CVE-2022-1253[0]:
| Heap-based Buffer Overflow in GitHub repository strukturag/libde265
| prior to and including 1.0.8. The fix is established in
Source: asterisk
X-Debbugs-CC: t...@security.debian.org
Severity: grave
Tags: security
Hi,
The following vulnerabilities were published for asterisk.
CVE-2022-24764[0]:
| PJSIP is a free and open source multimedia communication library
| written in C. Versions 2.12 and prior contain a stack buff
Processing control commands:
> reassign 1010821 pypdf2/2.4.2-1
Unknown command or malformed arguments to command.
> forwarded 1010821 https://github.com/py-pdf/PyPDF2/issues/
Bug #1010821 [src:xml2rfc] pypdf2 breaks xml2rfc autopkgtest:
lxml.etree.XMLSyntaxError: PCDATA invalid Char value 1
Control: reassign 1010821 pypdf2/2.4.2-1
Control: forwarded 1010821 https://github.com/py-pdf/PyPDF2/issues/
Control: retitle 1010821 PyPDF2 fails to read a PDF file with a beginbfchar
entry with an empty second element
Control: affects 1010821 + src:xml2rfc src:weasyprint
On Tue 2022-05-10 2
Your message dated Fri, 15 Jul 2022 15:04:05 +
with message-id
and subject line Bug#1014941: fixed in cctbx 2021.12+ds1-7
has caused the Debian Bug report #1014941,
regarding python3-cctbx: ships /usr/lib/python3/dist-packages/boost/__init__.py
to be marked as done.
This means that you claim
Processing commands for cont...@bugs.debian.org:
> tags 1014968 + upstream
Bug #1014968 [src:mruby] mruby: CVE-2021-46020 CVE-2022-0240 CVE-2022-0481
CVE-2022-0890 CVE-2022-1071 CVE-2022-1427 CVE-2022-1201
Added tag(s) upstream.
> thanks
Stopping processing here.
Please contact me if you need as
Processing commands for cont...@bugs.debian.org:
> tags 1014966 + upstream
Bug #1014966 [src:onionshare] onionshare: CVE-2021-41867 CVE-2021-41868
CVE-2022-21688 CVE-2022-21689 CVE-2022-21690 CVE-2022-21691 CVE-2022-21692
CVE-2022-21693 CVE-2022-21694 CVE-2022-21695 CVE-2022-21696
Added tag(s) u
Processing commands for cont...@bugs.debian.org:
> forwarded 1014957 https://github.com/dogtagpki/pki/pull/4021
Bug #1014957 [src:dogtag-pki] dogtag-pki: CVE-2022-2414
Set Bug forwarded-to-address to 'https://github.com/dogtagpki/pki/pull/4021'.
> tags 1014957 + upstream
Bug #1014957 [src:dogtag-p
Your message dated Fri, 15 Jul 2022 14:34:49 +
with message-id
and subject line Bug#1013496: fixed in django-stronghold 0.4.0+debian-1
has caused the Debian Bug report #1013496,
regarding django-stronghold: FTBFS: ImportError: cannot import name 'url' from
'django.conf.urls' (/usr/lib/python3
Your message dated Fri, 15 Jul 2022 14:34:40 +
with message-id
and subject line Bug#1014641: fixed in ceph 16.2.7+ds-5
has caused the Debian Bug report #1014641,
regarding ceph: depends on broken python3-sklearn
to be marked as done.
This means that you claim that the problem has been dealt w
Your message dated Fri, 15 Jul 2022 13:48:55 +
with message-id
and subject line Bug#1014962: fixed in casacore-data-sources 2-4
has caused the Debian Bug report #1014962,
regarding casacore-data-sources: Build-Depends libcasa-meas6 no longer
available in bookwork
to be marked as done.
This m
Processing control commands:
> tag -1 pending
Bug #1014641 [src:ceph] ceph: depends on broken python3-sklearn
Added tag(s) pending.
--
1014641: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014641
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
Control: tag -1 pending
Hello,
Bug #1014641 in ceph reported by you has been fixed in the
Git repository and is awaiting an upload. You can see the commit
message below and you can check the diff of the fix at:
https://salsa.debian.org/ceph-team/ceph/-/commit/955d2bad3412c589f42f72b5c9fcc506f71a
Your message dated Fri, 15 Jul 2022 13:33:57 +
with message-id
and subject line Bug#1014953: fixed in calibre 6.0.0+dfsg-2
has caused the Debian Bug report #1014953,
regarding calibre: Calibre fails to start with a qt error
to be marked as done.
This means that you claim that the problem has
Processing commands for cont...@bugs.debian.org:
> tags 1014945 = patch
Bug #1014945 [exim4] exim4: Failed to build exim4-daemon-custom with DMARC
support, due to OpenDMARC's api change on opendmarc_policy_store_dkim.
Removed tag(s) ftbfs.
> # does not affect binaries included in Debian
> severit
Source: calcium
Version: 0.4.1-2.1
Severity: serious
Tags: ftbfs fixed-upstream patch
Forwarded:
https://github.com/fredrik-johansson/calcium/commit/59a61324a9a113e269d646691a59273b7e784d04
https://buildd.debian.org/status/logs.php?pkg=calcium&ver=0.4.1-2.1%2Bb2
...
fmpz_mpoly_symmetric...PASS
0
Source: mruby
X-Debbugs-CC: t...@security.debian.org
Severity: grave
Tags: security
Hi,
The following vulnerabilities were published for mruby.
CVE-2021-46020[0]:
| An untrusted pointer dereference in mrb_vm_exec() of mruby v3.0.0 can
| lead to a segmentation fault or application crash.
https:/
Hi,
this seems to happen with normal pbuilder as well. I'll try to
investigate.
-Timo
Source: onionshare
X-Debbugs-CC: t...@security.debian.org
Severity: grave
Tags: security
Hi,
The following vulnerabilities were published for onionshare.
CVE-2021-41867[0]:
| An information disclosure vulnerability in OnionShare 2.3 before 2.4
| allows remote unauthenticated attackers to retriev
Processing commands for cont...@bugs.debian.org:
> tags 1014945 - d-i
Bug #1014945 [exim4] exim4: Failed to build exim4-daemon-custom with DMARC
support, due to OpenDMARC's api change on opendmarc_policy_store_dkim.
Removed tag(s) d-i.
> thanks
Stopping processing here.
Please contact me if you
Processing control commands:
> severity -1 normal
Bug #1009804 [src:pytest-salt-factories] pytest-salt-factories: autopkgtest
failure with python3.10
Severity set to 'normal' from 'serious'
--
1009804: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1009804
Debian Bug Tracking System
Contact
Control: severity -1 normal
Hi,
On Mon, 18 Apr 2022 09:55:49 +0200 Sebastian Ramacher
wrote:
Source: pytest-salt-factories
Version: 0.907.0-4
Severity: serious
Tags: sid bookworm
pytest-salt-factories' autopkgtests fail with python3.10:
Seems this fixed itself somehow due to external chang
Source: casacore-data-sources
Version: 2-3
Severity: serious
Tags: ftbfs
Justification: FTBFS
User: debian...@lists.debian.org
Dear maintainer,
Your package build-depends on libcasa-meas6 but that is no longer
available in testing/bookworm.
Please adapt your package.
Paul
https://qa.debian.org
Source: dogtag-pki
X-Debbugs-CC: t...@security.debian.org
Severity: grave
Tags: security
Hi,
The following vulnerability was published for dogtag-pki.
CVE-2022-2414[0]:
https://bugzilla.redhat.com/show_bug.cgi?id=2104676
https://github.com/dogtagpki/pki/pull/4021
https://github.com/dogtagpki/pk
Control: found -1 0.16.0-5
On 15/07/2022 11.51, Debian Bug Tracking System wrote:
* Also adding breaks/replaces for gnunet-gtk-dev to libgnunetgtk3
The library needs B+R against gnunet-gtk, not -dev.
Please use the same version constraint for both the Breaks+Replaces.
(You don't want to p
Processing control commands:
> found -1 0.16.0-5
Bug #1014952 {Done: Daniel Baumann }
[libgnunetgtk3] libgnunetgtk3: missing Breaks+Replaces: gnunet-gtk (<< 0.16.0-4)
There is no source info for the package 'libgnunetgtk3' at version '0.16.0-5'
with architecture ''
Unable to make a source versio
Your message dated Fri, 15 Jul 2022 09:49:34 +
with message-id
and subject line Bug#1014952: fixed in gnunet-gtk 0.16.0-5
has caused the Debian Bug report #1014952,
regarding libgnunetgtk3: missing Breaks+Replaces: gnunet-gtk (<< 0.16.0-4)
to be marked as done.
This means that you claim that
Processing control commands:
> severity -1 serious
Bug #1014901 [adduser] Home directories should not be setgid by default
Severity set to 'serious' from 'normal'
--
1014901: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014901
Debian Bug Tracking System
Contact ow...@bugs.debian.org with p
Package: calibre
Version: 6.0.0+dfsg-1
Severity: grave
Justification: renders package unusable
X-Debbugs-Cc: eleso...@lorinand.org
Dear Maintainer,
Since the upgrade of Calibre from v5 to v6 (Debian Unstable), calibre fails to
start complaining about QT plugins error :
➜ ~ calibre
qt.qpa.plugin
Package: libgnunetgtk3
Version: 0.16.0-4
Severity: serious
User: debian...@lists.debian.org
Usertags: piuparts
Hi,
during a test with piuparts I noticed your package fails to upgrade from
'testing'.
It installed fine in 'testing', then the upgrade to 'sid' fails
because it tries to overwrite othe
Your message dated Fri, 15 Jul 2022 09:05:40 +
with message-id
and subject line Bug#1004632: fixed in wxsvg 2:1.5.23+dfsg-2
has caused the Debian Bug report #1004632,
regarding wxsvg: FTBFS with ffmpeg 5.0
to be marked as done.
This means that you claim that the problem has been dealt with.
I
Sorry that I missed the link to the related bugs, they are follow:
1. https://bugs.exim.org/show_bug.cgi?id=2728
2. https://github.com/trusteddomainproject/OpenDMARC/issues/167
The (1) has a short patch, and the (2) is a feedback to OpenDMARC.
Package: exim4
Version: 4.94.2-7
Severity: serious
Tags: d-i ftbfs patch
Justification: fails to build from source
Dear Maintainer,
When building the exim4-daemon-custom with the source package of exim4,
after enable the DMARC support by uncomment some line in
EDITME.exim4-. I finally got
Package: python3-xraylarch
Version: 0.9.58+ds1-2
Severity: serious
User: debian...@lists.debian.org
Usertags: piuparts
Hi,
during a test with piuparts I noticed your package failed to install
because it tries to overwrite other packages files.
>From the attached log (scroll to the bottom...):
Package: python3-cctbx
Version: 2021.12+ds1-6
Severity: serious
User: debian...@lists.debian.org
Usertags: piuparts
Hi,
during a test with piuparts I noticed your package failed to install
because it tries to overwrite other packages files.
>From the attached log (scroll to the bottom...):
Pr
51 matches
Mail list logo