Processed: retitle 1030129 to ca-certificates-java - Fails to install: Error loading java.security file

2023-06-11 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > retitle 1030129 ca-certificates-java - Fails to install: Error loading > java.security file Bug #1030129 [ca-certificates-java] ca-certificates-java - Fails to install with OpenJDK 21: Error loading java.security file Changed Bug title to

Bug#1030129: ca-certificates-java - Fails to install with OpenJDK 21: Error loading java.security file

2023-06-11 Thread Sebastiaan Couwenberg
On Tue, 31 Jan 2023 13:56:42 +0100 Bastian Blank wrote: | dpkg: error processing package openjdk-21-jdk:arm64 (--configure): | dependency problems - leaving unconfigured It also fails to install with openjdk-17: Setting up ca-certificates-java (20230103) ... Exception in thread "main"

Processed: affects 1030129

2023-06-11 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > affects 1030129 src:mapserver Bug #1030129 [ca-certificates-java] ca-certificates-java - Fails to install with OpenJDK 21: Error loading java.security file Added indication that 1030129 affects src:mapserver > thanks Stopping processing here.

Bug#1037351: hippotat: ftbfs with rust-base64 0.21

2023-06-11 Thread Peter Green
sorry i over-filtered the debdiff, I think this one is correctly filtered. diff -Nru hippotat-1.1.7/Cargo.toml hippotat-1.1.7+nmu1/Cargo.toml --- hippotat-1.1.7/Cargo.toml 2023-01-12 18:50:36.0 + +++ hippotat-1.1.7+nmu1/Cargo.toml 2023-06-11 19:36:36.0 + @@ -30,7

Processed: fix severity

2023-06-11 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > severity 1037345 serious Bug #1037345 [389-ds-base] 389-ds-base: ftbfs with rust-base64 0.21 Severity set to 'serious' from 'normal' > severity 1037351 serious Bug #1037351 [hippotat] hippotat: ftbfs with rust-base64 0.21 Severity set to

Bug#1037352: pushpin: ftbfs with rust-base64 0.21

2023-06-11 Thread Peter Green
Package: pushpin Version: 1.36.0-2 Severity: serious Tags: trixie, sid, ftbfs, patch pushpin FTBFS with the new version of rust-base64 due to an upper limit on the dependency in Cargo.toml. If I remove the upper limit then the code builds fine. (I prepared a debdiff, but it ended up with a

Bug#1036706: marked as done (xerial-sqlite-jdbc: CVE-2023-32697)

2023-06-11 Thread Debian Bug Tracking System
Your message dated Sun, 11 Jun 2023 22:29:09 + with message-id and subject line Bug#1036706: fixed in xerial-sqlite-jdbc 3.42.0.0+dfsg-1 has caused the Debian Bug report #1036706, regarding xerial-sqlite-jdbc: CVE-2023-32697 to be marked as done. This means that you claim that the problem

Bug#1033832: marked as done (php-db: autopkgtest regression: FAIL DB::DB_Error[DB-1.11.0/tests/db_error.phpt])

2023-06-11 Thread Debian Bug Tracking System
Your message dated Sun, 11 Jun 2023 21:15:36 + with message-id and subject line Bug#1033832: fixed in php-db 1.11.0-1 has caused the Debian Bug report #1033832, regarding php-db: autopkgtest regression: FAIL DB::DB_Error[DB-1.11.0/tests/db_error.phpt] to be marked as done. This means that

Processed: [bts-link] source package src:frr

2023-06-11 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > # > # bts-link upstream status pull for source package src:frr > # see http://lists.debian.org/debian-devel-announce/2006/05/msg1.html > # https://bts-link-team.pages.debian.net/bts-link/ > # > user debian-bts-l...@lists.debian.org

Processed: [bts-link] source package python-flanker

2023-06-11 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > # > # bts-link upstream status pull for source package python-flanker > # see http://lists.debian.org/debian-devel-announce/2006/05/msg1.html > # https://bts-link-team.pages.debian.net/bts-link/ > # > user debian-bts-l...@lists.debian.org

Processed: [bts-link] source package odoo

2023-06-11 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > # > # bts-link upstream status pull for source package odoo > # see http://lists.debian.org/debian-devel-announce/2006/05/msg1.html > # https://bts-link-team.pages.debian.net/bts-link/ > # > user debian-bts-l...@lists.debian.org Setting

Processed: [bts-link] source package src:xdg-desktop-portal-gnome

2023-06-11 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > # > # bts-link upstream status pull for source package > src:xdg-desktop-portal-gnome > # see http://lists.debian.org/debian-devel-announce/2006/05/msg1.html > # https://bts-link-team.pages.debian.net/bts-link/ > # > user

Processed: [bts-link] source package src:eztrace-contrib

2023-06-11 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > # > # bts-link upstream status pull for source package src:eztrace-contrib > # see http://lists.debian.org/debian-devel-announce/2006/05/msg1.html > # https://bts-link-team.pages.debian.net/bts-link/ > # > user

Processed: [bts-link] source package procps

2023-06-11 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > # > # bts-link upstream status pull for source package procps > # see http://lists.debian.org/debian-devel-announce/2006/05/msg1.html > # https://bts-link-team.pages.debian.net/bts-link/ > # > user debian-bts-l...@lists.debian.org Setting

Processed: [bts-link] source package src:jamm

2023-06-11 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > # > # bts-link upstream status pull for source package src:jamm > # see http://lists.debian.org/debian-devel-announce/2006/05/msg1.html > # https://bts-link-team.pages.debian.net/bts-link/ > # > user debian-bts-l...@lists.debian.org

Processed: [bts-link] source package src:ccextractor

2023-06-11 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > # > # bts-link upstream status pull for source package src:ccextractor > # see http://lists.debian.org/debian-devel-announce/2006/05/msg1.html > # https://bts-link-team.pages.debian.net/bts-link/ > # > user

Processed: [bts-link] source package src:pybdsf

2023-06-11 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > # > # bts-link upstream status pull for source package src:pybdsf > # see http://lists.debian.org/debian-devel-announce/2006/05/msg1.html > # https://bts-link-team.pages.debian.net/bts-link/ > # > user debian-bts-l...@lists.debian.org

Processed: [bts-link] source package src:numba

2023-06-11 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > # > # bts-link upstream status pull for source package src:numba > # see http://lists.debian.org/debian-devel-announce/2006/05/msg1.html > # https://bts-link-team.pages.debian.net/bts-link/ > # > user debian-bts-l...@lists.debian.org

Bug#1036280: marked as done (openjdk-11: CVE-2023-21930 CVE-2023-21937 CVE-2023-21938 CVE-2023-21939 CVE-2023-21954 CVE-2023-21967 CVE-2023-21968)

2023-06-11 Thread Debian Bug Tracking System
Your message dated Sun, 11 Jun 2023 21:11:04 +0200 with message-id and subject line [ftpmas...@ftp-master.debian.org: Accepted openjdk-11 11.0.19+7-1 (source) into unstable] has caused the Debian Bug report #1036280, regarding openjdk-11: CVE-2023-21930 CVE-2023-21937 CVE-2023-21938

Bug#1036280: [ftpmas...@ftp-master.debian.org: Accepted openjdk-11 11.0.19+7-1 (source) into unstable]

2023-06-11 Thread Salvatore Bonaccorso
Source: openjdk-11 Source-Version: 11.0.19+7-1 Fixes as well #1036280, so closing manually: - Forwarded message from Debian FTP Masters - -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Sun, 11 Jun 2023 12:55:28 +0200 Source: openjdk-11 Architecture: source Version:

Processed: found 1036280 in 11.0.18+10-1

2023-06-11 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > found 1036280 11.0.18+10-1 Bug #1036280 [src:openjdk-11] openjdk-11: CVE-2023-21930 CVE-2023-21937 CVE-2023-21938 CVE-2023-21939 CVE-2023-21954 CVE-2023-21967 CVE-2023-21968 Marked as found in versions openjdk-11/11.0.18+10-1. > thanks Stopping

Processed: cpl-plugin-visir-calib: visir-kit-4.3.10*.tar.gz is no longer downloadable

2023-06-11 Thread Debian Bug Tracking System
Processing control commands: > fixed -1 4.3.11+dfsg-1 Bug #1037339 [cpl-plugin-visir-calib] cpl-plugin-visir-calib: visir-kit-4.3.10*.tar.gz is no longer downloadable Marked as fixed in versions cpl-plugin-visir/4.3.11+dfsg-1. -- 1037339:

Bug#1037339: cpl-plugin-visir-calib: visir-kit-4.3.10*.tar.gz is no longer downloadable

2023-06-11 Thread Andreas Beckmann
Package: cpl-plugin-visir-calib Version: 4.3.10+dfsg-5 Severity: serious User: debian...@lists.debian.org Usertags: piuparts Control: fixed -1 4.3.11+dfsg-1 Hi, during a test with piuparts I noticed your package failed to install. As per definition of the release team this makes the package too

Bug#1036359: elpa-markdown-toc -- crashes with (wrong-type-argument consp nil)

2023-06-11 Thread Nicholas D Steeves
Hi, Here is a way to work around this bug (whether in Emacs or in markdown-toc). To test: emacs --eval="(setq native-comp-deferred-compilation-deny-list '(\"markdown-toc\"))" To make permanent: (setq native-comp-deferred-compilation-deny-list '("markdown-toc")) That said, I'm not convinced

Bug#1036986: boost1.81: diff for NMU version 1.81.0-5.1

2023-06-11 Thread Sebastian Ramacher
Control: tags 1036986 + patch Control: tags 1036986 + pending Dear maintainer, I've prepared an NMU for boost1.81 (versioned as 1.81.0-5.1) and uploaded it to DELAYED/2. Please feel free to tell me if I should delay it longer. Cheers -- Sebastian Ramacher diff -Nru

Processed: boost1.81: diff for NMU version 1.81.0-5.1

2023-06-11 Thread Debian Bug Tracking System
Processing control commands: > tags 1036986 + patch Bug #1036986 [libboost-json1.81-dev] libboost-json1.81-dev: missing Depends: libboost-json1.81.0 (= ${binary:Version}) Added tag(s) patch. > tags 1036986 + pending Bug #1036986 [libboost-json1.81-dev] libboost-json1.81-dev: missing Depends:

Processed: Downgrade #1031726 severity

2023-06-11 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > severity 1031726 important Bug #1031726 [src:hdf5] hdf5: CVE-2022-26061 CVE-2022-25972 CVE-2022-25942 Severity set to 'important' from 'grave' > thanks Stopping processing here. Please contact me if you need assistance. -- 1031726:

Bug#1034128:

2023-06-11 Thread Andreas Hasenack
Quick MP at https://salsa.debian.org/python-team/packages/cachelib/-/merge_requests/1

Bug#1021583: marked as done (golang-gitlab-gitlab-org-labkit: FTBFS (test failure): gitlab.com/gitlab-org/labkit/metrics/http_round_tripper)

2023-06-11 Thread Debian Bug Tracking System
Your message dated Sun, 11 Jun 2023 18:49:45 +0530 with message-id and subject line Re: golang-gitlab-gitlab-org-labkit: FTBFS (test failure): gitlab.com/gitlab-org/labkit/metrics/http_round_tripper has caused the Debian Bug report #1021583, regarding golang-gitlab-gitlab-org-labkit: FTBFS (test

Processed: Re: golang-gitlab-gitlab-org-labkit: FTBFS (test failure): gitlab.com/gitlab-org/labkit/metrics/http_round_tripper

2023-06-11 Thread Debian Bug Tracking System
Processing control commands: > fixed -1 1.17.0-1 Bug #1021583 [src:golang-gitlab-gitlab-org-labkit] golang-gitlab-gitlab-org-labkit: FTBFS (test failure): gitlab.com/gitlab-org/labkit/metrics/http_round_tripper Marked as fixed in versions golang-gitlab-gitlab-org-labkit/1.17.0-1. -- 1021583:

Bug#1021583: golang-gitlab-gitlab-org-labkit: FTBFS (test failure): gitlab.com/gitlab-org/labkit/metrics/http_round_tripper

2023-06-11 Thread Pirate Praveen
Control: fixed -1 1.17.0-1 On Tue, 11 Oct 2022 13:24:32 +0200 Cyril Brulebois wrote: > Source: golang-gitlab-gitlab-org-labkit > Version: 1.16.0-1 > Severity: serious > Justification: FTBFS > > Hi, > > While preparing an update for the golang-github-gin-gonic-gin package, > I noticed

Bug#1033822: marked as done (oscrypto: autopkgtest regression: certificate expired 2023-01-01 00:00:00Z)

2023-06-11 Thread Debian Bug Tracking System
Your message dated Sun, 11 Jun 2023 13:09:50 + with message-id and subject line Bug#1033822: fixed in oscrypto 1.3.0-2 has caused the Debian Bug report #1033822, regarding oscrypto: autopkgtest regression: certificate expired 2023-01-01 00:00:00Z to be marked as done. This means that you

Processed: Re: gcc-12-base: please bump the Breaks: gnat (<< 12) for smoother upgrades from bullseye

2023-06-11 Thread Debian Bug Tracking System
Processing control commands: > tag -1 patch Bug #1036641 [gcc-12-base] gcc-12-base: please bump the Breaks: gnat (<< 12) for smoother upgrades from bullseye Added tag(s) patch. -- 1036641: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036641 Debian Bug Tracking System Contact

Bug#1036641: gcc-12-base: please bump the Breaks: gnat (<< 12) for smoother upgrades from bullseye

2023-06-11 Thread Andreas Beckmann
Followup-For: Bug #1036641 Control: tag -1 patch I've been running bullseye->bookworm upgrade tests with the following change applied to src:gcc-12, this had the best results w.r.t. upgrading gnat related packages: --- gcc-12-12.2.0/debian/rules.conf 2023-01-02 14:06:37.0 +0100 +++

Bug#1033822: marked as pending in oscrypto

2023-06-11 Thread Jochen Sprickerhof
Control: tag -1 pending Hello, Bug #1033822 in oscrypto reported by you has been fixed in the Git repository and is awaiting an upload. You can see the commit message below and you can check the diff of the fix at:

Processed: Bug#1033822 marked as pending in oscrypto

2023-06-11 Thread Debian Bug Tracking System
Processing control commands: > tag -1 pending Bug #1033822 [src:oscrypto] oscrypto: autopkgtest regression: certificate expired 2023-01-01 00:00:00Z Added tag(s) pending. -- 1033822: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033822 Debian Bug Tracking System Contact

Processed: Re: Bug#1019307: bluebird-gtk-theme: Please build-depend on libgdk-pixbuf-2.0-dev instead of libgdk-pixbuf2.0-dev

2023-06-11 Thread Debian Bug Tracking System
Processing control commands: > severity -1 serious Bug #1019307 [src:bluebird-gtk-theme] bluebird-gtk-theme: Please build-depend on libgdk-pixbuf-2.0-dev instead of libgdk-pixbuf2.0-dev Severity set to 'serious' from 'normal' > tags -1 + trixie sid Bug #1019307 [src:bluebird-gtk-theme]

Processed: Re: Bug#1019305: anjuta: Please build-depend on libgdk-pixbuf-2.0-dev instead of libgdk-pixbuf2.0-dev

2023-06-11 Thread Debian Bug Tracking System
Processing control commands: > severity -1 serious Bug #1019305 [src:anjuta] anjuta: Please build-depend on libgdk-pixbuf-2.0-dev instead of libgdk-pixbuf2.0-dev Severity set to 'serious' from 'normal' > tags -1 + trixie sid Bug #1019305 [src:anjuta] anjuta: Please build-depend on

Processed: Re: Bug#976034: ukwm: Please depend on libgdk-pixbuf-2.0-dev instead of libgdk-pixbuf2.0-dev

2023-06-11 Thread Debian Bug Tracking System
Processing control commands: > severity -1 serious Bug #976034 [src:ukwm] ukwm: Please depend on libgdk-pixbuf-2.0-dev instead of libgdk-pixbuf2.0-dev Severity set to 'serious' from 'normal' > tags -1 + trixie sid Bug #976034 [src:ukwm] ukwm: Please depend on libgdk-pixbuf-2.0-dev instead of

Processed: Re: Bug#1019304: adapta-gtk-theme: Please build-depend on libgdk-pixbuf-2.0-dev instead of libgdk-pixbuf2.0-dev

2023-06-11 Thread Debian Bug Tracking System
Processing control commands: > severity -1 serious Bug #1019304 [src:adapta-gtk-theme] adapta-gtk-theme: Please build-depend on libgdk-pixbuf-2.0-dev instead of libgdk-pixbuf2.0-dev Severity set to 'serious' from 'normal' > tags -1 + trixie sid Bug #1019304 [src:adapta-gtk-theme]

Processed: severity of 1036682 is serious, severity of 1036681 is serious, severity of 1036684 is serious ...

2023-06-11 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > severity 1036682 serious Bug #1036682 [src:slurm-wlm-contrib] slurm-wlm-contrib: FTBFS with CUDA 12: dh_install: warning: Cannot find "usr/lib/*/slurm-wlm/gpu_nvml.so" Severity set to 'serious' from 'important' > severity 1036681 serious Bug

Bug#973850: lilo: Should not be included in bullseye

2023-06-11 Thread Simon McVittie
On Sun, 11 Jun 2023 at 08:25:16 +0200, Helge Kreutzmann wrote: > On Mon, Sep 13, 2021 at 09:35:08PM +0200, Joachim Wiedorn wrote: > > Simon McVittie wrote on 2021-09-12 22:43: > > > > > Now that bullseye has been released, should lilo be removed from unstable > > > so that it will not be in any

Bug#1037324: d.o/CD/live refers to images no longer built

2023-06-11 Thread Laura Arjona Reina
Thanks for the patch. I have applied the update to the description, since the tags were already updated. Kind regards, -- Laura Arjona Reina https://wiki.debian.org/LauraArjona

Processed: Re: Bug#1037324: d.o/CD/live refers to images no longer built

2023-06-11 Thread Debian Bug Tracking System
Processing control commands: > tag -1 patch Bug #1037324 [www.debian.org] d.o/CD/live refers to images no longer built Added tag(s) patch. -- 1037324: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1037324 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems

Bug#1037324: d.o/CD/live refers to images no longer built

2023-06-11 Thread Jonathan Wiltshire
Control: tag -1 patch Patch attached. -- Jonathan Wiltshire j...@debian.org Debian Developer http://people.debian.org/~jmw 4096R: 0xD3524C51 / 0A55 B7C5 1223 3942 86EC 74C3 5394 479D D352 4C51 ed25519/0x196418AAEB74C8A1:

Bug#1037324: d.o/CD/live refers to images no longer built

2023-06-11 Thread Laura Arjona Reina
Hello El 11/6/23 a las 12:42, Jonathan Wiltshire escribió: Package: www.debian.org Severity: serious X-Debbugs-Cc: debian...@lists.debian.org, j...@debian.org i386 live images are no longer built as of bookworm, but the download page still refers to them. It needs a bit of a rewrite because

Bug#1037324: d.o/CD/live refers to images no longer built

2023-06-11 Thread Jonathan Wiltshire
Package: www.debian.org Severity: serious X-Debbugs-Cc: debian...@lists.debian.org, j...@debian.org i386 live images are no longer built as of bookworm, but the download page still refers to them. It needs a bit of a rewrite because the only architecture now is amd64. I became aware because of

Bug#1037322: amqp-tools: Process leaks authentication data

2023-06-11 Thread Christian Kastner
Package: amqp-tools Version: 0.11.0-1 Severity: grave Tags: security Forwarded: https://github.com/alanxz/rabbitmq-c/issues/575 When passing authentication data with either --password or --url, the data is exposed in the process list, where it can be seen by any user. Example: $ pgrep -a

Processed: Re: nomad ftbfs with newer golang-github-hashicorp-yamux-dev in experimental

2023-06-11 Thread Debian Bug Tracking System
Processing control commands: > severity -1 serious Bug #1037319 [nomad] nomad ftbfs with newer golang-github-hashicorp-yamux-dev in experimental Severity set to 'serious' from 'important' -- 1037319: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1037319 Debian Bug Tracking System Contact

Bug#1037007: marked as done (libopenmpt: failing autopkgtests with 0.7.0)

2023-06-11 Thread Debian Bug Tracking System
Your message dated Sun, 11 Jun 2023 09:21:32 + with message-id and subject line Bug#1037007: fixed in libopenmpt 0.7.1-1 has caused the Debian Bug report #1037007, regarding libopenmpt: failing autopkgtests with 0.7.0 to be marked as done. This means that you claim that the problem has been

Bug#1028222: marked as done (Don't release for bookworm)

2023-06-11 Thread Debian Bug Tracking System
Your message dated Sun, 11 Jun 2023 17:00:18 +0800 with message-id and subject line Re: Bug#1028222: Don't release for bookworm has caused the Debian Bug report #1028222, regarding Don't release for bookworm to be marked as done. This means that you claim that the problem has been dealt with.

Bug#1035949: mariadb: upgrade issue: mariadb-server-10.5 fails to stop after all other -10.5 packages were removed

2023-06-11 Thread Otto Kekäläinen
Hi! I did a bunch of reproducible experiments using Salsa-CI in https://salsa.debian.org/mariadb-team/mariadb-server/-/pipelines/536587 testing: ## upgrade to Bookworm * cacti and Bullseye upgrade - apt install -qq --yes cacti -> - apt full-upgrade -qq --yes * default-mysql-server and

Bug#973850: lilo: Should not be included in bullseye

2023-06-11 Thread Helge Kreutzmann
Hello Joachim, hello Simon, On Mon, Sep 13, 2021 at 09:35:08PM +0200, Joachim Wiedorn wrote: > Simon McVittie wrote on 2021-09-12 22:43: > > > Now that bullseye has been released, should lilo be removed from unstable > > so that it will not be in any future Debian release either? > > I think the

Bug#1037258: curl -I (HEAD request) fails with HTTP/2 against a Debian Apache instance

2023-06-11 Thread Sergio Durigan Junior
On Saturday, June 10 2023, Samuel Henrique wrote: > Hello, > > I'm not able to reproduce the issue on Bookworm with a HTTP2 localhost > apache server. [...] Hey, I was able to find another URL that triggers the same issue. This one: