Bug#1035920: cloud-initramfs-growroot: /usr/share/initramfs-tools/hooks/growroot fails in non-merged-/usr environment: expects /usr/bin/udevadm

2023-05-11 Thread Andreas Beckmann
Package: cloud-initramfs-growroot Version: 0.18.debian12 Severity: serious User: debian...@lists.debian.org Usertags: piuparts Control: affects -1 + debian-cloud-images-packages Hi, during a test with piuparts I noticed your package failed to install. As per definition of the release team this

Processed: cloud-initramfs-growroot: /usr/share/initramfs-tools/hooks/growroot fails in non-merged-/usr environment: expects /usr/bin/udevadm

2023-05-11 Thread Debian Bug Tracking System
Processing control commands: > affects -1 + debian-cloud-images-packages Bug #1035920 [cloud-initramfs-growroot] cloud-initramfs-growroot: /usr/share/initramfs-tools/hooks/growroot fails in non-merged-/usr environment: expects /usr/bin/udevadm Added indication that 1035920 affects

Bug#1035870: marked as done (libgnunet-dev: missing Depends: gnunet (= ${binary:Version}))

2023-05-11 Thread Debian Bug Tracking System
Your message dated Thu, 11 May 2023 08:50:55 + with message-id and subject line Bug#1035870: fixed in gnunet 0.19.3-2 has caused the Debian Bug report #1035870, regarding libgnunet-dev: missing Depends: gnunet (= ${binary:Version}) to be marked as done. This means that you claim that the

Bug#1035870: marked as done (libgnunet-dev: missing Depends: gnunet (= ${binary:Version}))

2023-05-11 Thread Debian Bug Tracking System
Your message dated Thu, 11 May 2023 08:51:17 + with message-id and subject line Bug#1035870: fixed in gnunet 0.19.4-2 has caused the Debian Bug report #1035870, regarding libgnunet-dev: missing Depends: gnunet (= ${binary:Version}) to be marked as done. This means that you claim that the

Bug#1035670: marked as pending in flask

2023-05-11 Thread Thomas Goirand
Control: tag -1 pending Hello, Bug #1035670 in flask reported by you has been fixed in the Git repository and is awaiting an upload. You can see the commit message below and you can check the diff of the fix at:

Processed: Bug#1035670 marked as pending in flask

2023-05-11 Thread Debian Bug Tracking System
Processing control commands: > tag -1 pending Bug #1035670 [src:flask] flask: CVE-2023-30861: Possible disclosure of permanent session cookie due to missing Vary: Cookie header Added tag(s) pending. -- 1035670: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1035670 Debian Bug Tracking

Processed: Bug#1035932 marked as pending in python-os-brick

2023-05-11 Thread Debian Bug Tracking System
Processing control commands: > tag -1 pending Bug #1035932 [src:python-os-brick] CVE-2023-2088 / OSSA-2023-003: Unauthorized volume access through deleted volume attachments Ignoring request to alter tags of bug #1035932 to the same tags previously set -- 1035932:

Bug#1035932: marked as pending in python-os-brick

2023-05-11 Thread Thomas Goirand
Control: tag -1 pending Hello, Bug #1035932 in python-os-brick reported by you has been fixed in the Git repository and is awaiting an upload. You can see the commit message below and you can check the diff of the fix at:

Bug#1035933: linux-image-6.1.0-8-amd64-unsigned: fails to build (llvm-strip not found, missing dependency?)

2023-05-11 Thread Claude Heiland-Allen
Package: linux-image-6.1.0-8-amd64-unsigned Severity: serious Tags: ftbfs Justification: fails to build from source (but built successfully in the past) X-Debbugs-Cc: cla...@mathr.co.uk Dear Maintainer, * What led up to the situation? I wanted to patch the kernel source to see if it would

Bug#1035932: marked as pending in python-os-brick

2023-05-11 Thread Thomas Goirand
Control: tag -1 pending Hello, Bug #1035932 in python-os-brick reported by you has been fixed in the Git repository and is awaiting an upload. You can see the commit message below and you can check the diff of the fix at:

Processed: Bug#1035932 marked as pending in python-os-brick

2023-05-11 Thread Debian Bug Tracking System
Processing control commands: > tag -1 pending Bug #1035932 [src:python-os-brick] CVE-2023-2088 / OSSA-2023-003: Unauthorized volume access through deleted volume attachments Ignoring request to alter tags of bug #1035932 to the same tags previously set -- 1035932:

Bug#1035932: marked as done (CVE-2023-2088 / OSSA-2023-003: Unauthorized volume access through deleted volume attachments)

2023-05-11 Thread Debian Bug Tracking System
Your message dated Thu, 11 May 2023 12:21:36 + with message-id and subject line Bug#1035932: fixed in python-os-brick 6.1.0-3 has caused the Debian Bug report #1035932, regarding CVE-2023-2088 / OSSA-2023-003: Unauthorized volume access through deleted volume attachments to be marked as

Bug#1035932: marked as done (CVE-2023-2088 / OSSA-2023-003: Unauthorized volume access through deleted volume attachments)

2023-05-11 Thread Debian Bug Tracking System
Your message dated Thu, 11 May 2023 12:21:47 + with message-id and subject line Bug#1035932: fixed in python-os-brick 6.2.2-1 has caused the Debian Bug report #1035932, regarding CVE-2023-2088 / OSSA-2023-003: Unauthorized volume access through deleted volume attachments to be marked as

Processed: found 1031797 in 3.-1

2023-05-11 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > found 1031797 3.-1 Bug #1031797 [src:libsemanage] libsemanage: Inaccurate copyright file The source 'libsemanage' and version '3.-1' do not appear to match any binary packages Marked as found in versions libsemanage/3.-1. > thanks Stopping

Processed: found 1031797 in 3.1-1

2023-05-11 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > found 1031797 3.1-1 Bug #1031797 [src:libsemanage] libsemanage: Inaccurate copyright file Marked as found in versions libsemanage/3.1-1. > thanks Stopping processing here. Please contact me if you need assistance. -- 1031797:

Processed: found 1031798 in 3.1-1

2023-05-11 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > found 1031798 3.1-1 Bug #1031798 [src:libsepol] libsepol: Inaccurate copyright file Marked as found in versions libsepol/3.1-1. > thanks Stopping processing here. Please contact me if you need assistance. -- 1031798:

Bug#1035932: CVE-2023-2088 / OSSA-2023-003: Unauthorized volume access through deleted volume attachments

2023-05-11 Thread Thomas Goirand
Source: python-os-brick Version: 6.2.0-1 Severity: grave OSSA-2023-003: Unauthorized volume access through deleted volume attachments :Date:

Bug#1035944: mariadb: upgrade issue: mariadb-server-10.5 fails to restart after upgrading mariadb-common

2023-05-11 Thread Andreas Beckmann
On 11/05/2023 14.58, Otto Kekäläinen wrote: Thanks for reporting! Is this sporadic or does it reproduce every time? Just reran it with the same result, so seems deterministic. If you tell me what information to collect, I can easily enter the chroot and test things after the failure

Processed: user debian...@lists.debian.org, found 1035604 in 20221002-9

2023-05-11 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > user debian...@lists.debian.org Setting user to debian...@lists.debian.org (was a...@debian.org). > found 1035604 20221002-9 Bug #1035604 [progress-linux-container] progress-linux-container: fails to upgrade from 'bullseye': diversion conflict

Bug#1035011: marked as done (libahven11-dev: missing Breaks+Replaces for libahven9-dev when upgrading from bullseye)

2023-05-11 Thread Debian Bug Tracking System
Your message dated Thu, 11 May 2023 09:19:00 + with message-id and subject line Bug#1035011: fixed in ahven 2.8-7 has caused the Debian Bug report #1035011, regarding libahven11-dev: missing Breaks+Replaces for libahven9-dev when upgrading from bullseye to be marked as done. This means that

Bug#1035013: marked as done (libanet7-dev: missing Breaks+Replaces for libanet5-dev when upgrading from bullseye)

2023-05-11 Thread Debian Bug Tracking System
Your message dated Thu, 11 May 2023 09:49:33 + with message-id and subject line Bug#1035013: fixed in anet 0.4.3-3 has caused the Debian Bug report #1035013, regarding libanet7-dev: missing Breaks+Replaces for libanet5-dev when upgrading from bullseye to be marked as done. This means that

Bug#1035791: marked as done (qt6-datavisualization-dev: Missing dependency on qml6-module-qtdatavisualization)

2023-05-11 Thread Debian Bug Tracking System
Your message dated Thu, 11 May 2023 10:50:48 + with message-id and subject line Bug#1035791: fixed in qt6-datavis3d 6.4.2-3 has caused the Debian Bug report #1035791, regarding qt6-datavisualization-dev: Missing dependency on qml6-module-qtdatavisualization to be marked as done. This means

Bug#1035792: marked as done (qt6-charts-dev: Missing dependecy on qml6-module-qtcharts)

2023-05-11 Thread Debian Bug Tracking System
Your message dated Thu, 11 May 2023 10:50:35 + with message-id and subject line Bug#1035792: fixed in qt6-charts 6.4.2-3 has caused the Debian Bug report #1035792, regarding qt6-charts-dev: Missing dependecy on qml6-module-qtcharts to be marked as done. This means that you claim that the

Bug#1034976: marked as done (gensio-bin: missing Breaks+Replaces for libgensio-dev when upgrading from bullseye)

2023-05-11 Thread Debian Bug Tracking System
Your message dated Thu, 11 May 2023 12:48:49 + with message-id and subject line Bug#1034976: fixed in gensio 2.6.2-4 has caused the Debian Bug report #1034976, regarding gensio-bin: missing Breaks+Replaces for libgensio-dev when upgrading from bullseye to be marked as done. This means that

Bug#1035944: mariadb: upgrade issue: mariadb-server-10.5 fails to restart after upgrading mariadb-common

2023-05-11 Thread Andreas Beckmann
Source: mariadb Version: 1:10.11.2-1 Severity: serious User: debian...@lists.debian.org Usertags: piuparts Control: affects -1 + mariadb-plugin-gssapi-server Hi, during a test with piuparts I noticed your package fails to upgrade from 'bullseye'. It installed fine in 'bullseye', then the upgrade

Processed: mariadb: upgrade issue: mariadb-server-10.5 fails to restart after upgrading mariadb-common

2023-05-11 Thread Debian Bug Tracking System
Processing control commands: > affects -1 + mariadb-plugin-gssapi-server Bug #1035944 [src:mariadb] mariadb: upgrade issue: mariadb-server-10.5 fails to restart after upgrading mariadb-common Added indication that 1035944 affects mariadb-plugin-gssapi-server -- 1035944:

Bug#1035932: marked as pending in python-os-brick

2023-05-11 Thread Thomas Goirand
Control: tag -1 pending Hello, Bug #1035932 in python-os-brick reported by you has been fixed in the Git repository and is awaiting an upload. You can see the commit message below and you can check the diff of the fix at:

Processed: Bug#1035932 marked as pending in python-os-brick

2023-05-11 Thread Debian Bug Tracking System
Processing control commands: > tag -1 pending Bug #1035932 [src:python-os-brick] CVE-2023-2088 / OSSA-2023-003: Unauthorized volume access through deleted volume attachments Added tag(s) pending. -- 1035932: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1035932 Debian Bug Tracking System

Bug#1035670: marked as done (flask: CVE-2023-30861: Possible disclosure of permanent session cookie due to missing Vary: Cookie header)

2023-05-11 Thread Debian Bug Tracking System
Your message dated Thu, 11 May 2023 11:04:07 + with message-id and subject line Bug#1035670: fixed in flask 2.2.2-3 has caused the Debian Bug report #1035670, regarding flask: CVE-2023-30861: Possible disclosure of permanent session cookie due to missing Vary: Cookie header to be marked as

Processed: notfound 1031797 in 3.-1

2023-05-11 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > notfound 1031797 3.-1 Bug #1031797 [src:libsemanage] libsemanage: Inaccurate copyright file The source 'libsemanage' and version '3.-1' do not appear to match any binary packages No longer marked as found in versions libsemanage/3.-1. > thanks

Bug#1035944: mariadb: upgrade issue: mariadb-server-10.5 fails to restart after upgrading mariadb-common

2023-05-11 Thread Otto Kekäläinen
Thanks for reporting! Is this sporadic or does it reproduce every time? We have this upgrade scenario in CI without issues, thus asking about reproducibility.

Bug#1035004: marked as done (libalog8-dev: missing Breaks+Replaces for libalog6-dev when upgrading from bullseye)

2023-05-11 Thread Debian Bug Tracking System
Your message dated Thu, 11 May 2023 09:35:33 + with message-id and subject line Bug#1035004: fixed in libalog 0.6.2-3 has caused the Debian Bug report #1035004, regarding libalog8-dev: missing Breaks+Replaces for libalog6-dev when upgrading from bullseye to be marked as done. This means

Bug#1034927: marked as done (libpcscada11-dev: missing Breaks+Replaces for libpcscada8-dev when upgrading from bullseye)

2023-05-11 Thread Debian Bug Tracking System
Your message dated Thu, 11 May 2023 10:24:48 + with message-id and subject line Bug#1034927: fixed in pcscada 0.7.7-4 has caused the Debian Bug report #1034927, regarding libpcscada11-dev: missing Breaks+Replaces for libpcscada8-dev when upgrading from bullseye to be marked as done. This

Bug#1035931: cjs: Please don't use mozjs78

2023-05-11 Thread Jeremy Bícha
Source: cjs Version: 5.6.0-1 Severity: serious Tags: security sid cjs uses mozjs78. mozjs78 is the SpiderMonkey JavaScript engine from Firefox 78 ESR. Firefox 78 ESR received monthly security updates until October 2021. Since mozjs78 is no longer supported, please switch to mozjs102. This was

Bug#1034694: closing 1034694

2023-05-11 Thread Jochen Sprickerhof
close 1034694 thanks

Processed: closing 1034694

2023-05-11 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > close 1034694 Bug #1034694 [gnome-core] gnome-core: Cannot install due to pipewire-audio dependency Marked Bug as done > thanks Stopping processing here. Please contact me if you need assistance. -- 1034694:

Bug#1035932: marked as pending in python-os-brick

2023-05-11 Thread Thomas Goirand
Control: tag -1 pending Hello, Bug #1035932 in python-os-brick reported by you has been fixed in the Git repository and is awaiting an upload. You can see the commit message below and you can check the diff of the fix at:

Processed: Bug#1035932 marked as pending in python-os-brick

2023-05-11 Thread Debian Bug Tracking System
Processing control commands: > tag -1 pending Bug #1035932 [src:python-os-brick] CVE-2023-2088 / OSSA-2023-003: Unauthorized volume access through deleted volume attachments Ignoring request to alter tags of bug #1035932 to the same tags previously set -- 1035932:

Processed: Bug#1035932 marked as pending in python-os-brick

2023-05-11 Thread Debian Bug Tracking System
Processing control commands: > tag -1 pending Bug #1035932 [src:python-os-brick] CVE-2023-2088 / OSSA-2023-003: Unauthorized volume access through deleted volume attachments Ignoring request to alter tags of bug #1035932 to the same tags previously set -- 1035932:

Bug#1031152: system-config-printer: unlock button in system-config-printer provides no elevated permissions dialog

2023-05-11 Thread Alban Browaeys
This unlikely to be a bug in system-config-printer as its delegate authentication to polkit and cups-pk-helper. Could you tell if you have cups-pk-helper installed and if running "pkexec ls" from a graphical terminal works? Cheers, Alban To other participants, you have to include the submitter

Bug#1035932: marked as pending in python-os-brick

2023-05-11 Thread Thomas Goirand
Control: tag -1 pending Hello, Bug #1035932 in python-os-brick reported by you has been fixed in the Git repository and is awaiting an upload. You can see the commit message below and you can check the diff of the fix at:

Processed: Bug#1035932 marked as pending in python-os-brick

2023-05-11 Thread Debian Bug Tracking System
Processing control commands: > tag -1 pending Bug #1035932 [src:python-os-brick] CVE-2023-2088 / OSSA-2023-003: Unauthorized volume access through deleted volume attachments Ignoring request to alter tags of bug #1035932 to the same tags previously set -- 1035932:

Bug#1035932: marked as pending in python-os-brick

2023-05-11 Thread Thomas Goirand
Control: tag -1 pending Hello, Bug #1035932 in python-os-brick reported by you has been fixed in the Git repository and is awaiting an upload. You can see the commit message below and you can check the diff of the fix at:

Bug#1034914: marked as done (libdbusada8-dev: missing Breaks+Replaces for libdbusada6-dev when upgrading from bullseye)

2023-05-11 Thread Debian Bug Tracking System
Your message dated Thu, 11 May 2023 19:03:50 + with message-id and subject line Bug#1034914: fixed in dbusada 0.6.2-4 has caused the Debian Bug report #1034914, regarding libdbusada8-dev: missing Breaks+Replaces for libdbusada6-dev when upgrading from bullseye to be marked as done. This

Processed: tagging 1035957, tagging 1035956, tagging 1035955, tagging 1035954, tagging 1035953, tagging 1035952 ...

2023-05-11 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > tags 1035957 + upstream Bug #1035957 [src:openjdk-17] openjdk-17: CVE-2023-21930 CVE-2023-21937 CVE-2023-21938 CVE-2023-21939 CVE-2023-21954 CVE-2023-21967 CVE-2023-21968 Added tag(s) upstream. > tags 1035956 + upstream Bug #1035956

Bug#1035289: merecat: diff for NMU version 2.31+git20220513+ds-4.1

2023-05-11 Thread Joost van Baal-Ilić
Hi gregor, Awesome, thanks a lot! (And no need to delay longer.) Bye, Joost On Thu, May 11, 2023 at 08:54:27PM +0200, gregor herrmann wrote: > Control: tags 1035289 + patch > Control: tags 1035289 + pending > > > Dear maintainer, > > I've prepared an NMU for merecat (versioned as

Bug#1034824: tomcat9 should not be released with Bookworm

2023-05-11 Thread Paul Gevers
Hi Markus, On Tue, 25 Apr 2023 16:04:09 +0200 Markus Koschany wrote: We can only support one major Tomcat version per release. Tomcat9 has been part of Buster and Bullseye already and is superseded by Tomcat 10 in Bookworm. I wanted to wait with the removal request until the issues in

Bug#1034824: tomcat9 should not be released with Bookworm

2023-05-11 Thread Markus Koschany
Hello Paul, Am Donnerstag, dem 11.05.2023 um 21:44 +0200 schrieb Paul Gevers: > Hi Markus, > > On Tue, 25 Apr 2023 16:04:09 +0200 Markus Koschany wrote: > > We can only support one major Tomcat version per release. Tomcat9 has > > been part of Buster and Bullseye already and is superseded by

Bug#1035947: fresh build from git fails with cannot access local variable 'new_file'

2023-05-11 Thread Mike Hommey
severity 1035947 normal thanks This would be serious if it failed to build with the sources in the Debian archive, which is what counts. Note that using uscan doesn't get you all the sources. On Thu, May 11, 2023 at 10:32:40AM -0400, Antoine Beaupre wrote: > Source: firefox > Severity: serious

Processed: Re: Bug#1035947: fresh build from git fails with cannot access local variable 'new_file'

2023-05-11 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > severity 1035947 normal Bug #1035947 [src:firefox] fresh build from git fails with cannot access local variable 'new_file' Severity set to 'normal' from 'serious' > thanks Stopping processing here. Please contact me if you need assistance. --

Bug#1035857: texlive-fonts-extra: broken font symlinks for junicode

2023-05-11 Thread Preuße
On 10.05.2023 11:18, Andreas Beckmann wrote: Hi again, during a test with piuparts I noticed your package ships (or creates) broken symlinks: OK, had a closer look: the "Debian Fonts Task Force" replaced the "Junicode 1" by "Junicode 2" although they may behave differently "Users of the

Bug#1029201: openbox-menu: do not release with bookworm

2023-05-11 Thread Mateusz Łukasik
On 9.05.2023 at 14:47 +0200, Bastian Germann wrote: On Thu, 19 Jan 2023 15:17:26 +0100 mat...@linuxmint.pl wrote: openbox-menu should not be shipped in bookworm. Will you also file a RM bug or are you going to update the package for later releases? I found new place of source

Processed: merecat: diff for NMU version 2.31+git20220513+ds-4.1

2023-05-11 Thread Debian Bug Tracking System
Processing control commands: > tags 1035289 + patch Bug #1035289 [merecat] merecat: postinst uses /usr/share/doc content (Policy 12.3): /usr/share/doc/merecat/examples/merecat.conf Added tag(s) patch. > tags 1035289 + pending Bug #1035289 [merecat] merecat: postinst uses /usr/share/doc content

Bug#1035289: merecat: diff for NMU version 2.31+git20220513+ds-4.1

2023-05-11 Thread gregor herrmann
Control: tags 1035289 + patch Control: tags 1035289 + pending Dear maintainer, I've prepared an NMU for merecat (versioned as 2.31+git20220513+ds-4.1) and uploaded it to DELAYED/5. Please feel free to tell me if I should delay it longer. Regards. -- .''`. https://info.comodo.priv.at --

Processed: tagging 1035932, found 1035932 in 6.1.0-2, cloning 1035932, reassign -1 to src:cinder ...

2023-05-11 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > tags 1035932 + security upstream fixed-upstream Bug #1035932 {Done: Thomas Goirand } [src:python-os-brick] CVE-2023-2088 / OSSA-2023-003: Unauthorized volume access through deleted volume attachments Added tag(s) fixed-upstream, upstream, and

Bug#1035289: merecat: diff for NMU version 2.31+git20220513+ds-4.1

2023-05-11 Thread gregor herrmann
[2nd try, I forgot to adjust the postinst, sorry for the blunder.] Dear maintainer, I've prepared an NMU for merecat (versioned as 2.31+git20220513+ds-4.1) and uploaded it to DELAYED/5. Please feel free to tell me if I should delay it longer. Regards. -- .''`. https://info.comodo.priv.at

Bug#1030284: nodejs: [arm64] RangeError: Maximum call stack size exceeded

2023-05-11 Thread James Addison
On Thu, 11 May 2023 at 02:43, Andres Salomon wrote: > > On Sat, 11 Mar 2023 11:04:15 + James Addison > wrote: > > Package: nodejs > > Followup-For: Bug #1030284 > > X-Debbugs-Cc: t...@debian.org > > > > Guidance received from the V8 project (a vendored dependency in the > upstream > >

Bug#1035957: openjdk-17: CVE-2023-21930 CVE-2023-21937 CVE-2023-21938 CVE-2023-21939 CVE-2023-21954 CVE-2023-21967 CVE-2023-21968

2023-05-11 Thread Moritz Mühlenhoff
Source: openjdk-17 X-Debbugs-CC: t...@security.debian.org Severity: grave Tags: security Hi, The following vulnerabilities were published for openjdk-17. CVE-2023-21930[0]: | Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition | product of Oracle Java SE (component: JSSE).

Bug#1018730: lvm2: Initramfs does not activate root LVs if VG is incomplete since 2.03.15 or 2.03.16, boot failure

2023-05-11 Thread Guilhem Moulin
On Thu, 11 May 2023 at 18:12:52 +0200, Bastian Blank wrote: > Nope, not really. Half VG was never a real thing. It might work in > some cases. And these use-cases are unbootable since 2.03.15… > Then, degraded is the default activation mode, so overriding that would > not be appropriate. But

Bug#1018730: lvm2: Initramfs does not activate root LVs if VG is incomplete since 2.03.15 or 2.03.16, boot failure

2023-05-11 Thread Bastian Blank
On Thu, May 11, 2023 at 06:25:00PM +0200, Guilhem Moulin wrote: > On Thu, 11 May 2023 at 18:12:52 +0200, Bastian Blank wrote: > > Nope, not really. Half VG was never a real thing. It might work in > > some cases. > And these use-cases are unbootable since 2.03.15… Those still have access to an

Bug#1034966: marked as done (pcp-doc: missing Breaks+Replaces for pcp when upgrading from bullseye)

2023-05-11 Thread Debian Bug Tracking System
Your message dated Thu, 11 May 2023 17:20:44 + with message-id and subject line Bug#1034966: fixed in pcp 6.0.3-1.1 has caused the Debian Bug report #1034966, regarding pcp-doc: missing Breaks+Replaces for pcp when upgrading from bullseye to be marked as done. This means that you claim that

Bug#1034973: marked as done (pcp-export-pcp2zabbix: missing Breaks+Replaces for pcp when upgrading from bullseye)

2023-05-11 Thread Debian Bug Tracking System
Your message dated Thu, 11 May 2023 17:20:44 + with message-id and subject line Bug#1034973: fixed in pcp 6.0.3-1.1 has caused the Debian Bug report #1034973, regarding pcp-export-pcp2zabbix: missing Breaks+Replaces for pcp when upgrading from bullseye to be marked as done. This means that

Bug#1034922: marked as done (pcp-export-pcp2xml: missing Breaks+Replaces for pcp when upgrading from bullseye)

2023-05-11 Thread Debian Bug Tracking System
Your message dated Thu, 11 May 2023 17:20:43 + with message-id and subject line Bug#1034922: fixed in pcp 6.0.3-1.1 has caused the Debian Bug report #1034922, regarding pcp-export-pcp2xml: missing Breaks+Replaces for pcp when upgrading from bullseye to be marked as done. This means that you

Bug#1034895: marked as done (pcp-zeroconf: missing Replaces: pcp (<< ?))

2023-05-11 Thread Debian Bug Tracking System
Your message dated Thu, 11 May 2023 17:20:43 + with message-id and subject line Bug#1034895: fixed in pcp 6.0.3-1.1 has caused the Debian Bug report #1034895, regarding pcp-zeroconf: missing Replaces: pcp (<< ?) to be marked as done. This means that you claim that the problem has been dealt

Bug#1034932: marked as done (pcp-export-pcp2spark: missing Breaks+Replaces for pcp when upgrading from bullseye)

2023-05-11 Thread Debian Bug Tracking System
Your message dated Thu, 11 May 2023 17:20:43 + with message-id and subject line Bug#1034932: fixed in pcp 6.0.3-1.1 has caused the Debian Bug report #1034932, regarding pcp-export-pcp2spark: missing Breaks+Replaces for pcp when upgrading from bullseye to be marked as done. This means that

Bug#1034983: marked as done (pcp-export-pcp2json: missing Breaks+Replaces for pcp when upgrading from bullseye)

2023-05-11 Thread Debian Bug Tracking System
Your message dated Thu, 11 May 2023 17:20:44 + with message-id and subject line Bug#1034983: fixed in pcp 6.0.3-1.1 has caused the Debian Bug report #1034983, regarding pcp-export-pcp2json: missing Breaks+Replaces for pcp when upgrading from bullseye to be marked as done. This means that

Bug#1034998: marked as done (pcp-export-pcp2elasticsearch: missing Breaks+Replaces for pcp when upgrading from bullseye)

2023-05-11 Thread Debian Bug Tracking System
Your message dated Thu, 11 May 2023 17:20:44 + with message-id and subject line Bug#1034998: fixed in pcp 6.0.3-1.1 has caused the Debian Bug report #1034998, regarding pcp-export-pcp2elasticsearch: missing Breaks+Replaces for pcp when upgrading from bullseye to be marked as done. This

Bug#1035872: tuxmath-data: broken symlink: /usr/share/tuxmath/fonts/AndikaDesRevG.ttf -> ../../fonts/truetype/andika/Andika-R.ttf

2023-05-11 Thread Holger Levsen
control: tags -1 + moreinfo control: severity -1 important thanks Hi Andreas, as usual: thanks for this bug report and all the other piuparts bug reports you are filing! \o/ On Wed, May 10, 2023 at 02:03:17PM +0200, Andreas Beckmann wrote: > Package: tuxmath-data > Severity: serious > during

Processed: Re: Bug#1035872: tuxmath-data: broken symlink: /usr/share/tuxmath/fonts/AndikaDesRevG.ttf -> ../../fonts/truetype/andika/Andika-R.ttf

2023-05-11 Thread Debian Bug Tracking System
Processing control commands: > tags -1 + moreinfo Bug #1035872 [tuxmath-data] tuxmath-data: broken symlink: /usr/share/tuxmath/fonts/AndikaDesRevG.ttf -> ../../fonts/truetype/andika/Andika-R.ttf Added tag(s) moreinfo. > severity -1 important Bug #1035872 [tuxmath-data] tuxmath-data: broken

Bug#1018730: lvm2: Initramfs does not activate root LVs if VG is incomplete since 2.03.15 or 2.03.16, boot failure

2023-05-11 Thread Bastian Blank
On Wed, May 10, 2023 at 03:09:04AM +0200, Guilhem Moulin wrote: > There might be a better way to detect an initramfs-tools environment > than checking whether ‘/run/initramfs’ exists (and ‘/run/systemd/system’ > doesn't). The only acceptable way would be a different udev rules file for the

Processed: limit source to popplerkit.framework, tagging 1035862

2023-05-11 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > limit source popplerkit.framework Limiting to bugs with field 'source' containing at least one of 'popplerkit.framework' Limit currently set to 'source':'popplerkit.framework' > tags 1035862 + pending Bug #1035862 [libpopplerkit0]

Processed: dnssec-trigger: diff for NMU version 0.17+repack-5.1

2023-05-11 Thread Debian Bug Tracking System
Processing control commands: > tags 1035286 + patch Bug #1035286 [dnssec-trigger] dnssec-trigger: missing Depends: openssl Added tag(s) patch. > tags 1035286 + pending Bug #1035286 [dnssec-trigger] dnssec-trigger: missing Depends: openssl Added tag(s) pending. -- 1035286:

Bug#1035286: dnssec-trigger: diff for NMU version 0.17+repack-5.1

2023-05-11 Thread gregor herrmann
Control: tags 1035286 + patch Control: tags 1035286 + pending Dear maintainer, I've prepared an NMU for dnssec-trigger (versioned as 0.17+repack-5.1) and uploaded it to DELAYED/5. Please feel free to tell me if I should delay it longer. Regards. -- .''`. https://info.comodo.priv.at --

Bug#1035947: fresh build from git fails with cannot access local variable 'new_file'

2023-05-11 Thread Antoine Beaupre
Source: firefox Severity: serious Tags: patch ftbfs Justification: fails to build from source (but built successfully in the past) I'm trying to build Firefox 113 from the git repository. I have pulled the package with: debcheckout firefox Then tried to download the latest tarballs with:

Bug#1035949: mariadb: upgrade issue: mariadb-server-10.5 fails to stop after all other -10.5 packages were removed

2023-05-11 Thread Andreas Beckmann
Source: mariadb Version: 1:10.11.2-1 Severity: serious User: debian...@lists.debian.org Usertags: piuparts Control: affects -1 + zoph Hi, during a test with piuparts I noticed your package fails to upgrade from 'bullseye'. It installed fine in 'bullseye', then the upgrade to 'bookworm' fails.

Processed: mariadb: upgrade issue: mariadb-server-10.5 fails to stop after all other -10.5 packages were removed

2023-05-11 Thread Debian Bug Tracking System
Processing control commands: > affects -1 + zoph Bug #1035949 [src:mariadb] mariadb: upgrade issue: mariadb-server-10.5 fails to stop after all other -10.5 packages were removed Added indication that 1035949 affects zoph -- 1035949: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1035949

Bug#1034836: marked as done (initramfs-tools: After bullseye -> bookworm upgrade boot stuck in the initramfs shell)

2023-05-11 Thread Debian Bug Tracking System
Your message dated Thu, 11 May 2023 17:42:35 +0200 with message-id <20230511154235.x7ioftoblgf2p...@shell.thinkmo.de> and subject line Re: Bug#1018730: lvm2: Initramfs does not activate root LVs if VG is incomplete since 2.03.15 or 2.03.16, boot failure has caused the Debian Bug report #1018730,

Bug#1018730: marked as done (lvm2: Initramfs does not activate root LVs if VG is incomplete since 2.03.15 or 2.03.16, boot failure)

2023-05-11 Thread Debian Bug Tracking System
Your message dated Thu, 11 May 2023 17:42:35 +0200 with message-id <20230511154235.x7ioftoblgf2p...@shell.thinkmo.de> and subject line Re: Bug#1018730: lvm2: Initramfs does not activate root LVs if VG is incomplete since 2.03.15 or 2.03.16, boot failure has caused the Debian Bug report #1018730,

Bug#1035841: fixed in amavisd-new 1:2.13.0-3

2023-05-11 Thread Johannes Schauer Marin Rodrigues
Hi, On Thu, 11 May 2023 23:52:00 + Debian FTP Masters wrote: > Changes: > amavisd-new (1:2.13.0-3) unstable; urgency=medium > . >* Fix failure to purge without adduser. Closes: #1035841. thank you! Would you like me to take care of filing the unblock request with release.debian.org

Bug#1030284: nodejs: [arm64] RangeError: Maximum call stack size exceeded

2023-05-11 Thread Thorsten Glaser
James Addison dixit: >On Thu, 11 May 2023 at 02:43, Andres Salomon wrote: >> For ARM64, he says that raising the stack limit is not safe for v8 >> *embedded inside WebView*, and therefore not appropriate for upstream >> v8. But then he says it could/should be safe for v8 *embedded inside >>

Bug#1018730: closed by Bastian Blank (Re: Bug#1018730: lvm2: Initramfs does not activate root LVs if VG is incomplete since 2.03.15 or 2.03.16, boot failure)

2023-05-11 Thread Melvin Vermeeren
Hi, My wording might be a bit over the top, apologies in advance. I do really mean the best, just a bit baffled at the wontfix reply and lack of acknowledgement of the problem. I'm not really understanding the "Half VG was never a real thing" approach and general dismissal of this bug, I

Bug#1034824: tomcat9 should not be released with Bookworm

2023-05-11 Thread Emmanuel Bourg
Hi Paul, Le 2023-05-11 21:44, Paul Gevers a écrit : From a quick look at the key packages: It seems you didn't follow up (86 days) on libcommons-dbcp-java which can't migrate to bookworm because it would make libbiojava-java-doc uninstallable (no fix there, no bug report filed). I have to

Bug#1035862: marked as done (libpopplerkit0: broken symlinks: /usr/share/GNUstep/Frameworks/PopplerKit.framework/Versions/1.0/*.pfb -> ../../../../../fonts/type1/urw-base35/*.pfb)

2023-05-11 Thread Debian Bug Tracking System
Your message dated Thu, 11 May 2023 22:42:52 + with message-id and subject line Bug#1035862: fixed in popplerkit.framework 0.0.20051227svn-11 has caused the Debian Bug report #1035862, regarding libpopplerkit0: broken symlinks:

Processed: fixed 1035732 in 5.27.2-1

2023-05-11 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > fixed 1035732 5.27.2-1 Bug #1035732 [libkscreenlocker5] libkscreenlocker5: Endless loop when using PAM Marked as fixed in versions kscreenlocker/5.27.2-1. > thanks Stopping processing here. Please contact me if you need assistance. -- 1035732:

Bug#1018730: More info

2023-05-11 Thread Melvin Vermeeren
To add to the previous briefly, as I didn't explicitly mention this. Early initramfs should: * Activate the resume device (one of the swap) for resume handling. * Activate the rootfs. Once rootfs is there, remaining PVs etc will cascade activate through the setup from late-stage boot process

Bug#1035289: marked as done (merecat: postinst uses /usr/share/doc content (Policy 12.3): /usr/share/doc/merecat/examples/merecat.conf)

2023-05-11 Thread Debian Bug Tracking System
Your message dated Thu, 11 May 2023 23:25:40 + with message-id and subject line Bug#1035289: fixed in merecat 2.31+git20220513+ds-4.1 has caused the Debian Bug report #1035289, regarding merecat: postinst uses /usr/share/doc content (Policy 12.3): /usr/share/doc/merecat/examples/merecat.conf

Bug#1035289: merecat: diff for NMU version 2.31+git20220513+ds-4.1

2023-05-11 Thread gregor herrmann
On Thu, 11 May 2023 21:28:17 +0200, Joost van Baal-Ilić wrote: > Awesome, thanks a lot! (And no need to delay longer.) Thanks, rescheduled to 0-day. Cheers, gregor -- .''`. https://info.comodo.priv.at -- Debian Developer https://www.debian.org : :' : OpenPGP fingerprint D1E1 316E 93A7

Bug#1035841: marked as done (amavisd-new fails to purge without adduser - userdel: not found)

2023-05-11 Thread Debian Bug Tracking System
Your message dated Thu, 11 May 2023 23:52:00 + with message-id and subject line Bug#1035841: fixed in amavisd-new 1:2.13.0-3 has caused the Debian Bug report #1035841, regarding amavisd-new fails to purge without adduser - userdel: not found to be marked as done. This means that you claim