Your message dated Tue, 08 Jun 2021 02:33:44 +
with message-id
and subject line Bug#987641: fixed in e2fsprogs 1.46.2-2
has caused the Debian Bug report #987641,
regarding e2fsprogs: FTBFS on armel/armhf with a 64-bit kernel
to be marked as done.
This means that you claim that the problem
Your message dated Mon, 07 Jun 2021 23:03:27 +
with message-id
and subject line Bug#936052: fixed in amavisd-new 1:2.11.1-5
has caused the Debian Bug report #936052,
regarding amavisd-new: Missing dependency on libnet-snmp-perl
to be marked as done.
This means that you claim that the
Processing control commands:
> severity -1 important
Bug #989571 [src:linux] linux-image-5.10.0-0.bpo.3-amd64: Incorrect large USB
disk sizing leading to data corruption
Severity set to 'important' from 'critical'
> tags -1 moreinfo
Bug #989571 [src:linux] linux-image-5.10.0-0.bpo.3-amd64:
Control: severity -1 important
Control: tags -1 moreinfo
On Mon, Jun 07, 2021 at 08:43:21PM +0100, Anton Ivanov wrote:
> Version: 5.10.13-1~bpo10+1
This is not the latest version. 5.10.24 (at least) is in buster-backports.
> [801076.291139] scsi host10: uas
> [801076.291557] scsi 10:0:0:0:
Your message dated Mon, 07 Jun 2021 20:33:28 +
with message-id
and subject line Bug#989055: fixed in libapache2-mod-auth-openidc 2.4.4.1-2
has caused the Debian Bug report #989055,
regarding libapache2-mod-auth-openidc: CVE-2021-20718
to be marked as done.
This means that you claim that the
Package: src:linux
Version: 5.10.13-1~bpo10+1
Severity: critical
Justification: causes serious data loss
Dear Maintainer,
Large USB drives (example - Seagate 4TB Backup) which work perfectly fine with
4.19 are identified as incorrect size. In the case of the 4TB sized USB it's
identified as a
Hi,
On Wed, 2 Jun 2021 22:22:04 +0200 Sebastian Ramacher
wrote:
Hi Gilles, hi Andreas,
On 2021-06-01 14:15:52 +0200, Andreas Beckmann wrote:
> On Tue, 18 May 2021 20:36:23 +0200 Dennis Filder wrote:
> > One more observation: Bullseye's gdal-data 3.2.1+dfsg-1 defines a
> > Breaks: libgdal20
On Fri, 28 May 2021 17:40:28 +0200 =?iso-8859-2?Q?Micha=B3_Miros=B3aw?= <
mirq-debo...@rere.qmqm.pl> wrote:
> On Wed, May 26, 2021 at 10:19:31AM -0400, Felipe Sateler wrote:
> > Control: tags -1 unreproducible moreinfo
> >
> >
> > On Tue, May 25, 2021 at 10:27 PM Michał Mirosław <
Your message dated Mon, 07 Jun 2021 19:33:37 +
with message-id
and subject line Bug#989564: fixed in isync 1.3.0-2.2
has caused the Debian Bug report #989564,
regarding isync: CVE-2021-3578
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not
Hi,
this bug is still open in buster…
bye,
//mirabilos
--
22:20⎜ The crazy that persists in his craziness becomes a master
22:21⎜ And the distance between the craziness and geniality is
only measured by the success 18:35⎜ "Psychotics are consistently
inconsistent. The essence of sanity is to be
Hi,
I just realised that I totally forgot to send the nmudiff for this one,
sorry. I've attached it now, hope that is ok.
Cheers Jochen
diff -Nru trscripts-1.18+nmu1/debian/changelog trscripts-1.18+nmu2/debian/changelog
--- trscripts-1.18+nmu1/debian/changelog 2021-01-07 15:01:30.0
Processing control commands:
> found -1 1.3.0-2
Bug #989564 [src:isync] isync: CVE-2021-3578
Marked as found in versions isync/1.3.0-2.
--
989564: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989564
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
Source: isync
Version: 1.3.0-2.1
Severity: grave
Tags: security upstream
Justification: user security hole
X-Debbugs-Cc: car...@debian.org, Debian Security Team
Control: found -1 1.3.0-2
Hi,
The following vulnerability was published for isync.
CVE-2021-3578[0]:
| possible remote code execution
Source: apache2
Version: 2.4.47-1
Severity: grave
Tags: security upstream
Justification: user security hole
X-Debbugs-Cc: car...@debian.org, Debian Security Team
Hi,
The following vulnerability was published for apache2.
CVE-2021-31618[0]:
| httpd: NULL pointer dereference on specially crafted
Processing control commands:
> severity -1 normal
Bug #989179 [aeskeyfind] aeskeyfind calculates wrong results on kernel 5.10.0.6
and glibc 2.31-11
Severity set to 'normal' from 'grave'
--
989179: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989179
Debian Bug Tracking System
Contact
Control: severity -1 normal
Hello Jan,
Thanks for the detailed explanation and for pushing your integration
tests. I have pushed them[0] to the main repo (with the same changes
we discussed in the rsakeyfind MR) making use of the "-t 50"
parameter. So the package can have integ tests even before
Your message dated Mon, 07 Jun 2021 13:33:46 +
with message-id
and subject line Bug#987545: fixed in pam-u2f 1.1.0-1.1
has caused the Debian Bug report #987545,
regarding libpam-u2f: CVE-2021-31924: libpam_u2f does not require pin
regardless of key definition
to be marked as done.
This
Your message dated Mon, 07 Jun 2021 13:19:14 +
with message-id
and subject line Bug#989126: fixed in orthanc-wsi 1.0-3
has caused the Debian Bug report #989126,
regarding package statically links without using a Built-Using attribute
to be marked as done.
This means that you claim that the
On 07 juin 2021 09:17, Andreas Beckmann wrote:
> On 06/06/2021 12.44, Christian Marillat wrote:
>> As requested in your previous e-mail (tesla-450) 450.119.04
>
> Thanks, then I'll try to get that unblocked.
>
> Did you have a chance to test 460.84, yet? The (usually sparse)
Well, where are
Your message dated Mon, 07 Jun 2021 12:48:36 +
with message-id
and subject line Bug#989127: fixed in orthanc-webviewer 2.7-4
has caused the Debian Bug report #989127,
regarding package statically links without using a Built-Using attribute
to be marked as done.
This means that you claim that
Processing commands for cont...@bugs.debian.org:
> forwarded 988094 https://github.com/linuxenko/chkservice/issues/12
Bug #988094 [chkservice] reportbug: chkservice fails to control certain services
Set Bug forwarded-to-address to
'https://github.com/linuxenko/chkservice/issues/12'.
> thanks
Processing commands for cont...@bugs.debian.org:
> tags 986293 + fixed
Bug #986293 {Done: Adrian Bunk } [libvirtuoso5.5-cil]
libvirtuoso5.5-cil: fails to upgrade from 'buster': The type initializer for
'Sys' threw an exception.
Added tag(s) fixed.
> thanks
Stopping processing here.
Please
Your message dated Mon, 07 Jun 2021 09:49:01 +
with message-id
and subject line Bug#989128: fixed in orthanc-dicomweb 1.5+dfsg-3
has caused the Debian Bug report #989128,
regarding package statically links without using a Built-Using attribute
to be marked as done.
This means that you claim
Your message dated Mon, 07 Jun 2021 09:33:41 +
with message-id
and subject line Bug#985574: fixed in pygments 2.7.1+dfsg-2.1
has caused the Debian Bug report #985574,
regarding pygments: CVE-2021-27291
to be marked as done.
This means that you claim that the problem has been dealt with.
If
Your message dated Mon, 07 Jun 2021 09:18:55 +
with message-id
and subject line Bug#989128: fixed in orthanc-dicomweb 1.6+dfsg-2
has caused the Debian Bug report #989128,
regarding package statically links without using a Built-Using attribute
to be marked as done.
This means that you claim
Your message dated Mon, 07 Jun 2021 09:04:20 +
with message-id
and subject line Bug#989332: fixed in webkit2gtk 2.32.1-2
has caused the Debian Bug report #989332,
regarding libwebkit2gtk-4.0-37: May 30 upgrade for DSA-4923-1 broke the
epiphany browser
to be marked as done.
This means that
Your message dated Mon, 07 Jun 2021 09:04:09 +
with message-id
and subject line Bug#984668: fixed in python-markdown2 2.3.10-1.1
has caused the Debian Bug report #984668,
regarding python-markdown2: CVE-2021-26813
to be marked as done.
This means that you claim that the problem has been
Your message dated Mon, 07 Jun 2021 08:20:00 +
with message-id
and subject line Bug#978416: fixed in python-autobahn 17.10.1+dfsg1-7
has caused the Debian Bug report #978416,
regarding python-autobahn: CVE-2020-35678
to be marked as done.
This means that you claim that the problem has been
Package: libgl1-mesa-dri
Version: 20.3.4-1
Severity: grave
Tags: upstream
Justification: renders package unusable
Dear Maintainer,
I'm using a Radeon Vega Frontier Edition with a Talos Blackbird Power9 system
(ppc64le). I'm constantly running into the issue mentioned here:
Processing control commands:
> tag -1 pending
Bug #978416 [src:python-autobahn] python-autobahn: CVE-2020-35678
Added tag(s) pending.
--
978416: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=978416
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
Control: tag -1 pending
Hello,
Bug #978416 in python-autobahn reported by you has been fixed in the
Git repository and is awaiting an upload. You can see the commit
message below and you can check the diff of the fix at:
On 06/06/2021 12.44, Christian Marillat wrote:
As requested in your previous e-mail (tesla-450) 450.119.04
Thanks, then I'll try to get that unblocked.
Did you have a chance to test 460.84, yet? The (usually sparse) upstream
changelog doesn't mention anything related to DP, though, but that
32 matches
Mail list logo