Package: release.debian.org
Severity: normal
Tags: buster
User: release.debian@packages.debian.org
Usertags: pu
Hi all,
cyrus-imapd ≤ 3.0.8 has a RC bug: it may loss data during upgrade from
stretch to buster. The fix is very simple, then I think it is low risky
to upgrade it in next Buster
Processing control commands:
> block 935737 with -1
Bug #935737 [release.debian.org] transition: perl
935737 was blocked by: 941933 941919 941934 941915 941926 941989 941935 941917
935737 was not blocking any bugs.
Added blocking bug(s) of 935737: 942073
--
935737:
Processing commands for cont...@bugs.debian.org:
> block 941955 with 942044
Bug #941955 [open-vm-tools] memory leaks in open-vm-tools
941955 was not blocked by any bugs.
941955 was not blocking any bugs.
Added blocking bug(s) of 941955: 942044
> thanks
Stopping processing here.
Please contact me
Package: release.debian.org
Severity: normal
Tags: buster
User: release.debian@packages.debian.org
Usertags: pu
Hi release-team,
I'd like to update open-vm-tools with the next pointrelease as upstream
found some memory leaks which need to be fixed. This includes a very
minor security issue
Processing commands for cont...@bugs.debian.org:
> unblock 935737 with 941920
Bug #935737 [release.debian.org] transition: perl
935737 was blocked by: 941915 941926 941920 941933 941935 941919 941989 941934
941917
935737 was not blocking any bugs.
Removed blocking bug(s) of 935737: 941920
>
ping?
On 2019-09-30 09:02, Mo Zhou wrote:
> Hi release team,
>
> Shall we proceed with the opencv transition? The opencv 3.2.0 in
> unstable
> is too ancient. The automatically generated ben file looks good:
>
> https://release.debian.org/transitions/html/auto-opencv.html
>
> I'm planning to
Le mardi 08 octobre 2019 à 20:40 +0200, Paul Gevers a écrit :
> On 08-10-2019 14:07, Sébastien Villemot wrote:
> > All packages concerned by this transition are now fixed, the only
> > exception being octave-mpi. For the latter, I suggest that it be
> > removed from testing, because the fix is not
Package: release.debian.org
Severity: normal
Tags: stretch
User: release.debian@packages.debian.org
Usertags: pu
Dear release managers,
as discussed in #939553[0], no DSA will be issued by the security team for
CVE-2018-21010 and this vulnerability can be fixed via -pu. The attached
debdiff
8 matches
Mail list logo