Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: transition
X-Debbugs-Cc: lego...@debian.org
Hi,
I'd like to do a transition of libzim 7->8. I've done local rebuilds
of all the reverse dependencies, python-libzim needs a patch (ready in
Processing commands for cont...@bugs.debian.org:
> unblock 1016988 by 1016180
Bug #1016988 [release.debian.org] transition: nautilus 43
1016988 was blocked by: 1017576 1016180
1016988 was not blocking any bugs.
Removed blocking bug(s) of 1016988: 1016180
>
End of message, stopping processing
Processing control commands:
> tags -1 confirmed
Bug #1017476 [release.debian.org] transition: poppler 22.08
Added tag(s) confirmed.
> forwarded -1 https://release.debian.org/transitions/html/auto-poppler.html
Bug #1017476 [release.debian.org] transition: poppler 22.08
Set Bug
Control: tags -1 confirmed
Control: forwarded -1
https://release.debian.org/transitions/html/auto-poppler.html
On 2022-08-16 13:52:42 -0400, Jeremy Bicha wrote:
> Package: release.debian.org
> Tags: moreinfo
> User: release.debian@packages.debian.org
> Usertags: transition
> X-Debbugs-Cc:
Your message dated Sun, 21 Aug 2022 19:05:46 +0200
with message-id
and subject line Re: Bug#1016923: Updated mathcomp-analysis
has caused the Debian Bug report #1016923,
regarding transition: mathcomp-finmap
to be marked as done.
This means that you claim that the problem has been dealt with.
If
Processing control commands:
> tags -1 confirmed
Bug #1017705 [release.debian.org] transition: benchmark
Added tag(s) confirmed.
--
1017705: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1017705
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
Control: tags -1 confirmed
On 2022-08-19 10:15:50 +0200, Timo Röhling wrote:
> Package: release.debian.org
> Severity: normal
> User: release.debian@packages.debian.org
> Usertags: transition
>
> Dear release team,
>
> I'd like to transition benchmark after upstream broke ABI compatibility
Aurelien Jarno (2022-08-20):
> [ Reason ]
> There are multiple fixes in this upload, mostly coming from the upstream
> stable branch:
> - One security issue with CVE entry
> - Multiple overflow fixes to wide string functions
> - Failure to enforce libio vtable protection
> - A performance issue
Processing commands for cont...@bugs.debian.org:
> tags 1017841 - moreinfo
Bug #1017841 [release.debian.org] bullseye-pu: package pcre2/10.36-2
Removed tag(s) moreinfo.
> tags 1013448 + moreinfo
Bug #1013448 [src:pcre2] pcre2 relies on write+execute mappings unnecessarily
Added tag(s) moreinfo.
>
Processing commands for cont...@bugs.debian.org:
> tags 1017841 + moreinfo
Bug #1017841 [release.debian.org] bullseye-pu: package pcre2/10.36-2
Added tag(s) moreinfo.
> quit
Stopping processing here.
Please contact me if you need assistance.
--
1017841:
Hi,
Sorry, that debdiff had the wrong distro in the changelog; here's a
correct one.
Regards,
Matthewdiff -u pcre2-10.36/debian/changelog pcre2-10.36/debian/changelog
--- pcre2-10.36/debian/changelog
+++ pcre2-10.36/debian/changelog
@@ -1,3 +1,10 @@
+pcre2 (10.36-2+deb11u1) bullseye;
Package: release.debian.org
Severity: normal
Tags: bullseye
User: release.debian@packages.debian.org
Usertags: pu
Hi,
I've backported the upstream security fixes for CVE-2022-1586 and
CVE-2022-1587 to bullseye, and would like them to go in the next
stable update, please. I consulted the
12 matches
Mail list logo