Bug#1033034: unblock: libmemcached/1.1.4-1

2023-03-15 Thread Ondřej Surý
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Hi, Please unblock package libmemcached 1.1.4-1, it contains fix for #1032479 (CVE-2023-27478). Removing libmemcached from testing would

Bug#1033033: unblock: mozjs78/78.15.0-7

2023-03-15 Thread Jeremy Bícha
Package: release.debian.org Control: affects -1 + src:mozjs78 X-Debbugs-Cc: mozj...@packages.debian.org User: release.debian@packages.debian.org Usertags: unblock Please unblock package mozjs78 [ Reason ] This update adds 2 patches to fix 2 FTBFS issues (python3.11 & gcc12) [ Impact ]

Processed: unblock: mozjs78/78.15.0-7

2023-03-15 Thread Debian Bug Tracking System
Processing control commands: > affects -1 + src:mozjs78 Bug #1033033 [release.debian.org] unblock: mozjs78/78.15.0-7 Added indication that 1033033 affects src:mozjs78 -- 1033033: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033033 Debian Bug Tracking System Contact ow...@bugs.debian.org

Processed: 1025708 moreinfo

2023-03-15 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > tags 1025708 -moreinfo Bug #1025708 [release.debian.org] bullseye-pu: package debootstrap/1.0.123+deb11u2 Removed tag(s) moreinfo. > thanks Stopping processing here. Please contact me if you need assistance. -- 1025708:

Bug#1032899: unblock: rocm-hipamd/5.2.3-6

2023-03-15 Thread Christian Kastner
On 2023-03-13 18:28, Christian Kastner wrote: > [ Impact ] > The new versions are in far better shape: they've catched missing > dependencies, added patches, improved the build process, etc. Apologies, I was only thinking of the more recent releases. Revision -2 fixed an RC bug in January, but

Re: 11.7 planning

2023-03-15 Thread Andy
On 15 March 2023 20:33:47 GMT, Jonathan Wiltshire wrote: >Hi, > >We're overdue for 11.7 and need it done with a keyring update included >before bookworm can be released. The wheels are turning on the keyring so >how do dates in April look for everybody? Saturdays are 1st (probably too >soon),

Processed: Re: Bug#1033018: unblock: sudo/1.9.13p3-1

2023-03-15 Thread Debian Bug Tracking System
Processing control commands: > tags -1 moreinfo Bug #1033018 [release.debian.org] unblock: sudo/1.9.13p3-1 Added tag(s) moreinfo. -- 1033018: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033018 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems

Bug#1033025: unblock: socklog/2.1.0+repack-5

2023-03-15 Thread Mathieu Mirmont
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock X-Debbugs-Cc: sock...@packages.debian.org Control: affects -1 + src:socklog Please unblock package socklog [ Reason ] Fix RC bug #1031794. [ Impact ] No change of behaviour. [ Tests ]

Processed: unblock: socklog/2.1.0+repack-5

2023-03-15 Thread Debian Bug Tracking System
Processing control commands: > affects -1 + src:socklog Bug #1033025 [release.debian.org] unblock: socklog/2.1.0+repack-5 Added indication that 1033025 affects src:socklog -- 1033025: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033025 Debian Bug Tracking System Contact

Bug#1032928: marked as done (unblock: python3.11/3.11.2-6)

2023-03-15 Thread Debian Bug Tracking System
Your message dated Wed, 15 Mar 2023 21:59:08 + with message-id and subject line unblock python3.11 has caused the Debian Bug report #1032928, regarding unblock: python3.11/3.11.2-6 to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case

Auto-rejecting packages with a broken Maintainer field?

2023-03-15 Thread Cyril Brulebois
Hi ftp and release teams, This isn't the first time that we have an awful package slip through the net and reach the archive, breaking a few things in the process. The last occurrence is gnome-shell-extension-tiling-assistant in experimental, featuring a multi-{line,valued} Maintainer field,

Bug#1031652: bullseye-pu: package c-ares/1.17.1-1+deb11u1 CVE-2022-4904

2023-03-15 Thread Jonathan Wiltshire
Control: tag -1 confirmed On Sun, Feb 19, 2023 at 09:05:37PM +0100, Gregor Jasny wrote: > I'd like to upload a new version of c-ares which fixes > CVE-2022-4904 (#1031525). According to the assessment of the > Security Team the bug is not severe enough to warrant an upload > to bullseye-seurity

Processed: Re: Bug#1031652: bullseye-pu: package c-ares/1.17.1-1+deb11u1 CVE-2022-4904

2023-03-15 Thread Debian Bug Tracking System
Processing control commands: > tag -1 confirmed Bug #1031652 [release.debian.org] bullseye-pu: package c-ares/1.17.1-1+deb11u1 CVE-2022-4904 Added tag(s) confirmed. -- 1031652: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1031652 Debian Bug Tracking System Contact ow...@bugs.debian.org

Bug#1031279: bullseye-pu: package flask-security/4.0.0-1+deb11u1

2023-03-15 Thread Jonathan Wiltshire
Control: tag -1 confirmed On Tue, Feb 14, 2023 at 02:26:58PM +, Carsten Schoenert wrote: > [ Reason ] > The version of flask-security in bullseye is affected by CVE-2021-23385. > https://security-tracker.debian.org/tracker/CVE-2021-23385 > > [ Impact ] > Without that fix users of Flask based

Processed: Re: Bug#1031279: bullseye-pu: package flask-security/4.0.0-1+deb11u1

2023-03-15 Thread Debian Bug Tracking System
Processing control commands: > tag -1 confirmed Bug #1031279 [release.debian.org] bullseye-pu: package flask-security/4.0.0-1+deb11u1 Added tag(s) confirmed. -- 1031279: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1031279 Debian Bug Tracking System Contact ow...@bugs.debian.org with

Processed: Re: Bug#1025789: bullseye-pu: wolfssl/4.6.0+p1-0+deb11u1_4.6.0+p1-0+deb11u2.debdiff

2023-03-15 Thread Debian Bug Tracking System
Processing control commands: > tag -1 moreinfo Bug #1025789 [release.debian.org] bullseye-pu: wolfssl/4.6.0+p1-0+deb11u2 Added tag(s) moreinfo. -- 1025789: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1025789 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems

Bug#1025789: bullseye-pu: wolfssl/4.6.0+p1-0+deb11u1_4.6.0+p1-0+deb11u2.debdiff

2023-03-15 Thread Jonathan Wiltshire
Control: tag -1 moreinfo On Thu, Dec 08, 2022 at 08:07:09PM -0800, Felix Lechner wrote: > diff -Nru wolfssl-4.6.0+p1/debian/changelog.dch > wolfssl-4.6.0+p1/debian/changelog.dch > --- wolfssl-4.6.0+p1/debian/changelog.dch 1970-01-01 00:00:00.0 > + > +++

Bug#1032985: unblock: gourmand/1.1.0+really1.1.0~rc3-3

2023-03-15 Thread Christian Marillat
On 15 mars 2023 20:35, Jonathan Wiltshire wrote: > Control: tag -1 moreinfo > > Hi, > > On Wed, Mar 15, 2023 at 09:29:54AM +0100, Christian Marillat wrote: >> [ Checklist ] >> [x] all changes are documented in the d/changelog >> [x] I reviewed all changes and I approve them >> [ ] attach

Processed: retitle 1025789 to bullseye-pu: wolfssl/4.6.0+p1-0+deb11u2

2023-03-15 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > retitle 1025789 bullseye-pu: wolfssl/4.6.0+p1-0+deb11u2 Bug #1025789 [release.debian.org] bullseye-pu: wolfssl/4.6.0+p1-0+deb11u1_4.6.0+p1-0+deb11u2.debdiff Changed Bug title to 'bullseye-pu: wolfssl/4.6.0+p1-0+deb11u2' from 'bullseye-pu:

Processed: Re: Bug#1026078: bullseye-pu: package ceph/14.2.21-1 CVE-2022-3650

2023-03-15 Thread Debian Bug Tracking System
Processing control commands: > tag -1 confirmed Bug #1026078 [release.debian.org] bullseye-pu: package ceph/14.2.21-1 CVE-2022-3650 Added tag(s) confirmed. -- 1026078: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026078 Debian Bug Tracking System Contact ow...@bugs.debian.org with

Bug#1026078: bullseye-pu: package ceph/14.2.21-1 CVE-2022-3650

2023-03-15 Thread Jonathan Wiltshire
Control: tag -1 confirmed On Wed, Dec 14, 2022 at 11:52:16AM +0100, Thomas Goirand wrote: > I have prepared an update for Ceph in Bullseye to address > CVE-2022-3650 (ie: ceph to root privilege escalation). > The security team already told me that there will be no DSA. Please go ahead with the

Processed: tagging 1002956

2023-03-15 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > tags 1002956 + moreinfo Bug #1002956 [release.debian.org] bullseye-pu: package rabbitmq-server/3.8.9-3 CVE-2021-32718, CVE-2021-32719 Bug #1004513 [release.debian.org] bullseye-pu: package rabbitmq-server/3.8.9-3 Added tag(s) moreinfo. Added

Bug#1025708: bullseye-pu: package debootstrap/1.0.123+deb11u2

2023-03-15 Thread Luca Boccassi
On Wed, 15 Mar 2023 at 21:07, Jonathan Wiltshire wrote: > > Control: tag -1 moreinfo > > Hi, > > On Wed, Dec 07, 2022 at 08:11:11PM +, Luca Boccassi wrote: > > An improvement to reduce the number of dependencies pulled down by the > > usr-merged debootstrapped image has been available in

Processed: Re: Bug#1026945: bullseye-pu: package guix/1.2.0-4

2023-03-15 Thread Debian Bug Tracking System
Processing control commands: > tag -1 confirmed Bug #1026945 [release.debian.org] bullseye-pu: package guix/1.2.0-4 Added tag(s) confirmed. -- 1026945: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026945 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems

Bug#1026945: bullseye-pu: package guix/1.2.0-4

2023-03-15 Thread Jonathan Wiltshire
Control: tag -1 confirmed On Sat, Dec 24, 2022 at 07:33:38AM -0800, Vagrant Cascadian wrote: > This fixes a FTBFS of due several test suites using expired OpenPGP > keys. At the time the current packages in Debian were built, the keys > had not yet expired, but was later fixed upstream: Please

Processed: Re: Bug#1025708: bullseye-pu: package debootstrap/1.0.123+deb11u2

2023-03-15 Thread Debian Bug Tracking System
Processing control commands: > tag -1 moreinfo Bug #1025708 [release.debian.org] bullseye-pu: package debootstrap/1.0.123+deb11u2 Added tag(s) moreinfo. -- 1025708: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1025708 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems

Bug#1025708: bullseye-pu: package debootstrap/1.0.123+deb11u2

2023-03-15 Thread Jonathan Wiltshire
Control: tag -1 moreinfo Hi, On Wed, Dec 07, 2022 at 08:11:11PM +, Luca Boccassi wrote: > An improvement to reduce the number of dependencies pulled down by the > usr-merged debootstrapped image has been available in unstable, > bookworm and bullseye-backports for a while. I'd like to make

Processed: reopening 1032977

2023-03-15 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > # wrong bug > reopen 1032977 Bug #1032977 {Done: Jonathan Wiltshire } [release.debian.org] unblock: apache2/2.4.56-1 Bug reopened Ignoring request to alter fixed versions of bug #1032977 to the same values previously set > thanks Stopping

Processed: closing 1032976

2023-03-15 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > close 1032976 Bug #1032976 [release.debian.org] unblock: node-sqlite3/5.1.5+ds1-1 Marked Bug as done > thanks Stopping processing here. Please contact me if you need assistance. -- 1032976:

Processed: Re: Bug#1032985: unblock: gourmand/1.1.0+really1.1.0~rc3-3

2023-03-15 Thread Debian Bug Tracking System
Processing control commands: > tag -1 moreinfo Bug #1032985 [release.debian.org] unblock: gourmand/1.1.0+really1.1.0~rc3-3 Added tag(s) moreinfo. -- 1032985: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1032985 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems

Bug#1032985: unblock: gourmand/1.1.0+really1.1.0~rc3-3

2023-03-15 Thread Jonathan Wiltshire
Control: tag -1 moreinfo Hi, On Wed, Mar 15, 2023 at 09:29:54AM +0100, Christian Marillat wrote: > [ Checklist ] > [x] all changes are documented in the d/changelog > [x] I reviewed all changes and I approve them > [ ] attach debdiff against the package in testing Can we get the debdiff

NEW changes in stable-new

2023-03-15 Thread Debian FTP Masters
Processing changes file: node-sqlite3_5.0.0+ds1-1+deb11u2_amd64.changes ACCEPT Processing changes file: node-sqlite3_5.0.0+ds1-1+deb11u2_arm64-buildd.changes ACCEPT Processing changes file: node-sqlite3_5.0.0+ds1-1+deb11u2_armhf-buildd.changes ACCEPT Processing changes file:

Bug#1031410: bullseye-pu: package postgis/3.1.1+dfsg-1+deb11u1

2023-03-15 Thread Sebastiaan Couwenberg
Can we get this into the upcoming 11.7 point release? Kind Regards, Bas -- GPG Key ID: 4096R/6750F10AE88D4AF1 Fingerprint: 8182 DE41 7056 408D 6146 50D1 6750 F10A E88D 4AF1

Re: 11.7 planning

2023-03-15 Thread Cyril Brulebois
Jonathan Wiltshire (2023-03-15): > We're overdue for 11.7 and need it done with a keyring update included > before bookworm can be released. The wheels are turning on the keyring so > how do dates in April look for everybody? Saturdays are 1st (probably too > soon), 8th, 15th, 22nd and 29th. I

Re: 11.7 planning

2023-03-15 Thread Adam D. Barratt
On Wed, 2023-03-15 at 20:33 +, Jonathan Wiltshire wrote: > We're overdue for 11.7 and need it done with a keyring update > included > before bookworm can be released. The wheels are turning on the > keyring so > how do dates in April look for everybody? Saturdays are 1st (probably > too >

Processed: Re: Bug#1032847: unblock: intel-microcode/3.20230214.1

2023-03-15 Thread Debian Bug Tracking System
Processing control commands: > tag -1 -moreinfo Bug #1032847 [release.debian.org] unblock: intel-microcode/3.20230214.1 Removed tag(s) moreinfo. -- 1032847: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1032847 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems

Processed: closing 1032977

2023-03-15 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > close 1032977 Bug #1032977 [release.debian.org] unblock: apache2/2.4.56-1 Marked Bug as done > thanks Stopping processing here. Please contact me if you need assistance. -- 1032977: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1032977

Bug#1032847: unblock: intel-microcode/3.20230214.1

2023-03-15 Thread Tobias Frost
Control: tag -1 -moreinfo > > On Sun, Mar 12, 2023 at 06:56:21PM +0100, Tobias Frost wrote: > > I've uploaded intel-microcode to DELAYED/5, ETA will be Mar 17 ~18:00 CET > > Please unblock package intel-microcode once it hits unstable. > > Please remove the moreinfo tag from this bug when it's

11.7 planning

2023-03-15 Thread Jonathan Wiltshire
Hi, We're overdue for 11.7 and need it done with a keyring update included before bookworm can be released. The wheels are turning on the keyring so how do dates in April look for everybody? Saturdays are 1st (probably too soon), 8th, 15th, 22nd and 29th. Thanks, -- Jonathan Wiltshire

Processed: Re: Bug#1032994: unblock: node-webpack/5.76.1+dfsg1+~cs17.16.16-1

2023-03-15 Thread Debian Bug Tracking System
Processing control commands: > tags -1 moreinfo Bug #1032994 [release.debian.org] unblock: node-webpack/5.76.1+dfsg1+~cs17.16.16-1 Added tag(s) moreinfo. -- 1032994: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1032994 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems

Bug#1032994: unblock: node-webpack/5.76.1+dfsg1+~cs17.16.16-1

2023-03-15 Thread Paul Gevers
Control: tags -1 moreinfo Hi Yadd, On 15-03-2023 13:38, Yadd wrote: [ Reason ] node-webpack is vulnerable to cross-realm object access (#1032904, CVE-2023-28154). This doesn't look like a targeted fix, but rather seems to include much more. How about reverting and providing a fix only for

Bug#1033009: marked as done (unblock: calamares-settings-debian/12.0.5-1)

2023-03-15 Thread Debian Bug Tracking System
Your message dated Wed, 15 Mar 2023 20:55:56 +0100 with message-id <9569bc32-8190-30dd-098e-2762c790e...@debian.org> and subject line Re: Bug#1033009: unblock: calamares-settings-debian/12.0.5-1 has caused the Debian Bug report #1033009, regarding unblock: calamares-settings-debian/12.0.5-1 to be

Bug#1032999: unblock: mesa/22.3.6-1

2023-03-15 Thread Paul Gevers
Hi Timo, On 15-03-2023 19:15, Timo Aaltonen wrote: There's actually 22.3.7 out, which I was thinking of uploading to sid, Is that following the freeze policy [1]? I.e. targeted fixes? (It might be, I don't know the release policy of mesa). since it's the last release of the 22.3.x series.

Bug#1033019: unblock: mozjs102/102.9.0-1

2023-03-15 Thread Jeremy Bícha
Package: release.debian.org Control: affects -1 + src:mozjs102 X-Debbugs-Cc: mozjs...@packages.debian.org User: release.debian@packages.debian.org Usertags: unblock Please unblock package mozjs102 [ Reason ] The new mozjs102 stable point release includes a security fix, CVE-2023-25751 [

Processed: unblock: mozjs102/102.9.0-1

2023-03-15 Thread Debian Bug Tracking System
Processing control commands: > affects -1 + src:mozjs102 Bug #1033019 [release.debian.org] unblock: mozjs102/102.9.0-1 Added indication that 1033019 affects src:mozjs102 -- 1033019: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033019 Debian Bug Tracking System Contact

Processed: unblock: sudo/1.9.13p3-1

2023-03-15 Thread Debian Bug Tracking System
Processing control commands: > affects -1 + src:sudo Bug #1033018 [release.debian.org] unblock: sudo/1.9.13p3-1 Added indication that 1033018 affects src:sudo -- 1033018: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033018 Debian Bug Tracking System Contact ow...@bugs.debian.org with

Bug#1032999: unblock: mesa/22.3.6-1

2023-03-15 Thread Timo Aaltonen
Simon McVittie kirjoitti 15.3.2023 klo 16.40: Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock X-Debbugs-Cc: m...@packages.debian.org Control: affects -1 + src:mesa Control: block -1 by 1032887 Please consider unblocking package mesa.

Bug#1032999: unblock: mesa/22.3.6-1

2023-03-15 Thread Simon McVittie
On Wed, 15 Mar 2023 at 14:40:27 +, Simon McVittie wrote: > [x] attach debdiff against the package in testing Sorry, here's the debdiff, filtered to exclude .pick_status.json (which is used upstream to track which changes should/should not be backported). smcv

Bug#1033004: marked as done (unblock: libevent/2.1.12-stable-8)

2023-03-15 Thread Debian Bug Tracking System
Your message dated Wed, 15 Mar 2023 16:22:09 + with message-id and subject line Re: Bug#1033004: unblock: libevent/2.1.12-stable-8 has caused the Debian Bug report #1033004, regarding unblock: libevent/2.1.12-stable-8 to be marked as done. This means that you claim that the problem has been

Processed: unblock: calamares-settings-debian/12.0.5-1

2023-03-15 Thread Debian Bug Tracking System
Processing control commands: > affects -1 + src:calamares-settings-debian Bug #1033009 [release.debian.org] unblock: calamares-settings-debian/12.0.5-1 Added indication that 1033009 affects src:calamares-settings-debian -- 1033009: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033009

Bug#1033009: unblock: calamares-settings-debian/12.0.5-1

2023-03-15 Thread Jonathan Carter
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock X-Debbugs-Cc: calamares-settings-deb...@packages.debian.org, Please alloq calamares-settings-debian (12.0.5-1) to migrate to testing, it contains the correct artwork for bookworm Control:

Bug#1032988: marked as done (unblock: netplan.io/0.106-2)

2023-03-15 Thread Debian Bug Tracking System
Your message dated Wed, 15 Mar 2023 15:42:05 + with message-id and subject line Re: Bug#1032988: unblock: netplan.io/0.106-2 has caused the Debian Bug report #1032988, regarding unblock: netplan.io/0.106-2 to be marked as done. This means that you claim that the problem has been dealt with.

Bug#1032991: marked as done (nmu: scribus_1.5.8+dfsg-4+b3)

2023-03-15 Thread Debian Bug Tracking System
Your message dated Wed, 15 Mar 2023 15:49:24 + with message-id and subject line Re: Bug#1032991: nmu: scribus_1.5.8+dfsg-4+b3 has caused the Debian Bug report #1032991, regarding nmu: scribus_1.5.8+dfsg-4+b3 to be marked as done. This means that you claim that the problem has been dealt

Bug#1033006: unblock: openvpn/2.6.1-1 (preapproval)

2023-03-15 Thread Bernhard Schmidt
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock Please give permission to upload OpenVPN 2.6.1-1 to unstable and let it migrate to testing (currently in experimental as 2.6.1-1~exp1 [ Reason ] Upstream has released the first minor

Re: bookworm release date?

2023-03-15 Thread Jonathan Wiltshire
On Thu, Mar 09, 2023 at 09:55:50PM +, James Addison wrote: > Hi Adam, > > On Thu, 09 Mar 2023 17:05:28 +, Adam wrote: > > ftp-master have now published their bookworm keys, so we can get those > > incorporated. For the SRM side, you probably saw that we've been > > considering moving to

Bug#1033004: unblock: libevent/2.1.12-stable-8

2023-03-15 Thread Nicolas Mora
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock Please unblock package libevent [ Reason ] libevent in testing has a ftbfs bug with glibc 2.36: #1023284 [ Impact ] The package libevent 2.1.12-stable-5 recompiled with glibc 2.36 breaks

Processed: unblock: mesa/22.3.6-1

2023-03-15 Thread Debian Bug Tracking System
Processing control commands: > affects -1 + src:mesa Bug #1032999 [release.debian.org] unblock: mesa/22.3.6-1 Added indication that 1032999 affects src:mesa > block -1 by 1032887 Bug #1032999 [release.debian.org] unblock: mesa/22.3.6-1 1032999 was not blocked by any bugs. 1032999 was not blocking

Bug#1032999: unblock: mesa/22.3.6-1

2023-03-15 Thread Simon McVittie
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock X-Debbugs-Cc: m...@packages.debian.org Control: affects -1 + src:mesa Control: block -1 by 1032887 Please consider unblocking package mesa. [ Reason ] New upstream bugfix release, fixing

Processed: block 1032899 with 1032887

2023-03-15 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > block 1032899 with 1032887 Bug #1032899 [release.debian.org] unblock: rocm-hipamd/5.2.3-6 1032899 was not blocked by any bugs. 1032899 was not blocking any bugs. Added blocking bug(s) of 1032899: 1032887 > thanks Stopping processing here. Please

Bug#1032994: unblock: node-webpack/5.76.1+dfsg1+~cs17.16.16-1

2023-03-15 Thread Yadd
On 3/15/23 16:38, Yadd wrote: Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock X-Debbugs-Cc: node-webp...@packages.debian.org Control: affects -1 + src:node-webpack Please unblock package node-webpack [ Reason ] node-webpack is

Bug#1032994: unblock: node-webpack/5.76.1+dfsg1+~cs17.16.16-1

2023-03-15 Thread Yadd
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock X-Debbugs-Cc: node-webp...@packages.debian.org Control: affects -1 + src:node-webpack Please unblock package node-webpack [ Reason ] node-webpack is vulnerable to cross-realm object access

Processed: unblock: node-webpack/5.76.1+dfsg1+~cs17.16.16-1

2023-03-15 Thread Debian Bug Tracking System
Processing control commands: > affects -1 + src:node-webpack Bug #1032994 [release.debian.org] unblock: node-webpack/5.76.1+dfsg1+~cs17.16.16-1 Added indication that 1032994 affects src:node-webpack -- 1032994: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1032994 Debian Bug Tracking

Bug#1032993: release.debian.org: key packages: mksh should not be a key package

2023-03-15 Thread Thorsten Glaser
Package: release.debian.org Severity: normal X-Debbugs-Cc: t...@mirbsd.de I already mentioned this as an aside in #986431 but here’s it as a separate bugreport. mksh is only a key package because shunit2 build-depends on it. (Would be nice if the key package status is shown in tracker or so… I

Processed: nmu: scribus_1.5.8+dfsg-4+b3

2023-03-15 Thread Debian Bug Tracking System
Processing control commands: > affects -1 + src:scribus Bug #1032991 [release.debian.org] nmu: scribus_1.5.8+dfsg-4+b3 Added indication that 1032991 affects src:scribus -- 1032991: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1032991 Debian Bug Tracking System Contact ow...@bugs.debian.org

Bug#1032991: nmu: scribus_1.5.8+dfsg-4+b3

2023-03-15 Thread Mattia Rizzolo
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: binnmu X-Debbugs-Cc: scri...@packages.debian.org Control: affects -1 + src:scribus Hello release team, I'd like to ask you to binNMU scribus to pick up a newer harfbuzz feature (hurfbuzz-subset)

Bug#1032977: Bug#1032976: unblock: node-sqlite3/5.1.5+ds1-1

2023-03-15 Thread Yadd
On 3/15/23 11:40, Jonathan Wiltshire wrote: It's a bit noisy with the other stuff from the upstream release, but I can see the argument for sticking with it rather than cherry-picking. Unblocked. Thanks Jonathan! I pushed also an unblock request for Apache 2.4.56. Since we decide to follow

Bug#1032935: marked as done (unblock: fonts-dejavu/2.37-6)

2023-03-15 Thread Debian Bug Tracking System
Your message dated Wed, 15 Mar 2023 09:13:19 + with message-id and subject line Re: Bug#1032935: unblock: fonts-dejavu/2.37-6 has caused the Debian Bug report #1032935, regarding unblock: fonts-dejavu/2.37-6 to be marked as done. This means that you claim that the problem has been dealt

Bug#1032988: unblock: netplan.io/0.106-2

2023-03-15 Thread Lukas Märdian
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock X-Debbugs-Cc: sl...@ubuntu.com Please unblock package netplan.io I missed the hard freeze deadline by one day (after the 10 days soft freeze delay). netplan.io is a key package, thus we

Bug#1032526: marked as done ([pre-approval] unblock: dar/2.7.8-2)

2023-03-15 Thread Debian Bug Tracking System
Your message dated Wed, 15 Mar 2023 09:07:43 + with message-id and subject line Re: Bug#1032526: [pre-approval] unblock: dar/2.7.8-2 has caused the Debian Bug report #1032526, regarding [pre-approval] unblock: dar/2.7.8-2 to be marked as done. This means that you claim that the problem has

Bug#798780: marked as done (release.debian.org: Please let playonlinux migrate to testing with a dependency on wine32)

2023-03-15 Thread Debian Bug Tracking System
Your message dated Wed, 15 Mar 2023 08:56:06 + with message-id and subject line Re: Bug#798780: release.debian.org: Please let playonlinux migrate to testing has caused the Debian Bug report #798780, regarding release.debian.org: Please let playonlinux migrate to testing with a dependency

Processed: tagging 1032885

2023-03-15 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > tags 1032885 + moreinfo Bug #1032885 [release.debian.org] unblock: debian-security-support/1:12+2023.03.05 Added tag(s) moreinfo. > thanks Stopping processing here. Please contact me if you need assistance. -- 1032885:

Bug#1032986: unblock fdroidserver/2.2.1-1

2023-03-15 Thread Hans-Christoph Steiner
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock Please unblock package: fdroidserver It is blocked due to a autopkgtest failure only on s390x, this failure is not a regression. Since bullseye, we have fixed the issues in fdroidserver

Bug#1032985: unblock: gourmand/1.1.0+really1.1.0~rc3-3

2023-03-15 Thread Christian Marillat
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock X-Debbugs-Cc: gourm...@packages.debian.org Control: affects -1 + src:gourmand Please unblock package gourmand Unstable fix an annoying bug "unable to add an ingredient" fixed in #1030027)

Processed: unblock: gourmand/1.1.0+really1.1.0~rc3-3

2023-03-15 Thread Debian Bug Tracking System
Processing control commands: > affects -1 + src:gourmand Bug #1032985 [release.debian.org] unblock: gourmand/1.1.0+really1.1.0~rc3-3 Added indication that 1032985 affects src:gourmand -- 1032985: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1032985 Debian Bug Tracking System Contact

Processed: closing 1032872

2023-03-15 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > close 1032872 Bug #1032872 [release.debian.org] unblock: puppet-module-puppetlabs-mysql/8.1.0-7 Marked Bug as done > thanks Stopping processing here. Please contact me if you need assistance. -- 1032872:

Bug#1032872: unblock: puppet-module-puppetlabs-mysql/8.1.0-7

2023-03-15 Thread Jonathan Wiltshire
On Mon, Mar 13, 2023 at 09:47:43AM +0100, Thomas Goirand wrote: > Please unblock package puppet-module-puppetlabs-mysql It's not blocked, because it has passing tests. If it gets caught up in the hard freeze please reopen. -- Jonathan Wiltshire

Re: Upload of new upstream version before fix has migrated to testing (Was: Re: Bug#1032120: tiledb: uses atomic operations, but is not linked to libatomic)

2023-03-15 Thread Andreas Tille
[Release team in CC] Am Wed, Mar 15, 2023 at 08:45:21AM +0530 schrieb Nilesh Patra: > I am removing myself from the uploaders field/maintenance of tiledb-py. Feel > free to update it once tiledb is ready for migration. The repository > lives at python team namespace. I admit I'm strongly in

Bug#1032971: marked as done (unblock: man-db/2.11.2-2)

2023-03-15 Thread Debian Bug Tracking System
Your message dated Wed, 15 Mar 2023 07:35:12 + with message-id and subject line Re: Bug#1032971: unblock: man-db/2.11.2-2 has caused the Debian Bug report #1032971, regarding unblock: man-db/2.11.2-2 to be marked as done. This means that you claim that the problem has been dealt with. If

Bug#1032976: unblock: node-sqlite3/5.1.5+ds1-1

2023-03-15 Thread Jonathan Wiltshire
Hi, On Wed, Mar 15, 2023 at 06:33:08AM +0400, Yadd wrote: > Please unblock package node-sqlite3 > > [ Reason ] > A code execution vulnerability was discover in node-sqlite3 due to the > underlying implementation of .toString(). It is then possible to execute > arbitrary JavaScript or to achieve

Processed: Re: Bug#1032847: unblock: intel-microcode/3.20230214.1

2023-03-15 Thread Debian Bug Tracking System
Processing control commands: > tag -1 moreinfo Bug #1032847 [release.debian.org] unblock: intel-microcode/3.20230214.1 Added tag(s) moreinfo. -- 1032847: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1032847 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems

Bug#1032847: unblock: intel-microcode/3.20230214.1

2023-03-15 Thread Jonathan Wiltshire
Control: tag -1 moreinfo On Sun, Mar 12, 2023 at 06:56:21PM +0100, Tobias Frost wrote: > I've uploaded intel-microcode to DELAYED/5, ETA will be Mar 17 ~18:00 CET > Please unblock package intel-microcode once it hits unstable. Please remove the moreinfo tag from this bug when it's ready to