Re: Bug#1033492: unblock: php8.2/8.2.4-1 ????

2023-03-26 Thread Ondřej Surý
Paul, just a quick reply - PHP already has a security (and if I remember correctly release) team exception from the last time. So, we already had this talk about upstream policies. I’m happy to fill the template though when it’s not Sunday. Ondrej -- Ondřej Surý (He/Him) > On 26. 3. 2023,

Processed: unblock: php8.2/8.2.4-1 ????

2023-03-26 Thread Debian Bug Tracking System
Processing control commands: > affects -1 src:php8.2 Bug #1033492 [release.debian.org] unblock: php8.2/8.2.4-1 Added indication that 1033492 affects src:php8.2 -- 1033492: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033492 Debian Bug Tracking System Contact ow...@bugs.debian.org

unblock: php8.2/8.2.4-1 ????

2023-03-26 Thread Paul Gevers
Package: release.debian.org Tags: moreinfo User: release.debian@packages.debian.org Usertags: unblock X-Debbugs-Cc: ond...@sury.org Control: affects -1 src:php8.2 Dear Ondřej, I just noticed that security bug 1031368 is fixed in unstable was fixed in php8.2 version 8.2.3-1. That didn't

Re: Situation for redis for bookworm?

2023-03-26 Thread Paul Gevers
Hi Salvatore, On 26-03-2023 13:57, Salvatore Bonaccorso wrote: redis is on the radar for that, recent uploads for unstable did fix some (arguably no-dsa) CVEs. Redis is though not able to migrate to testing. Can you have a look and if the testing regressions are fase positives or to be ignore

Bug#1033503: dgit autopkgtests broken by git 2.40

2023-03-26 Thread Ian Jackson
Package: dgit Version: 10.7 Control: affects -1 git Some of dgit's tests create strange git objects, to test error handling. For example, to avoid a repetition of #849041. git 2.40, just uploaded to unstable, has this change: | * "git hash-object" now checks that the resulting object is well

Situation for redis for bookworm?

2023-03-26 Thread Salvatore Bonaccorso
Hi Chris, I'm trying to clarify some packages which have security-fixes which did not yet land in bookworm. redis is on the radar for that, recent uploads for unstable did fix some (arguably no-dsa) CVEs. Redis is though not able to migrate to testing. Can you have a look and if the testing

Bug#1033492: unblock: php8.2/8.2.4-1 ????

2023-03-26 Thread Paul Gevers
Hi Ondřej, On 26-03-2023 08:36, Ondřej Surý wrote: just a quick reply - PHP already has a security (and if I remember correctly release) team exception from the last time. So, we already had this talk about upstream policies. I *suspect* the same, but because of the shear amount of work

Processed: bullseye-pu: package libreoffice/1:7.0.4-4+deb11u6

2023-03-26 Thread Debian Bug Tracking System
Processing control commands: > affects -1 + src:libreoffice Bug #1033506 [release.debian.org] bullseye-pu: package libreoffice/1:7.0.4-4+deb11u6 Added indication that 1033506 affects src:libreoffice -- 1033506: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033506 Debian Bug Tracking

Bug#1033506: bullseye-pu: package libreoffice/1:7.0.4-4+deb11u6

2023-03-26 Thread Rene Engelhard
Package: release.debian.org Severity: normal Tags: bullseye User: release.debian@packages.debian.org Usertags: pu X-Debbugs-Cc: libreoff...@packages.debian.org Control: affects -1 + src:libreoffice Hi, This fixes "CVE-2022-38745. Empty entry in Java class path risks arbitrary code execution"

Bug#1033518: unblock: rails/2:6.1.7.3+dfsg-1

2023-03-26 Thread Lucas Nussbaum
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock Please unblock package rails. That version fixes a number of CVEs and #1030050. >From the changelog: + This is a security-only release from a rails stable branch. Upstream changelogs:

Bug#1033189: marked as done (unblock: girara/0.4.0-1)

2023-03-26 Thread Debian Bug Tracking System
Your message dated Sun, 26 Mar 2023 20:11:04 +0200 with message-id and subject line Re: Bug#1033189: unblock: girara/0.4.0-1 has caused the Debian Bug report #1033189, regarding unblock: girara/0.4.0-1 to be marked as done. This means that you claim that the problem has been dealt with. If this

Processed: Re: Bug#1033464: unblock: fish/3.6.0-3

2023-03-26 Thread Debian Bug Tracking System
Processing control commands: > tags -1 - moreinfo Bug #1033464 [release.debian.org] unblock: fish/3.6.0-3 Removed tag(s) moreinfo. -- 1033464: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033464 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems

Bug#1033464: unblock: fish/3.6.0-3

2023-03-26 Thread M. Zhou
Control: tags -1 - moreinfo On Sun, 2023-03-26 at 07:28 +0200, Paul Gevers wrote: > Control: tags -1 confirmed moreinfo > > Hi Mo, > > On 25-03-2023 15:39, M. Zhou wrote: > > Please unblock package fish > > Not yet uploaded. This package does not have a proper > > autopkgtest, manual unblock

Bug#1033439: pre-unblock: monitoring-plugins/2.3.3-5

2023-03-26 Thread Sebastian Ramacher
Hi Jan On 2023-03-25 16:58:12 +0100, Jan Wagner wrote: > Hi Sebastian, > > Am 25.03.23 um 10:31 schrieb Sebastian Ramacher: > > What's the rationale to include these patches? Do they fix bugs reported > > in the BTS or upstream? > > upstream I was hoping to get some more details on the bugs

Bug#1033464: unblock: fish/3.6.0-3

2023-03-26 Thread Luna Jernberg
Not to whine but is the plan to build 3.6.1 that was released yesterday aswell? On 3/26/23, M. Zhou wrote: > Control: tags -1 - moreinfo > > On Sun, 2023-03-26 at 07:28 +0200, Paul Gevers wrote: >> Control: tags -1 confirmed moreinfo >> >> Hi Mo, >> >> On 25-03-2023 15:39, M. Zhou wrote: >> >

Re: 11.7 planning + bookworm planning

2023-03-26 Thread Steve McIntyre
Hey Paul, Nobody else seems to have replied yet, so... :-) On Thu, Mar 23, 2023 at 01:31:22PM +0100, Paul Gevers wrote: >Hi, > >With the point release scheduled for April 29th, it's probably good to have >at least one weekend in between, or do people not mind doing two weekends in >a row?

Processed: unblock: ghostscript/10.0.0~dfsg-10

2023-03-26 Thread Debian Bug Tracking System
Processing control commands: > tags -1 + moreinfo Bug #1033219 [release.debian.org] unblock: ghostscript/10.0.0~dfsg-10 Added tag(s) moreinfo. -- 1033219: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033219 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems

Bug#1033219: unblock: ghostscript/10.0.0~dfsg-10

2023-03-26 Thread Graham Inggs
Control: tags -1 + moreinfo Hi Håvard I don't see ghostscript/10.0.0~dfsg-10 in unstable, so I assume this is a pre-approval request. Please explain why we need this fix in bookworm, and why it can't wait for trixie. Regards Graham

Bug#1033344: marked as done (unblock: src:texlive-extra/2022.20230122-3)

2023-03-26 Thread Debian Bug Tracking System
Your message dated Sun, 26 Mar 2023 20:52:03 +0200 with message-id and subject line Re: Bug#1033344: unblock: src:texlive-extra/2022.20230122-3 has caused the Debian Bug report #1033344, regarding unblock: src:texlive-extra/2022.20230122-3 to be marked as done. This means that you claim that

Bug#1033375: marked as done (unblock: amule/1:2.3.3-3)

2023-03-26 Thread Debian Bug Tracking System
Your message dated Sun, 26 Mar 2023 21:15:26 +0200 with message-id and subject line Re: Bug#1033375: unblock: amule/1:2.3.3-3 has caused the Debian Bug report #1033375, regarding unblock: amule/1:2.3.3-3 to be marked as done. This means that you claim that the problem has been dealt with. If

Bug#1033536: unblock: inn2/2.7.1~20230306-1

2023-03-26 Thread Marco d'Itri
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock X-Debbugs-Cc: i...@packages.debian.org Control: affects -1 + src:inn2 Please unblock package inn2 I have here a newer snapshot of the inn2 stable 2.7 branch, with various cleanups and

Processed: unblock: inn2/2.7.1~20230306-1

2023-03-26 Thread Debian Bug Tracking System
Processing control commands: > affects -1 + src:inn2 Bug #1033536 [release.debian.org] unblock: inn2/2.7.1~20230306-1 Added indication that 1033536 affects src:inn2 -- 1033536: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033536 Debian Bug Tracking System Contact ow...@bugs.debian.org

Bug#1033529: unblock: libmicrohttpd/0.9.75-6

2023-03-26 Thread Salvatore Bonaccorso
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock X-Debbugs-Cc: libmicroht...@packages.debian.org, Daniel Baumann , car...@debian.org Control: affects -1 + src:libmicrohttpd Dear release team, Please unblock package libmicrohttpd The

Processed: unblock: libmicrohttpd/0.9.75-6

2023-03-26 Thread Debian Bug Tracking System
Processing control commands: > affects -1 + src:libmicrohttpd Bug #1033529 [release.debian.org] unblock: libmicrohttpd/0.9.75-6 Added indication that 1033529 affects src:libmicrohttpd -- 1033529: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033529 Debian Bug Tracking System Contact

Bug#1033006: unblock: openvpn/2.6.1-1 (preapproval)

2023-03-26 Thread Bernhard Schmidt
On 25/03/23 10:17 PM, Sebastian Ramacher wrote: > > - upload 2.6.1 from experimental to unstable, then stage 2.6.2 and the > > new DCO in experimental for the second review round > > > > I would prefer the last option. > > Let's go ahead with the last option. Please let us know once openvpn >

Bug#1033464: marked as done (unblock: fish/3.6.0-3)

2023-03-26 Thread Debian Bug Tracking System
Your message dated Sun, 26 Mar 2023 21:28:40 +0200 with message-id and subject line Re: Bug#1033464: unblock: fish/3.6.0-3 has caused the Debian Bug report #1033464, regarding unblock: fish/3.6.0-3 to be marked as done. This means that you claim that the problem has been dealt with. If this is

Bug#1033464: unblock: fish/3.6.0-3

2023-03-26 Thread M. Zhou
On Sun, 2023-03-26 at 20:31 +0200, Luna Jernberg wrote: > Not to whine but is the plan to build 3.6.1 that was released yesterday > aswell? It's the hard freeze stage for Debian. Introducing a massive change, such as the full 3.6.1 upgrade will not likely successfully make it in testing

Bug#1033219: unblock: ghostscript/10.0.0~dfsg-10

2023-03-26 Thread Håvard F . Aasen
Control: tags -1 - moreinfo On 26.03.2023 20:45, Graham Inggs wrote: > Control: tags -1 + moreinfo > > Hi Håvard > > I don't see ghostscript/10.0.0~dfsg-10 in unstable, so I assume this > is a pre-approval request. pre-apporval, yes. > > Please explain why we need this fix in bookworm, and

Processed: Re: unblock: ghostscript/10.0.0~dfsg-10

2023-03-26 Thread Debian Bug Tracking System
Processing control commands: > tags -1 - moreinfo Bug #1033219 [release.debian.org] unblock: ghostscript/10.0.0~dfsg-10 Removed tag(s) moreinfo. -- 1033219: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033219 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems

Bug#1033470: marked as done (unblock: libopenmpt/0.6.9-1)

2023-03-26 Thread Debian Bug Tracking System
Your message dated Sun, 26 Mar 2023 22:32:40 +0200 with message-id and subject line Re: Bug#1033470: unblock: libopenmpt/0.6.9-1 has caused the Debian Bug report #1033470, regarding unblock: libopenmpt/0.6.9-1 to be marked as done. This means that you claim that the problem has been dealt with.

Bug#1033401: marked as done (unblock: src:dino-im/0.4.2-1)

2023-03-26 Thread Debian Bug Tracking System
Your message dated Sun, 26 Mar 2023 21:20:38 +0200 with message-id and subject line Re: Bug#1033401: unblock: src:dino-im/0.4.2-1 has caused the Debian Bug report #1033401, regarding unblock: src:dino-im/0.4.2-1 to be marked as done. This means that you claim that the problem has been dealt

Processed: unblock: cairosvg/2.5.2-1.1

2023-03-26 Thread Debian Bug Tracking System
Processing control commands: > affects -1 + src:cairosvg Bug #1033527 [release.debian.org] unblock: cairosvg/2.5.2-1.1 Added indication that 1033527 affects src:cairosvg -- 1033527: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033527 Debian Bug Tracking System Contact

Bug#1033527: unblock: cairosvg/2.5.2-1.1

2023-03-26 Thread Salvatore Bonaccorso
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock X-Debbugs-Cc: cairo...@packages.debian.org, car...@debian.org Control: affects -1 + src:cairosvg Dear release team, Please unblock package cairosvg It addresses CVE-2023-27586, #1033295

Bug#1033464: unblock: fish/3.6.0-3

2023-03-26 Thread Luna Jernberg
Alright thanks for the info :) On 3/26/23, M. Zhou wrote: > On Sun, 2023-03-26 at 20:31 +0200, Luna Jernberg wrote: >> Not to whine but is the plan to build 3.6.1 that was released yesterday >> aswell? > > It's the hard freeze stage for Debian. Introducing a massive change, such > as the full

Bug#1033490: marked as done (unblock: py7zr/0.11.3+dfsg-5)

2023-03-26 Thread Debian Bug Tracking System
Your message dated Sun, 26 Mar 2023 22:41:50 +0200 with message-id and subject line Re: Bug#1033490: unblock: py7zr/0.11.3+dfsg-5 has caused the Debian Bug report #1033490, regarding unblock: py7zr/0.11.3+dfsg-5 to be marked as done. This means that you claim that the problem has been dealt