On 2021-01-16 19:14:53 [+0100], Kurt Roeckx wrote:
> So I went over the open issues and pull requests, and currently
> don't see a reason not to upload it to unstable with those 2
> patches. I don't know about any other regressions in 1.1.1.
The openssl package migrated to testing.
I would
Package: release.debian.org
User: release.debian@packages.debian.org
Usertags: pu
Tags: buster
Severity: normal
Hi Adam, all,
[ Reason ]
A CVE was discovered in cacti and fixed upstream. I backported the patch
to the buster package. Related, other security issues were discovered
and fixed.
Your message dated Thu, 21 Jan 2021 21:03:46 +0200
with message-id
and subject line Re: Bug#980749: nmu: slepc_3.14.1+dfsg1-1
has caused the Debian Bug report #980749,
regarding nmu: slepc_3.14.1+dfsg1-1
to be marked as done.
This means that you claim that the problem has been dealt with.
If
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: binnmu
Judging by the dolfin debci failures, slepc needs to be rebuilt.
Either that, or dolfin itself needs a rebuild.
Dolfin tests report:
File
Hi,
On 21-01-2021 02:23, Paul Wise wrote:
>> Passing packages that are still shown are those where an update
>> happened since the successful run, so they are more or less
>> "pending". I realize that probably nobody realizes this.
>
> It is very non-obvious from the output, I'd suggest putting
5 matches
Mail list logo