Re: [Pkg-javascript-devel] Bug#982766: Bug#982766: node-webpack: remove dependency on node-uglifyjs-webpack-plugin

2021-03-13 Thread Pirate Praveen
[Ccing debian-release] On Wed, 17 Feb 2021 14:01:40 + Julian Gilbey wrote: > On Sun, Feb 14, 2021 at 02:26:30PM +0100, Jonas Smedegaard wrote: > > I still recommend to request release team to ignore for this release > > instead of lowering sverity, but don't care anough about this

Bug#985192: unblock: libonig/6.9.6-1.1

2021-03-13 Thread Hideki Yamane
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock Please unblock package libonig [ Reason ] Current testing version 6.9.6-1 is not compatible with previous version 6.9.5-2. [ Impact ] If current testing version 6.9.6-1 would be shipped,

Bug#985191: unblock: debian-pan/0.3

2021-03-13 Thread Picca Frédéric-Emmanuel
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock X-Debbugs-Cc: pi...@debian.org Please unblock package debian-pan it is a Debian blends, the objectif od this blends is to package softwares for synchrotron and neutron facilities.

Bug#985172: unblock: ifetch-tools/0.18.2-2

2021-03-13 Thread Richard Nelson
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock X-Debbugs-Cc: unix...@gmail.com Please unblock package ifetch-tools The package uploaded to unstable closes RC bug: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=985051 Due to hard

NEW changes in stable-new

2021-03-13 Thread Debian FTP Masters
Processing changes file: fwupd_1.2.13-3+deb10u1_source.changes ACCEPT Processing changes file: pygments_2.3.1+dfsg-1+deb10u1_source.changes ACCEPT Processing changes file: pygments_2.3.1+dfsg-1+deb10u1_all.changes ACCEPT Processing changes file: tiff_4.1.0+git191117-2~deb10u2_amd64.changes

Bug#983485: buster-pu: package m2crypto/0.31.0-4+deb10u2

2021-03-13 Thread Sebastian Andrzej Siewior
On 2021-03-13 17:31:50 [+], Adam D. Barratt wrote: > Please go ahead. Thanks, uploaded. > Regards, > > Adam Sebastian

Bug#984790: buster-pu: package libreoffice/1:6.1.5-3+deb10u7

2021-03-13 Thread Rene Engelhard
Hi, Am 13.03.21 um 19:57 schrieb Adam D. Barratt: > Control: tags -1 + confirmed > > On Mon, 2021-03-08 at 13:26 +0100, Rene Engelhard wrote: >> +libreoffice (1:6.1.5-3+deb10u7) buster; urgency=medium >> + >> + * debian/patches/fix-PYTHONPATH.diff: backport upstream fix to >> +not leave a

Bug#984790: buster-pu: package libreoffice/1:6.1.5-3+deb10u7

2021-03-13 Thread Adam D. Barratt
Control: tags -1 + confirmed On Mon, 2021-03-08 at 13:26 +0100, Rene Engelhard wrote: > +libreoffice (1:6.1.5-3+deb10u7) buster; urgency=medium > + > + * debian/patches/fix-PYTHONPATH.diff: backport upstream fix to > +not leave a bare trailing : in PYTHONPATH as it causes > unconditional > +

Processed: Re: Bug#984790: buster-pu: package libreoffice/1:6.1.5-3+deb10u7

2021-03-13 Thread Debian Bug Tracking System
Processing control commands: > tags -1 + confirmed Bug #984790 [release.debian.org] buster-pu: package libreoffice/1:6.1.5-3+deb10u7 Added tag(s) confirmed. -- 984790: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=984790 Debian Bug Tracking System Contact ow...@bugs.debian.org with

Bug#983531: buster-pu: package python2.7/2.7.16-2+deb10u2

2021-03-13 Thread Adam D. Barratt
On Fri, 2021-02-26 at 16:30 +0100, Moritz Muehlenhoff wrote: > On Fri, Feb 26, 2021 at 07:49:38AM +0100, Matthias Klose wrote: > > On 2/25/21 7:41 PM, Moritz Muehlenhoff wrote: > > > + * CVE-2021-3177 > > > > are all the ctypes tests passing with this patch? See #983516. > > I'll have a look at

Bug#984604: buster-pu: package sabnzbdplus/2.3.6+dfsg-1

2021-03-13 Thread Adam D. Barratt
Control: tags -1 + confirmed On Fri, 2021-03-05 at 20:00 +0100, Jeroen Ploemen wrote: > The sabnzbdplus package in buster is affected by a security issue > (CVE-2020-13124), permitting code execution from the program's web > interface through crafted settings. By default, the web interface is >

Processed: Re: Bug#984604: buster-pu: package sabnzbdplus/2.3.6+dfsg-1

2021-03-13 Thread Debian Bug Tracking System
Processing control commands: > tags -1 + confirmed Bug #984604 [release.debian.org] buster-pu: package sabnzbdplus/2.3.6+dfsg-1 Added tag(s) confirmed. -- 984604: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=984604 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems

Bug#983051: buster-pu: package xterm/344-1+deb10u1

2021-03-13 Thread Sven Joachim
On 2021-03-13 17:27 +, Adam D. Barratt wrote: > Control: tags -1 + confirmed > > On Sun, 2021-03-07 at 18:21 +0100, Sven Joachim wrote: >> On 2021-02-18 17:54 +0100, Sven Joachim wrote: > [...] >> > I would like to fix bug #982439/CVE-2021-27135[1] in Buster, a >> > potential >> > DoS against

Processed: Re: Bug#983485: buster-pu: package m2crypto/0.31.0-4+deb10u2

2021-03-13 Thread Debian Bug Tracking System
Processing control commands: > tags -1 + confirmed Bug #983485 [release.debian.org] buster-pu: package m2crypto/0.31.0-4+deb10u2 Added tag(s) confirmed. -- 983485: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=983485 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems

Bug#983485: buster-pu: package m2crypto/0.31.0-4+deb10u2

2021-03-13 Thread Adam D. Barratt
Control: tags -1 + confirmed On Wed, 2021-02-24 at 23:23 +0100, Sebastian Andrzej Siewior wrote: > This is the proposed update for Buster to fix a build failure against > openssl 1.1.1j which is proposed for Buster. > The changes touch only the test suite: > - A fix in openssl for the SSLv23

Processed: Re: Bug#983134: buster-pu: package python3.7/3.7.3-2+deb10u3

2021-03-13 Thread Debian Bug Tracking System
Processing control commands: > tags -1 + confirmed Bug #983134 [release.debian.org] buster-pu: package python3.7/3.7.3-2+deb10u3 Added tag(s) confirmed. -- 983134: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=983134 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems

Bug#983134: buster-pu: package python3.7/3.7.3-2+deb10u3

2021-03-13 Thread Adam D. Barratt
Control: tags -1 + confirmed On Fri, 2021-02-19 at 22:32 +0100, Moritz Muehlenhoff wrote: > +python3.7 (3.7.3-2+deb10u3) buster; urgency=medium > + > + * CVE-2020-26116 > + * CVE-2021-3177 > Please go ahead. Regards, Adam

NEW changes in stable-new

2021-03-13 Thread Debian FTP Masters
Processing changes file: docker.io_18.09.1+dfsg1-7.1+deb10u3_source.changes ACCEPT Processing changes file: docker.io_18.09.1+dfsg1-7.1+deb10u3_all.changes ACCEPT Processing changes file: docker.io_18.09.1+dfsg1-7.1+deb10u3_amd64-buildd.changes REJECT Processing changes file:

Processed: Re: Bug#983051: buster-pu: package xterm/344-1+deb10u1

2021-03-13 Thread Debian Bug Tracking System
Processing control commands: > tags -1 + confirmed Bug #983051 [release.debian.org] buster-pu: package xterm/344-1+deb10u1 Added tag(s) confirmed. -- 983051: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=983051 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems

Bug#983051: buster-pu: package xterm/344-1+deb10u1

2021-03-13 Thread Adam D. Barratt
Control: tags -1 + confirmed On Sun, 2021-03-07 at 18:21 +0100, Sven Joachim wrote: > On 2021-02-18 17:54 +0100, Sven Joachim wrote: [...] > > I would like to fix bug #982439/CVE-2021-27135[1] in Buster, a > > potential > > DoS against xterm when the user selects specially crafted > > text. The

Processed: Re: Bug#982571: buster-pu: package gdnsd/2.4.3-1

2021-03-13 Thread Debian Bug Tracking System
Processing control commands: > tags -1 + confirmed Bug #982571 [release.debian.org] buster-pu: package gdnsd/2.4.3-1 Added tag(s) confirmed. -- 982571: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=982571 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems

Bug#982571: buster-pu: package gdnsd/2.4.3-1

2021-03-13 Thread Adam D. Barratt
Control: tags -1 + confirmed On Fri, 2021-02-12 at 02:15 +0200, Faidon Liambotis wrote: > This is a buster proposed update to fix CVE-2019-13952 aka #932407. > This > is an old and really minor vulnerability, which I honestly had > forgotten > about. It's easy and thus still good to fix. >

Processed: Re: Bug#981453: buster-pu: package fetchmail/6.4.0~beta4-3+deb10u1

2021-03-13 Thread Debian Bug Tracking System
Processing control commands: > tags -1 + confirmed Bug #981453 [release.debian.org] buster-pu: package fetchmail/6.4.0~beta4-3+deb10u1 Added tag(s) confirmed. -- 981453: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=981453 Debian Bug Tracking System Contact ow...@bugs.debian.org with

Bug#981453: buster-pu: package fetchmail/6.4.0~beta4-3+deb10u1

2021-03-13 Thread Adam D. Barratt
Control: tags -1 + confirmed On Sun, 2021-01-31 at 15:04 +0100, László Böszörményi wrote: > There are two SSL related bugs in fetchmail that affect Buster. The > first cause is that otherwise working SSL connections fail sometimes > [1]. The fix is in 6.4.0~rc1 and in Bullseye since Aug, 2019. >

Processed: Re: Bug#981664: buster-pu: package privoxy/3.0.28-2

2021-03-13 Thread Debian Bug Tracking System
Processing control commands: > tags -1 + confirmed Bug #981664 [release.debian.org] buster-pu: package privoxy/3.0.28-2 Added tag(s) confirmed. -- 981664: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=981664 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems

Bug#981664: buster-pu: package privoxy/3.0.28-2

2021-03-13 Thread Adam D. Barratt
Control: tags -1 + confirmed On Mon, 2021-03-08 at 14:08 +0100, Roland Rosenfeld wrote: > Hi release team! > > In the meantime privoxy 3.0.32 was released, which contains five more > CVEs, I applied four of them to 3.0.28-2+deb10u1.patch-v4 now, while > CVE-2021-20274 applies to code, that was

Processed: Re: Bug#982996: buster-pu: package awstats/7.6+dfsg-2

2021-03-13 Thread Debian Bug Tracking System
Processing control commands: > tags -1 + confirmed Bug #982996 [release.debian.org] buster-pu: package awstats/7.6+dfsg-2 Added tag(s) confirmed. -- 982996: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=982996 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems

Bug#982996: buster-pu: package awstats/7.6+dfsg-2

2021-03-13 Thread Adam D. Barratt
Control: tags -1 + confirmed On Wed, 2021-02-17 at 23:33 +0100, Håvard Flaget Aasen wrote: > These are the same changes which was implemented in stretch, two > upstream patches. Both of these patches resolves a path traversal > flaw, which was first discovered with CVE-2017-1000501. > Please

Processed: Re: Bug#982311: buster-pu: package groff/1.22.4-3+deb10u1

2021-03-13 Thread Debian Bug Tracking System
Processing control commands: > tags -1 + confirmed Bug #982311 [release.debian.org] buster-pu: package groff/1.22.4-3+deb10u1 Added tag(s) confirmed. -- 982311: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=982311 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems

Bug#982311: buster-pu: package groff/1.22.4-3+deb10u1

2021-03-13 Thread Adam D. Barratt
Control: tags -1 + confirmed On Mon, 2021-02-08 at 16:08 +, Colin Watson wrote: > https://bugs.debian.org/982302 reports that groff/buster is built > with > references to ghostscript 9.26, despite 9.27 having been uploaded to > buster in August 2020. I think the path of least resistance/risk

Bug#984595: marked as done (buster-pu: package samba/2:4.9.5+dfsg-5)

2021-03-13 Thread Debian Bug Tracking System
Your message dated Sat, 13 Mar 2021 17:12:31 + with message-id <70e3af961623ecd9008e4dd08f6b51d49dee6c1c.ca...@adam-barratt.org.uk> and subject line Re: Bug#984595: buster-pu: package samba/2:4.9.5+dfsg-5 has caused the Debian Bug report #984595, regarding buster-pu: package

Bug#985146: unblock: gsequencer/3.7.44-3

2021-03-13 Thread Joël Krähemann
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock Please unblock package gsequencer [ Reason ] I would love to patch the user's manual chapter 2. The information there are incomplete and were not updated as extending the UI of gsequencer.

Bug#985145: unblock: nagios-check-xmppng/0.3.2-3

2021-03-13 Thread Jan Dittberner
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock Please unblock package nagios-check-xmppng I am upstream of the packaged plugin and received a bug report [1] just a few days before the end of the soft freeze. The bugfix is quite minimal

Bug#985139: unblock: manpages-l10n/4.9.3-1

2021-03-13 Thread Helge Kreutzmann
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock X-Debbugs-Cc: "Dr. Tobias Quathamer" , Javier Fernández-Sanguino Peña Please unblock package manpages-l10n (Please provide enough (but not too much) information to help the release team

Re: firmware-nonfree 20210208-1 upload

2021-03-13 Thread maximilian attems
> Tomorrow once firmware-nonfree has migrated 20210208-4 will be uploaded > with important small fixes to Raspberry Pi 4B and BananaPi M2 ultra and > BananaPi M3 supports. 20210208-4 upload happening now. -- maks signature.asc Description: PGP signature

Bug#929214: release.debian.org - Add package constraint for cloud images

2021-03-13 Thread Bastian Blank
Hi Ivo On Sat, Mar 13, 2021 at 03:30:39PM +0100, Ivo De Decker wrote: > > The binary package is in testing since some time. Please add it to the > > key packages list. > Added. Thanks. Regards, Bastian -- Our way is peace. -- Septimus, the Son Worshiper, "Bread and Circuses",

Bug#985136: marked as done (unblock: gnome-passwordsafe/5.0-2)

2021-03-13 Thread Debian Bug Tracking System
Your message dated Sat, 13 Mar 2021 14:31:59 + with message-id and subject line unblock gnome-passwordsafe has caused the Debian Bug report #985136, regarding unblock: gnome-passwordsafe/5.0-2 to be marked as done. This means that you claim that the problem has been dealt with. If this is

Bug#929214: marked as done (Add key package for cloud images)

2021-03-13 Thread Debian Bug Tracking System
Your message dated Sat, 13 Mar 2021 15:30:39 +0100 with message-id <20210313143037.ga27...@debian.org> and subject line Re: Bug#929214: release.debian.org - Add package constraint for cloud images has caused the Debian Bug report #929214, regarding Add key package for cloud images to be marked as

Bug#985136: unblock: gnome-passwordsafe/5.0-2

2021-03-13 Thread Henry-Nicolas Tourneur
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock Please unblock package gnome-passwordsafe [ Reason ] Fix a bug that prevents the icon of the application from being displayed when the software is running in a Wayland session. [ Impact ]

Re: Please also unblock the other cpl-plugin-* packages

2021-03-13 Thread Ivo De Decker
Hi Ole, On 3/13/21 11:11 AM, Ole Streicher wrote: I just found that you unblocked the packages cpl-plugin-hawki and cpl-plugin amber, due to their fixing of grave/serious bugs (#984058 and #984546). There are however also other packages that had in fact the same bug #984508; the bug author

Bug#985062: marked as done (unblock: lxc-templates/3.0.4-5)

2021-03-13 Thread Debian Bug Tracking System
Your message dated Sat, 13 Mar 2021 13:37:16 + with message-id and subject line unblock lxc-templates has caused the Debian Bug report #985062, regarding unblock: lxc-templates/3.0.4-5 to be marked as done. This means that you claim that the problem has been dealt with. If this is not the

Bug#984468: marked as done (Unblock selected KDE Apps 20.12.3)

2021-03-13 Thread Debian Bug Tracking System
Your message dated Sat, 13 Mar 2021 14:28:22 +0100 with message-id <20210313132820.ga26...@debian.org> and subject line Re: Bug#984468: Pre-approval for uploading KDE Apps 20.12.3 has caused the Debian Bug report #984468, regarding Unblock selected KDE Apps 20.12.3 to be marked as done. This

Bug#984645: marked as done (unblock: refpolicy/2:2.20210203-4)

2021-03-13 Thread Debian Bug Tracking System
Your message dated Sat, 13 Mar 2021 13:18:17 + with message-id and subject line unblock refpolicy has caused the Debian Bug report #984645, regarding unblock: refpolicy/2:2.20210203-4 to be marked as done. This means that you claim that the problem has been dealt with. If this is not the

Bug#984642: marked as done (unblock: policycoreutils/3.1-3)

2021-03-13 Thread Debian Bug Tracking System
Your message dated Sat, 13 Mar 2021 13:16:41 + with message-id and subject line unblock policycoreutils has caused the Debian Bug report #984642, regarding unblock: policycoreutils/3.1-3 to be marked as done. This means that you claim that the problem has been dealt with. If this is not the

Bug#985132: marked as done (unblock: tipa/tipa_1.3-21)

2021-03-13 Thread Debian Bug Tracking System
Your message dated Sat, 13 Mar 2021 14:10:15 +0100 with message-id <20210313131014.ga26...@debian.org> and subject line Re: unblock: tipa/tipa_1.3-21 has caused the Debian Bug report #985132, regarding unblock: tipa/tipa_1.3-21 to be marked as done. This means that you claim that the problem has

Bug#985128: marked as done (unblock: texlive-bin/2020.20200327.54578-7)

2021-03-13 Thread Debian Bug Tracking System
Your message dated Sat, 13 Mar 2021 12:58:46 + with message-id and subject line unblock texlive-bin has caused the Debian Bug report #985128, regarding unblock: texlive-bin/2020.20200327.54578-7 to be marked as done. This means that you claim that the problem has been dealt with. If this is

Bug#985132: unblock: tipa/tipa_1.3-21

2021-03-13 Thread Hilmar Preusse
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock Please unblock package tipa [ Reason ] In the last upload I fixed the most issues regarding the Debian packaging itself. [ Impact ] Not releasing the package results in a heavily outdated

Please also unblock the other cpl-plugin-* packages

2021-03-13 Thread Ole Streicher
Dear Ivo, I just found that you unblocked the packages cpl-plugin-hawki and cpl-plugin amber, due to their fixing of grave/serious bugs (#984058 and #984546). There are however also other packages that had in fact the same bug #984508; the bug author mentioned it there but didn't really open

Bug#985128: unblock: texlive-bin/2020.20200327.54578-7

2021-03-13 Thread Norbert Preining
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock X-Debbugs-Cc: debian-tex-ma...@lists.debian.org Please unblock package texlive-bin [ Reason ] Several fixes for shell escape exploits recently reported on the private TeX Live security