Bug#1034206: unblock: owslib/0.27.2-3

2023-04-17 Thread Sebastiaan Couwenberg
On 4/11/23 06:48, Bas Couwenberg wrote: Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock X-Debbugs-Cc: ows...@packages.debian.org Control: affects -1 + src:owslib Please unblock package owslib It is affected by CVE-2023-27476 reported

Bug#1034548: bullseye-pu: package glibc/2.31-13+deb11u6

2023-04-17 Thread Aurelien Jarno
Package: release.debian.org Severity: normal Tags: bullseye User: release.debian@packages.debian.org Usertags: pu X-Debbugs-Cc: gl...@packages.debian.org, debian-b...@lists.debian.org, debian-gl...@lists.debian.org Control: affects -1 + src:glibc [ Reason ] There are multiple fixes in this

Processed: bullseye-pu: package glibc/2.31-13+deb11u6

2023-04-17 Thread Debian Bug Tracking System
Processing control commands: > affects -1 + src:glibc Bug #1034548 [release.debian.org] bullseye-pu: package glibc/2.31-13+deb11u6 Added indication that 1034548 affects src:glibc -- 1034548: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034548 Debian Bug Tracking System Contact

Bug#1034515: marked as done (unblock: openvswitch/3.1.0-2 (CVE-2023-1668))

2023-04-17 Thread Debian Bug Tracking System
Your message dated Mon, 17 Apr 2023 23:19:27 +0200 with message-id and subject line Re: Bug#1034515: unblock: openvswitch/3.1.0-2 (CVE-2023-1668) has caused the Debian Bug report #1034515, regarding unblock: openvswitch/3.1.0-2 (CVE-2023-1668) to be marked as done. This means that you claim that

Processed: reopening 1034245

2023-04-17 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > reopen 1034245 Bug #1034245 {Done: Sebastian Ramacher } [release.debian.org] pre-approval: unblock: openvswitch/3.1.1 (CVE-2023-1668) Bug reopened Ignoring request to alter fixed versions of bug #1034245 to the same values previously set >

Bug#1034245: marked as done (pre-approval: unblock: openvswitch/3.1.1 (CVE-2023-1668))

2023-04-17 Thread Debian Bug Tracking System
Your message dated Mon, 17 Apr 2023 21:16:44 + with message-id and subject line unblock openvswitch has caused the Debian Bug report #1034245, regarding pre-approval: unblock: openvswitch/3.1.1 (CVE-2023-1668) to be marked as done. This means that you claim that the problem has been dealt

Bug#1034533: marked as done (unblock: connman/1.41-3)

2023-04-17 Thread Debian Bug Tracking System
Your message dated Mon, 17 Apr 2023 21:02:33 + with message-id and subject line unblock connman has caused the Debian Bug report #1034533, regarding unblock: connman/1.41-3 to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now

Bug#1034446: unblock: linux/6.1.24-1

2023-04-17 Thread Salvatore Bonaccorso
Hi Paul, On Sat, Apr 15, 2023 at 09:41:02PM +0200, Paul Gevers wrote: > Hi Salvatore, > > On 15-04-2023 17:02, Salvatore Bonaccorso wrote: > > Would you in principle agree on that, imporantly, at this stage of the > > release? The current debian/changelog is attached. > > I'm pretty sure I've

Bug#1034497: marked as done (unblock: jekyll/4.3.1+dfsg-2)

2023-04-17 Thread Debian Bug Tracking System
Your message dated Mon, 17 Apr 2023 21:39:38 +0200 with message-id and subject line Re: Bug#1034497: unblock: jekyll/4.3.1+dfsg-2 has caused the Debian Bug report #1034497, regarding unblock: jekyll/4.3.1+dfsg-2 to be marked as done. This means that you claim that the problem has been dealt

Bug#1034380: marked as done (unblock: opm-models/2022.10+ds-4)

2023-04-17 Thread Debian Bug Tracking System
Your message dated Mon, 17 Apr 2023 21:09:48 +0200 with message-id and subject line Re: Bug#1034380: unblock: opm-models/2022.10+ds-4 has caused the Debian Bug report #1034380, regarding unblock: opm-models/2022.10+ds-4 to be marked as done. This means that you claim that the problem has been

Bug#1034533: unblock: connman/1.41-3

2023-04-17 Thread Bastian Germann
Package: release.debian.org Control: affects -1 + src:connman X-Debbugs-Cc: conn...@packages.debian.org User: release.debian@packages.debian.org Usertags: unblock Severity: normal Please unblock package connman. [ Reason ] Open CVE-2023-28488 in bookworm [ Impact ] User is vulnerable for

Processed: unblock: connman/1.41-3

2023-04-17 Thread Debian Bug Tracking System
Processing control commands: > affects -1 + src:connman Bug #1034533 [release.debian.org] unblock: connman/1.41-3 Added indication that 1034533 affects src:connman -- 1034533: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034533 Debian Bug Tracking System Contact ow...@bugs.debian.org with

Bug#1034527: unblock: nageru/2.2.1-1

2023-04-17 Thread Steinar H. Gunderson
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock X-Debbugs-Cc: nag...@packages.debian.org Control: affects -1 + src:nageru Please unblock package nageru Please consider unblocking Nageru 2.2.1-1. It contains a number of focused fixes,

Processed: unblock: nageru/2.2.1-1

2023-04-17 Thread Debian Bug Tracking System
Processing control commands: > affects -1 + src:nageru Bug #1034527 [release.debian.org] unblock: nageru/2.2.1-1 Added indication that 1034527 affects src:nageru -- 1034527: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034527 Debian Bug Tracking System Contact ow...@bugs.debian.org with

Bug#1034518: unblock: openstack-pkg-tools/123

2023-04-17 Thread Thomas Goirand
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock X-Debbugs-Cc: openstack-pkg-to...@packages.debian.org Control: affects -1 + src:openstack-pkg-tools Please unblock package openstack-pkg-tools [ Reason ] Since we don't have

Processed: unblock: openstack-pkg-tools/123

2023-04-17 Thread Debian Bug Tracking System
Processing control commands: > affects -1 + src:openstack-pkg-tools Bug #1034518 [release.debian.org] unblock: openstack-pkg-tools/123 Added indication that 1034518 affects src:openstack-pkg-tools -- 1034518: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034518 Debian Bug Tracking System

Bug#1034515: unblock: openvswitch/3.1.0-2 (CVE-2023-1668)

2023-04-17 Thread Thomas Goirand
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock X-Debbugs-Cc: openvswi...@packages.debian.org Control: affects -1 + src:openvswitch Please unblock package openvswitch [ Reason ] The latest upload fixes CVE-2023-1668, that is: "Remote

Processed: unblock: openvswitch/3.1.0-2 (CVE-2023-1668)

2023-04-17 Thread Debian Bug Tracking System
Processing control commands: > affects -1 + src:openvswitch Bug #1034515 [release.debian.org] unblock: openvswitch/3.1.0-2 (CVE-2023-1668) Added indication that 1034515 affects src:openvswitch -- 1034515: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034515 Debian Bug Tracking System

Bug#1034510: bullseye-pu: package protobuf/3.12.4-1+deb11u1

2023-04-17 Thread Helmut Grohne
Package: release.debian.org Severity: normal Tags: bullseye User: release.debian@packages.debian.org Usertags: pu X-Debbugs-Cc: proto...@packages.debian.org, g...@debian.org, debian-secur...@lists.debian.org Control: affects -1 + src:protobuf [ Reason ] This update aims to fix three

Processed: bullseye-pu: package protobuf/3.12.4-1+deb11u1

2023-04-17 Thread Debian Bug Tracking System
Processing control commands: > affects -1 + src:protobuf Bug #1034510 [release.debian.org] bullseye-pu: package protobuf/3.12.4-1+deb11u1 Added indication that 1034510 affects src:protobuf -- 1034510: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034510 Debian Bug Tracking System Contact

Bug#1034508: unblock: sdop/0.90-2

2023-04-17 Thread Bastian Germann
Package: release.debian.org Control: affects -1 + src:sdop X-Debbugs-Cc: s...@packages.debian.org User: release.debian@packages.debian.org Usertags: unblock Severity: normal Please unblock package sdop. [ Reason ] The fix for RC bug #1034080 is in the unstable version. [ Impact ] The

Processed: unblock: sdop/0.90-2

2023-04-17 Thread Debian Bug Tracking System
Processing control commands: > affects -1 + src:sdop Bug #1034508 [release.debian.org] unblock: sdop/0.90-2 Added indication that 1034508 affects src:sdop -- 1034508: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034508 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems

NEW changes in stable-new

2023-04-17 Thread Debian FTP Masters
Processing changes file: guix_1.2.0-4+deb11u1_arm64-buildd.changes ACCEPT

Bug#1033570: unblock: kdenlive/22.12.3-2

2023-04-17 Thread Patrick Matthäi
Am 15.04.2023 um 21:51 schrieb Paul Gevers: Control: tags -1 confirmed Hi Patrick, Thanks. On 14-04-2023 10:45, Patrick Matthäi wrote: You may have guessed from the silence (see also our FAQ [1]) that we're not enthusiastic about mlt. I'm currently leaning towards the tpu route for

Bug#1034505: unblock (pre-approval): libsdl2/2.26.5+dfsg-1

2023-04-17 Thread Simon McVittie
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock X-Debbugs-Cc: libs...@packages.debian.org Control: affects -1 + src:libsdl2 I've prepared a libsdl2 update for upstream stable release 2.26.5 and I'd like to include it in bookworm if

Processed: unblock (pre-approval): libsdl2/2.26.5+dfsg-1

2023-04-17 Thread Debian Bug Tracking System
Processing control commands: > affects -1 + src:libsdl2 Bug #1034505 [release.debian.org] unblock (pre-approval): libsdl2/2.26.5+dfsg-1 Added indication that 1034505 affects src:libsdl2 -- 1034505: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034505 Debian Bug Tracking System Contact

Wake up - Audit time

2023-04-17 Thread Victor Pollard
Good morning, we provide a solution that significantly shortens the audit time, enables standards control and non-compliance reporting: ● Audits - to check quality or process standards (ISO, 5S, LPA) ● Scheduler - all work can be scheduled and linked to the notification system ● Checklists -

Bug#1034380: unblock: opm-models/2022.10+ds-4

2023-04-17 Thread Markus Blatt
Hi Paul, Am Sun, Apr 16, 2023 at 10:03:07PM +0200 schrieb Paul Gevers: On 13-04-2023 22:56, Markus Blatt wrote: None, because no real code is changed Can you elaborate why this is needed? I confirm I see nothing of interest. you are right, there are no real changes in here. The only