Package: release.debian.org
Severity: normal
Tags: buster
User: release.debian@packages.debian.org
Usertags: pu
To fix the PBF support in the osmpbf rdeps it needs to be rebuilt with
protobuf 3.6.1 as reported in #935990.
There are no actual changes to the source package for this, just
On 29/08/2019 11:17, Philipp Kern wrote:
> On 2019-08-29 11:14, Emilio Pozuelo Monfort wrote:
>> Why don't you let the interested teams run the scripts and generate the
>> required
>> binNMUs (like they do now), and then you pull that from a cronjob in wuiet
>> and
>> schedule the binNMUs? You
package release.debian.org
tags 935588 = buster pending
thanks
Hi,
The upload referenced by this bug report has been flagged for acceptance into
the proposed-updates queue for Debian buster.
Thanks for your contribution!
Upload details
==
Package: lttv
Version: 1.5-3+b1
Processing commands for cont...@bugs.debian.org:
> package release.debian.org
Limiting to bugs with field 'package' containing at least one of
'release.debian.org'
Limit currently set to 'package':'release.debian.org'
> tags 935588 = buster pending
Bug #935588 [release.debian.org] nmu: rdepends
On Thu, Aug 29, 2019 at 11:14AM, Emilio Pozuelo Monfort wrote:
> On 27/08/2019 21:50, Philipp Kern wrote:
> > Do you have an opinion if this should actually be automated? I.e.
> > automatically be fed into wb on a regular basis? I think the Release
> > Team would also be the first team who would
Processing changes file: linux-signed-amd64_4.19.67+2_source.changes
ACCEPT
Processing changes file: linux-signed-arm64_4.19.67+2_source.changes
ACCEPT
Processing changes file: lttv_1.5-3+b1_amd64.changes
ACCEPT
Processing changes file: lttv_1.5-3+b1_arm64.changes
ACCEPT
Processing changes
On 2019-08-29 11:14, Emilio Pozuelo Monfort wrote:
Why don't you let the interested teams run the scripts and generate the
required
binNMUs (like they do now), and then you pull that from a cronjob in
wuiet and
schedule the binNMUs? You would just need to define the format and do
some
sanity
Processing changes file: linux_4.19.67-2_mips64el.changes
ACCEPT
package release.debian.org
tags 906258 = stretch pending
thanks
Hi,
The upload referenced by this bug report has been flagged for acceptance into
the proposed-updates queue for Debian stretch.
Thanks for your contribution!
Upload details
==
Package: yubico-piv-tool
Version:
Processing commands for cont...@bugs.debian.org:
> package release.debian.org
Limiting to bugs with field 'package' containing at least one of
'release.debian.org'
Limit currently set to 'package':'release.debian.org'
> tags 906258 = stretch pending
Bug #906258 [release.debian.org] stretch-pu:
Processing commands for cont...@bugs.debian.org:
> package release.debian.org
Limiting to bugs with field 'package' containing at least one of
'release.debian.org'
Limit currently set to 'package':'release.debian.org'
> tags 906258 = stretch pending
Bug #906258 [release.debian.org] stretch-pu:
Processing changes file: linux_4.19.67-2_mips.changes
ACCEPT
On 27/08/2019 21:50, Philipp Kern wrote:
> On 8/27/2019 7:39 PM, Adam D. Barratt wrote:
>> On Tue, 2019-08-27 at 19:40 +0300, Ilias Tsitsimpis wrote:
>>> So, how can we move forward? Is the release team willing to give more
>>> members of our team access to the wanna-build infrastructure, or
>>>
On 29/08/2019 11:32, Ilias Tsitsimpis wrote:
> On Thu, Aug 29, 2019 at 11:14AM, Emilio Pozuelo Monfort wrote:
>> On 27/08/2019 21:50, Philipp Kern wrote:
>>> Do you have an opinion if this should actually be automated? I.e.
>>> automatically be fed into wb on a regular basis? I think the Release
On 2019-08-29 11:46, Emilio Pozuelo Monfort wrote:
On 29/08/2019 11:17, Philipp Kern wrote:
On 2019-08-29 11:14, Emilio Pozuelo Monfort wrote:
Why don't you let the interested teams run the scripts and generate
the required
binNMUs (like they do now), and then you pull that from a cronjob in
Processing changes file: yubico-piv-tool_1.4.2-2+deb9u1_amd64.changes
ACCEPT
Processing changes file: yubico-piv-tool_1.4.2-2+deb9u2_source.changes
ACCEPT
hi,
(this started as a discussion whether to update radare2 in (old)stable
and has since then evolved into a discussion about the problem
summarized well by Raphael.)
On Thu, Aug 29, 2019 at 01:48:14PM +0200, Raphael Hertzog wrote:
> On Thu, 29 Aug 2019, Moritz Mühlenhoff wrote:
> > The upstream
(Note: pkg-security@tracker.d.o is not a valid email, dropped)
Hi,
On Thu, 29 Aug 2019, Holger Levsen wrote:
> > In general, we (Debian) don't have a good answer to this problem and
> > virtualbox is clearly a bad precedent. We really need to find a solution
> > to this in concertation with the
Package: release.debian.org
Severity: normal
Tags: stretch
User: release.debian@packages.debian.org
Usertags: pu
Hi,
sdl-image1.2 is affected by a number of security issues in stretch. Impact is
quite minor, but it would still be nice to get them fixed.
Attached is a debdiff addressing most
Package: release.debian.org
Severity: normal
Tags: buster
User: release.debian@packages.debian.org
Usertags: pu
X-Debbugs-CC: t...@security.debian.org
Hi,
sdl-image1.2 is affected by a number of security issues in buster. Impact is
quite minor, but it would still be nice to get them fixed.
Isn't this the sort of problem that things like flatpack or snap were
created for?
On Thu, Aug 29, 2019 at 9:57 AM Abhijith PA wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
>
>
> Hi,
>
> On 29/08/19 6:47 pm, Paul Gevers wrote:
> > Hi
> >
> > On 29-08-2019 14:28, Raphael Hertzog
Lneas Enisa para pymes 1. Enisa crecimiento -Entre 25mil y 1,5M de
euros. -Vencimiento mximo a 9 aos con un mximo de 7
de carencia del principal. -Para pymes con proyectos de
consolidacin, crecimiento e internacionalizacin. Quiero
saber ms 2. Enisa emprendedores -Entre 25mil y 300mil euros.
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Hi,
On 29/08/19 6:47 pm, Paul Gevers wrote:
> Hi
>
> On 29-08-2019 14:28, Raphael Hertzog wrote:
>> (Note: pkg-security@tracker.d.o is not a valid email, dropped)
>>
>> Hi,
>>
>> On Thu, 29 Aug 2019, Holger Levsen wrote:
In general, we
Hi
On 29-08-2019 14:28, Raphael Hertzog wrote:
> (Note: pkg-security@tracker.d.o is not a valid email, dropped)
>
> Hi,
>
> On Thu, 29 Aug 2019, Holger Levsen wrote:
>>> In general, we (Debian) don't have a good answer to this problem and
>>> virtualbox is clearly a bad precedent. We really
Small update: I forgot to close the bug report (#932755) and did not mention
CVE-2019-5058 in debian/changelog. You can find an updated debdiff in
attachment.
cheers,
Hugo
--
Hugo Lefeuvre (hle)|www.owl.eu.com
RSA4096_ 360B 03B3 BF27 4F4D 7A3F D5E8 14AA 1EB8 A247 3DFD
Package: release.debian.org
Severity: normal
Tags: stretch
User: release.debian@packages.debian.org
Usertags: pu
Let's update the codename mapping s.t. reportbug offers current options
(e.g. stretch-pu and buster-pu) and queries up-to-date version
information.
This request is being submitted
Processing changes file: yubico-piv-tool_1.4.2-2+deb9u2_amd64.changes
ACCEPT
Processing changes file: yubico-piv-tool_1.4.2-2+deb9u2_i386.changes
ACCEPT
Processing changes file: linux-signed-arm64_4.19.67+2_arm64.changes
ACCEPT
Processing changes file: linux-signed-amd64_4.19.67+2_amd64.changes
ACCEPT
Processing changes file: yubico-piv-tool_1.4.2-2+deb9u2_arm64.changes
ACCEPT
Processing changes file: yubico-piv-tool_1.4.2-2+deb9u2_armel.changes
ACCEPT
Processing changes file: yubico-piv-tool_1.4.2-2+deb9u2_armhf.changes
ACCEPT
Processing changes file:
Package: release.debian.org
Severity: normal
Tags: stretch
User: release.debian@packages.debian.org
Usertags: pu
Another package required for Firefox ESR 68. This time the package is already
present in stretch, but a newer version (>= 2.13) is required, and the diff is
quite huge, so I went
package release.debian.org
tags 906258 = stretch pending
thanks
Hi,
The upload referenced by this bug report has been flagged for acceptance into
the proposed-updates queue for Debian stretch.
Thanks for your contribution!
Upload details
==
Package: yubico-piv-tool
Version:
Control: tags -1 + confirmed
On Wed, 2019-08-28 at 17:29 +0200, Xavier Guimard wrote:
> During buster release, we fixed CVE-2016-10542 for node-ws. The same
> patch can be applied in Stretch.
>
Please go ahead.
Regards,
Adam
Processing control commands:
> tags -1 + confirmed
Bug #936007 [release.debian.org] stretch-pu: package libu2f-host/1.1.2-2+deb9u1
Added tag(s) confirmed.
--
936007: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=936007
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
Control: tags -1 + confirmed
On Thu, 2019-08-29 at 00:04 +0200, Nicolas Braud-Santoni wrote:
> I would like to backport the fix for CVE-2019-9578 in the next point
> release
> for stretch. Please find enclosed the proposed debdiff.
++ /* the response has to be atleast 17 bytes, if it's
Processing control commands:
> tags -1 + confirmed
Bug #935976 [release.debian.org] stretch-pu: package
node-ws/1.1.0+ds1.e6ddaae4-3+deb9u1
Added tag(s) confirmed.
--
935976: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=935976
Debian Bug Tracking System
Contact ow...@bugs.debian.org with
Processing control commands:
> tags -1 + confirmed
Bug #935999 [release.debian.org] buster-pu: package libu2f-host/1.1.9-1+deb10u1
Added tag(s) confirmed.
--
935999: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=935999
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
Control: tags -1 + confirmed
On Thu, 2019-08-29 at 10:15 +0200, Bas Couwenberg wrote:
> To fix the PBF support in the osmpbf rdeps it needs to be rebuilt
> with protobuf 3.6.1 as reported in #935990.
>
Please go ahead.
Regards,
Adam
Processing control commands:
> tags -1 + confirmed
Bug #936022 [release.debian.org] buster-pu: package osmpbf/1.3.3-11
Added tag(s) confirmed.
--
936022: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=936022
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
Control: tags -1 + confirmed
On Wed, 2019-08-28 at 22:52 +0200, Nicolas Braud-Santoni wrote:
> On Wed, Aug 28, 2019 at 10:29:02PM +0200, Nicolas Braud-Santoni
> wrote:
> > I would like to backport the following patches for libu2f-host to
> > stretch:
> >
> > + Fix for CVE-2019-9578 (Closes:
On Thu, 2019-08-29 at 23:20 +0200, Hans-Christoph Steiner wrote:
> Ok, this is embarrasing: after discussing that Debian version regex
> and
> the version scheme for proposed-updates, I failed to see that the
> regex
> was wrong (see https://bugs.debian.org/935938). Its fixed now in
>
Processing changes file: ceph_12.2.11+dfsg1-2.1+b1_mips.changes
ACCEPT
Control: tags -1 + confirmed
On Thu, 2019-08-29 at 09:51 -0400, Hugo Lefeuvre wrote:
> Small update: I forgot to close the bug report (#932755) and did not
> mention
> CVE-2019-5058 in debian/changelog. You can find an updated debdiff in
> attachment.
>
Please go ahead.
Regards,
Adam
Control: tags -1 + confirmed
On Thu, 2019-08-29 at 09:45 -0400, Hugo Lefeuvre wrote:
> sdl-image1.2 is affected by a number of security issues in buster.
> Impact is
> quite minor, but it would still be nice to get them fixed.
>
Please go ahead.
Regards,
Adam
Ok, this is embarrasing: after discussing that Debian version regex and
the version scheme for proposed-updates, I failed to see that the regex
was wrong (see https://bugs.debian.org/935938). Its fixed now in
25.0.0+11+deb10u1. And hopefully I got the version right.
Is this bug report enough,
Processing control commands:
> tags -1 + confirmed
Bug #936051 [release.debian.org] stretch-pu: package
sdl-image1.2/1.2.12-5+deb9u2
Added tag(s) confirmed.
--
936051: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=936051
Debian Bug Tracking System
Contact ow...@bugs.debian.org with
Processing control commands:
> tags -1 + confirmed
Bug #936056 [release.debian.org] buster-pu: package
sdl-image1.2/1.2.12-10+deb10u1
Added tag(s) confirmed.
--
936056: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=936056
Debian Bug Tracking System
Contact ow...@bugs.debian.org with
On Thu, 2019-08-29 at 22:45 +0100, Adam D. Barratt wrote:
> On Thu, 2019-08-29 at 23:20 +0200, Hans-Christoph Steiner wrote:
> > Ok, this is embarrasing: after discussing that Debian version regex
> > and
> > the version scheme for proposed-updates, I failed to see that the
> > regex
> > was wrong
Processing control commands:
> retitle -1 buster-pu: package reportbug/7.5.3~deb10u1
Bug #935988 [release.debian.org] buster-pu: package reportbug/7.5.2+nmu1~deb10u1
Changed Bug title to 'buster-pu: package reportbug/7.5.3~deb10u1' from
'buster-pu: package reportbug/7.5.2+nmu1~deb10u1'.
--
Followup-For: Bug #935988
Control: retitle -1 buster-pu: package reportbug/7.5.3~deb10u1
new debdiff for rebuilding the 7.5.3 maintainer upload for buster.
Andreas
diff -Nru reportbug-7.5.2/bin/reportbug reportbug-7.5.3~deb10u1/bin/reportbug
--- reportbug-7.5.2/bin/reportbug 2019-02-01
package release.debian.org
tags 935588 = buster pending
thanks
Hi,
The upload referenced by this bug report has been flagged for acceptance into
the proposed-updates queue for Debian buster.
Thanks for your contribution!
Upload details
==
Package: ceph
Version:
On Wed, 2019-08-28 at 19:52 +0200, Andreas Beckmann wrote:
> reportbug/buster does not know about buster being stable ...
>
> I've just uploaded a fix to unstable via DELAYED/2, so it should be
> in
> unstable before the weekend, still hoping for a maintainer upload.
That happened.
[...]
> I'll
package release.debian.org
tags 935588 = buster pending
thanks
Hi,
The upload referenced by this bug report has been flagged for acceptance into
the proposed-updates queue for Debian buster.
Thanks for your contribution!
Upload details
==
Package: gdb-mingw-w64
Version: 10.8+b2
Processing commands for cont...@bugs.debian.org:
> package release.debian.org
Limiting to bugs with field 'package' containing at least one of
'release.debian.org'
Limit currently set to 'package':'release.debian.org'
> tags 935588 = buster pending
Bug #935588 [release.debian.org] nmu: rdepends
package release.debian.org
tags 935588 = buster pending
thanks
Hi,
The upload referenced by this bug report has been flagged for acceptance into
the proposed-updates queue for Debian buster.
Thanks for your contribution!
Upload details
==
Package: gdb
Version: 8.2.1-2+b1
Processing commands for cont...@bugs.debian.org:
> package release.debian.org
Limiting to bugs with field 'package' containing at least one of
'release.debian.org'
Limit currently set to 'package':'release.debian.org'
> tags 935588 = buster pending
Bug #935588 [release.debian.org] nmu: rdepends
Processing commands for cont...@bugs.debian.org:
> package release.debian.org
Limiting to bugs with field 'package' containing at least one of
'release.debian.org'
Limit currently set to 'package':'release.debian.org'
> tags 935588 = buster pending
Bug #935588 [release.debian.org] nmu: rdepends
On 29/08/2019 20.26, Adam D. Barratt wrote:
> Will you be updating and/or reversioning the pu to reflect the
> maintainer upload?
Yes, updated pu is coming... The maintainer upload contained a few more
bugfixes, but I think they all should go to buster as well.
Unfortunately it's lacking a
Processing changes file: gdb-mingw-w64_10.8+b1_mips.changes
REJECT
Processing changes file: ceph_12.2.11+dfsg1-2.1+b1_amd64.changes
ACCEPT
Processing changes file: ceph_12.2.11+dfsg1-2.1+b1_arm64.changes
ACCEPT
Processing changes file: ceph_12.2.11+dfsg1-2.1+b1_armel.changes
ACCEPT
Processing changes file: linux_4.19.67-2_mipsel.changes
ACCEPT
[Resending because I got some bounces]
On 2019, ഓഗസ്റ്റ് 29 7:10:38 PM IST, Abhijith PA wrote:
>
>Hi,
>
>On 29/08/19 6:47 pm, Paul Gevers wrote:
>> Hi
>>
>> On 29-08-2019 14:28, Raphael Hertzog wrote:
>>> (Note: pkg-security@tracker.d.o is not a valid email, dropped)
>>>
>>> Hi,
>>>
>>> On
[Resending because I got some bounces]
On 2019, ഓഗസ്റ്റ് 29 7:50:00 PM IST, Dan Clery wrote:
>Isn't this the sort of problem that things like flatpack or snap were
>created for?
In those solutions either security updates have to handled by each flatpack or
snap instead of sharing it
On 8/28/19 6:05 AM, Sebastiaan Couwenberg wrote:
> On 8/26/19 5:42 AM, Sebastiaan Couwenberg wrote:
>> On 8/25/19 4:31 PM, Sebastiaan Couwenberg wrote:
>>> On 8/25/19 3:22 PM, Jonathan Wiltshire wrote:
On Fri, Jul 12, 2019 at 09:39:26PM +0200, Bas Couwenberg wrote:
> For the Debian GIS
> The cross-build changes aren't really appropriate for stable, but I'm
> going to ACK the whole and hope it works out.
Thanks!
All fixes are related to critical bugs or build failures, but true,
cross-build problems are not actually that relevant build problems. It
would be a pity to not have
Processing control commands:
> block 931949 by -1
Bug #931949 [release.debian.org] transition: proj
931949 was blocked by: 931935 931931 931914 931872 931941 931948 931904 931944
931943 931940 931922 931908 931945
931949 was blocking: 931950
Added blocking bug(s) of 931949: 936017
> forwarded -1
65 matches
Mail list logo