Your message dated Sat, 13 Mar 2021 12:58:46 +
with message-id
and subject line unblock texlive-bin
has caused the Debian Bug report #985128,
regarding unblock: texlive-bin/2020.20200327.54578-7
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
Please unblock package tipa
[ Reason ]
In the last upload I fixed the most issues regarding the Debian
packaging itself.
[ Impact ]
Not releasing the package results in a heavily outdated
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
X-Debbugs-Cc: debian-tex-ma...@lists.debian.org
Please unblock package texlive-bin
[ Reason ]
Several fixes for shell escape exploits recently reported on the
private TeX Live security
Dear Ivo,
I just found that you unblocked the packages cpl-plugin-hawki and
cpl-plugin amber, due to their fixing of grave/serious bugs (#984058 and
#984546).
There are however also other packages that had in fact the same bug
#984508; the bug author mentioned it there but didn't really open
Your message dated Sat, 13 Mar 2021 14:28:22 +0100
with message-id <20210313132820.ga26...@debian.org>
and subject line Re: Bug#984468: Pre-approval for uploading KDE Apps 20.12.3
has caused the Debian Bug report #984468,
regarding Unblock selected KDE Apps 20.12.3
to be marked as done.
This
Hi Ole,
On 3/13/21 11:11 AM, Ole Streicher wrote:
I just found that you unblocked the packages cpl-plugin-hawki and
cpl-plugin amber, due to their fixing of grave/serious bugs (#984058 and
#984546).
There are however also other packages that had in fact the same bug
#984508; the bug author
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
Please unblock package nagios-check-xmppng
I am upstream of the packaged plugin and received a bug report [1] just
a few days before the end of the soft freeze. The bugfix is quite
minimal
Processing control commands:
> tags -1 + confirmed
Bug #982571 [release.debian.org] buster-pu: package gdnsd/2.4.3-1
Added tag(s) confirmed.
--
982571: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=982571
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
Control: tags -1 + confirmed
On Fri, 2021-02-12 at 02:15 +0200, Faidon Liambotis wrote:
> This is a buster proposed update to fix CVE-2019-13952 aka #932407.
> This
> is an old and really minor vulnerability, which I honestly had
> forgotten
> about. It's easy and thus still good to fix.
>
Control: tags -1 + confirmed
On Sun, 2021-01-31 at 15:04 +0100, László Böszörményi wrote:
> There are two SSL related bugs in fetchmail that affect Buster. The
> first cause is that otherwise working SSL connections fail sometimes
> [1]. The fix is in 6.4.0~rc1 and in Bullseye since Aug, 2019.
>
Processing control commands:
> tags -1 + confirmed
Bug #981453 [release.debian.org] buster-pu: package
fetchmail/6.4.0~beta4-3+deb10u1
Added tag(s) confirmed.
--
981453: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=981453
Debian Bug Tracking System
Contact ow...@bugs.debian.org with
Control: tags -1 + confirmed
On Wed, 2021-02-24 at 23:23 +0100, Sebastian Andrzej Siewior wrote:
> This is the proposed update for Buster to fix a build failure against
> openssl 1.1.1j which is proposed for Buster.
> The changes touch only the test suite:
> - A fix in openssl for the SSLv23
Processing control commands:
> tags -1 + confirmed
Bug #983485 [release.debian.org] buster-pu: package m2crypto/0.31.0-4+deb10u2
Added tag(s) confirmed.
--
983485: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=983485
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
Your message dated Sat, 13 Mar 2021 14:10:15 +0100
with message-id <20210313131014.ga26...@debian.org>
and subject line Re: unblock: tipa/tipa_1.3-21
has caused the Debian Bug report #985132,
regarding unblock: tipa/tipa_1.3-21
to be marked as done.
This means that you claim that the problem has
Your message dated Sat, 13 Mar 2021 15:30:39 +0100
with message-id <20210313143037.ga27...@debian.org>
and subject line Re: Bug#929214: release.debian.org - Add package constraint
for cloud images
has caused the Debian Bug report #929214,
regarding Add key package for cloud images
to be marked as
Your message dated Sat, 13 Mar 2021 14:31:59 +
with message-id
and subject line unblock gnome-passwordsafe
has caused the Debian Bug report #985136,
regarding unblock: gnome-passwordsafe/5.0-2
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
Please unblock package gsequencer
[ Reason ]
I would love to patch the user's manual chapter 2. The information
there are incomplete and were not updated as extending the UI of
gsequencer.
Your message dated Sat, 13 Mar 2021 17:12:31 +
with message-id
<70e3af961623ecd9008e4dd08f6b51d49dee6c1c.ca...@adam-barratt.org.uk>
and subject line Re: Bug#984595: buster-pu: package samba/2:4.9.5+dfsg-5
has caused the Debian Bug report #984595,
regarding buster-pu: package
Processing changes file: docker.io_18.09.1+dfsg1-7.1+deb10u3_source.changes
ACCEPT
Processing changes file: docker.io_18.09.1+dfsg1-7.1+deb10u3_all.changes
ACCEPT
Processing changes file:
docker.io_18.09.1+dfsg1-7.1+deb10u3_amd64-buildd.changes
REJECT
Processing changes file:
Control: tags -1 + confirmed
On Fri, 2021-02-19 at 22:32 +0100, Moritz Muehlenhoff wrote:
> +python3.7 (3.7.3-2+deb10u3) buster; urgency=medium
> +
> + * CVE-2020-26116
> + * CVE-2021-3177
>
Please go ahead.
Regards,
Adam
Processing control commands:
> tags -1 + confirmed
Bug #983134 [release.debian.org] buster-pu: package python3.7/3.7.3-2+deb10u3
Added tag(s) confirmed.
--
983134: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=983134
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
Please unblock package gnome-passwordsafe
[ Reason ]
Fix a bug that prevents the icon of the application from being displayed
when the software is running in a Wayland session.
[ Impact ]
Hi Ivo
On Sat, Mar 13, 2021 at 03:30:39PM +0100, Ivo De Decker wrote:
> > The binary package is in testing since some time. Please add it to the
> > key packages list.
> Added.
Thanks.
Regards,
Bastian
--
Our way is peace.
-- Septimus, the Son Worshiper, "Bread and Circuses",
Control: tags -1 + confirmed
On Wed, 2021-02-17 at 23:33 +0100, Håvard Flaget Aasen wrote:
> These are the same changes which was implemented in stretch, two
> upstream patches. Both of these patches resolves a path traversal
> flaw, which was first discovered with CVE-2017-1000501.
>
Please
Processing control commands:
> tags -1 + confirmed
Bug #982996 [release.debian.org] buster-pu: package awstats/7.6+dfsg-2
Added tag(s) confirmed.
--
982996: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=982996
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
Control: tags -1 + confirmed
On Mon, 2021-02-08 at 16:08 +, Colin Watson wrote:
> https://bugs.debian.org/982302 reports that groff/buster is built
> with
> references to ghostscript 9.26, despite 9.27 having been uploaded to
> buster in August 2020. I think the path of least resistance/risk
Processing control commands:
> tags -1 + confirmed
Bug #982311 [release.debian.org] buster-pu: package groff/1.22.4-3+deb10u1
Added tag(s) confirmed.
--
982311: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=982311
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
Your message dated Sat, 13 Mar 2021 13:18:17 +
with message-id
and subject line unblock refpolicy
has caused the Debian Bug report #984645,
regarding unblock: refpolicy/2:2.20210203-4
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the
Your message dated Sat, 13 Mar 2021 13:16:41 +
with message-id
and subject line unblock policycoreutils
has caused the Debian Bug report #984642,
regarding unblock: policycoreutils/3.1-3
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the
Your message dated Sat, 13 Mar 2021 13:37:16 +
with message-id
and subject line unblock lxc-templates
has caused the Debian Bug report #985062,
regarding unblock: lxc-templates/3.0.4-5
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
X-Debbugs-Cc: "Dr. Tobias Quathamer" , Javier
Fernández-Sanguino Peña
Please unblock package manpages-l10n
(Please provide enough (but not too much) information to help
the release team
Control: tags -1 + confirmed
On Sun, 2021-03-07 at 18:21 +0100, Sven Joachim wrote:
> On 2021-02-18 17:54 +0100, Sven Joachim wrote:
[...]
> > I would like to fix bug #982439/CVE-2021-27135[1] in Buster, a
> > potential
> > DoS against xterm when the user selects specially crafted
> > text. The
Processing control commands:
> tags -1 + confirmed
Bug #983051 [release.debian.org] buster-pu: package xterm/344-1+deb10u1
Added tag(s) confirmed.
--
983051: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=983051
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
> Tomorrow once firmware-nonfree has migrated 20210208-4 will be uploaded
> with important small fixes to Raspberry Pi 4B and BananaPi M2 ultra and
> BananaPi M3 supports.
20210208-4 upload happening now.
--
maks
signature.asc
Description: PGP signature
Control: tags -1 + confirmed
On Mon, 2021-03-08 at 14:08 +0100, Roland Rosenfeld wrote:
> Hi release team!
>
> In the meantime privoxy 3.0.32 was released, which contains five more
> CVEs, I applied four of them to 3.0.28-2+deb10u1.patch-v4 now, while
> CVE-2021-20274 applies to code, that was
Processing control commands:
> tags -1 + confirmed
Bug #981664 [release.debian.org] buster-pu: package privoxy/3.0.28-2
Added tag(s) confirmed.
--
981664: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=981664
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
On Fri, 2021-02-26 at 16:30 +0100, Moritz Muehlenhoff wrote:
> On Fri, Feb 26, 2021 at 07:49:38AM +0100, Matthias Klose wrote:
> > On 2/25/21 7:41 PM, Moritz Muehlenhoff wrote:
> > > + * CVE-2021-3177
> >
> > are all the ctypes tests passing with this patch? See #983516.
>
> I'll have a look at
Control: tags -1 + confirmed
On Fri, 2021-03-05 at 20:00 +0100, Jeroen Ploemen wrote:
> The sabnzbdplus package in buster is affected by a security issue
> (CVE-2020-13124), permitting code execution from the program's web
> interface through crafted settings. By default, the web interface is
>
Processing control commands:
> tags -1 + confirmed
Bug #984604 [release.debian.org] buster-pu: package sabnzbdplus/2.3.6+dfsg-1
Added tag(s) confirmed.
--
984604: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=984604
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
Control: tags -1 + confirmed
On Mon, 2021-03-08 at 13:26 +0100, Rene Engelhard wrote:
> +libreoffice (1:6.1.5-3+deb10u7) buster; urgency=medium
> +
> + * debian/patches/fix-PYTHONPATH.diff: backport upstream fix to
> +not leave a bare trailing : in PYTHONPATH as it causes
> unconditional
> +
Processing control commands:
> tags -1 + confirmed
Bug #984790 [release.debian.org] buster-pu: package
libreoffice/1:6.1.5-3+deb10u7
Added tag(s) confirmed.
--
984790: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=984790
Debian Bug Tracking System
Contact ow...@bugs.debian.org with
On 2021-03-13 17:31:50 [+], Adam D. Barratt wrote:
> Please go ahead.
Thanks, uploaded.
> Regards,
>
> Adam
Sebastian
Processing changes file: fwupd_1.2.13-3+deb10u1_source.changes
ACCEPT
Processing changes file: pygments_2.3.1+dfsg-1+deb10u1_source.changes
ACCEPT
Processing changes file: pygments_2.3.1+dfsg-1+deb10u1_all.changes
ACCEPT
Processing changes file: tiff_4.1.0+git191117-2~deb10u2_amd64.changes
On 2021-03-13 17:27 +, Adam D. Barratt wrote:
> Control: tags -1 + confirmed
>
> On Sun, 2021-03-07 at 18:21 +0100, Sven Joachim wrote:
>> On 2021-02-18 17:54 +0100, Sven Joachim wrote:
> [...]
>> > I would like to fix bug #982439/CVE-2021-27135[1] in Buster, a
>> > potential
>> > DoS against
Hi,
Am 13.03.21 um 19:57 schrieb Adam D. Barratt:
> Control: tags -1 + confirmed
>
> On Mon, 2021-03-08 at 13:26 +0100, Rene Engelhard wrote:
>> +libreoffice (1:6.1.5-3+deb10u7) buster; urgency=medium
>> +
>> + * debian/patches/fix-PYTHONPATH.diff: backport upstream fix to
>> +not leave a
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
X-Debbugs-Cc: unix...@gmail.com
Please unblock package ifetch-tools
The package uploaded to unstable closes RC bug:
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=985051
Due to hard
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
X-Debbugs-Cc: pi...@debian.org
Please unblock package debian-pan
it is a Debian blends, the objectif od this blends is to package
softwares for synchrotron and neutron facilities.
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
Please unblock package libonig
[ Reason ]
Current testing version 6.9.6-1 is not compatible with previous version
6.9.5-2.
[ Impact ]
If current testing version 6.9.6-1 would be shipped,
[Ccing debian-release]
On Wed, 17 Feb 2021 14:01:40 + Julian Gilbey wrote:
> On Sun, Feb 14, 2021 at 02:26:30PM +0100, Jonas Smedegaard wrote:
> > I still recommend to request release team to ignore for this release
> > instead of lowering sverity, but don't care anough about this
49 matches
Mail list logo