Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
I would like to fix some issues in corekeeper reported by Jakub Wilk.
unblock corekeeper/1.7
--
bye,
pabs
https://wiki.debian.org/PaulWise
diff -Nru corekeeper-1.6/debian/changelog core
On Fri, 05 Apr 2019 11:58:24 +0800 Paul Wise wrote:
> I've done that in the attached patch.
I've now asked the release team for an unblock.
--
bye,
pabs
https://wiki.debian.org/PaulWise
signature.asc
Description: This is a digitally signed message part
As an intermediary fix for those that just want to listen to their music...
(which does not fix the actual bug ;) )
Change the Service Type to 'simple' instead of forking and remove the
'--daemon' argument from ExecStart, aka resulting file:
/lib/systemd/system/shairport-sync.service
```
[Unit]
Package: wnpp
Severity: wishlist
Owner: Drew Parsons
* Package name: golang-github-koofr-go-koofrclient
Version : 20190201.7f32759
Upstream Author : Koofr
* URL : https://github.com/koofr/go-koofrclient
* License : MIT
Programming Lang: Go
Description :
I had this bug occur today when trying to run evince after an upgrade. The
message told me to run the command:
gdk-pixbuf-query-loaders >
/usr/lib/x86_64-linux-gnu/gdk-pixbuf-2.0/2.10.0/loaders.cache
But this doesn't work because it needs to be done as root and because
the full path to the com
Control: found -1 11.0.3+1-1~bpo9+1
Control: affects -1 + openjdk-11-jre openjdk-11-dbg openjdk-11-jre-zero
On Wed, 28 Nov 2018 03:48:25 +0100 Andreas Beckmann wrote:
> Does this require a newer version of ca-certificates-java (needs to
> be backported) and a corresponding versioned dependency to
Source: php-imagick
Version: 3.4.3~rc2-2
Severity: grave
Tags: security upstream
Forwarded: https://bugs.php.net/bug.php?id=77791
Hi,
The following vulnerability was published for php-imagick.
CVE-2019-11037[0]:
| In PHP imagick extension in versions between 3.3.0 and 3.4.4, writing
| to an arra
Source: php7.3
Version: 7.3.4-2
Severity: important
Tags: security upstream
Forwarded: https://bugs.php.net/bug.php?id=77950
Hi,
The following vulnerability was published for php7.3.
CVE-2019-11036[0]:
| When processing certain files, PHP EXIF extension in versions 7.1.x
| below 7.1.29, 7.2.x be
Package: rust-doc
Version: 1.24.1+dfsg1-1~deb8u4
Severity: serious
User: debian...@lists.debian.org
Usertags: piuparts
Hi,
during a test with piuparts I noticed your package is not
installable in jessie:
The following packages have unmet dependencies:
rust-doc : Depends: fonts-open-sans but it
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: rm
rust-doc is a cruft binary:all package in stable, no longer built by the
new upstream version needed for modern firefox etc. that was introduced
via stretch/updates.
$ rmadison -s stable --sourc
Package: gcc-8-cross
Version: 28
Dear Matthias:
I see this in debian/rules:
ifeq ($(JOBS),1)
JOBS := 2
endif
This was made in commit a4c6cdfc25368c1c86dfd215db99669f93f1f096
but the changelog does not say anything about it.
I believe this is related to the Makefile bug I reported in #9
Package: upgrade-reports
Severity: important
Dear Maintainer,
*** Reporter, please consider answering these questions, where appropriate ***
* What led up to the situation?
started apper to be up to date
* What exactly did you do (or not do) that was effective (or
ineffective)?
repeat
söndag 21 april 2019 kl. 19:55:10 CEST skrev Magnus Holmgren:
> But now that I look closer, it looks like the "spool format error" message
> is only triggered by malformed header files, and Thomas in https://
> lists.exim.org/lurker/message/20180726.174108.0620f3c0.en.html had narrowed
> it down
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: binnmu
nmu qtsvg-opensource-src_5.12.2-1 . ANY . experimental . -m "Rebuild against
qtbase-abi-5-12-3."
nmu qtmultimedia-opensource-src_5.12.2-1 . ANY . experimental . -m "Rebuild
against qtbase-a
Source: nageru
Version: 1.8.6-1
Severity: serious
Tags: ftbfs
Justification: fails to build from source (but built successfully in the past)
Hi,
nageru/experimental FTBFS on all platforms:
https://buildd.debian.org/status/package.php?p=nageru&suite=experimental
[68/260] c++ -Istream@sta -I. -I..
On Sat, May 04, 2019 at 01:59:36PM +0200, Andreas Beckmann wrote:
> nageru/experimental FTBFS on all platforms:
> https://buildd.debian.org/status/package.php?p=nageru&suite=experimental
It depends on newer bmusb, currently in NEW. I should probably add a
Build-Depends.
/* Steinar */
--
Homepage
On Sat, Apr 20, 2019 at 01:39:36PM +0200, Guillem Jover wrote:
> Source: curl
> Source-Version: 7.64.0-2
> Severity: serious
> Control: affects -1 rtorrent
>
> Hi!
Hello,
> I've started noticing rtorrent busy-looping at some points after
> finishing a torrent. stracing and gdb'ing the process it
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
control: forwarded -1 https://bugzilla.xfce.org/show_bug.cgi?id=15356
On Fri, 2019-05-03 at 19:43 +0200, pn...@telenet.be wrote:
> Hi Yves-Alexis,
> Thank you for your quick response.
> I've reported the issue at bugzilla.xfce.org (Bug #15356).
Man
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
In the light of dhcpcd5 automremoval (#928056, #928104, #928105), I'd
like to upload a wicd package which relies less on dhcpcd5. It
actually is already committed in Git, but the upload didn
Followup-For: Bug #924283
Control: affects -1 + jython-stilts astro-all
Hi,
you need to bump the dependency to
default-jre-headless (>= 2:1.9) | java9-runtime-headless
^^
otherwise default-jre-headless allows incompatible versions.
Andreas
Package: mutt
Version: 1.10.1-2
Severity: normal
Hello,
I recently got an email from a guy using Outlook and the mail's From
header was encoded using ks_c_5601-1987.
It looked as follows in raw:
From: =?ks_c_5601-1987?B?U6mqcmVuIExhc3RuYW1l?=
and mutt failed to properly display it. It
Hi,
This bug affect both firefox-esr in Stretch and firefox in
testing/unstable. Should they be kept separate ?
This bug does not affect packaged extensions within Debian despite some
of them having the expired certificate like webext-noscript 10.1.9.6-2
or webext-https-everywhere 2018.8.22-1~deb
Hi,
Axel Beckert wrote:
> I'll prepare a feature branch for this in git including a planned
> debdiff and let you know once it's ready for review/upload. I though
> would happy to receive feedback from the release team beforehand.
Preliminary (and obviously not yet finished) patch as of the branc
Package: sponsorship-requests
Severity: normal
Dear mentors,
I am looking for a sponsor for my package "libsml"
* Package name: libsml
Version : 0.1.1+git20190410-1
Section : libs
It builds those binary packages:
libsml-dev - Header files for libSML
libsml1 - Library
Package: xcolorsel
Version: 1.1a-21
Severity: minor
Hi,
Both the usage text and the man page point to the wrong location for
rgb.txt:
$ xcolorsel --help
xcolorsel: Invalid options/additional parameters
Offending arguments are:
xcolorsel --help
usage: xcolorsel [options] [RgbTxtFile]
dis
Package: firefox-esr
Version: 60.6.1esr-1~deb9u1
Severity: important
In Preferences/Privacy & Security there are a pair of preferences "Allow
Firefox to send technical and interaction data to Mozilla" and "Allow Firefox
to install and run studies". These are both unchecked and greyed out by
defaul
I burn discs once a year. Next time I try I report here.
Отправлено из мобильной Рамблер/почты.
10.3.2019, 13:21:14 пользователь Steve McIntyre (st...@einval.com) написал:
Control: severity -1 important
Control: tags -1 +moreinfo
Hi!
On Fri, Nov 30, 2018 at 05:40:41AM +0300, Md Ayquassa
Package: lists.debian.org
Severity: wishlist
Dear Maintainer,
A fairly new programming language, nim, has surfaced with an increasing
number of adoptees of software, also in the sciences, that we would like
to package. We created https://salsa.debian.org/nim-team/ and for
team management we thoug
Official Mozilla response:
https://discourse.mozilla.org/t/certificate-issue-causing-add-ons-to-be-disabled-or-fail-to-install/39047
"Certificate issue causing add-ons to be disabled or fail to install:
10:50 a.m. UTC / 01:50 a.m. PDT: We rolled-out a fix for release, beta
and nightly users on
Package: firefox
Version: 66.0.1-1
Severity: normal
Firefox shield appears to be disabled in the Debian sid release of firefox in
66.0.1.
I've also seen this feature being called or related to "user studies" and
"normandy".
This is a feature that allows Firefox to push quick changes without a ful
Source: cracklib2
Version: 2.9.6-2
Tags: patch
User: helm...@debian.org
Usertags: rebootstrap
When building cracklib2 in a dirty chroot (i.e. with extra packages),
the build result is not reproducible. The presence of zlib1g-dev adds
additional features. Moreover, when doing a cross build, the pre
I ran into the same problem. I have just one (root) filesystem, with ext4 on
it. I think it's trivial to reproduce it with an install with ext*
filesystems.
For inspiration on how to fix it you can look here:
https://github.com/void-linux/void-packages/tree/master/srcpkgs/dracut/patches
(I don'
Hello,
On Sat, 4 May 2019 09:43:12 -0500 Erik wrote:
> Firefox from the Debian package has data reporting disabled so using
> studies is not possible.
Neither with Tor Browser, which is also affected.
Just tried some workaround, it seems to work with both Firefox ESR from
Debian stable, and To
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
Please unblock package libfm-qt
Problem: Recursive moving of folders is prohibited in some cases
New version fixes #927708 which renders pcmanfm-qt nearly unusable for basic
tasks in file
' is supported in XHTML and HTML5, so at least render it
properly when seen in HTML we encounter.
We don't start escaping "'", yet; but if we do, I suggest using
' to ensure compatibility with older w3m versions.
>From b557289dd4309b37a2d9710fa92c3d269ef67228 Mon Sep 17 00:00:00 2001
From: Eric Wo
Control: found -1 2:17.0+dfsg1-3
Control: fixed -1 2:17.6+dfsg1-2
Dear Paul and Johannes,
2017-12-25 23:52 GMT+01:00 Johannes Schauer :
> On Mon, 17 Apr 2017 18:39:24 +0200 Paul Menzel
> wrote:
>> The systemd service unit file `/lib/systemd/system/kodi.service`
>> currently needs the binaries
mozilla is roling out a fix
https://blog.mozilla.org/addons/2019/05/04/update-regarding-add-ons-in-firefox/
that said they are using the 'studies' infrastructure to do so, and
they seem to be disabled in the debian build.
Package: zram-tools
Version: 0.3.2.1-1
Severity: normal
Command:
$ zramswap status
compr_data_size: 0 KiB
orig_data_size: 0 KiB
compression-ratio: 0
This due to code /usr/sbin/zramswap
55 function status {
56 orig_data_size="0"
57 for file in /sys/block/
On Fri, Jan 18, 2019 at 03:16:26AM +0100, Andreas Bombe wrote:
> This has worked for all these years until the update, which rejects the
> VG with system ID without advance warning during package upgrade. Systems
> may become unbootable after upgrade if these VGs contain filesystems
> that are moun
Package: dhcpcd5
Version: 7.1.0-1
Severity: serious
Tags: security upstream fixed-upstream
Dear Maintainer,
another week - another bug ;) Upstream released version 7.2.2 of dhcpcd5 fixing
another potential security issue in DHCPv6. All versions currently supported in
Debian (jessie, stretch, bu
Control: tags + -1 jessie
Control: notfound -1 1.25
Please be a bit more careful filing bugs for old versions in future. Without
the extra annotations I just added, this might have kicked rustc out of testing
if nobody else was paying attention.
Judging from https://packages.debian.org/sid/font
Control: tags -1 + jessie
Control: notfound -1 1.32.0+dfsg1-3
Control: notfound -1 1.25.0+dfsg1-1
--
GPG: ed25519/56034877E1F87C35
GPG: rsa4096/1318EFAC5FBBDBCE
https://github.com/infinity0/pubkeys.git
Source: db5.3
Version: 5.3.28+dfsg1-0.6
Severity: important
Tags: security
I noticed that db5.3 builds an embedded copy of sqlite3, but it isn't
documented in the security tracker. This is troubling. Embedded code
copies are discouraged by the debian policy and sqlite3 has a history of
(few) vulne
Package: clonezilla
Version: 3.27.16-3
Severity: important
Dear Maintainer,
debian-live clonezilla fails to infinate loop while scanning /tmp/ocs_bind_root
reproduce,
boot debian-live-buster-DI-rc1-amd64-kde+nonfree.iso
sudo apt update
sudo apt install clonezilla
sudo clonezilla
>device-image
Package: zram-tools
Version: 0.3.2.1-1
Severity: wishlist
Dear Maintainer,
Please add selectable compression algorithm in in
/etc/default/zramswap as Kernel 4.19.0-4-amd64 there are several
choices:
cat /sys/block/zram0/comp_algorithm
[lzo] lz4 lz4hc
Note that in sript /usr/sbin/zrams
Control: fixed -1 1.32.0+dfsg1-3
Control: fixed -1 1.25.0+dfsg1-1
--
GPG: ed25519/56034877E1F87C35
GPG: rsa4096/1318EFAC5FBBDBCE
https://github.com/infinity0/pubkeys.git
Source: jetty9
Version: 9.4.15-1
Severity: important
Tags: security upstream fixed-upstream
Hi,
The following vulnerabilities were published for jetty9. Although they
are distinct issues, and one is adressed in 9.4.16 and the other in
4.9.17 I still opted to fill one single bug, assuming the next
Package: release.debian.org
User: release.debian@packages.debian.org
Usertags: unblock
Dear Release team,
Please unblock package qtchooser. It fixes bug #928344 which is of
severity: important. The debdiff is attached.
unblock qtchooser/66-2
--
Dmitry Shachnev
--- a/debian/changelog
+++ b/d
On Sat, 04 May 2019 14:42:28 -0300 Niv Sardi wrote:
> mozilla is roling out a fix
>
https://blog.mozilla.org/addons/2019/05/04/update-regarding-add-ons-in-firefox/
> that said they are using the 'studies' infrastructure to do so, and
> they seem to be disabled in the debian build.
In that arti
Package: wnpp
Severity: wishlist
Owner: Stephen Kitt
* Package name: nulib2
Version : 3.1.0
Upstream Author : Andy McFadden
* URL : http://nulib.com
* License : BSD
Programming Lang: C
Description : NuFX and Binary II archive utility
NuLib2 is a comma
Source: patman
Version: 1.2.2+dfsg-5
Tags: patch upstream
User: helm...@debian.org
Usertags: rebootstrap
patman fails to cross build from source, because the upstream Makefile
hard codes g++. It also hard codes "install -s", which breaks generation
of -dbgsym packages and DEB_BUILD_OPTIONS=nostrip
An immediate fix is to set xpinstall.signatures.required to false in
about:config
0xCEC1B8C7E51FC983.asc
Description: application/pgp-keys
signature.asc
Description: OpenPGP digital signature
On Fri, May 03, 2019 at 10:42:34PM +0100, Steve McIntyre wrote:
> diff --git a/grub-core/loader/efi/fdt.c b/grub-core/loader/efi/fdt.c
> index c9aee74ef..735c56e45 100644
> --- a/grub-core/loader/efi/fdt.c
> +++ b/grub-core/loader/efi/fdt.c
> @@ -123,6 +123,14 @@ grub_cmd_devicetree (grub_command_t
On March 4, 2019 at 11:25PM +, Peter.Chubb (at data61.csiro.au) wrote:
> I rebuilt emacs without the in-built GNUTLS --- and everything now
> works properly.
>
> I added the line:
> confflags += --without-gnutls
> to debian/rules and rebuilt.
Rebuilding the emacs package may be unneeded.
Ema
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
Hello release team!
I'm here to talk about an eventual unblock request of my package
mmdebstrap. In this context I want to discuss with you, which changes
will still be permitted at this ti
On Sat, May 04, 2019 at 10:44:26PM +0100, Colin Watson wrote:
>On Fri, May 03, 2019 at 10:42:34PM +0100, Steve McIntyre wrote:
>> diff --git a/grub-core/loader/efi/fdt.c b/grub-core/loader/efi/fdt.c
>> index c9aee74ef..735c56e45 100644
>> --- a/grub-core/loader/efi/fdt.c
>> +++ b/grub-core/loader/e
Changing "xpinstall.signatures.required" to "false" will work on builds
without MOZ_REQUIRE_SIGNING.
This can be checking by going to resource://gre/modules/AppConstants.jsm
and checking the value of MOZ_REQUIRE_SIGNING, if it is false, the
signatures can be disabled with the above config.
Note it
On Sat, May 04, 2019 at 08:54:27AM +0200, Salvatore Bonaccorso wrote:
> tags 928417 - security
The fact that this bug allows Mozilla to disable remotely security
extensions like noscript is a major security issue.
When noscript get deactivated, firefox should default to disabling
javascript compl
Package: firefox-esr
Version: 60.6.1esr-1
Severity: normal
Tags: upstream
Dear Maintainer,
Reinstalling add-ons is broken in Firefox. This appears to be an
upstream bug:
https://discourse.mozilla.org/t/certificate-issue-causing-add-ons-to-be-disabled-or-fail-to-install/39047
What I did:
- NoScri
Just to confirm, this does happen on a clean account, with AppArmor set
to complain only for /usr/bin/firefox and
/usr/lib/firefox-esr/firefox-esr. Any add-on fails to install; I've
tried NoScript (one of the most popular ones), and To Google Translate
(was on the home page).
So I assume it's
Hello I have been trying to contact you. Did you get my business proposal?
While I agree an unknown disabling of plugins, not just noscript (there
are others like noscript) is a security concern...
There is a big, yellow banner that appears and stays at the top of your
browser, informing you if any plugins/add-ons are disabled.
So for me, the 'big deal' is being infor
Hello,
I found a workaround for firefox-esr 60.6.1esr-1~deb9u1 from Debian 9.9
Stretch/stable, and uBlock origin 1.18.16 from
https://addons.mozilla.org (AMO).
When uBlock origin was suddenly disabled today, I first changed this
setting on the configuration page about:config :
xpinstall.si
On Sat, May 04, 2019 at 06:59:22PM +0100, Colin Watson wrote:
> On Fri, Jan 18, 2019 at 03:16:26AM +0100, Andreas Bombe wrote:
> > This has worked for all these years until the update, which rejects the
> > VG with system ID without advance warning during package upgrade. Systems
> > may become unb
Package: sponsorship-requests
Severity: important
Dear mentors,
I am looking for a sponsor for my package "megadown"
* Package name: megadown
Version : 0~20190502+git734e46f-1
Upstream Author : [fill in name and email of upstream]
* URL : [fill in URL of ups
Hi,
Aurelien Jarno (2019-05-03):
> The glibc package in version 2.28-10 currently in sid mostly updates the
> git-updates.diff patch to the latest upstream stable branch:
> - Fix security issue CVE-2019-9169.
> - Support for the new Reiwa era to the ja_JP which seems to be something
> quite imp
Hello,
I am basically interested in taking over the maintenance of the sketch package
(in the long run).
However, I have to admit that I have not used the package myself up to now,
still, it might be become quite useful for the upcoming downwriting of my
thesis.
Nor I have ever done packaging
Hello,
I am basically interested in taking over the maintenance of the sketch
package (in the long run).
However, I have to admit that I have not used the package myself up to
now, still, it might be become quite useful for the upcoming downwriting
of my thesis.
Nor I have ever done packaging
Le mardi 05 mars 2019 à 19:09:54+, Santiago Vila a écrit :
> Package: src:python-blessed
> Version: 1.15.0-1
> Severity: important
> Tags: ftbfs
>
> Dear maintainer:
>
> I tried to build this package in buster but it failed:
>
> ---
Hartmut Buhrmester wrote:
> So I think, that the setting xpinstall.signatures.required = false is
> not really needed.
>
> Enabling "studies" and using a short update interval of 5 seconds
> should do the trick.
I think the opposite is true.
I had xpinstall.signatures.required set to false bef
I went through the test suite and identified places where either the
test suite was probably out of date (or working with old documentation)
or insserv was giving improper results. Most of the test cases which
were failing can, I believe, be addressed by warnings rather than
outright failures or bl
Source: linux
Version: 5.0.10-1~exp1
Severity: wishlist
Tags: patch
Hello,
the riscv64 architecture is changing its standard kernel image
format from ELF to a flat kernel image with a PE/COFF-compatible
header (similar to arm64) to make EFI stub support possible, so
we need to ship arch/riscv/boo
Source: python-certbot
Version: 0.31.0-1
Severity: serious
Tags: upstream
Because of changes to the ACME v2 standard, unauthenticated GET
requests to ACME compatible APIs must be performed as special
POST-as-GET requests to be valid. The primary ACME API, Let's
Encrypt, has deprecated support for
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
Please unblock package python-acme to fix RC bug #928452.
Because of changes to the ACME v2 standard, unauthenticated GET
requests to ACME compatible APIs must be performed as special
POST-
Hi Sean,
An official Debian package cannot edit your .zshrc file. A quick instruction for
zsh integration can be found here:
/usr/share/doc/fzf/README.Debian
which is a standard location for notes. And the it is already pointed
out in fzf's description.
$ apt show fzf
Package: fzf
Version: 0.
Package: perl6-zef
Version: 0.6.2-1
Severity: serious
Clarification: renders zef nearly unusable
Dear maintainer,
The URL list for p6c mirrors has already outdated:
53 "short-name" : "p6c",
54 "enabled" : 1,
55 "module" : "Zef::Repository::Ecosystems",
56
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
X-Debbugs-CC: Robert Lemmen , Dominique Dumont
Please unblock package perl6-zef
(explain the reason for the unblock here)
As I reported in #928454, the outdated mirror URL list renders z
Package: wget
Version: 1.20.1-1.1
Severity: wishlist
Tags: patch
User: ubuntu-de...@lists.ubuntu.com
Usertags: origin-ubuntu eoan ubuntu-patch
Hi Noël,
In Ubuntu, we have patched the wget package to support parallel builds.
This seems like a useful enhancement for Debian to include as well. Ple
Hi all,
it seems the issue is already reported and fixed in upstream repo:
https://bugs.freedesktop.org/show_bug.cgi?id=110509
Package: firefox-esr
Version: 60.6.1esr-1~deb9u1
Followup-For: Bug #928415
Dear Maintainer,
What is Debian's recommendation for users and administrators dealing
with this major snafu?
I've got a bunch of Debian Stable boxes with Firefox-esr and
installing the STUDIES "hotfix" from Mozilla by han
80 matches
Mail list logo