Hi,
My name is Roman, and I am the developer of the Valentina project.
> Seamly2D is a fork of Valentina.
Technically it is not true. I have left the original project. Thus, current
Valentina is a fork of what is left of Valentina after rename.
> well, compared to valentina it seems to have way
On Wed, 8 Jul 2020 21:29:07 +0200 Ondřej Tůma wrote:
> thank's for report. I'm working now on version 1.4.3, which is last
> upstream stable version. So I apply patch to new version too.
It is now too late to get 1.4.3 into bullseye and the bug is now going
to cause formiko to be removed from bul
On 03/06/2021 01.41, Andreas Beckmann wrote:
BUT: This would still only solve the co-installability mess of hdf5,
the gdal problem is still there.
gdal could rename gdal-data to gdal3-data, build with
--datadir=/sur/share/gdal3 and drop the Breaks on libgdal20.
Thus libgdal20 + gdal-data from
On 02/06/2021 22.22, Sebastian Ramacher wrote:
So, what if we use the free versions between 103 and 200 to transition
to a Debian-specific version? Attached is a patch that does that. It's
not an optimal solution as we would have a release with a
Debian-specific SOVERSIONs. For good reason, we us
Processing commands for cont...@bugs.debian.org:
> fixed 989283 0.11.3-1
Bug #989283 [prosody] prosody: upgrade overwrites changed files in /etc without
asking
Marked as fixed in versions prosody/0.11.3-1.
> thanks
Stopping processing here.
Please contact me if you need assistance.
--
989283: h
Processing commands for cont...@bugs.debian.org:
> notfound 967939 1.1.1+rev1500-1.2
Bug #967939 [dvb-apps] dvb-apps: Update dvb-apps:amd64 1.1.1+rev1500-1.2 =>
1.1.1+rev1500-1.4 breaks gnutv
No longer marked as found in versions linuxtv-dvb-apps/1.1.1+rev1500-1.2.
> found 967939 1.1.1+rev1500-1.
Package: wireguard-dkms
Severity: serious
The only kernel shipped in bullseye is 5.10, and dkms.conf
already inhits building the module for it.
There is not much benefit shipping a package that cannot
do anything useful in the release in question.
Running the buster kernel at least temporarily i
Processing commands for cont...@bugs.debian.org:
> affects 989332 + security.debian.org,release.debian.org
Bug #989332 [libwebkit2gtk-4.0-37] libwebkit2gtk-4.0-37: May 30 upgrade for
DSA-4923-1 broke the epiphany browser
Added indication that 989332 affects security.debian.org and release.debian.
Processing commands for cont...@bugs.debian.org:
> affects 989283 + security.debian.org,release.debian.org
Bug #989283 [prosody] prosody: upgrade overwrites changed files in /etc without
asking
Added indication that 989283 affects security.debian.org and release.debian.org
> thanks
Stopping proce
On Wed, Jun 02, 2021 at 09:21:54PM +0200, Jose wrote:
> Berto,
>
> Thanks.
>
> Here is the full gdb bt after installing the debug symbols.
>
> Please tell me if you'd like me to do any additional tests
> or debugging.
>
> --josé
> #0 0x7f707b64e7bb in __GI_raise (sig=sig@entry=6) at
> ..
Hi Gilles, hi Andreas,
On 2021-06-01 14:15:52 +0200, Andreas Beckmann wrote:
> On Tue, 18 May 2021 20:36:23 +0200 Dennis Filder wrote:
> > One more observation: Bullseye's gdal-data 3.2.1+dfsg-1 defines a
> > Breaks: libgdal20 (< 2.5.0~), but the libgdal20 in Buster is 2.4.0,
> > and postgresql-1
Processing control commands:
> retitle -1 nauty: i386 baseline violation by using popcnt
Bug #989399 [nauty] nauty FTCBFS -- multiple reasons
Changed Bug title to 'nauty: i386 baseline violation by using popcnt' from
'nauty FTCBFS -- multiple reasons'.
> severity -1 serious
Bug #989399 [nauty] na
This is really an annoying bug. Just installed libtowitoko2 2.0.7-9+b1 to
test a serial CHIPDRIVE card reader only to find this old bug again.
The original /etc/reader.conf.d/libtowitoko2 file is:
FRIENDLYNAME "Towitoko Chipdrive Reader"
DEVICENAME/dev/ttyS0
LIBPATH /usr/lib
On Wed, Jun 02, 2021 at 06:11:56PM +0200, Jose wrote:
> Hi Berto,
>
> Sorry for the delay. Yopmail went down a little bit after I sent my
> initial report.
>
> Discord still crashes for me. I'm attaching the gdb trace you
> requested. I opened epiphany with a blank home screen, then went
> to the
Your message dated Wed, 02 Jun 2021 15:34:01 +
with message-id
and subject line Bug#989394: fixed in python-django 2:2.2.24-1
has caused the Debian Bug report #989394,
regarding python-django: CVE-2021-33203 & CVE-2021-33571
to be marked as done.
This means that you claim that the problem has
Your message dated Wed, 02 Jun 2021 15:19:05 +
with message-id
and subject line Bug#989394: fixed in python-django 2:3.2.4-1
has caused the Debian Bug report #989394,
regarding python-django: CVE-2021-33203 & CVE-2021-33571
to be marked as done.
This means that you claim that the problem has
Processing commands for cont...@bugs.debian.org:
> found 989394 2:2.2.23-1
Bug #989394 [python-django] python-django: CVE-2021-33203 & CVE-2021-33571
There is no source info for the package 'python-django' at version '2:2.2.23-1'
with architecture ''
Unable to make a source version for version '2
Processing commands for cont...@bugs.debian.org:
> found 989394 2:2.2.23-1
Bug #989394 [python-django] python-django: CVE-2021-33203 & CVE-2021-33571
There is no source info for the package 'python-django' at version '2:2.2.23-1'
with architecture ''
Unable to make a source version for version '2
Package: python-django
Version: 1:1.11.29-1~deb10u1
X-Debbugs-CC: t...@security.debian.org
Severity: grave
Tags: security
Hi,
The following vulnerabilities were published for python-django.
* CVE-2021-33203: Potential directory traversal via admindocs
Staff members could use the admindocs
Processing commands for cont...@bugs.debian.org:
> # back to original severity as code not built
> severity 989288 important
Bug #989288 [dacs] CVE-2021-29629
Severity set to 'important' from 'serious'
> thanks
Stopping processing here.
Please contact me if you need assistance.
--
989288: https:
Processing commands for cont...@bugs.debian.org:
> severity 987937 important
Bug #987937 [src:mialmpick] mialmpick: fails to build from the source
Severity set to 'important' from 'serious'
> thanks
Stopping processing here.
Please contact me if you need assistance.
--
987937: https://bugs.debia
Your message dated Wed, 02 Jun 2021 10:33:29 +
with message-id
and subject line Bug#956320: fixed in fabric 2.5.0-0.3
has caused the Debian Bug report #956320,
regarding python3-fabric: Missing dependency on python3-decorator
to be marked as done.
This means that you claim that the problem ha
Your message dated Wed, 02 Jun 2021 09:18:55 +
with message-id
and subject line Bug#95: fixed in rlottie 0.1+dfsg-2
has caused the Debian Bug report #95,
regarding CVE-2021-31323 CVE-2021-31322 CVE-2021-31321 CVE-2021-31320
CVE-2021-31319 CVE-2021-31318 CVE-2021-31317 CVE-2021-31315
t
Hi Matteo
Am 01.06.21 um 15:55 schrieb Matteo F. Vescovi:
Actually, upstream already provided me a patch to fix the issue but I'm
lacking time these days to prepare a revision with the fix.
I can confirm that 1.4.11+dfsg-3 fixes the issue. Thanks!
I'll try to upload a fixed source package ton
Hi Jochen!
first, thanks for the test. I was guessing but I do no pretend that you did it.
In any case, it is great that you have done it because now, we have real
information.
OTOH I like very much your summary. I take it as a reference for the future.
Thanks for all,
Cheers,
Leo
--
--
Processing control commands:
> tag -1 + upstream
Bug #989193 [apparmor-profiles-extra] breaks apt-cacher-ng by blocking link
operation
Added tag(s) upstream.
> forwarded -1 https://gitlab.com/apparmor/apparmor-profiles/-/merge_requests/51
Bug #989193 [apparmor-profiles-extra] breaks apt-cacher-ng
Control: tag -1 + upstream
Control: forwarded -1
https://gitlab.com/apparmor/apparmor-profiles/-/merge_requests/51
Control: tag -1 + moreinfo
Hi,
Eduard Bloch (2021-05-28):
> see attachment, your config which doesn't allow link calls, which
> sporadically breaks operation of apt-cacher-ng in une
Hi Leo,
* Leopold Palomo-Avellaneda [2021-06-02 08:43]:
It's strange and I think that it's more a misunderstanding from
upstream than a packaging name error.
I agree with Jochen that for Bullseye with just a binNMU should be
enough. However, I would like to know if it's binary incompatible
Source: zfs-linux
Version: 2.0.1-1
Severity: grave
Tags: upstream
Justification: causes data loss
X-Debbugs-Cc: aeru...@aerusso.net
See Brian Behlendof's comment at [1], in the merge request for commit
3f81aba76, referencing the analysis of the bug report [2].
In summary: a kernel buffer iterator
29 matches
Mail list logo