Your message dated Fri, 2 Jul 2021 13:36:00 +0900
with message-id <20210702133601.c88e8500b6779ec063973...@iijmio-mail.jp>
and subject line
has caused the Debian Bug report #989799,
regarding psmisc: Undeclared file conflict with manpages-de from
buster-backports
to be marked as done.
This means
Hi Helge,
On Fri, 2 Jul 2021 10:29:53 +0900
Hideki Yamane wrote:
> We can close it via mail, but should investigate its reason, IMO.
Note it as https://bugs.debian.org/990557
Let's close Bug#989799 via hand.
--
Hideki Yamane
On Thu, 1 Jul 2021 21:07:03 +0200
Helge Kreutzmann wrote:
> It now has. So this bug is closed, if users upgrade to the latestes
> backport version.
Hmm, however, this bug is not closed automatically. Weird.
https://tracker.debian.org/news/1243791/accepted-manpages-l10n-4100-1bpo101-source-into
(somehow my message didn't made it to the BTS, sorry for double post.)
Hi Hideki and Vincent,
just some information from a bystander. Also Ccing the bug author for
more information. @Vincent: would be great to get your answers as
well.
* Hideki Yamane [2021-06-28 22:35]:
On Sun, 14 Feb 202
Hi
On 2021-06-30 17:40:42 +0900, Hideki Yamane wrote:
> Hi,
>
> On Tue, 22 Jun 2021 11:23:51 +0200 Sebastian Ramacher
> wrote:
> > 1.3.4-1 would have needed to rename the package to libopenscap25 and
> > start a library transition. The library package also contains a bunch of
> > binaries and o
Hi Hideki and Vincent,
just some information from a bystander. Also Ccing the bug author for
more information. @Vincent: would be great to get your answers as well.
* Hideki Yamane [2021-06-28 22:35]:
On Sun, 14 Feb 2021 14:12:17 + Vincent Arkesteijn
wrote:
Firefox is killed with SIGI
Your message dated Thu, 01 Jul 2021 20:33:25 +
with message-id
and subject line Bug#990527: fixed in kimageformats 5.78.0-5
has caused the Debian Bug report #990527,
regarding kimageformats: CVE-2021-36083
to be marked as done.
This means that you claim that the problem has been dealt with.
I
Hi
> CVE-2021-36083[0]:
kimageformats_5.78.0-5_source.changes uploaded with the fix.
Thanks
Norbert
--
PREINING Norbert https://www.preining.info
Fujitsu Research + IFMGA Guide + TU Wien + TeX Live + Debian Dev
GPG: 0x860CDC13 fp: F7D8 A928 26E3 16A1 9FA0
Processing commands for cont...@bugs.debian.org:
> tags 990543 + upstream
Bug #990543 [src:rpm] rpm: CVE-2021-35937 CVE-2021-35938 CVE-2021-35939
Added tag(s) upstream.
> tags 990542 + upstream
Bug #990542 [src:glibc] glibc: CVE-2021-35942
Added tag(s) upstream.
> found 990542 2.31-12
Bug #990542
Hello Hideki,
On Wed, Jun 30, 2021 at 01:46:37PM +0900, Hideki Yamane wrote:
> Have it reached to buster-backports repo?
It now has. So this bug is closed, if users upgrade to the latestes
backport version.
Greetings
Helge
--
Dr. Helge Kreutzmann deb...@he
Processing commands for cont...@bugs.debian.org:
> affects 990493 autosize.js node-babel-plugin-lodash
Bug #990493 {Done: Pirate Praveen }
[node-babel-plugin-add-module-exports] node-babel-plugin-add-module-exports
broken with babel-preset-env 7
Added indication that 990493 affects autosize.js a
On Wed, 30 Jun 2021 21:23:37 +0530 Pirate Praveen
wrote:
> $ reverse-depends -b node-babel-plugin-add-module-exports
> Reverse-Build-Depends
> * autosize.js
> * node-babel-plugin-lodash
> * node-colormin
> * node-css-loader
> * node-deep-for-each
> * node-es6-promise
> * node-handlebars
> * node
Source: mruby
X-Debbugs-CC: t...@security.debian.org
Severity: grave
Tags: security
Hi,
The following vulnerability was published for mruby.
CVE-2020-36401[0]:
| mruby 2.1.2 has a double free in mrb_default_allocf (called from
| mrb_free and obj_free).
https://bugs.chromium.org/p/oss-fuzz/issue
In order to reproduce the error I took the code from here (also
attached):
https://gist.github.com/chergert/eb6149916b10d3bf094c
and commented out the #include .
and compiled it with
gcc vdso-getcpu.c -ldl
running the resulting a.out will crash on a s390x qemu guest, but on
ppc64el guest not.
I h
Processing commands for cont...@bugs.debian.org:
> tags 990524 + upstream
Bug #990524 [src:rabbitmq-server] rabbitmq-server: CVE-2021-32719 CVE-2021-32718
Added tag(s) upstream.
> found 990524 3.8.9-3
Bug #990524 [src:rabbitmq-server] rabbitmq-server: CVE-2021-32719 CVE-2021-32718
Marked as found
Processing commands for cont...@bugs.debian.org:
> found 990527 5.78.0-4
Bug #990527 [src:kimageformats] kimageformats: CVE-2021-36083
Marked as found in versions kimageformats/5.78.0-4.
> close 990527 5.83.0-1
Bug #990527 [src:kimageformats] kimageformats: CVE-2021-36083
Marked as fixed in versio
found 990527 5.78.0-4
close 990527 5.83.0-1
thanks
Dear Andreas,
thank you for the hint about post-installation scripts.
The colleague whom I lended my Eyes17 box could check the compatibility
of expeyes software vs. modemmanager with success: this validates the
udev rules file.
I uploaded a fixed package to unstable, anf filed an unblock reques
Source: ndpi
X-Debbugs-CC: t...@security.debian.org
Severity: grave
Tags: security
Hi,
The following vulnerability was published for ndpi.
CVE-2021-36082[0]:
| ntop nDPI 3.4 has a stack-based buffer overflow in
| processClientServerHello.
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=30
Source: kimageformats
X-Debbugs-CC: t...@security.debian.org
Severity: grave
Tags: security
Hi,
The following vulnerability was published for kimageformats.
CVE-2021-36083[0]:
| KDE KImageFormats 5.70.0 through 5.81.0 has a stack-based buffer
| overflow in XCFImageFormat::loadTileRLE.
https://b
Source: libgrokj2k
X-Debbugs-CC: t...@security.debian.org
Severity: grave
Tags: security
Hi,
The following vulnerability was published for libgrokj2k.
CVE-2021-36089[0]:
| Grok 7.6.6 through 9.2.0 has a heap-based buffer overflow in
| grk::FileFormatDecompress::apply_palette_clr (called from
| g
Your message dated Thu, 01 Jul 2021 10:48:30 +
with message-id
and subject line Bug#990489: fixed in expeyes 4.8.8+repack-2
has caused the Debian Bug report #990489,
regarding python3-expeyes: superfluous Conflicts: modemmanager causes problems
on buster->bullseye upgrades
to be marked as don
I just found the bug and the fix! It's not in podman but in conmon!
See https://github.com/containers/conmon/releases/tag/v2.0.29 and
https://github.com/containers/conmon/commit/b033cb5dfde6de05e63408fc839f1bb641cddd85
On Tue, 29 Jun 2021 00:08:48 +0900 Hideki Yamane wrote:
> Well, I've tested
23 matches
Mail list logo