i think i know what rhat might be. i flat-out refuse to let a mission critical
piece of software developed by pottering run on systems that i manage,
particularly after seeing the persistent generation of CVEs on mitre.org, and
also in interactions with him where he just does not listen.
(trans
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Sat, 28 May 2022 17:41:16 +0200
Source: libcaca
Architecture: source
Version: 0.99.beta19-3
Distribution: unstable
Urgency: medium
Maintainer: Debian QA Group
Changed-By: Fabio Fantoni
Closes: 987278
Changes:
libcac
libcaca_0.99.beta19-3_source.changes uploaded successfully to localhost
along with the files:
libcaca_0.99.beta19-3.dsc
libcaca_0.99.beta19-3.debian.tar.xz
libcaca_0.99.beta19-3_source.buildinfo
Greetings,
Your Debian queue daemon (running on host usper.debian.org)
Processing control commands:
> tags 857018 moreinfo
Bug #857018 [schroot] schroot: Setup script not running, --session-name not
working
Added tag(s) moreinfo.
--
857018: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=857018
Debian Bug Tracking System
Contact ow...@bugs.debian.org with proble
Control: tags 857018 moreinfo
Mike Hommey wrote...
> I installed a new machine some time ago, and setup schroot for the first
> time on it...
Hi, it's been a while, and I failed to reproduce your report. Can you
please check whether the problems still exist on your side? Quite
frankly, this feel
Conrol: tags 992430 moreinfo
Sergey Vlasov wrote...
> When doing schroot into a buster chroot environment, sudo
> commands fail due to password not matching the current user password.
> There is no such problem for bullseye chroot environment.
>
> To reproduce:
>
> 0. make sure your current use
Processing control commands:
> tags 993957 moreinfo
Bug #993957 [schroot] schroot: fails with non-existent subdirectory
Added tag(s) moreinfo.
--
993957: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=993957
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
Control: tags 993957 moreinfo
lkcl wrote...
> schroot 1.6.10 (04 May 2014) fails with a continuous attempt to read
> a non-existent subdirectory, /run/systemd/userdb, when operating a
> type "directory" schroot.
>
> a type "plain" does not have this same issue.
>
> creating the missing subdirec
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Sat, 28 May 2022 10:35:49 -0400
Source: pidgin-librvp
Architecture: source
Version: 0.9.7cvs-3
Distribution: unstable
Urgency: medium
Maintainer: Debian QA Group
Changed-By: Boyuan Yang
Closes: 1011728
Changes:
pidg
pidgin-librvp_0.9.7cvs-3_source.changes uploaded successfully to localhost
along with the files:
pidgin-librvp_0.9.7cvs-3.dsc
pidgin-librvp_0.9.7cvs.orig.tar.gz
pidgin-librvp_0.9.7cvs-3.debian.tar.xz
pidgin-librvp_0.9.7cvs-3_amd64.buildinfo
Greetings,
Your Debian queue daemon (run
Your message dated Sat, 28 May 2022 15:03:56 +
with message-id
and subject line Bug#1011728: fixed in pidgin-librvp 0.9.7cvs-3
has caused the Debian Bug report #1011728,
regarding pidgin-librvp: FTBFS: rm: cannot remove
'/<>/debian/pidgin-librvp/usr/lib/purple-2/librvp.la': No such
file or d
Hello,
To Whom It May Concern:
I want to enroll three members of my family for horse riding training in your
establishment.
Below is their schedule list for your consideration:
1] Number of persons- 3 Adults male (Age 23,21 and 19)
2] Duration of the enrollment- 4 Weeks,5 times weekly,making a
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Sat, 28 May 2022 11:55:46 +0200
Source: open-invaders
Architecture: source
Version: 0.3-8
Distribution: unstable
Urgency: medium
Maintainer: Debian QA Group
Changed-By: Adam Borowski
Closes: 989063 1011963
Changes:
Your message dated Sat, 28 May 2022 11:20:49 +
with message-id
and subject line Bug#989063: fixed in open-invaders 0.3-8
has caused the Debian Bug report #989063,
regarding open-invaders: Sometimes segfaults during gameplay due to array
overrun
to be marked as done.
This means that you claim
Your message dated Sat, 28 May 2022 11:20:49 +
with message-id
and subject line Bug#1011963: fixed in open-invaders 0.3-8
has caused the Debian Bug report #1011963,
regarding open-invaders FTBFS on riscv64
to be marked as done.
This means that you claim that the problem has been dealt with.
I
open-invaders_0.3-8_source.changes uploaded successfully to localhost
along with the files:
open-invaders_0.3-8.dsc
open-invaders_0.3-8.debian.tar.xz
open-invaders_0.3-8_source.buildinfo
Greetings,
Your Debian queue daemon (running on host usper.debian.org)
dvbackup_0.0.4-10.dsc: Invalid size hash for dvbackup_0.0.4.orig.tar.gz:
According to the control file the size hash should be 113356,
but dvbackup_0.0.4.orig.tar.gz has 115303.
If you did not include dvbackup_0.0.4.orig.tar.gz in your upload, a different
version
might already be known to the
eancheck_1.0-3.dsc: Invalid size hash for eancheck_1.0.orig.tar.gz:
According to the control file the size hash should be 2696,
but eancheck_1.0.orig.tar.gz has 2777.
If you did not include eancheck_1.0.orig.tar.gz in your upload, a different
version
might already be known to the archive softw
dvbackup_0.0.4-10_source.changes uploaded successfully to localhost
along with the files:
dvbackup_0.0.4-10.dsc
dvbackup_0.0.4-10.debian.tar.xz
dvbackup_0.0.4-10_amd64.buildinfo
Greetings,
Your Debian queue daemon (running on host usper.debian.org)
eancheck_1.0-3_source.changes uploaded successfully to localhost
along with the files:
eancheck_1.0-3.dsc
eancheck_1.0-3.debian.tar.xz
eancheck_1.0-3_amd64.buildinfo
Greetings,
Your Debian queue daemon (running on host usper.debian.org)
20 matches
Mail list logo