On 8/28/19 6:05 AM, Sebastiaan Couwenberg wrote:
> On 8/26/19 5:42 AM, Sebastiaan Couwenberg wrote:
>> On 8/25/19 4:31 PM, Sebastiaan Couwenberg wrote:
>>> On 8/25/19 3:22 PM, Jonathan Wiltshire wrote:
On Fri, Jul 12, 2019 at 09:39:26PM +0200, Bas Couwenberg wrote:
> For the Debian GIS tea
Processing changes file: linux_4.19.67-2_mipsel.changes
ACCEPT
[Resending because I got some bounces]
On 2019, ഓഗസ്റ്റ് 29 7:50:00 PM IST, Dan Clery wrote:
>Isn't this the sort of problem that things like flatpack or snap were
>created for?
In those solutions either security updates have to handled by each flatpack or
snap instead of sharing it (duplicatio
[Resending because I got some bounces]
On 2019, ഓഗസ്റ്റ് 29 7:10:38 PM IST, Abhijith PA wrote:
>
>Hi,
>
>On 29/08/19 6:47 pm, Paul Gevers wrote:
>> Hi
>>
>> On 29-08-2019 14:28, Raphael Hertzog wrote:
>>> (Note: pkg-security@tracker.d.o is not a valid email, dropped)
>>>
>>> Hi,
>>>
>>> On Thu
Processing control commands:
> retitle -1 buster-pu: package reportbug/7.5.3~deb10u1
Bug #935988 [release.debian.org] buster-pu: package reportbug/7.5.2+nmu1~deb10u1
Changed Bug title to 'buster-pu: package reportbug/7.5.3~deb10u1' from
'buster-pu: package reportbug/7.5.2+nmu1~deb10u1'.
--
9359
Followup-For: Bug #935988
Control: retitle -1 buster-pu: package reportbug/7.5.3~deb10u1
new debdiff for rebuilding the 7.5.3 maintainer upload for buster.
Andreas
diff -Nru reportbug-7.5.2/bin/reportbug reportbug-7.5.3~deb10u1/bin/reportbug
--- reportbug-7.5.2/bin/reportbug 2019-02-01 02:5
Processing changes file: ceph_12.2.11+dfsg1-2.1+b1_mips.changes
ACCEPT
On Thu, 2019-08-29 at 22:45 +0100, Adam D. Barratt wrote:
> On Thu, 2019-08-29 at 23:20 +0200, Hans-Christoph Steiner wrote:
> > Ok, this is embarrasing: after discussing that Debian version regex
> > and
> > the version scheme for proposed-updates, I failed to see that the
> > regex
> > was wrong
On Thu, 2019-08-29 at 23:20 +0200, Hans-Christoph Steiner wrote:
> Ok, this is embarrasing: after discussing that Debian version regex
> and
> the version scheme for proposed-updates, I failed to see that the
> regex
> was wrong (see https://bugs.debian.org/935938). Its fixed now in
> 25.0.0+11+de
Control: tags -1 + confirmed
On Thu, 2019-08-29 at 00:04 +0200, Nicolas Braud-Santoni wrote:
> I would like to backport the fix for CVE-2019-9578 in the next point
> release
> for stretch. Please find enclosed the proposed debdiff.
++ /* the response has to be atleast 17 bytes, if it's more
Processing control commands:
> tags -1 + confirmed
Bug #935976 [release.debian.org] stretch-pu: package
node-ws/1.1.0+ds1.e6ddaae4-3+deb9u1
Added tag(s) confirmed.
--
935976: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=935976
Debian Bug Tracking System
Contact ow...@bugs.debian.org with p
Control: tags -1 + confirmed
On Wed, 2019-08-28 at 17:29 +0200, Xavier Guimard wrote:
> During buster release, we fixed CVE-2016-10542 for node-ws. The same
> patch can be applied in Stretch.
>
Please go ahead.
Regards,
Adam
Processing control commands:
> tags -1 + confirmed
Bug #936007 [release.debian.org] stretch-pu: package libu2f-host/1.1.2-2+deb9u1
Added tag(s) confirmed.
--
936007: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=936007
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
Control: tags -1 + confirmed
On Thu, 2019-08-29 at 10:15 +0200, Bas Couwenberg wrote:
> To fix the PBF support in the osmpbf rdeps it needs to be rebuilt
> with protobuf 3.6.1 as reported in #935990.
>
Please go ahead.
Regards,
Adam
Processing control commands:
> tags -1 + confirmed
Bug #936022 [release.debian.org] buster-pu: package osmpbf/1.3.3-11
Added tag(s) confirmed.
--
936022: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=936022
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
Control: tags -1 + confirmed
On Wed, 2019-08-28 at 22:52 +0200, Nicolas Braud-Santoni wrote:
> On Wed, Aug 28, 2019 at 10:29:02PM +0200, Nicolas Braud-Santoni
> wrote:
> > I would like to backport the following patches for libu2f-host to
> > stretch:
> >
> > + Fix for CVE-2019-9578 (Closes: #92
Processing control commands:
> tags -1 + confirmed
Bug #935999 [release.debian.org] buster-pu: package libu2f-host/1.1.9-1+deb10u1
Added tag(s) confirmed.
--
935999: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=935999
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
Control: tags -1 + confirmed
On Thu, 2019-08-29 at 09:51 -0400, Hugo Lefeuvre wrote:
> Small update: I forgot to close the bug report (#932755) and did not
> mention
> CVE-2019-5058 in debian/changelog. You can find an updated debdiff in
> attachment.
>
Please go ahead.
Regards,
Adam
Control: tags -1 + confirmed
On Thu, 2019-08-29 at 09:45 -0400, Hugo Lefeuvre wrote:
> sdl-image1.2 is affected by a number of security issues in buster.
> Impact is
> quite minor, but it would still be nice to get them fixed.
>
Please go ahead.
Regards,
Adam
Ok, this is embarrasing: after discussing that Debian version regex and
the version scheme for proposed-updates, I failed to see that the regex
was wrong (see https://bugs.debian.org/935938). Its fixed now in
25.0.0+11+deb10u1. And hopefully I got the version right.
Is this bug report enough,
Processing control commands:
> tags -1 + confirmed
Bug #936051 [release.debian.org] stretch-pu: package
sdl-image1.2/1.2.12-5+deb9u2
Added tag(s) confirmed.
--
936051: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=936051
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
Processing control commands:
> tags -1 + confirmed
Bug #936056 [release.debian.org] buster-pu: package
sdl-image1.2/1.2.12-10+deb10u1
Added tag(s) confirmed.
--
936056: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=936056
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problem
Processing changes file: gdb-mingw-w64_10.8+b1_mips.changes
REJECT
Processing changes file: ceph_12.2.11+dfsg1-2.1+b1_amd64.changes
ACCEPT
Processing changes file: ceph_12.2.11+dfsg1-2.1+b1_arm64.changes
ACCEPT
Processing changes file: ceph_12.2.11+dfsg1-2.1+b1_armel.changes
ACCEPT
Processi
On 29/08/2019 20.26, Adam D. Barratt wrote:
> Will you be updating and/or reversioning the pu to reflect the
> maintainer upload?
Yes, updated pu is coming... The maintainer upload contained a few more
bugfixes, but I think they all should go to buster as well.
Unfortunately it's lacking a one-lin
On Wed, 2019-08-28 at 19:52 +0200, Andreas Beckmann wrote:
> reportbug/buster does not know about buster being stable ...
>
> I've just uploaded a fix to unstable via DELAYED/2, so it should be
> in
> unstable before the weekend, still hoping for a maintainer upload.
That happened.
[...]
> I'll
package release.debian.org
tags 935588 = buster pending
thanks
Hi,
The upload referenced by this bug report has been flagged for acceptance into
the proposed-updates queue for Debian buster.
Thanks for your contribution!
Upload details
==
Package: gdb-mingw-w64
Version: 10.8+b2
E
Processing commands for cont...@bugs.debian.org:
> package release.debian.org
Limiting to bugs with field 'package' containing at least one of
'release.debian.org'
Limit currently set to 'package':'release.debian.org'
> tags 935588 = buster pending
Bug #935588 [release.debian.org] nmu: rdepends
package release.debian.org
tags 935588 = buster pending
thanks
Hi,
The upload referenced by this bug report has been flagged for acceptance into
the proposed-updates queue for Debian buster.
Thanks for your contribution!
Upload details
==
Package: gdb
Version: 8.2.1-2+b1
Explanat
Processing commands for cont...@bugs.debian.org:
> package release.debian.org
Limiting to bugs with field 'package' containing at least one of
'release.debian.org'
Limit currently set to 'package':'release.debian.org'
> tags 935588 = buster pending
Bug #935588 [release.debian.org] nmu: rdepends
Processing commands for cont...@bugs.debian.org:
> package release.debian.org
Limiting to bugs with field 'package' containing at least one of
'release.debian.org'
Limit currently set to 'package':'release.debian.org'
> tags 935588 = buster pending
Bug #935588 [release.debian.org] nmu: rdepends
package release.debian.org
tags 935588 = buster pending
thanks
Hi,
The upload referenced by this bug report has been flagged for acceptance into
the proposed-updates queue for Debian buster.
Thanks for your contribution!
Upload details
==
Package: ceph
Version: 12.2.11+dfsg1-2.1+b
Processing changes file: linux-signed-arm64_4.19.67+2_arm64.changes
ACCEPT
Processing changes file: yubico-piv-tool_1.4.2-2+deb9u2_arm64.changes
ACCEPT
Processing changes file: yubico-piv-tool_1.4.2-2+deb9u2_armel.changes
ACCEPT
Processing changes file: yubico-piv-tool_1.4.2-2+deb9u2_armhf.changes
ACCEPT
Processing changes file: yubico-piv-tool_1.4.2-2+deb9u2_mips.c
Processing changes file: linux-signed-amd64_4.19.67+2_amd64.changes
ACCEPT
Package: release.debian.org
Severity: normal
Tags: stretch
User: release.debian@packages.debian.org
Usertags: pu
Another package required for Firefox ESR 68. This time the package is already
present in stretch, but a newer version (>= 2.13) is required, and the diff is
quite huge, so I went al
Processing changes file: yubico-piv-tool_1.4.2-2+deb9u2_amd64.changes
ACCEPT
Processing changes file: yubico-piv-tool_1.4.2-2+deb9u2_i386.changes
ACCEPT
Package: release.debian.org
Severity: normal
Tags: stretch
User: release.debian@packages.debian.org
Usertags: pu
Let's update the codename mapping s.t. reportbug offers current options
(e.g. stretch-pu and buster-pu) and queries up-to-date version
information.
This request is being submitted
Isn't this the sort of problem that things like flatpack or snap were
created for?
On Thu, Aug 29, 2019 at 9:57 AM Abhijith PA wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
>
>
> Hi,
>
> On 29/08/19 6:47 pm, Paul Gevers wrote:
> > Hi
> >
> > On 29-08-2019 14:28, Raphael Hertzog wrot
Small update: I forgot to close the bug report (#932755) and did not mention
CVE-2019-5058 in debian/changelog. You can find an updated debdiff in
attachment.
cheers,
Hugo
--
Hugo Lefeuvre (hle)|www.owl.eu.com
RSA4096_ 360B 03B3 BF27 4F4D 7A3F D5E8 14AA 1EB8 A247 3DFD
ed2
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Hi,
On 29/08/19 6:47 pm, Paul Gevers wrote:
> Hi
>
> On 29-08-2019 14:28, Raphael Hertzog wrote:
>> (Note: pkg-security@tracker.d.o is not a valid email, dropped)
>>
>> Hi,
>>
>> On Thu, 29 Aug 2019, Holger Levsen wrote:
In general, we (Deb
Package: release.debian.org
Severity: normal
Tags: buster
User: release.debian@packages.debian.org
Usertags: pu
X-Debbugs-CC: t...@security.debian.org
Hi,
sdl-image1.2 is affected by a number of security issues in buster. Impact is
quite minor, but it would still be nice to get them fixed.
A
Hi
On 29-08-2019 14:28, Raphael Hertzog wrote:
> (Note: pkg-security@tracker.d.o is not a valid email, dropped)
>
> Hi,
>
> On Thu, 29 Aug 2019, Holger Levsen wrote:
>>> In general, we (Debian) don't have a good answer to this problem and
>>> virtualbox is clearly a bad precedent. We really need
Líneas Enisa para pymes 1. Enisa crecimiento -Entre 25mil y 1,5M de
euros. -Vencimiento máximo a 9 años con un máximo de 7
de carencia del principal. -Para pymes con proyectos de
consolidación, crecimiento e internacionalización. Quiero
saber más 2. Enisa emprendedores -Entre 25mil y 300mil euros
Package: release.debian.org
Severity: normal
Tags: stretch
User: release.debian@packages.debian.org
Usertags: pu
Hi,
sdl-image1.2 is affected by a number of security issues in stretch. Impact is
quite minor, but it would still be nice to get them fixed.
Attached is a debdiff addressing most
(Note: pkg-security@tracker.d.o is not a valid email, dropped)
Hi,
On Thu, 29 Aug 2019, Holger Levsen wrote:
> > In general, we (Debian) don't have a good answer to this problem and
> > virtualbox is clearly a bad precedent. We really need to find a solution
> > to this in concertation with the r
hi,
(this started as a discussion whether to update radare2 in (old)stable
and has since then evolved into a discussion about the problem
summarized well by Raphael.)
On Thu, Aug 29, 2019 at 01:48:14PM +0200, Raphael Hertzog wrote:
> On Thu, 29 Aug 2019, Moritz Mühlenhoff wrote:
> > The upstream
Processing changes file: yubico-piv-tool_1.4.2-2+deb9u1_amd64.changes
ACCEPT
Processing changes file: yubico-piv-tool_1.4.2-2+deb9u2_source.changes
ACCEPT
package release.debian.org
tags 906258 = stretch pending
thanks
Hi,
The upload referenced by this bug report has been flagged for acceptance into
the proposed-updates queue for Debian stretch.
Thanks for your contribution!
Upload details
==
Package: yubico-piv-tool
Version: 1.4.2-
Processing commands for cont...@bugs.debian.org:
> package release.debian.org
Limiting to bugs with field 'package' containing at least one of
'release.debian.org'
Limit currently set to 'package':'release.debian.org'
> tags 906258 = stretch pending
Bug #906258 [release.debian.org] stretch-pu: p
Processing commands for cont...@bugs.debian.org:
> package release.debian.org
Limiting to bugs with field 'package' containing at least one of
'release.debian.org'
Limit currently set to 'package':'release.debian.org'
> tags 906258 = stretch pending
Bug #906258 [release.debian.org] stretch-pu: p
package release.debian.org
tags 906258 = stretch pending
thanks
Hi,
The upload referenced by this bug report has been flagged for acceptance into
the proposed-updates queue for Debian stretch.
Thanks for your contribution!
Upload details
==
Package: yubico-piv-tool
Version: 1.4.2-
Processing changes file: linux-signed-amd64_4.19.67+2_source.changes
ACCEPT
Processing changes file: linux-signed-arm64_4.19.67+2_source.changes
ACCEPT
Processing changes file: lttv_1.5-3+b1_amd64.changes
ACCEPT
Processing changes file: lttv_1.5-3+b1_arm64.changes
ACCEPT
Processing changes
Processing changes file: linux_4.19.67-2_mips64el.changes
ACCEPT
Processing commands for cont...@bugs.debian.org:
> package release.debian.org
Limiting to bugs with field 'package' containing at least one of
'release.debian.org'
Limit currently set to 'package':'release.debian.org'
> tags 935588 = buster pending
Bug #935588 [release.debian.org] nmu: rdepends
package release.debian.org
tags 935588 = buster pending
thanks
Hi,
The upload referenced by this bug report has been flagged for acceptance into
the proposed-updates queue for Debian buster.
Thanks for your contribution!
Upload details
==
Package: lttv
Version: 1.5-3+b1
Explanati
On 2019-08-29 11:46, Emilio Pozuelo Monfort wrote:
On 29/08/2019 11:17, Philipp Kern wrote:
On 2019-08-29 11:14, Emilio Pozuelo Monfort wrote:
Why don't you let the interested teams run the scripts and generate
the required
binNMUs (like they do now), and then you pull that from a cronjob in
w
On 29/08/2019 11:32, Ilias Tsitsimpis wrote:
> On Thu, Aug 29, 2019 at 11:14AM, Emilio Pozuelo Monfort wrote:
>> On 27/08/2019 21:50, Philipp Kern wrote:
>>> Do you have an opinion if this should actually be automated? I.e.
>>> automatically be fed into wb on a regular basis? I think the Release
>>
On 29/08/2019 11:17, Philipp Kern wrote:
> On 2019-08-29 11:14, Emilio Pozuelo Monfort wrote:
>> Why don't you let the interested teams run the scripts and generate the
>> required
>> binNMUs (like they do now), and then you pull that from a cronjob in wuiet
>> and
>> schedule the binNMUs? You wo
On Thu, Aug 29, 2019 at 11:14AM, Emilio Pozuelo Monfort wrote:
> On 27/08/2019 21:50, Philipp Kern wrote:
> > Do you have an opinion if this should actually be automated? I.e.
> > automatically be fed into wb on a regular basis? I think the Release
> > Team would also be the first team who would wa
On 2019-08-29 11:14, Emilio Pozuelo Monfort wrote:
Why don't you let the interested teams run the scripts and generate the
required
binNMUs (like they do now), and then you pull that from a cronjob in
wuiet and
schedule the binNMUs? You would just need to define the format and do
some
sanity c
On 27/08/2019 21:50, Philipp Kern wrote:
> On 8/27/2019 7:39 PM, Adam D. Barratt wrote:
>> On Tue, 2019-08-27 at 19:40 +0300, Ilias Tsitsimpis wrote:
>>> So, how can we move forward? Is the release team willing to give more
>>> members of our team access to the wanna-build infrastructure, or
>>> sh
Package: release.debian.org
Severity: normal
Tags: buster
User: release.debian@packages.debian.org
Usertags: pu
To fix the PBF support in the osmpbf rdeps it needs to be rebuilt with
protobuf 3.6.1 as reported in #935990.
There are no actual changes to the source package for this, just
rebuil
Processing changes file: linux_4.19.67-2_mips.changes
ACCEPT
63 matches
Mail list logo