Re: drop-seq-tools/i386 has unsatisfiable dependency - please enable migration

2020-06-05 Thread Paul Gevers
Hi Andreas, On 06-06-2020 07:27, Andreas Tille wrote: > if I remember correctly this kind of cases needs manual intervention Indeed. > (I > do not remember clearly whether it was writing an e-mail here - so > please teach me if I'm wrong). We prefer bug reports, to avoid them getting lost. > D

drop-seq-tools/i386 has unsatisfiable dependency - please enable migration

2020-06-05 Thread Andreas Tille
Hi release team, if I remember correctly this kind of cases needs manual intervention (I do not remember clearly whether it was writing an e-mail here - so please teach me if I'm wrong). Drop-seq-tools is clearly Arch:all but depends picard-tools which exists only for amd64 and is thus only insta

Bug#962306: buster-pu: package b43-fwcutter/1:019-4+deb10u1

2020-06-05 Thread Andreas Beckmann
Package: release.debian.org Severity: normal Tags: buster User: release.debian@packages.debian.org Usertags: pu Hi, I'd like to fix some bugs in b43-fwcutter with commits cherry-picked from the package in sid: * Run firmware removal commands under LC_ALL=C. (Closes: #960791) -> instal

NEW changes in stable-new

2020-06-05 Thread Debian FTP Masters
Processing changes file: ca-certificates_20200601~deb10u1_all.changes ACCEPT

Bug#962155: stretch-pu: package ca-certificates/20200601~deb9u1

2020-06-05 Thread Adam D. Barratt
On Fri, 2020-06-05 at 13:14 -0500, Michael Shuler wrote: > On 6/5/20 10:37 AM, Adam D. Barratt wrote: > > On Thu, 2020-06-04 at 20:48 -0500, Michael Shuler wrote: > > > Thanks again, uploaded to mentors: > > > > > > RFS: ca-certificates/20200601~deb9u1 [RC] -- Common CA > > > certificates > > > ht

Bug#962155: stretch-pu: package ca-certificates/20200601~deb9u1

2020-06-05 Thread Michael Shuler
On 6/5/20 10:37 AM, Adam D. Barratt wrote: On Thu, 2020-06-04 at 20:48 -0500, Michael Shuler wrote: Thanks again, uploaded to mentors: RFS: ca-certificates/20200601~deb9u1 [RC] -- Common CA certificates https://bugs.debian.org/962245 I re-uploaded to mentors the updated 20200601~deb9u1 packag

NEW changes in stable-new

2020-06-05 Thread Debian FTP Masters
Processing changes file: ca-certificates_20200601~deb10u1_source.changes ACCEPT

Bug#962152: ca-certificates 20200601~deb10u1 flagged for acceptance

2020-06-05 Thread Adam D Barratt
package release.debian.org tags 962152 = buster pending thanks Hi, The upload referenced by this bug report has been flagged for acceptance into the proposed-updates queue for Debian buster. Thanks for your contribution! Upload details == Package: ca-certificates Version: 20200601

Processed: ca-certificates 20200601~deb10u1 flagged for acceptance

2020-06-05 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > package release.debian.org Limiting to bugs with field 'package' containing at least one of 'release.debian.org' Limit currently set to 'package':'release.debian.org' > tags 962152 = buster pending Bug #962152 [release.debian.org] buster-pu: pac

Processed: ros-actionlib build depends on libboost-signals-dev that is removed in boost1.71

2020-06-05 Thread Debian Bug Tracking System
Processing control commands: > block 961995 by -1 Bug #961995 [release.debian.org] transition: boost-defaults 961995 was blocked by: 959437 960426 962252 948127 962286 959479 960422 962229 954351 962287 960427 960378 959439 958156 962253 948122 960413 962070 955581 960412 960331 959463 959573 94

Processed: ros-image-common FTBFS with boost 1.71

2020-06-05 Thread Debian Bug Tracking System
Processing control commands: > block 961995 by -1 Bug #961995 [release.debian.org] transition: boost-defaults 961995 was blocked by: 960412 960416 954711 948127 954648 953871 960426 960422 960418 960378 959573 948122 962252 959439 962229 960427 954351 960424 962070 959463 954649 959417 955581 96

Processed: ros-dynamic-reconfigure build depends on libboost-signals-dev that is removed in boost1.71

2020-06-05 Thread Debian Bug Tracking System
Processing control commands: > block 961995 by -1 Bug #961995 [release.debian.org] transition: boost-defaults 961995 was blocked by: 954711 953873 959573 958156 960385 960424 949837 960378 960331 960383 960413 960412 960421 953871 959439 960500 960414 959463 959479 948127 960422 959480 962086 96

Bug#962155: stretch-pu: package ca-certificates/20200601~deb9u1

2020-06-05 Thread Adam D. Barratt
On Thu, 2020-06-04 at 20:48 -0500, Michael Shuler wrote: > Thanks again, uploaded to mentors: > > RFS: ca-certificates/20200601~deb9u1 [RC] -- Common CA certificates > https://bugs.debian.org/962245 I see there was some additional feedback on the RFS, which is why this hasn't been uploaded yet.

Processed: sword silently loses ICU support when built with ICU without icu-config

2020-06-05 Thread Debian Bug Tracking System
Processing control commands: > block 960193 by -1 Bug #960193 [release.debian.org] transition: icu 960193 was blocked by: 962069 960239 959756 960241 960236 960263 960374 955114 960243 960237 960623 962095 960193 was not blocking any bugs. Added blocking bug(s) of 960193: 962265 -- 960193: http

Bug#962264: stretch-pu: package ruby2.3/2.3.3-1+deb9u8

2020-06-05 Thread Utkarsh Gupta
Package: release.debian.org User: release.debian@packages.debian.org Usertags: pu Tags: stretch X-Debbugs-CC: debian-r...@lists.debian.org Severity: normal Hello, ruby2.3 was affected by CVE-2020-10663, which was an unsafe object creation vulnerability. This has been fixed in Sid, Bullseye, a

Bug#962256: stretch-pu: package ruby-json/2.0.1+dfsg-3+deb9u1

2020-06-05 Thread Utkarsh Gupta
Package: release.debian.org User: release.debian@packages.debian.org Usertags: pu Tags: stretch X-Debbugs-CC: debian-r...@lists.debian.org Severity: normal Hello, ruby-json was affected by CVE-2020-10663, which was an unsafe object creation vulnerability. This has been fixed in Sid, Bullseye,

Bug#962255: buster-pu: package ruby-json/2.1.0+dfsg-2+deb10u1

2020-06-05 Thread Utkarsh Gupta
Package: release.debian.org User: release.debian@packages.debian.org Usertags: pu Tags: buster X-Debbugs-CC: debian-r...@lists.debian.org Severity: normal Hello, ruby-json was affected by CVE-2020-10663, which was an unsafe object creation vulnerability. This has been fixed in Sid, Bullseye,