Hi Andreas,
On 06-06-2020 07:27, Andreas Tille wrote:
> if I remember correctly this kind of cases needs manual intervention
Indeed.
> (I
> do not remember clearly whether it was writing an e-mail here - so
> please teach me if I'm wrong).
We prefer bug reports, to avoid them getting lost.
> D
Hi release team,
if I remember correctly this kind of cases needs manual intervention (I
do not remember clearly whether it was writing an e-mail here - so
please teach me if I'm wrong). Drop-seq-tools is clearly Arch:all but
depends picard-tools which exists only for amd64 and is thus only
insta
Package: release.debian.org
Severity: normal
Tags: buster
User: release.debian@packages.debian.org
Usertags: pu
Hi,
I'd like to fix some bugs in b43-fwcutter with commits cherry-picked
from the package in sid:
* Run firmware removal commands under LC_ALL=C. (Closes: #960791)
-> instal
Processing changes file: ca-certificates_20200601~deb10u1_all.changes
ACCEPT
On Fri, 2020-06-05 at 13:14 -0500, Michael Shuler wrote:
> On 6/5/20 10:37 AM, Adam D. Barratt wrote:
> > On Thu, 2020-06-04 at 20:48 -0500, Michael Shuler wrote:
> > > Thanks again, uploaded to mentors:
> > >
> > > RFS: ca-certificates/20200601~deb9u1 [RC] -- Common CA
> > > certificates
> > > ht
On 6/5/20 10:37 AM, Adam D. Barratt wrote:
On Thu, 2020-06-04 at 20:48 -0500, Michael Shuler wrote:
Thanks again, uploaded to mentors:
RFS: ca-certificates/20200601~deb9u1 [RC] -- Common CA certificates
https://bugs.debian.org/962245
I re-uploaded to mentors the updated 20200601~deb9u1 packag
Processing changes file: ca-certificates_20200601~deb10u1_source.changes
ACCEPT
package release.debian.org
tags 962152 = buster pending
thanks
Hi,
The upload referenced by this bug report has been flagged for acceptance into
the proposed-updates queue for Debian buster.
Thanks for your contribution!
Upload details
==
Package: ca-certificates
Version: 20200601
Processing commands for cont...@bugs.debian.org:
> package release.debian.org
Limiting to bugs with field 'package' containing at least one of
'release.debian.org'
Limit currently set to 'package':'release.debian.org'
> tags 962152 = buster pending
Bug #962152 [release.debian.org] buster-pu: pac
Processing control commands:
> block 961995 by -1
Bug #961995 [release.debian.org] transition: boost-defaults
961995 was blocked by: 959437 960426 962252 948127 962286 959479 960422 962229
954351 962287 960427 960378 959439 958156 962253 948122 960413 962070 955581
960412 960331 959463 959573 94
Processing control commands:
> block 961995 by -1
Bug #961995 [release.debian.org] transition: boost-defaults
961995 was blocked by: 960412 960416 954711 948127 954648 953871 960426 960422
960418 960378 959573 948122 962252 959439 962229 960427 954351 960424 962070
959463 954649 959417 955581 96
Processing control commands:
> block 961995 by -1
Bug #961995 [release.debian.org] transition: boost-defaults
961995 was blocked by: 954711 953873 959573 958156 960385 960424 949837 960378
960331 960383 960413 960412 960421 953871 959439 960500 960414 959463 959479
948127 960422 959480 962086 96
On Thu, 2020-06-04 at 20:48 -0500, Michael Shuler wrote:
> Thanks again, uploaded to mentors:
>
> RFS: ca-certificates/20200601~deb9u1 [RC] -- Common CA certificates
> https://bugs.debian.org/962245
I see there was some additional feedback on the RFS, which is why this
hasn't been uploaded yet.
Processing control commands:
> block 960193 by -1
Bug #960193 [release.debian.org] transition: icu
960193 was blocked by: 962069 960239 959756 960241 960236 960263 960374 955114
960243 960237 960623 962095
960193 was not blocking any bugs.
Added blocking bug(s) of 960193: 962265
--
960193: http
Package: release.debian.org
User: release.debian@packages.debian.org
Usertags: pu
Tags: stretch
X-Debbugs-CC: debian-r...@lists.debian.org
Severity: normal
Hello,
ruby2.3 was affected by CVE-2020-10663, which was an unsafe object
creation vulnerability.
This has been fixed in Sid, Bullseye, a
Package: release.debian.org
User: release.debian@packages.debian.org
Usertags: pu
Tags: stretch
X-Debbugs-CC: debian-r...@lists.debian.org
Severity: normal
Hello,
ruby-json was affected by CVE-2020-10663, which was an unsafe object
creation vulnerability.
This has been fixed in Sid, Bullseye,
Package: release.debian.org
User: release.debian@packages.debian.org
Usertags: pu
Tags: buster
X-Debbugs-CC: debian-r...@lists.debian.org
Severity: normal
Hello,
ruby-json was affected by CVE-2020-10663, which was an unsafe object
creation vulnerability.
This has been fixed in Sid, Bullseye,
17 matches
Mail list logo