Hi all,
On 30-05-2021 09:09, Paul Gevers wrote:
> 26 June
> 3 July
> 10 July
> 17 July [Steve (CD), press]
> 24 July [Steve (CD), press]
> 31 July
> 7 August
> 14 August
This can now be updated to:
26 June [Ansgar (ftp)]
3 July[Ansgar (ftp), Sebastian (release), Paul (release)]
10 July [
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
X-Debbugs-Cc: haavard_aa...@yahoo.no
Please unblock package htmldoc
This release adds patches to fix 8 CVE's and closes: #989437.
There are two things which is not needed in this release.
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Please unblock package exabgp
[ Reason ]
When run as root, ExaBGP won't be able to access the FIFO owned by the
exabgp user. Make ExaBGP run
Cyril Brulebois (2021-06-02):
> Paul Gevers (2021-06-01):
> > On 01-06-2021 08:06, Salvatore Bonaccorso wrote:
> > > The version is not 4 days in unstable, looks good to me to let it
> > > migrate to testing (unless Cyril spotted issues in recent d-i tests).
> >
> > I'm still good to go.
>
> Te
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
Please unblock package apt-transport-s3
We need this package to be included in the Bullseye release, changeset is
minimal and only contains fix for the RC bug (#986647).
Impact of this chan
Control: tags -1 = confirmed d-i
Hi Theodore,
Sorry it took so long.
On 20-05-2021 19:40, Theodore Y. Ts'o wrote:
> That patch is rather long, but it's all mostly of the form:
>
> - tail = (struct ext4_fc_tail *)ext4_fc_tag_val(tl);
> + memcpy(&tail, ext4_fc_tag_val(tl), sizeof(tail));
Processing control commands:
> tags -1 = confirmed d-i
Bug #988830 [release.debian.org] [pre-approval] unblock: e2fsprogs
Added tag(s) confirmed; removed tag(s) moreinfo.
--
988830: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=988830
Debian Bug Tracking System
Contact ow...@bugs.debian.org
Hi Pirate,
On Thu, 22 Apr 2021 13:50:18 +0200 Ivo De Decker wrote:
> It seems the RC bug fix is unrelated to the new upstream. Please prepare an
> upload based on the version currently in testing that only contains the
fix
> for the RC bug, not the new upsteam.
Are you going to follow up on thi
tags 987504 wontfix
thanks
Hi Moritz, Adrian,
On 03-06-2021 20:00, Moritz Mühlenhoff wrote:
> Yes, we should not revert this and rather fix fallout in the handful
> of affected packages.
It's really bad we have to do this so late in the cycle, while the
problem was known for so long. Adrian, can
Am Wed, May 19, 2021 at 08:49:01PM +0200 schrieb Paul Gevers:
> Hi,
>
> First off, thanks Adrian for raising the concern. In general, at this
> stage we don't like packages breaking other packages.
This should have been fixed in unstable for a long time, I pinged the maintainer
multiple times eve
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
X-Debbugs-Cc: pkg-java-maintainers%40lists.alioth.debian.org
Please unblock
jverein (2.8.18+git20200921.6212a59+dfsg-7)
It fixed #988929
Piuparts tests are ok now
this package can be built
Package: release.debian.org
User: release.debian@packages.debian.org
Usertags: unblock
Dear Release Team,
Please consider unblocking python-django 2:2.2.24-1. It actually
constitutes two versions, the first addressing security releases which
should be uncontroversial and the second (2:2.2.23-
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
Please unblock package libpam-chroot
[ Reason ]
This version includes fixes to build properly the package including:
- Installing the PAM module in the correct location (#980047)
- Supporti
Package: release.debian.org
Severity: normal
Tags: buster
User: release.debian@packages.debian.org
Usertags: pu
X-Debbugs-Cc: libgcryp...@packages.debian.org,secur...@debian.org
Hello,
I would like to fix the non-DSA CVE-2021-33560 for buster by
cherrypicking the respective commit from 1.8.8
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
X-Debbugs-Cc: libgcryp...@packages.debian.org
Please unblock package libgcrypt20.
Compared to 1.8.7-3 this pulls a 4 commits from 1.8.8, including
30_10-cipher-Fix-ElGamal-encryption-for-ot
Salvatore Bonaccorso (2021-06-03):
> This brings the update to address CVE-2021-25217 / #989157 in buster
> (the fix was applied already as NMU in unstable and unblocked
> accordingly).
>
> The debian/changelog entry is
>
> +isc-dhcp (4.4.1-2+deb10u1) buster; urgency=medium
> +
> + * Non-mainta
Package: release.debian.org
Severity: normal
Tags: buster
User: release.debian@packages.debian.org
Usertags: pu
X-Debbugs-Cc: car...@debian.org,k...@debian.org
Hi Stable release managers,
This brings the update to address CVE-2021-25217 / #989157 in buster
(the fix was applied already as NMU
Dear release team,
osspd maintainer here. Version 1.3.2-12 has hit unstable now that my new key is
finally in the keyring.
> diff --git a/debian/changelog b/debian/changelog
> index c412732..9481d07 100644
> --- a/debian/changelog
> +++ b/debian/changelog
> @@ -1,3 +1,17 @@
> +osspd (1.3.2-12
Your message dated Thu, 3 Jun 2021 12:42:06 +0200
with message-id
and subject line Re: Bug#989418: unblock: libpappsomspp/0.8.25-2
has caused the Debian Bug report #989418,
regarding unblock: libpappsomspp/0.8.25-2
to be marked as done.
This means that you claim that the problem has been dealt wi
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
unblock libpappsomspp/0.8.25-2
Please unblock package libpappsomspp
Greetings, Fellow Developers,
I would like in this mail to advocate the unblocking of the transition for two
packages:
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
Please unblock package homebank
(Please provide enough (but not too much) information to help
the release team to judge the request efficiently. E.g. by
filling in the sections below.)
[ R
Your message dated Thu, 3 Jun 2021 09:35:58 +0200
with message-id
and subject line Re: Bug#989405: unblock:
qtdeclarative-opensource-src/5.15.2+dfsg-5
has caused the Debian Bug report #989405,
regarding unblock: qtdeclarative-opensource-src/5.15.2+dfsg-5
to be marked as done.
This means that you
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
Please unblock package ifupdown-extra
[ Reason ]
There is a bug (#987310) in the package in testing which prevents the
static-routes script (/etc/network/if-up.d/20static-routes) from work
23 matches
Mail list logo