Processing changes file: http-parser_2.8.1-1+deb10u2_mips64el-buildd.changes
ACCEPT
Processing changes file: http-parser_2.8.1-1+deb10u2_mipsel-buildd.changes
ACCEPT
Processing changes file: http-parser_2.8.1-1+deb10u2_amd64-buildd.changes
ACCEPT
Processing changes file: http-parser_2.8.1-1+deb10u2_arm64-buildd.changes
ACCEPT
Processing changes file: http-parser_2.8.1-1+deb10u2_armel-buildd.changes
ACCEPT
Processing changes file: http-parser_2.8.1-1+deb10
Processing changes file: http-parser_2.8.1-1+deb10u2_i386-buildd.changes
ACCEPT
On Sat, 4 Dec 2021, Adam D. Barratt wrote:
Control: tags -1 + confirmed
On Thu, 2021-10-28 at 22:35 +, Thorsten Alteholz wrote:
The attached debdiff for jbig2dec fixes CVE-2020-12268 in Buster.
This CVE is marked as no-dsa by the security team.
The patch just adds some checks to preve
On Sat, 4 Dec 2021, Adam D. Barratt wrote:
Control: tags -1 + confirmed
On Tue, 2021-11-23 at 23:22 +, Thorsten Alteholz wrote:
The attached debdiff for btrbk fixes a regression of CVE-2021-38173
in
Buster.
Please go ahead.
Thanks, uploaded now.
Thorsten
On Sat, 4 Dec 2021, Adam D. Barratt wrote:
Control: tags -1 + confirmed
On Thu, 2021-04-22 at 17:36 +, Thorsten Alteholz wrote:
The attached debdiff for leptonlib fixes five CVEs in Buster:
- CVE-2020-36277
- CVE-2020-36278
- CVE-2020-36279
- CVE-2020-36280
- CVE-2020-36281
A
On Fri, 3 Dec 2021, Adam D. Barratt wrote:
Control: tags -1 + confirmed
On Tue, 2021-11-23 at 23:22 +, Thorsten Alteholz wrote:
The attached debdiff for btrbk fixes a regression of CVE-2021-38173
in
Bullseye.
The regression was reported in #996260 [1] and a pointer to the fix
was
provi
On Sat, 4 Dec 2021, Adam D. Barratt wrote:
Control: tags -1 + confirmed
On Mon, 2021-11-22 at 18:14 +, Thorsten Alteholz wrote:
The attached debdiff for libmodbus fixes CVE-2019-14462 and CVE-2019-
14463
in Buster.
These CVEs are marked as no-dsa by the security team.
Please go ahea
Processing control commands:
> reopen -1
Bug #996997 {Done: Christoph Biedl }
[release.debian.org] buster-pu: Cleaning up the http-parser ABI breakage in
Debian 10 ("buster")
'reopen' may be inappropriate when a bug has been closed with a version;
all fixed versions will be cleared, and you may
Control: reopen -1
Control: tags -1 + pending
On Fri, 2021-12-10 at 22:21 +, Debian Bug Tracking System wrote:
> Your message dated Fri, 10 Dec 2021 22:17:20 +
> with message-id
> and subject line Bug#996997: fixed in http-parser 2.8.1-1+deb10u2
> has caused the Debian Bug report #996997,
Processing changes file: http-parser_2.8.1-1+deb10u2_source.changes
ACCEPT
Your message dated Fri, 10 Dec 2021 22:17:20 +
with message-id
and subject line Bug#996997: fixed in http-parser 2.8.1-1+deb10u2
has caused the Debian Bug report #996997,
regarding buster-pu: Cleaning up the http-parser ABI breakage in Debian 10
("buster")
to be marked as done.
This means th
Processing commands for cont...@bugs.debian.org:
> package release.debian.org
Limiting to bugs with field 'package' containing at least one of
'release.debian.org'
Limit currently set to 'package':'release.debian.org'
> tags 996997 = buster pending
Bug #996997 [release.debian.org] buster-pu: Cle
package release.debian.org
tags 996997 = buster pending
thanks
Hi,
The upload referenced by this bug report has been flagged for acceptance into
the proposed-updates queue for Debian buster.
Thanks for your contribution!
Upload details
==
Package: http-parser
Version: 2.8.1-1+deb1
Package: release.debian.org
Severity: normal
Tags: bullseye
User: release.debian@packages.debian.org
Usertags: pu
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
[ Reason ]
Array indexing is broken, making bpftrace unable to complete its task on some
scripts.
[ Impact ]
Some scripts cannot
On Tue, 2021-12-07 at 08:10 -0800, Otto Kekäläinen wrote:
> > When we were faced with a similar situation for 10.3 last year, we
> > decided to proceed anyway as 10.5 was about to become the default
> > version and 10.3 was then removed from unstable shortly afterwards.
>
> True
>
> > Looking at
Processing control commands:
> tags -1 + confirmed
Bug #1000454 [release.debian.org] bullseye-pu: package gdal/3.2.2+dfsg-2+deb11u1
Added tag(s) confirmed.
--
1000454: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1000454
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
Control: tags -1 + confirmed
On Fri, 2021-12-03 at 17:28 +0100, Sebastiaan Couwenberg wrote:
> Control: tags -1 - moreinfo
>
> On 12/3/21 17:16, Adam D. Barratt wrote:
[...]
> > diff -Nru gdal-3.2.2+dfsg/debian/patches/0001-Add-a-cppcheck_2004-
> > CI-target-and-fix-related-issues.patch gdal-
> >
On 12/10/21 14:33, Sebastiaan Couwenberg wrote:
On 12/8/21 20:59, Sebastiaan Couwenberg wrote:
Thanks. gdal (3.4.0+dfsg-1) has been uploaded to unstable and is now
built & installed on all release architectures.
pdal is built & installed on all release architectures, grass & paraview
can be b
On 12/8/21 20:59, Sebastiaan Couwenberg wrote:
Thanks. gdal (3.4.0+dfsg-1) has been uploaded to unstable and is now
built & installed on all release architectures.
pdal is built & installed on all release architectures, grass & paraview
can be binNMUed.
Kind Regards,
Bas
--
GPG Key ID: 40
Processing changes file: linux_5.10.84-1_mips64el-buildd.changes
ACCEPT
Package: release.debian.org
Severity: normal
Tags: buster
User: release.debian@packages.debian.org
Usertags: pu
This fixes CVE-2021-44540 and CVE-2021-44543.
Since all are tagged "minor issue" in the security-tracer, I tend to
send this into the next point release of buster.
Salsa-CI passed:
22 matches
Mail list logo