Processing control commands:
> affects -1 + src:qemu
Bug #1062044 [release.debian.org] bookworm-pu: package qemu/1:7.2+dfsg-7+deb12u4
Added indication that 1062044 affects src:qemu
--
1062044: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1062044
Debian Bug Tracking System
Contact ow...@bugs
Package: release.debian.org
Severity: normal
Tags: bullseye
User: release.debian@packages.debian.org
Usertags: pu
X-Debbugs-Cc: gl...@packages.debian.org
Control: affects -1 + src:glibc
[ Reason ]
A memory corruption was discovered in the glibc's qsort()
function, due to missing bounds check a
Processing control commands:
> affects -1 + src:glibc
Bug #1062006 [release.debian.org] bullseye-pu: package glibc/2.31-13+deb11u8
Added indication that 1062006 affects src:glibc
--
1062006: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1062006
Debian Bug Tracking System
Contact ow...@bugs.d
Processing control commands:
> affects -1 + src:usb.ids
Bug #1062005 [release.debian.org] bullseye-pu: package
usb.ids/2024.01.20-0+deb11u1
Added indication that 1062005 affects src:usb.ids
--
1062005: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1062005
Debian Bug Tracking System
Contact
Processing control commands:
> affects -1 + src:usb.ids
Bug #1062004 [release.debian.org] bookworm-pu: package
usb.ids/2024.01.20-0+deb12u1
Added indication that 1062004 affects src:usb.ids
--
1062004: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1062004
Debian Bug Tracking System
Contact
Package: release.debian.org
Severity: normal
Tags: bullseye
User: release.debian@packages.debian.org
Usertags: pu
X-Debbugs-Cc: usb@packages.debian.org
Control: affects -1 + src:usb.ids
[ Reason ]
This new upstream version of the USB ID database adds a few USB devices.
[ Impact ]
New USB
Package: release.debian.org
Severity: normal
Tags: bookworm
User: release.debian@packages.debian.org
Usertags: pu
X-Debbugs-Cc: usb@packages.debian.org
Control: affects -1 + src:usb.ids
[ Reason ]
This new upstream version of the USB ID database adds a few USB devices.
[ Impact ]
New USB
Package: release.debian.org
Severity: normal
Tags: bullseye
User: release.debian@packages.debian.org
Usertags: pu
X-Debbugs-Cc: debian-security-supp...@packages.debian.org
Control: affects -1 + src:debian-security-support
[ Reason ]
* Add chromium to security-support-ended.deb11, thanks to A
Processing control commands:
> affects -1 + src:debian-security-support
Bug #1061983 [release.debian.org] bullseye-pu: package
debian-security-support/1:11+2024.01.30
Added indication that 1061983 affects src:debian-security-support
--
1061983: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=
On Thu, 25 Jan 2024 at 04:44:12 +0100, Guilhem Moulin wrote:
> [ Changes ]
>
> Fix CVE-2023-34194: Reachable assertion (and application exit) via a
> crafted XML document with a '\0' located after whitespace.
Per https://bugs.debian.org/1061473#12 I guess you'd like CVE-2023-40462
to be removed fr
On Mon, 29 Jan 2024 22:06:33 + "Adam D. Barratt"
wrote:
Please go ahead.
Uploaded, thanks!
OpenPGP_0x8F53E0193B294B75.asc
Description: OpenPGP public key
OpenPGP_signature.asc
Description: OpenPGP digital signature
> + * HTML Input: Dont add resources that exist outside the folder hierarchy
> s/Dont/Don't/
>
> Please go ahead.
Thank you.
I was uploaded new package with your fix.
--
YOKOTA Hiroshi
Hi,
someone uploaded a new mathcomp-analysis not knowing about this planned
transition, so it should be taken into account.
Cheers,
J.Puydt
PS: updated ben script
dw coq-elpi_2.0.0-1 . ANY . -m 'elpi >= 1.18.1-1'
dw coq-hierarchy-builder_1.7.0-1 . ANY . -m 'coq-elpi >= 2.0.0-1'
dw ssreflect
13 matches
Mail list logo