Package: release.debian.org
Severity: normal
Tags: bookworm
User: release.debian@packages.debian.org
Usertags: pu
X-Debbugs-Cc: needrest...@packages.debian.org, pmatth...@debian.org
Control: affects -1 + src:needrestart
[ Reason ]
needrestart, starting with bookworm, supports more microcode ch
Package: release.debian.org
Severity: normal
Tags: bookworm
User: release.debian@packages.debian.org
Usertags: pu
X-Debbugs-Cc: prometheus-node-exporter-collect...@packages.debian.org
Control: affects -1 + src:prometheus-node-exporter-collectors
[ Reason ]
Since the bookworm upgrade, all hosts
Package: release.debian.org
Severity: normal
Tags: bookworm
User: release.debian@packages.debian.org
Usertags: pu
X-Debbugs-Cc: hash-slin...@packages.debian.org, ond...@debian.org,
team+...@tracker.debian.org
Control: affects -1 + src:hash-slinger
[ Reason ]
When upgrading our Puppet server t
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
X-Debbugs-Cc: pubpa...@packages.debian.org
Control: affects -1 + src:pubpaste
Please unblock package pubpaste
[ Reason ]
There are two serious crashes in pubpaste in testing right now, whic
Package: release.debian.org
Severity: normal
Tags: buster
User: release.debian@packages.debian.org
Usertags: pu
The version of "internetarchive" in Debian has some serious
scalability and reliability issues. In particular, it has trouble
handling more than 1024 files (#950289) but upstream als
Package: release.debian.org
Severity: normal
Tags: buster
User: release.debian@packages.debian.org
Usertags: pu
ganeti-instance-debootstrap (GID) has a RC bug (grave) affecting
buster (#942114). I uploaded a minimal package to unstable to fix this
problem which has now trickled down into testi
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
Please unblock package dmarc-cat
The previous -2 unblock you did (thanks for that!) was fine, but the
autopkgtest suite I introduced was buggy. -3 fixes that problem with a
one-line change.
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
Please unblock package dmarc-cat
Test suite communicates with network, RC bug #928990
Fixed package uploaded to unstable, debdiff:
diff -Nru dmarc-cat-0.9.2/debian/changelog dmarc-cat-0.9
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
Please unblock package youtube-dl
youtube-dl, as often happens, has already lagged behind the youtube
interface and cannot download stuff from there at all (RC bug #927862)
The attached pa
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
Please unblock package matrix-synapse
The package currently in buster generates gigabytes of logs which can
easily fill up disks on servers (RC bug #927057).
The following patch fixes the
Package: release.debian.org
Severity: normal
Tags: stretch
User: release.debian@packages.debian.org
Usertags: pu
Hi,
I'd like to update debian-security-support in Stretch to synchronize
with the other suites. I expect this should go in via a normal point
update, as per previous request in #91
Package: release.debian.org
Severity: normal
Tags: stretch
User: release.debian@packages.debian.org
Usertags: pu
Hi,
Monkeysign has a minor security issue and two critical bugs
(unreported but still quite important) that affect all versions after
jessie.
The 2.2.4 upload performed on unstabl
Package: release.debian.org
Severity: normal
Tags: stretch
User: release.debian@packages.debian.org
Usertags: pu
Hi,
I am working on a new release of Monkeysign, which I'd like to upload
in Debian. If it would be just me, I would tag the current HEAD with
2.2.4, considering the changes are mo
Package: release.debian.org
Severity: normal
Tags: jessie
User: release.debian@packages.debian.org
Usertags: pu
The ca-certificates package in jessie is still vulnerable to #858539,
that is it still ships the WoSign and StartCom certificates which have
been marked as blacklisted after october
Package: release.debian.org
Severity: normal
Tags: jessie
User: release.debian@packages.debian.org
Usertags: pu
A security issue came up in kedpm as shipped in stable (CVE-2017-8296,
#860817). It was marked "no-dsa" by the security team, to be fixed in
the next point release.
This is therefor
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
Please unblock package atheme-services
There is a security issue that was fixed in the upstream 7.2.8 package
(#855588), which introduced a new security issue, which was fixed in
the 7.2.9
16 matches
Mail list logo