Bug#1084894: transition: phpunit

2025-01-20 Thread Emilio Pozuelo Monfort
On 21/01/2025 07:55, David Prévot wrote: Hi, Le Sat, Jan 18, 2025 at 01:46:51PM +0100, Emilio Pozuelo Monfort a écrit : On 17/01/2025 09:38, David Prévot wrote: Le Fri, Jan 10, 2025 at 09:25:41PM +0100, Emilio Pozuelo Monfort a écrit : On 10/01/2025 10:25, David Prévot wrote: Le Sun, Oct 13,

Bug#1084894: transition: phpunit

2025-01-20 Thread David Prévot
Hi, Le Sat, Jan 18, 2025 at 01:46:51PM +0100, Emilio Pozuelo Monfort a écrit : > On 17/01/2025 09:38, David Prévot wrote: > > Le Fri, Jan 10, 2025 at 09:25:41PM +0100, Emilio Pozuelo Monfort a écrit : > > > On 10/01/2025 10:25, David Prévot wrote: > > > > Le Sun, Oct 13, 2024 at 03:35:04PM +0100,

Bug#1093670: bookworm-pu: package bup/0.33.7-1~deb12u1

2025-01-20 Thread Robert Edmonds
Package: release.debian.org Severity: normal Tags: bookworm User: release.debian@packages.debian.org Usertags: pu X-Debbugs-Cc: b...@packages.debian.org, r...@defaultvalue.org Control: affects -1 + src:bup Hi, I'd like to update the version of bup in bookworm from 0.33.2-1~deb12u1 to 0.33.7-1

Processed: bookworm-pu: package bup/0.33.7-1~deb12u1

2025-01-20 Thread Debian Bug Tracking System
Processing control commands: > affects -1 + src:bup Bug #1093670 [release.debian.org] bookworm-pu: package bup/0.33.7-1~deb12u1 Added indication that 1093670 affects src:bup -- 1093670: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1093670 Debian Bug Tracking System Contact ow...@bugs.debian

Bug#1093386: RM: libnet-easytcp-perl/0.26-6

2025-01-20 Thread Holger Levsen
Hi Salvatore & Moritz, On Sat, Jan 18, 2025 at 05:52:39PM +0100, Salvatore Bonaccorso wrote: > > > This is the corresponding removal request for libnet-easytcp-perl from > > > stable, relating to #1093385 for unstable and testing. > > should this be communicated via src:debian-security-support as

Bug#1093620: transition: gnustep-multiarch

2025-01-20 Thread Yavor Doganov
Package: release.debian.org Severity: normal Tags: moreinfo X-Debbugs-Cc: pkg-gnustep-maintain...@lists.alioth.debian.org User: release.debian@packages.debian.org Usertags: transition We at the GNUstep team would like to make the GNUstep libraries multiarch-capable. It has not been done until

Bug#1093611: transition: urdfdom and dart

2025-01-20 Thread Emilio Pozuelo Monfort
Control: tags -1 confirmed On 20/01/2025 12:49, Jose Luis Rivero wrote: Package: release.debian.org Severity: normal X-Debbugs-Cc: urdf...@packages.debian.org Control: affects -1 + src:urdfdom + src:dart User: release.debian@packages.debian.org Usertags: transition Dear release team: As th

Processed: Re: Bug#1093611: transition: urdfdom and dart

2025-01-20 Thread Debian Bug Tracking System
Processing control commands: > tags -1 confirmed Bug #1093611 [release.debian.org] transition: urdfdom and dart Added tag(s) confirmed. -- 1093611: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1093611 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems

Processed: transition: urdfdom and dart

2025-01-20 Thread Debian Bug Tracking System
Processing control commands: > affects -1 + src:urdfdom + src:dart Bug #1093611 [release.debian.org] transition: urdfdom and dart Added indication that 1093611 affects src:urdfdom, +, and src:dart -- 1093611: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1093611 Debian Bug Tracking System Co

Bug#1093611: transition: urdfdom and dart

2025-01-20 Thread Jose Luis Rivero
Package: release.debian.org Severity: normal X-Debbugs-Cc: urdf...@packages.debian.org Control: affects -1 + src:urdfdom + src:dart User: release.debian@packages.debian.org Usertags: transition Dear release team: As the maintainer of the urdfdom and dart I think that we are good to move the v

Bug#1093625: bookworm-pu: package libtar/1.2.20-8+deb12u1

2025-01-20 Thread Adrian Bunk
Package: release.debian.org Severity: normal Tags: bookworm User: release.debian@packages.debian.org Usertags: pu X-Debbugs-Cc: secur...@debian.org * CVE-2021-33643: out-of-bounds read in gnu_longlink() * CVE-2021-33644: out-of-bounds read in gnu_longname() * CVE-2021-33645: memory leak