Your message dated Tue, 27 Nov 2018 21:19:54 +
with message-id
and subject line Bug#902474: fixed in policykit-1 0.115-2
has caused the Debian Bug report #902474,
regarding policykit-1 postinst fails with "--runtime cannot be used with
unmask"
to be marked as done.
This means that you claim
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Tue, 27 Nov 2018 21:53:12 +0100
Source: policykit-1
Binary: policykit-1 policykit-1-doc libpolkit-gobject-1-0
libpolkit-gobject-1-dev libpolkit-agent-1-0 libpolkit-agent-1-dev
gir1.2-polkit-1.0
Architecture: source
Ve
Your message dated Tue, 27 Nov 2018 22:14:47 +0100
with message-id <416757bd-82f8-b30c-2bac-62415b819...@debian.org>
and subject line Re: Dialog ineffective: vague wording, omits the application,
click on action does nothing
has caused the Debian Bug report #729190,
regarding Dialog ineffective: v
Your message dated Tue, 27 Nov 2018 22:17:28 +0100
with message-id <71b4dc23-3ce9-b0b4-de2c-6a58d9418...@debian.org>
and subject line Re: policykit-1: Install fails with Error calling
StartServiceByName
has caused the Debian Bug report #797368,
regarding policykit-1: Install fails with Error calli
Processing commands for cont...@bugs.debian.org:
> reassign 738023 lxdm
Bug #738023 [src:policykit-1] [experimental] policykit-1: workaround for lxdm
Bug reassigned from package 'src:policykit-1' to 'lxdm'.
No longer marked as found in versions policykit-1/0.112-2.
Ignoring request to alter fixed
policykit-1_0.115-2_source.changes uploaded successfully to localhost
along with the files:
policykit-1_0.115-2.dsc
policykit-1_0.115-2.debian.tar.xz
policykit-1_0.115-2_source.buildinfo
Greetings,
Your Debian queue daemon (running on host usper.debian.org)
Your message dated Tue, 27 Nov 2018 22:07:10 +0100
with message-id
and subject line Re: policykit-1: write and execute memory regions
has caused the Debian Bug report #889900,
regarding policykit-1: write and execute memory regions
to be marked as done.
This means that you claim that the problem
Your message dated Tue, 27 Nov 2018 22:03:53 +0100
with message-id <89d508ae-1bde-c7df-74fb-043a558ed...@debian.org>
and subject line Re: Add back support for pkla files
has caused the Debian Bug report #765386,
regarding Add back support for pkla files
to be marked as done.
This means that you cl
On Mon, Nov 26, 2018 at 05:50:56PM +0100, Martin Pitt wrote:
> Hello Eric,
>
> Eric Garver [2018-11-26 10:20 -0500]:
> > No. As far as I can tell, firewalld never uses iptables -R (rule
> > replace) option. It's possible this is being triggered by something
> > external via the direct/passthrough
Your message dated Tue, 27 Nov 2018 19:36:55 +
with message-id
and subject line Bug#902474: fixed in policykit-1 0.105-22
has caused the Debian Bug report #902474,
regarding policykit-1 postinst fails with "--runtime cannot be used with
unmask"
to be marked as done.
This means that you clai
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Tue, 27 Nov 2018 20:17:44 +0100
Source: policykit-1
Binary: policykit-1 policykit-1-doc libpolkit-gobject-1-0
libpolkit-gobject-1-dev libpolkit-agent-1-0 libpolkit-agent-1-dev
libpolkit-backend-1-0 libpolkit-backend-1
policykit-1_0.105-22_source.changes uploaded successfully to localhost
along with the files:
policykit-1_0.105-22.dsc
policykit-1_0.105-22.debian.tar.xz
policykit-1_0.105-22_source.buildinfo
Greetings,
Your Debian queue daemon (running on host usper.debian.org)
Processing commands for cont...@bugs.debian.org:
> severity 815330 minor
Bug #815330 [src:policykit-1] policykit-1: FTBFS on hurd-i386: testsuite
failures
Severity set to 'minor' from 'important'
> thanks
Stopping processing here.
Please contact me if you need assistance.
--
815330: https://bug
Hello Simon,
On Tue, Nov 27, 2018 at 02:48:34PM +, Simon McVittie wrote:
> On Tue, 27 Nov 2018 at 14:26:11 +0100, Helge Kreutzmann wrote:
> > These commands and their parameters do not belong into the system log.
> > These are private data. Of course, if the system administrator chooses
> > to
[snip]
I'm with Simon on this issue.
Imho the only sensible thing is to close this bug report and tag it wontfix.
Sorry if this not the outcome you expected.
Regards,
Michael
--
Why is it that all of the instruments seeking intelligent life in the
universe are pointed away from Earth?
sign
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Tue, 27 Nov 2018 14:46:53 +0100
Source: network-manager-pptp
Binary: network-manager-pptp network-manager-pptp-gnome
Architecture: source
Version: 1.2.8-2
Distribution: unstable
Urgency: medium
Maintainer: Utopia Mainte
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Tue, 27 Nov 2018 14:29:27 +0100
Source: network-manager-openvpn
Binary: network-manager-openvpn network-manager-openvpn-gnome
Architecture: source
Version: 1.8.8-2
Distribution: unstable
Urgency: medium
Maintainer: Utop
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Tue, 27 Nov 2018 14:59:41 +0100
Source: network-manager-vpnc
Binary: network-manager-vpnc network-manager-vpnc-gnome
Architecture: source
Version: 1.2.6-2
Distribution: unstable
Urgency: medium
Maintainer: Utopia Mainte
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Tue, 27 Nov 2018 15:10:52 +0100
Source: firewalld
Binary: firewalld firewall-applet firewall-config
Architecture: source
Version: 0.6.3-4
Distribution: unstable
Urgency: medium
Maintainer: Utopia Maintenance Team
Chan
On Tue, 27 Nov 2018 at 14:26:11 +0100, Helge Kreutzmann wrote:
> These commands and their parameters do not belong into the system log.
> These are private data. Of course, if the system administrator chooses
> to spy on a user, he can so so. But by default this should not be the
> case.
Please no
firewalld_0.6.3-4_source.changes uploaded successfully to localhost
along with the files:
firewalld_0.6.3-4.dsc
firewalld_0.6.3-4.debian.tar.xz
firewalld_0.6.3-4_source.buildinfo
Greetings,
Your Debian queue daemon (running on host usper.debian.org)
network-manager-vpnc_1.2.6-2_source.changes uploaded successfully to localhost
along with the files:
network-manager-vpnc_1.2.6-2.dsc
network-manager-vpnc_1.2.6-2.debian.tar.xz
network-manager-vpnc_1.2.6-2_source.buildinfo
Greetings,
Your Debian queue daemon (running on host usper.d
Processing commands for cont...@bugs.debian.org:
> close 806298
Bug #806298 [network-manager-vpnc] Could recommend frontend binaries
Marked Bug as done
> tags 806298 + wontfix
Bug #806298 {Done: Michael Biebl } [network-manager-vpnc]
Could recommend frontend binaries
Added tag(s) wontfix.
> thank
network-manager-pptp_1.2.8-2_source.changes uploaded successfully to localhost
along with the files:
network-manager-pptp_1.2.8-2.dsc
network-manager-pptp_1.2.8-2.debian.tar.xz
network-manager-pptp_1.2.8-2_source.buildinfo
Greetings,
Your Debian queue daemon (running on host usper.d
network-manager-openvpn_1.8.8-2_source.changes uploaded successfully to
localhost
along with the files:
network-manager-openvpn_1.8.8-2.dsc
network-manager-openvpn_1.8.8-2.debian.tar.xz
network-manager-openvpn_1.8.8-2_source.buildinfo
Greetings,
Your Debian queue daemon (running on
Package: dbus
Version: 1.12.10-1
Severity: important
Tags: security
Currently, dbus logs commands and their parameters, e.g. from my
system (parts masked out with ##)
Nov 3 13:57:16 samd dbus-daemon[2402]: [session uid=1000 pid=2400] Activating
service name='org.a11y.Bus' requested by ':1.3' (ui
On Tue, 27 Nov 2018 at 09:41:00 +0100, Thomas Martitz wrote:
> Without this packages, the KDE session and all user units had their own dbus
> server/bus. Only after installing the dbus-user-session package all share
> the same bus under /run/user/1000/bus.
What do you consider to be a bug here? Pl
I can confirm this bug. Very annoying.
Without this packages, the KDE session and all user units had their own
dbus server/bus. Only after installing the dbus-user-session package all
share the same bus under /run/user/1000/bus.
However, from examining /etc/X11/Xsession.d/*, in particular th
28 matches
Mail list logo