Bug#851611: SawFish, gnome-int, debian-menu
After fixing the link the next error complains about debian-menu missing. This indeed vanishes if the package menu gets installed. So if sawfish treats that missing dependency as error, it should be required instead of suggested.
Bug#1088850: ITP: releng-tool -- Tool to tailor the building of packages
Package: wnpp Severity: wishlist Owner: g...@jdknight.me X-Debbugs-Cc: debian-de...@lists.debian.org * Package name: releng-tool Version : 1.4.0 Upstream Contact: James Knight * URL : https://releng.io/ * License : BSD-2-Clause Programming Lang: Python Description : Tool to tailor the building of packages releng-tool aims to provide a way for developers to tailor the building of multiple software components to help prepare packages for desired runtime environments (e.g. cross-platform portable packages, embedded targets, etc.). When building a package, assets may be located in multiple locations and may require various methods to extract, build and more. releng-tool allows developers to define a set of packages, specifying where resources should be fetched from, how packages should be extracted and the processes for patching, configuring, building and installing each package for a target sysroot. It would be nice to have this tool available in Debian for an easy install with shell completion support. I use the tool myself to help build software packages for embedded Linux images generated by Buildroot. I plan to maintain this package. Long time Debian user, first time packager; so still trying to familiarize myself with the process. From my understanding, this package may be best suited under DPT unless someone informs me otherwise. Will need a sponsor, if anyone is willing.
Bug#204898: HUGE report
http://s6.bilder-hosting.de/img/BEJ8Z.jpg I'll burn this god-damned place down. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#1055362: Crash when plugging in USB graphics tablet
Package: wayfire Version: 0.7.4-3 When I plug in a USB graphics tablet, there is a segmentation fault approximately half the time. In my experience, the bug might trigger more reliably with an XWayland client open, or with many clients open. I haven't seen this crash on startup, it only seems to happen when plugging in the graphics tablet while running. This is the same crash described in upstream bug #1415 [1], and fixed in upstream PR #1555 [2], which is a one-line fix to add a null check. I am using Debian bookworm, up to date as of 2023-11-03, using kernel 6.1.0-13-amd64. I've posted a log [3], and there's another log linked in the upstream bug report. I'm happy to test any patched version of the package or provide any more details. Thank you for the work you do to maintain this package and all of the others that you maintain as well. [1] https://github.com/WayfireWM/wayfire/issues/1415 [2] https://github.com/WayfireWM/wayfire/pull/1555 [3] https://ethanwhite.net/static/wayfire.log
Bug#308994: Cum again and shoot harder
Dont miss out on the action at every party find out how. http://www.albagrowths.com/ Heard of the fellowship of my manhood? -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#1023424: Vulnerabilities CVE-2022-1292, CVE-2022-2068, CVE-2022-2097
Package: OpenSSL Version: 1.1.1n-0+deb11u3 Severity: critical Tags: bullseye security fixed-upstream Description: The component OpenSSL1.1.1n-0+deb11u3 suffers from 3 vulnerabilities: * (CVE-2022-1292)[https://nvd.nist.gov/vuln/detail/CVE-2022-1292] (critical) * (CVE-2022-2068)[https://nvd.nist.gov/vuln/detail/CVE-2022-2068] (critical) * (CVE-2022-2097)[https://nvd.nist.gov/vuln/detail/CVE-2022-2097] (medium) Fix: Updating the package to version (OpenSSL1.1.1s)[https://github.com/openssl/openssl/releases/tag/OpenSSL_1_1_1s] would resolve them. -- System Information: Debian Release: 11.5 APT prefers stable-updates APT policy: (500, 'stable-updates'), (500, 'stable-security'), (500, 'stable') Architecture: amd64 (x86_64)