Bug#851611: SawFish, gnome-int, debian-menu

2020-06-11 Thread git
After fixing the link the next error complains about debian-menu
missing.
This indeed vanishes if the package menu gets installed.

So if sawfish treats that missing dependency as error, it should be
required instead of suggested.



Bug#1088850: ITP: releng-tool -- Tool to tailor the building of packages

2024-12-01 Thread git
Package: wnpp
Severity: wishlist
Owner: g...@jdknight.me
X-Debbugs-Cc: debian-de...@lists.debian.org

* Package name: releng-tool
  Version : 1.4.0
  Upstream Contact: James Knight 
* URL : https://releng.io/
* License : BSD-2-Clause
  Programming Lang: Python
  Description : Tool to tailor the building of packages

releng-tool aims to provide a way for developers to tailor
the building of multiple software components to help prepare
packages for desired runtime environments (e.g. cross-platform
portable packages, embedded targets, etc.). When building a
package, assets may be located in multiple locations and may
require various methods to extract, build and more. releng-tool
allows developers to define a set of packages, specifying where
resources should be fetched from, how packages should be
extracted and the processes for patching, configuring, building
and installing each package for a target sysroot.

It would be nice to have this tool available in Debian for an
easy install with shell completion support. I use the tool
myself to help build software packages for embedded Linux
images generated by Buildroot.

I plan to maintain this package. Long time Debian user, first
time packager; so still trying to familiarize myself with the
process. From my understanding, this package may be best suited
under DPT unless someone informs me otherwise. Will need a
sponsor, if anyone is willing.



Bug#204898: HUGE report

2007-04-17 Thread elsie git

http://s6.bilder-hosting.de/img/BEJ8Z.jpg

I'll burn this god-damned place down.



--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#1055362: Crash when plugging in USB graphics tablet

2023-11-04 Thread ethan-git
Package: wayfire
Version: 0.7.4-3

When I plug in a USB graphics tablet, there is a segmentation fault
approximately half the time. In my experience, the bug might trigger
more reliably with an XWayland client open, or with many clients open.
I haven't seen this crash on startup, it only seems to happen when
plugging in the graphics tablet while running. This is the same crash
described in upstream bug #1415 [1], and fixed in upstream PR #1555 [2],
which is a one-line fix to add a null check.

I am using Debian bookworm, up to date as of 2023-11-03, using kernel
6.1.0-13-amd64. I've posted a log [3], and there's another log linked
in the upstream bug report. I'm happy to test any patched version of
the package or provide any more details.

Thank you for the work you do to maintain this package and all of the
others that you maintain as well.

[1] https://github.com/WayfireWM/wayfire/issues/1415
[2] https://github.com/WayfireWM/wayfire/pull/1555
[3] https://ethanwhite.net/static/wayfire.log



Bug#308994: Cum again and shoot harder

2008-03-21 Thread Rhett git

Don’t miss out on the action at every party – find out how.

http://www.albagrowths.com/
Heard of the fellowship of my manhood?



--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#1023424: Vulnerabilities CVE-2022-1292, CVE-2022-2068, CVE-2022-2097

2022-11-03 Thread nospam099-git...@yahoo.com
Package: OpenSSL
Version: 1.1.1n-0+deb11u3
Severity: critical
Tags: bullseye security fixed-upstream

Description:
The component OpenSSL1.1.1n-0+deb11u3 suffers from 3 vulnerabilities:
* (CVE-2022-1292)[https://nvd.nist.gov/vuln/detail/CVE-2022-1292] (critical)
* (CVE-2022-2068)[https://nvd.nist.gov/vuln/detail/CVE-2022-2068] (critical)
* (CVE-2022-2097)[https://nvd.nist.gov/vuln/detail/CVE-2022-2097] (medium)

Fix:
Updating the package to version 
(OpenSSL1.1.1s)[https://github.com/openssl/openssl/releases/tag/OpenSSL_1_1_1s] 
would resolve them.

-- System Information:
Debian Release: 11.5
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'stable-security'), (500, 'stable')
Architecture: amd64 (x86_64)