what it's worth, I think this is the right call. Please try to include
the ZTS patches, it helps a lot when validating new kernels that the ZTS
runs are clean.
Best,
Antonio Russo
See also [1], which presumably will cherry-pick the fix onto 2.2
without changes. If that is indeed the case, we should probably
cherry pick it as is, too.
Best,
Antonio Russo
[1] https://github.com/openzfs/zfs/pull/17325
On 2025-05-19 11:24, Florian Bach wrote:
Am 19.05.25 um 07:46 schrieb Antonio Russo:
There is progress on this, but it is occurring in real time. My suggestion
is to wait for upstream to decide they understand it, finalize the PR, merge
it, and then back port the fix to 2.3. This last step
s now,
and upgrading to trixie from bookworm is not going to make the situation
worse for anyone.
I would recommend reducing the severity of this bug to important so that
zfs is not removed from trixie.
Best,
Antonio Russo
[1] https://github.com/openzfs/zfs/pull/17340#pullrequestreview-2847190346
On 2025-05-17 10:08, Guido Günther wrote:
What situations would the user service for root be spawned? It's not
used for su, sudo or ssh as far as I can tell.
I get a user systemd session when I ssh as root on bookworm and unstable.
pam_systemd, I believe, is responsible for this. The behavior
Control: tag -1 patch
Please see [1], where I have packaged 1.4.4 which addresses this
issue.
Best,
Antonio Russo
[1] https://gitlab.com/dante/pkg-debian-full/-/merge_requests/2
authoring this patch! Would you be willing
to submit this to upstream [1]?
Best,
Antonio Russo
[1] https://github.com/element-hq/synapse
On 2025-05-09 10:25, Jeremy Bícha wrote:
On Fri, May 9, 2025 at 11:27 AM Antonio Russo wrote:
I'm tagging this bug as a security bug because it needlessly
starts a process that should not be running as root.
Have you sent your patch to the security contact at
https://www.blue
Control: tag -1 security
Hello,
I'm tagging this bug as a security bug because it needlessly
starts a process that should not be running as root.
Best,
Antonio
Control: severity -1 grave
Control: tag -1 + patch
I'm increasing the severity of this bug since it's running extra
code as root, entirely needlessly. I also tried to raise this issue
with upstream, but I got no response.
Antonio
Package: firejail
Version: 0.9.74-1
Severity: normal
Tags: patch upstream
Dear Maintainer,
firejail fails to create SELinux labels for some objects under /dev, and [1]
addresses this issue upstream. I've attached a back-ported version of that.
Best,
Antonio Russo
[1] https://githu
On 2025-04-16 13:19, Patrick Franz wrote:
Hi Antonio,
are you affected by this ? Is it causing issues ?
I get this every time I alt-tab in kwin (wayland) using
the compact switcher visualization (and allowing the
on-screen list of windows to show up).
I am unaware of any other symptom besides
more software I wasn't going
to use.
If you want more details, I can explain how I'm doing it.
Best,
Antonio Russo
On 2025-03-17 17:31, Jeremy Bícha wrote:
Source: inkscape-textext
Version: 1.8.2-1
Please update inkscape-textext to the latest release, 1.11.1.
Thanks for uploading the new Inkscape! I just opened an RFS bug [1]
for 1.11.1.
Best,
Antonio Russo
[1] https://bugs.debian.org/cgi-bin
: GL_INVALID_OPERATION in
glDrawBuffers(unsupported buffer GL_BACK_LEFT)
I'm not sure if this is the right binary package, but the fix is against
source package qt6-base.
Best,
Antonio Russo
[1] https://bugreports.qt.io/browse/QTBUG-122819
[2] https://gitlab.freedesktop.org/mesa
something that can be
reasonably provided by this package, since by its nature the cacher will know
what you request of it (and, more fatally, that you are requesting anything
of it).
Best,
Antonio Russo
have been using this patch since submitting it (over two years
now).
Best,
Antonio Russo
Thank you for the upload!
Best,
Antonio
-module-qtwebengine).
Given that the rest of the dependencies have moved over to QT6, I suspect
this is just an oversight.
Best,
Antonio Russo
e 1.4 entered unstable today.
Best,
Antonio Russo
On 2025-02-13 01:54, Chris Hofstaedtler wrote:
Please let me know the upstream commit which fixes it all.
These two MRs should address the issue:
https://github.com/util-linux/util-linux/pull/3436
https://github.com/util-linux/util-linux/pull/3410
Best,
Antonio
what do). (If it's not identified
after another upload cycle, I might file a bug pointing this out).
I've also included a link [3] on how to adjust the properties of this bug.
Best,
Antonio Russo
[1] https://release.debian.org/transitions/html/qt6base-abi-6.8.2.html
[2]
https://buil
Just to clarify for everyone: this is resolved by installing pahole.
Presumably, the solution is to just to make kbuild Depend: on pahole.
Best,
Antonio
OpenPGP_0x72DB026E04C1C768.asc
Description: OpenPGP public key
OpenPGP_signature.asc
Description: OpenPGP digital signature
On 2/12/25 05:43, Antonio Russo wrote:
Package: util-linux
Version: 2.40.4-2
Severity: normal
X-Debbugs-Cc: aeru...@aerusso.net
Tags: patch
Forwarded: https://github.com/util-linux/util-linux/pull/3410
Dear Maintainer,
Since the cherry-pick of upstream commit
fixed in upstream [1].
Please consider also cherry picking this fix.
Best,
Antonio Russo
[1] https://github.com/util-linux/util-linux/pull/3410
OpenPGP_0x72DB026E04C1C768.asc
Description: OpenPGP public key
OpenPGP_signature.asc
Description: OpenPGP digital signature
in
mpris-proxy.
Please consider the following trivial patch that changes this
default behavior.
Best,
Antonio Russo
From d9e02494e661109607c073968fa352c1397a1ffb Mon Sep 17 00:00:00 2001
From: Antonio Enrico Russo
Date: Sun, 26 Jan 2025 08:00:26 -0700
Subject: [PATCH] Do not start mpris-proxy
Hello,
On 1/11/25 02:45, Russell Coker wrote:
Is there a way we could automatically change the [allow_execmem]
boolean when a package like gdm or sddm is installed?
Wouldn't it be better to only allow some processes to have w&x memory,
rather than try to automatically flip the global boolean?
instead
create the merge request when you push to upstream [2] (I use this in my
workflow).
I've had trouble with setting the text of the MR, but I'm sure I'm escaping
something
incorrectly in my script.
Best,
Antonio Russo
[1]
https://docs.gitlab.com/ee/user/project/merge_requests
hot.
Best,
Antonio Russo
[1] https://invent.kde.org/office/kbibtex/-/issues/3
OpenPGP_0x72DB026E04C1C768.asc
Description: OpenPGP public key
OpenPGP_signature.asc
Description: OpenPGP digital signature
The problem is resolved with a local selinux module with these extra
permissions granted to systemd_resolved_t:
allow systemd_resolved_t init_runtime_t:sock_file create;
allow systemd_resolved_t init_runtime_t:dir watch;
The confusion was caused by [1], or something else that caused the kernel
Package: apt
Version: 2.9.19
Severity: normal
X-Debbugs-Cc: aeru...@aerusso.net
Dear Maintainer,
I'm not sure which (recent) version of apt caused this (though reading the
changelog
makes me suspicious of 2.9.19), but as of this version, I cannot use the seccomp
sandbox with any https transpor
On 12/21/24 17:59, Antonio Russo wrote:
1. The issue is resolved by ordering systemd-resolved
after systemd-tmpfiles-setup using an After= dependency.
Reverting `PrivateTmp=yes` from `PrivateTmp=disconnected` also resolves the
issue. So, it's a regression fixing [1], which I'm
On 12/21/24 17:33, Luca Boccassi wrote:
On Sun, 22 Dec 2024 at 00:28, Antonio Russo wrote:
On 12/21/24 04:37, Luca Boccassi wrote:
Does it work if you boot in permissive mode or with selinux disabled?
I am able to reproduce this in a trixie VM.
That's still in enforcing mode, fro
On 12/21/24 04:37, Luca Boccassi wrote:
Does it work if you boot in permissive mode or with selinux disabled?
I am able to reproduce this in a trixie VM. I used one created by sbuild
~months ago that I've been updating. Then, I mostly-followed [1].
Specifically, I:
apt-get install systemd-re
Package: systemd-resolved
Version: 257.1-1
Severity: normal
Dear maintainer,
I upgraded to 257.1-1, and both systemd-timesyncd and systemd-resolved fail to
come up at boot:
systemd[1]: Starting systemd-resolved.service - Network Name Resolution...
systemd[1]: Starting systemd-timesyncd.service
On 12/16/24 08:19, Matthew Vernon wrote:
PCRE2 does not, no. But if you want to do something any time the package
is upgraded, you might declare yourself an interest-noawait trigger upon
/usr/include/pcre2.h (which is necessarily updated whenever the version
changes, which looks to be what selinu
On 12/16/24 02:14, Matthew Vernon wrote:
If selinux wants to run something whenever pcre2 is updated on a system, it
probably wants to install a suitable dpkg trigger.
On what trigger name should an selinux package be interested? Does pcre2
activate any
custom trigger names?
Antonio
OpenP
On 11/24/24 08:18, Antonio Russo wrote:
Dear Maintainer,
After upgrading to pcre2 10.44-4, I get errors like this:
Regex version mismatch, expected: 10.44 2024-06-07 actual: 10.42 2022-12-11
dpkg: warning: selinux: Regex version mismatch, expected: 10.44 2024-06-07
actual: 10.42 2022-12-11
Control: tags -1 -moreinfo
Dear mentors,
I am looking for a sponsor for my package "kcollectd":
* Package name : kcollectd
Version : 0.12.2-1
Upstream contact : Antonio Russo
* URL : https://www.antonioerusso.com/projects/kcollectd
* License
Package: sponsorship-requests
Severity: normal
Dear mentors,
I am looking for a sponsor for my package "kcollectd":
* Package name : kcollectd
Version : 0.12.2-1
Upstream contact : Antonio Russo
* URL : https://www.antonioerusso.com/projects
Package: libpcre2-16-0
Version: 10.44-4
Severity: normal
X-Debbugs-Cc: aeru...@aerusso.net
Dear Maintainer,
After upgrading to pcre2 10.44-4, I get errors like this:
Regex version mismatch, expected: 10.44 2024-06-07 actual: 10.42 2022-12-11
dpkg: warning: selinux: Regex version mismatch, expec
20/24 13:16, Hefee wrote:
But I lowered the dependency
from depends to recommends, so you are able to install libkf6purpose-bin with
sid only (fixed in 6.6.0-3).
[/snip]
I consider this bug closed, too. Can you double check this BTS incantation?
Package: kdeconnect
Version: 24.08.2-1
Severity: wishlist
Dear Maintainer,
The most recent version of kdeconnect has added the binary package
qml6-module-org-kde-kdeconnect, which is pulled in by libkf6purpose-bin.
The qml package in turn pulls in kdeconnect.
I suspect both of these requirement
Control: forcemerge 1071456 -1
On 7/5/24 06:50, Paride Legovini wrote:
On Fri, 5 Jul 2024 Antonio Russo wrote:> I'm not
sure if this bug belongs to sbuild, sbuild-qemu, or autopkgtest. The
problem
I am experiencing is that passing --extra-package with a large enough package
(93 M
tus of rust-team actually
getting the package out is.
Feel free to salvage as much or as little of that MR as you'd like!
Best,
Antonio Russo
https://salsa.debian.org/rust-team/debcargo-conf/-/merge_requests/657
rm that
cargo-web indeed interacts well enough with python3-setuptools-rust as
packaged to actually build something.
Best,
Antonio Russo
From 0acc174812eb3020e57ed05e4c7e5d5efd6d18c9 Mon Sep 17 00:00:00 2001
From: Antonio Enrico Russo
Date: Wed, 18 Sep 2024 18:39:10 -0600
Subject: [PATCH] R
Hello Jessie,
On 2024-08-16 10:42, Jesse Rhodes wrote:
> Can you clarify exactly what functionality is missing without this
> interface, and how to reproduce the issue? Is there an upstream bug?
I'm not able to reproduce this any more (i.e., I rolled back the change
I made to /usr/share/applicat
kde.KWin.ScreenShot2,org.kde.KWin.CaptureScreen
Best,
Antonio Russo
OpenPGP_0xB01C53D5DED4A4EE.asc
Description: OpenPGP public key
OpenPGP_signature.asc
Description: OpenPGP digital signature
I am running into). The copy to vm fails (hangs apparently
indefinitely,
and breaks further interaction with the VM).
The stdin file on the 9p shared filesystem winds up the same size as stdin_eof
flag-file.
Is this limitation known and/or am I doing something wrong with the VM?
Best,
An
Source: selinux-policy-default
Version: 2:2.20221101-9
Severity: normal
X-Debbugs-Cc: aeru...@aerusso.net
Dear Maintainer,
On a fresh bookworm installation, I have enabled selinux following [1]. I
enabled
enforcing mode, and tried to log in at the console tty (tty1, tty2, and tty6).
journalctl -
I can confirm this version of systemd breaks my system's boot as well. I don't
have any
modified journald.conf settings.
I'm running dracut, and the image that is built fails to start
systemd-modules-load.service
Running systemd-modules-load (rd.shell=1 rd.break=cmdline) at the (dracut)
shell
that dpkg-dev version 1.22.5 (or later) allows you to use
Provides: ${t64:Provides}
to automatically generate the versioned Provides: line.
Best,
Antonio Russo
OpenPGP_0xB01C53D5DED4A4EE.asc
Description: OpenPGP public key
OpenPGP_signature.asc
Description: OpenPGP digital signature
ot; and trigger another build attempt.
So, I'm asking for someone to please "give back" the build to the buildds, so
that
we can spin the roulette wheel and hopefully get a buildd with an ipv4 address.
Best,
Antonio Russo
[1] https://tracker.debian.org/pkg/krb5
OpenPGP_0xB01C53D5DED
On 2023-12-08 09:01, Sven Joachim wrote:
>
> ,
> | @@ -8550,7 +8556,7 @@ tmux|tmux terminal multiplexer,
> | use=ecma+italics, use=ecma+strikeout, use=xterm+edit,
> | use=xterm+pcfkeys, use=xterm+sl, use=xterm+tmux,
> | use=screen, use=bracketed+paste, use=report+version,
> | - u
-256color I get the same bad behavior in aptitude.
If I downgrade all ncurses packages to 6.4+20231016, I don't get this behavior.
Maybe this
bug should instead be assigned to ncurses?
Best,
Antonio Russo
OpenPGP_0xB01C53D5DED4A4EE.asc
Description: OpenPGP public key
OpenPGP_signatur
What semantics are you thinking for handling upgrades? This does not appear
to be a new zpool "feature", so we may want to support loading such a pool
on an earlier version of our zfs packaging. How does this sound?
- migrate the property if it exists (but do not remove the old, root
filesyst
Package: sponsorship-requests
Severity: normal
Dear mentors,
I am looking for a sponsor for my package "kcollectd":
* Package name : kcollectd
Version : 0.12.1-1
Upstream contact : Antonio Russo
* URL : https://www.antonioerusso.com/projects
8EED5
> gpgv: Can't check signature: No public key
> uscan die: OpenPGP signature did not verify. at
> /usr/share/perl5/Devscripts/Uscan/Output.pm line 77.
I assume that means it is actually verifying the signature.
Should I add a lintian override to capture this situation?
1) unstable; urgency=medium
.
* Initial release (Closes: #1041718)
Best,
Antonio Russo
OpenPGP_0xB01C53D5DED4A4EE.asc
Description: OpenPGP public key
OpenPGP_signature.asc
Description: OpenPGP digital signature
Most notably, upstream
has dropped support for
inkscape <1.3, and I am tracking that change here.
Best,
Antonio Russo
OpenPGP_0xB01C53D5DED4A4EE.asc
Description: OpenPGP public key
OpenPGP_signature.asc
Description: OpenPGP digital signature
urgency=medium
.
* Initial release (Closes: #1041718)
Best,
Antonio Russo
OpenPGP_0xB01C53D5DED4A4EE.asc
Description: OpenPGP public key
OpenPGP_signature
Description: OpenPGP digital signature
bian.net/debian/pool/main/k/keepassxc-proxy-client/keepassxc-proxy-client_0.1.6-1.dsc
Changes for the initial release:
keepassxc-proxy-client (0.1.6-1) unstable; urgency=medium
.
* Initial release (Closes: #1041718)
Best,
Antonio Russo
OpenPGP_0xB01C53D5DED4A4EE.asc
Description
Package: wnpp
Severity: wishlist
Owner: Antonio Russo
X-Debbugs-Cc: debian-de...@lists.debian.org
* Package name: keepassxc-proxy-client
Version : 0.1.6
Upstream Contact: Henrik Böving
* URL : https://github.com/hargoniX/keepassxc-proxy-client
* License : ISC
control: tag -1 patch
This breaks builds of many things including, e.g., kwin.
I'm attaching couc...@debian.org 's patch, which fixed 5.103.0-3, but
apparently never got into the git repository.
Best,
Antonio Russo
(hello other Antonio!)
--- ../kcmutils/debian/libkf5kcmutils-bin.insta
Hello,
This is the use case for the zfs-mount-generator(8).
The man page EXAMPLES section has a quick start guide.
Best,
Antonio
OpenPGP_0xB01C53D5DED4A4EE.asc
Description: OpenPGP public key
OpenPGP_signature
Description: OpenPGP digital signature
retitle -1 dpkg continues to perform setup after usrmerge directory fails
thanks
This was a WSL1 install of Debian, which is buggy [1] (but I do no want to
be the focus of this bug report). (The /lib directory genuinely cannot
be renamed, or something. Who knows what/how exactly WSL1 butchered t
Package: usrmerge
Version: 35
Severity: important
X-Debbugs-Cc: aeru...@aerusso.net
Dear Maintainer,
Under WSL, I installed Debian bullseye (months? a year? ago), and have now
decided to upgrade it to bookworm. My process was:
1. s/bullseye/bookworm/g for /etc/apt/sources.list
2. apt update
3.
e temporary files on ZFS with
Linux 6.1
will not work. (This should not be related to your compiling issue at all,
though).
Best,
Antonio Russo
is at important severity since it is a regression and could conceivable
lead to difficult to debug problems.
Briefly, the interface to tmpfile() interface in the kernel was adjusted to use
a struct file rather than a struct dentry. The adjustment is relatively
straightforward.
Best,
Antonio Russ
On 1/8/23 09:22, Eduard Bloch wrote:
>
> Thanks. Regarding the second patch, I am not sure. Looks like my C++
> also has become rusty in the last months. It would be good to have an
> explicit description of the problem cases, since I don't know exactly
> what you mean with "streaming". I.e. it se
unavailable class.
Matthew Ahrens has fixed this with upstream commit b72efb751 [1].
Best,
Antonio Russo
[1]
https://github.com/openzfs/zfs/commit/b72efb751147ab57afd1588a15910f547cb22600
omain sockets.
Best,
Antonio Russocommit 3c8d91146b9acfa5ab42e4c2496038185b86f95d
Author: Antonio Russo
Date: Mon Dec 26 12:31:48 2022 -0700
Do not override disabled tcp listener
diff --git a/src/acfg.cc b/src/acfg.cc
index a137ac2..2a64348 100644
--- a/src/acfg.cc
+++ b/src/acfg.cc
@@ -
c3da84531a3902536b2e9fed01d5eb54e23
Author: Antonio Russo
Date: Thu Dec 22 04:41:14 2022 -0700
Streaming support for Sources
Signed-off-by: Antonio Russo
diff --git a/src/cacheman.cc b/src/cacheman.cc
index 940be40..52f3a38 100644
--- a/src/cacheman.cc
+++ b/src/cacheman.cc
I must have somehow managed to run an expiration task while there weren't
package files.
This presumably caused the files to be tagged for deletion. When they became
referenced
again, apt-cacher-ng still wants to delete them.
I'm leaving this bug open as a wishlist because it's trivial to work
Package: apt-cacher-ng
X-Debbugs-Cc: aeru...@aerusso.net
Version: 3.7.4-1~bpo11+1
Severity: normal
Dear Maintainer,
During a manual run of acng expiration scan, I'm finding acng wants to remove
basically all
the cached files. As a specific example, it's parsing
bullseye/main/binary-amd64:
er visible.
Best,
Antonio Russo
I've pushed packaging for 1.8.2 to salsa [1].
I don't presently have a testing/unstable system to test this with,
(and I wasn't able to trivially backport 1.2.1), so I can only
confirm it works on 1.0.2-4 and 1.1.2-3~bpo11+1.
If anyone confirms this works on unstable, I'll push it out.
Otherwise
Control: severity -1 wishlist
Control: retitle -1 Please backport support for 5.13
Hello,
ZFS 2.0.3 doesn't support 5.13. Neither does 2.0.5, (which is a
matter of some friction). You'll have to switch to 2.1 if you
can't wait -- and I haven't gotten around to packaging it yet.
- Antonio
Ope
Hello,
Those instructions don't quite work. It did, however, lead me how to figure
it out (thank you).
If you want to do this, you have to:
1. Open ANOTHER tab (try it if you don't believe me, you have to do this)
2. On that tab, a section called "top sites" will appear. Tab to the site
you wo
Package: firefox-esr
X-Debbugs-Cc: aeru...@aerusso.net
Version: 78.13.0esr-1~deb11u1
Severity: normal
Dear Maintainer,
* What led up to the situation?
Install firefox-esr, remove any old profiles, start the program,
and click in the URL bar. Advertisements for several non-free
online platfor
With the release coming up, I don't think anyone has made getting
new versions of software into Debian a major priority. (So that's
the excuse this time!)
(Post-release) As for 2.1, I'd like to get this into experimental
-- and I'd like to keep unstable/bookworm on 2.0, since my
understanding is t
Source: zfs-linux
Version: 2.0.1-1
Severity: grave
Tags: upstream
Justification: causes data loss
X-Debbugs-Cc: aeru...@aerusso.net
See Brian Behlendof's comment at [1], in the merge request for commit
3f81aba76, referencing the analysis of the bug report [2].
In summary: a kernel buffer iterator
Package: chromium
Version: 89.0.4389.82-1
Severity: grave
Tags: upstream security
Justification: user security hole
X-Debbugs-Cc: aeru...@aerusso.net, Debian Security Team
Per [1] (or [2], and allegedly [3] which I cannot access):
> A use after free security issue was found in the Blink compone
Control: fixed -1 2.0.2-1
Hello,
Unfortunately, it took a while to get 2.0 into backports. This should
now be resolved. That said, if you look at the bug reports for ZFS,
there's a recurring theme---people often upgrade their kernel and find
that ZFS is not compatible. You point out:
> btw: I
Control: found -1 0.8.6-1
Control: fixed -1 2.0.2-1
Thank you for reporting this. Are you running stable (0.7.12) and affected by
this?
Backports and bullseye should now have the fix you mention.
Best,
Antonio
OpenPGP_0xB01C53D5DED4A4EE.asc
Description: application/pgp-keys
OpenPGP_signatur
Control: tag -1 patch
Hello Andreas,
Deleting these old symlinks from (presumably) another ZFS packaging is indeed
the correct fix. I do think we could handle this case slightly more nicely,
and I've opened an MR on salsa [1] that should fix this.
Best,
Antonio
[1] https://salsa.debian.org/zfs
Hello,
On 2/19/21 1:35 AM, Xavier wrote:
>
> The recently added cron "TRIM the first Sunday of every month" makes some SSD
> drives crash.
>
> The problem appears on reasonnably busy and otherwise stable servers:
>* with about 100 containers,
>* each on a separate zvol, ext4 mounted wit
Hello,
> Please change the email address on this bug report from
> send_only.aurin...@auroville.org.in to b...@charlesmatkinson.org
See controlling the Debian BTS [1].
> I tried hard to make a source .deb but did not manage to do so.
> Would you like me to share the system I use to create the .
control: tag -1 patch
On 2/5/21 3:22 AM, Gianfranco Costamagna wrote:
> control: reopen -1
> control: notfixed -1 3.0.9+dfsg1-1.1
>
> Hello, I reuse this bug, to point out that now the package has an autopkgtest
> failure on armhf, probably due to an incomplete patch or a missing xvfb
> depende
Hello Wookey,
On 2/3/21 6:44 AM, Wookey wrote:
> On 2021-02-02 23:42 -0700, Antonio Russo wrote:
>
> I've tested the builds on arm64 and armhf. I'm short of non-headless
> boxes here to test the X functionality on.
>
> So I've uploaded to get the migration
ardware to test this on, so, while I can
confirm that this builds (and works) on amd64, it would be nice if someone
could check that it works correctly on arm.
Best,
Antonio Russo
[1] https://tracker.debian.org/pkg/xpra
[2] https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=956822
The patch I submitted builds and runs fine on amd64. It should
also trivially get past the assertion failure in the referenced
buildd log.
I can prepare an NMU---but I'd feel better if someone with an
actual arm* machine could test it.
Also, maybe
-if not platform.uname()[4].startswith("arm
Control: severity -1 grave
Dear Maintainer,
Does this root-level access bug still affect the current
version of snapd in testing?
I do not think it befits Debian to ship a package in this
state---users expect security isolated snaps to not give
trivial root level access to their systems.
I apol
uture) there's no need to upstream this change.
Author: Simon Ruderich
Author: Antonio Russo
Bug-Debian: https://bugs.debian.org/863891
Forwarded: not-needed
Last-Update: 2020-12-18
Index: xpra-2.4.3+dfsg1/setup.py
===
--- xpra-2.4.3+
e.
As for upstreaming the changes: I assume that they had some good reason not to
put it in a file by itself. I do not have any preexisting relationship with
them, so I don't feel like rocking the boat to change things up.
Best,
Antonio Russo
OpenPGP_0xB01C53D5DED4A4EE.asc
Description: appli
elf if it is rebuilt.
Per a conversation I've had on debian-devel [3], it appears I should
request a binNMU (as I believe I am, here). Please let me know if I
am doing anything incorrectly (e.g., should I be cc-ing the dovecot*
developers involved?)
Thank you,
Antonio Russo
[1] https://track
Yes, and this is partly my fault. I've prepared a version of this
patch [1] and forwarding it to upstream [2]. [1] Also includes
some other fixes that should get in, but weren't worth delaying
the upload for. (But this certainly is!)
/sbin is the correct place for this, right?
Antonio
[1] http
cherry-pick that commit?
Thanks,
Antonio Russo
[1] https://github.com/openzfs/zfs/issues/11448
[2]
https://github.com/karelzak/util-linux/commit/372ce5b74e79470b1bda1fc284c19a313a422361
OpenPGP_0xB01C53D5DED4A4EE.asc
Description: application/pgp-keys
OpenPGP_signature
Description: OpenPGP
on a half dozen
machines.
>
> Kind regards,
>
> Laurent Bigonville
Thanks for getting back so quickly,
Antonio Russo
OpenPGP_0xB01C53D5DED4A4EE.asc
Description: application/pgp-keys
OpenPGP_signature
Description: OpenPGP digital signature
Hello,
I am interested in getting dma 0.13 into bullseye. I've been running it
on a fleet of machines after packaging it [1].
Would the dma packaging team be willing to sponsor an upload if I prepared
it?
Best,
Antonio Russo
[1] https://salsa.debian.org/debian/dma/-/merge_reque
1 - 100 of 312 matches
Mail list logo