Processing commands for cont...@bugs.debian.org:
> forwarded 689700
> http://lists.gnu.org/archive/html/bug-bison/2012-10/msg9.html
Bug #689700 [bison] bison: generate incompatible header file
Set Bug forwarded-to-address to
'http://lists.gnu.org/archive/html/bug-bison/2012-10/msg9.html'
On Thu, Oct 18, 2012 at 12:36:18PM +1100, Mark Purcell wrote:
>
> ...
> > 13:51 < tzafrir_laptop> stappers, th fix is to get a newr chan_capi from
> > SVN 13:52 < tzafrir_laptop> It seems that thy don't intend to release
> > anything. But thir branch 1.1.5 is old.
>
> Thanks Geert,
>
> If upstre
Processing commands for cont...@bugs.debian.org:
> reassign 473400 xlockmore-gl
Bug #473400 [xlockmore] xlockmore: xlock shouldn't unlock the screen if
screensaver fails
Bug reassigned from package 'xlockmore' to 'xlockmore-gl'.
No longer marked as found in versions xlockmore/1:5.22-1.3 and
xloc
Processing commands for cont...@bugs.debian.org:
> tags 625020 upstream wontfix
Bug #625020 [src:asterisk-chan-capi] asterisk-chan-capi: FTBFS: logger.h:87:64:
error: expected declaration specifiers before 'attribute_warn_unused_result'
Added tag(s) upstream and wontfix.
> thanks
Stopping process
On Sat, 6 Oct 2012 20:26:34 Andreas Beckmann wrote:
> debsums reports modification of the following files,
> from the attached log (scroll to the bottom...):
>
> /etc/yate/providers.conf
Adreas,
Thanks for the report.
/etc/yate/providers.conf is installed as a conffile:
Installing n
tags 625020 upstream wontfix
thanks
On Sat, 13 Oct 2012 23:25:52 Geert Stappers wrote:
> * how to get the source
...
> 13:51 < tzafrir_laptop> stappers, th fix is to get a newr chan_capi from
> SVN 13:52 < tzafrir_laptop> It seems that thy don't intend to release
> anything. But thir branch 1.1.5
Control: tags -1 + patch
On Thu, 2012-10-18 at 04:50:24 +0200, Guillem Jover wrote:
> But in any case gadfly is also buggy, as it's using the substvar
> ${source:Version} as the base for the binary version, which should
> not include the binNMU version part. And using ${binary:Version}
> which is
Processing control commands:
> tags -1 + patch
Bug #623578 [gadfly] gadfly: build wrong version of the packaging during a
binNMU
Added tag(s) patch.
--
623578: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=623578
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--
To
Processing commands for cont...@bugs.debian.org:
> reopen 623578
Bug #623578 {Done: Samuel Thibault } [dpkg] gadfly: build
wrong version of the packaging during a binNMU
'reopen' may be inappropriate when a bug has been closed with a version;
all fixed versions will be cleared, and you may need t
reopen 623578
tags 623578 - patch
clone 623578 -1
notfixed -1 1.16.7
reassign 623578 gadfly
found 623578 1.0.0-15
block 623578 by -1
thanks
Hi!
On Sun, 2012-10-14 at 23:20:11 +0200, Samuel Thibault wrote:
> Andreas Metzler, le Sun 14 Oct 2012 15:44:16 +0200, a écrit :
> > Afaict (Both by looking
Hi,
On Tue, Oct 16, 2012 at 05:08:23PM +0200, Andreas Beckmann wrote:
> I don't have time right now to do a further analysis. Might be the
> conffiles being owned by uim-common in 1:1.5.7-9.1, but now they are
> handled by libuim-data.
Thank you for your checking.
Touching these files to let mv_c
Your message dated Thu, 18 Oct 2012 00:02:32 +
with message-id
and subject line Bug#685970: fixed in openjpeg 1.3+dfsg-4.6
has caused the Debian Bug report #685970,
regarding openjpeg: CVE-2012-3535
to be marked as done.
This means that you claim that the problem has been dealt with.
If this
Your message dated Wed, 17 Oct 2012 23:03:02 +
with message-id
and subject line Bug#690670: fixed in ruby1.9.1 1.9.3.194-3
has caused the Debian Bug report #690670,
regarding ruby1.9.1: CVE-2012-4522
to be marked as done.
This means that you claim that the problem has been dealt with.
If this
Package: drupal7
Version: 7.14-1
Severity: critical
Tags: security
X-Debbugs-CC: secure-testing-t...@lists.alioth.debian.org
--- Please enter the report below this line. ---
Hi!
There is currently a security issue with Drupal 7.14 currently in
unstable, being shipped with wheezy.
http://drup
Hi!
On Wed, 2012-10-17 at 21:03:51 +0100, Adam D. Barratt wrote:
> On Mon, 2012-10-15 at 03:14 +0200, Samuel Thibault wrote:
> > Mmm, +b1 is indeed here, but dak is still REJECTing it, saying that
> > there is no such source version in unstable:
> >
> > python-kjbuckets_1.0.0-15+b4_hurd-i386.deb:
Processing commands for cont...@bugs.debian.org:
> owner 690778 nicho...@periapt.co.uk
Bug #690778 [mysql-5.5] mysql-5.5: New security issues from October Patch Update
Owner recorded as nicho...@periapt.co.uk.
>
End of message, stopping processing here.
Please contact me if you need assistance.
-
Your message dated Wed, 17 Oct 2012 20:51:25 +
with message-id
and subject line Bug#690358: fixed in httping 1.5.5-1
has caused the Debian Bug report #690358,
regarding httping: free(): invalid pointer
to be marked as done.
This means that you claim that the problem has been dealt with.
If th
> Whilst this has now been fixed in unstable, it was via the upload of a
> new upstream which adds over 2000 lines of new code (and doesn't even
> directly include the security fix) and with a debhelper compat bump
> thrown in on the packaging side.
>
> It's possible someone might feel incli
On Tue, Oct 16, 2012 at 10:17:53PM -0600, Bdale Garbee wrote:
> Ben Hutchings writes:
>
> > 'iocharset=iso8859-1' is actually the default; you would need to
> > override the default by specifying 'iocharset=utf8'.
>
> Ah, right. Yes, in that case I agree we can just lose the explicit
> iocharse
On Mon, 2012-10-15 at 03:14 +0200, Samuel Thibault wrote:
> Mmm, +b1 is indeed here, but dak is still REJECTing it, saying that
> there is no such source version in unstable:
>
> python-kjbuckets_1.0.0-15+b4_hurd-i386.deb: trying to install to
> unstable, but could not find source
The build log i
On Wed, 2012-10-17 at 20:48 +0200, Michael Biebl wrote:
> Which versions exactly did you test?
> Do you run squeeze, wheezy or sid?
I have it one one system that runs sid.., but is largely un-updated (because of
Evolution - long story).
There I have Evolution 2.32.3.
I have another system, most r
On Tue, 2012-10-16 at 11:52 +0200, Moritz Muehlenhoff wrote:
> Please see https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-4516 for
> details an a patch.
Whilst this has now been fixed in unstable, it was via the upload of a
new upstream which adds over 2000 lines of new code (and doesn't even
On Wed, Oct 17, 2012 at 11:00:49AM -0700, Chuan-kai Lin wrote:
> Hi,
>
> I am forwarding this bug report by Bill Allombert from the Debian bug
> tracking system (http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=689700).
> Here is Bill's report:
Dear bison developers,
I realise my report was incom
Processing commands for cont...@bugs.debian.org:
> # Wednesday 17 October 19:03:07 UTC 2012
> # Tagging as pending bugs that are closed by packages in NEW
> # http://ftp-master.debian.org/new.html
> #
> # Source package in NEW: href="http://packages.qa.debian.org/libav";>libav
> tags 671934 + pe
Which versions exactly did you test?
Do you run squeeze, wheezy or sid?
Please use reportbug next time.
--
Why is it that all of the instruments seeking intelligent life in the
universe are pointed away from Earth?
signature.asc
Description: OpenPGP digital signature
On Sun, Oct 14, 2012 at 11:42:12AM -0500, Dirk Eddelbuettel wrote:
> I fear there is nothing I can do for you. The current version is in
> unstable, and users can easily install it directly from CRAN -- which has ~
> 4000 packages of which we have maybe 150 in Debian. So people are used to
> mixi
Processing commands for cont...@bugs.debian.org:
> severity 690358 grave
Bug #690358 [httping] httping: free(): invalid pointer
Severity set to 'grave' from 'normal'
> thanks
Stopping processing here.
Please contact me if you need assistance.
--
690358: http://bugs.debian.org/cgi-bin/bugreport.c
Hi,
> Jonas Genannt wrote (17 Oct 2012 06:18:07 GMT) :
> > we should remove it from testing, because Gitalist was also removed.
>
> Do you want to do it, or do you prefer me to?
[x] done :)
Thanks,
Jonas
--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subje
Hi Jonas,
Jonas Genannt wrote (17 Oct 2012 06:18:07 GMT) :
> we should remove it from testing, because Gitalist was also removed.
Do you want to do it, or do you prefer me to?
Cheers,
--
intrigeri
| GnuPG key @ https://gaffer.ptitcanardnoir.org/intrigeri/intrigeri.asc
| OTR fingerprint @
On Sun, 07 Oct 2012 16:57:51 +0200, gregor herrmann wrote:
> Still, I'd appreciate a quick look by a CTTE member to check if this
> implements their decision correctly, and especially a pre-approval of
> the RT, since this is targetted at wheezy (please note that the
> versions in wheezy and sid a
Hi,
> We sent the first batch to the Alioth users, and are quite happy that,
> among the 213 members of the Alioth webwml group we contacted, 104
> members already sent us back the agreement, and 44 other persons (who
> already provided content but who currently don't have commit access)
> sent it
Hi.
One thing that could be done on the Debian side though.
We should add a NEWS entry informing about that corruption, so that
users will at least learn what has happened... even when it might have
happened years ago to them, where Evolution still regularly used mbox.
Cheers,
Chris.
smime.p7
Modestas,
I dug a little bit and it appears that the problem is only with the recurring
tasks.
Gilles
On Saturday 13 October 2012 03:33:22 Modestas Vainius wrote:
> Hello,
>
> Friday 13 January 2012 16:18:06 rašė:
> > I have been using stable (fresh install) for few months and this morning I
>
Hi,
On Wed, Oct 17, 2012 at 04:39:14PM +0200, Steffen Möller wrote:
> Hello,
> On 10/17/2012 04:16 PM, Andreas Tille wrote:
> > I admit that an empty package is not nice but from my perspective this
> > bug does not qualify as severity "grave". I'm tempted to set this to
> > "normal" - specifical
Hello,
On 10/17/2012 04:16 PM, Andreas Tille wrote:
> I admit that an empty package is not nice but from my perspective this
> bug does not qualify as severity "grave". I'm tempted to set this to
> "normal" - specifically in freeze time this severity might add noise
> we do not really need.
>
> W
Dear all,
Please find enclosed a detailled bug description.
The 6.1-2 rheolef library (sid & wheezy) is not usable as is
and a new version is required:
a fixed version of the rheolef debianization is available as 6.1-3 in svn.
Yours sincerely,
Pierre
--
pierre.saram...@imag.fr
Directeur de Rec
Processing commands for cont...@bugs.debian.org:
> tag 688842 patch
Bug #688842 [perl] CPAN modules no longer installed to /usr/local by default
Added tag(s) patch.
> thanks
Stopping processing here.
Please contact me if you need assistance.
--
688842: http://bugs.debian.org/cgi-bin/bugreport.cg
tag 688842 patch
thanks
On Wed, Oct 03, 2012 at 11:41:30AM +0300, Niko Tyni wrote:
> On Wed, Sep 26, 2012 at 09:12:00AM +0300, Niko Tyni wrote:
> > When the site dirs don't exist, the CPAN shell interactive configuration
> > states
> > Warning: You do not have write permission for Perl library
On Wednesday 17 October 2012 15:20:58 Moritz Muehlenhoff wrote:
> Package: virtualbox
> Severity: grave
> Tags: security
> Justification: user security hole
>
> Oracle fixed an unspecified security issue in their latest Patch Update:
> http://www.oracle.com/technetwork/topics/security/cpuoct2012-1
Hi,
I admit that an empty package is not nice but from my perspective this
bug does not qualify as severity "grave". I'm tempted to set this to
"normal" - specifically in freeze time this severity might add noise
we do not really need.
What do you think?
Kind regards
Andreas.
--
htt
Package: openslp-dfsg
Followup-For: Bug #687597
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
As far as I can tell, no solution known yet, on 17 October 2012, 15:28 +0200.
While going through Debian QA group owned RC bugs, I touched on this bug.
http://security-tracker.debian.org/tracker/CVE-20
Package: mysql-5.5
Severity: grave
Tags: security
Justification: user security hole
Due to the usual intransparency we'll again have to update to a new upstream
release in Wheezy and stable...
http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html
Also, it's amazing how the ma
Package: virtualbox
Severity: grave
Tags: security
Justification: user security hole
Oracle fixed an unspecified security issue in their latest Patch Update:
http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html
CVE-2012-3221 Oracle VM Virtual Box NoneVirtualBox Core
Package: openjdk-7
Severity: grave
Tags: security
Justification: user security hole
http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html
--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lis
Package: openjdk-6
Severity: grave
Tags: security
Justification: user security hole
http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html
--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@list
Your message dated Wed, 17 Oct 2012 12:47:26 +
with message-id
and subject line Bug#689896: fixed in lastfmsubmitd 1.0.6-4
has caused the Debian Bug report #689896,
regarding Ships a folder in /var/run or /var/lock (Policy Manual section 9.3.2)
to be marked as done.
This means that you claim
Package: rheolef
Version: 6.1-3
Severity: grave
Tags: patch
Dear debian maintainers,
The rheolef_6.1-2 package is wrongly distributed in sid and wheezy.
The rheolef debianization files debian/* are now fixed and the fixed version is
available
as rheolef_6.1-3 in svn.
Please could you upgrade t
Your message dated Wed, 17 Oct 2012 12:17:34 +
with message-id
and subject line Bug#685611: fixed in suckless-tools 38-2
has caused the Debian Bug report #685611,
regarding suckless-tools: no link to upstream in d/copyright
to be marked as done.
This means that you claim that the problem has
Your message dated Wed, 17 Oct 2012 11:32:53 +
with message-id
and subject line Bug#685186: fixed in elilo 3.14-2
has caused the Debian Bug report #685186,
regarding IA64 (Itanium) Wheezy, ELILO installation failed
to be marked as done.
This means that you claim that the problem has been deal
Hi Zigo,
As lastfmsubmitd is maintained by the Debian QA group, I will just go
ahead and upload a new version of lastfmsubmitd with your patch applied.
I will request an unblock after the upload.
Paul
signature.asc
Description: OpenPGP digital signature
On Tue, Oct 16, 2012 at 09:47:54AM -0700, Roland Dreier wrote:
> The first vulnerable version in Debian is 1.0.14. Upstream introduced
> ACM support (where the vulnerability exists) in version 1.0.12, so
> Debian's 1.0.10 is not vulnerable.
Thanks, I'll mark Squeeze as not affected in the Debian
51 matches
Mail list logo