Hello,
Holger Wansing, le mar. 04 juin 2019 20:59:12 +, a ecrit:
> Am Sonntag, 2. Juni 2019 schrieb Holger Wansing:
> > Am Sonntag, 2. Juni 2019 schrieb Samuel Thibault:
> > > ButterflyOfFire, le dim. 02 juin 2019 15:43:41 +, a ecrit:
> > > > >> "لاحقاً"
> > > >
> > > > This word means "l
Your message dated Mon, 17 Jun 2019 19:06:49 +
with message-id
and subject line Bug#919759: fixed in gokey
0.0~git20190103.40eba7e+really0.0~git20181023.b4e2780-3
has caused the Debian Bug report #919759,
regarding gokey FTBFS on armel/mips*: FAIL github.com/cloudflare/gokey
to be marked as d
Processing control commands:
> tag -1 pending
Bug #919759 [src:gokey] gokey FTBFS on armel/mips*: FAIL
github.com/cloudflare/gokey
Added tag(s) pending.
--
919759: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=919759
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
Control: tag -1 pending
Hello,
Bug #919759 in gokey reported by you has been fixed in the
Git repository and is awaiting an upload. You can see the commit
message below and you can check the diff of the fix at:
https://salsa.debian.org/go-team/packages/gokey/commit/e8b08364912589ce80ea8274cae7b3
On 2019-06-16 Ross Boylan wrote:
[...]
> So it sounds as if I should wait til gnutls30 3.6.7-4 appears before
> doing the upgrade. Or maybe the security problem is serious enough to
> warrant an upgrade now? TLS is likely to matter to me only as a
> client.
Hello Ross,
this choice a noop, 3.6.
Your message dated Mon, 17 Jun 2019 13:48:36 +
with message-id
and subject line Bug#930507: fixed in ompl 1.4.2+ds1-3
has caused the Debian Bug report #930507,
regarding libompl-dev: libeigen required to build against OMPL
to be marked as done.
This means that you claim that the problem has b
Processing commands for cont...@bugs.debian.org:
> severity 930631 important
Bug #930631 [src:linux] linux-image-4.19.0-5-amd64: Fresh Buster install fails
to boot to desktop
Severity set to 'important' from 'critical'
> thanks
Stopping processing here.
Please contact me if you need assistance.
reopen 930507
Hi,
the missing symbol should be in libGLdispatch.so.0, please verify:
$ nm -D /usr/lib/x86_64-linux-gnu/libGLdispatch.so.0 | grep tls
$ ls -la /usr/lib/x86_64-linux-gnu/libGLdispatch.so*
Are there any stale versions of libGLdispatch.so* on your system?
You are working on a merged-usr environm
Followup-For: Bug #929685
Control: tag -1 patch
Hi,
I looked into this again and would suggest to demote the
ca-certificates-java -> default-jre-headless
dependency to a recommends.
ca-certificates-java will have to gracefully handle the case that no JRE
is available at all and that one becomes
Processing control commands:
> tag -1 patch
Bug #929685 [ca-certificates-java,default-jre-headless,openjdk-11-jre-headless]
ca-certificates-java,default-jre-headless,openjdk-11-jre-headless: get rid of
the circular dependency
Added tag(s) patch.
--
929685: https://bugs.debian.org/cgi-bin/bugre
Hi,
I reproduced this testing timeout on the mipsel porter box
eller.debian.org. Then I increased the timeout and it succeeded:
[...]
ok github.com/cloudflare/gokey 9.447s
? github.com/cloudflare/gokey/cmd/gokey [no test files]
=== RUN TestKnownKey
--- PASS: TestKnownKey (684.7
Processing commands for cont...@bugs.debian.org:
> tags 926712 patch
Bug #926712 [evolution-ews] evolution-ews: CVE-2019-3890
Added tag(s) patch.
> thanks
Stopping processing here.
Please contact me if you need assistance.
--
926712: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=926712
Debia
On Tue, 9 Apr 2019 15:52:52 +0200 Sylvain Beucler <
b...@beuc.net
> wrote:
> Package: evolution-ews
> Version: 3.30.5-1
> X-Debbugs-CC:
t...@security.debian.org
> Severity: grave
> Tags: security
>
> Hi,
>
> The following vulnerability was published for evolution-ews.
>
> CVE-2019-3890[0]:
> N
Your message dated Mon, 17 Jun 2019 08:48:39 +
with message-id
and subject line Bug#927775: fixed in monit 1:5.25.2-3+deb10u1
has caused the Debian Bug report #927775,
regarding monit: CVE-2019-11454 CVE-2019-11455
to be marked as done.
This means that you claim that the problem has been deal
as requested in https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=908678#139
we have created a data/CVE/.list repo ("v2") during MiniDebConf HH
It is mirrored at Salsa:
https://salsa.debian.org/dlange/debian_security_security-tracker_split_files_v2
On Wed, 12 Jun 2019 17:07:11 +0200 Ivo De Decker wrote:
> As the security team considers this an issue that needs to be fixed for
> buster, I'm increasing the severity. Please do not downgrade it again.
Thanks for "help", security team.
> Note that the revert Paul mentioned in #930313
I don't u
Your message dated Mon, 17 Jun 2019 07:39:55 +
with message-id <5d0743cb46aa0_3822b1c7cfe70cc17...@godard.mail>
and subject line Bug#930587 fixed in www.debian.org
has caused the Debian Bug report #930587,
regarding www.debian.org: release notes fail to build for jessie and stretch
to be marked
On Mon, Jun 17, 2019 at 12:52:54AM +0200, wf...@niif.hu wrote:
> Dear Security Team,
>
> I'm ready to upload libqb-1.0.1-1+deb9u1 with the following debdiff:
>
> diff -Nru libqb-1.0.1/debian/changelog libqb-1.0.1/debian/changelog
> --- libqb-1.0.1/debian/changelog 2016-12-07 14:55:45.000
19 matches
Mail list logo