On 07 juin 2021 09:17, Andreas Beckmann wrote:
> On 06/06/2021 12.44, Christian Marillat wrote:
>> As requested in your previous e-mail (tesla-450) 450.119.04
>
> Thanks, then I'll try to get that unblocked.
>
> Did you have a chance to test 460.84, yet? The (usually sparse)
> upstream changelog
Your message dated Wed, 07 Jul 2021 04:03:25 +
with message-id
and subject line Bug#990765: fixed in sshfs-fuse 3.7.1+repack-2
has caused the Debian Bug report #990765,
regarding sshfs: please add Breaks: fuse (<< 2)
to be marked as done.
This means that you claim that the problem has been de
Processing control commands:
> tag -1 pending
Bug #990765 [sshfs] sshfs: please add Breaks: fuse (<< 2)
Added tag(s) pending.
--
990765: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990765
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
Control: tag -1 pending
Hello,
Bug #990765 in sshfs-fuse reported by you has been fixed in the
Git repository and is awaiting an upload. You can see the commit
message below and you can check the diff of the fix at:
https://salsa.debian.org/debian/sshfs-fuse/-/commit/3240d3e615f6286dc4fbafb71d70
> I do have this in a VM so I think we can easily repro this.
>
> // Fresh VM install from debian-10.9.0-i386-netinst.iso
> # history
> 1 visudo
> 2 rm /etc/motd
> 3 poweroff
> 4 apt install mariadb-server
> 5 dpkg -l|grep mariadb
> 6 sed -i 's/buster/bullseye/g' /etc/
Your message dated Tue, 06 Jul 2021 20:18:07 +
with message-id
and subject line Bug#990764: fixed in kdeconnect 20.12.3-2
has caused the Debian Bug report #990764,
regarding kdeconnect: please add Breaks: fuse (<< 3) and Depends: fuse3 (>= 3)
to be marked as done.
This means that you claim th
On Tue, Jul 06, 2021 at 08:46:30AM -0600, Sam Hartman wrote:
> > "Hideki" == Hideki Yamane writes:
> control: tags -1 -patch -pending
> I NACK this proposed NMU.
> This many years after multiarch, I think it is entirely reasonable for
> PAM to drop support for non-multiarch paths at the tran
Your message dated Tue, 06 Jul 2021 18:32:07 +
with message-id
and subject line Bug#990561: fixed in libuv1 1.24.1-1+deb10u1
has caused the Debian Bug report #990561,
regarding libuv1: CVE-2021-22918
to be marked as done.
This means that you claim that the problem has been dealt with.
If this
Your message dated Tue, 06 Jul 2021 18:32:07 +
with message-id
and subject line Bug#989615: fixed in intel-microcode 3.20210608.2~deb10u1
has caused the Debian Bug report #989615,
regarding intel-microcode: CVE-2020-24511 CVE-2020-24512 CVE-2020-24513
CVE-2020-24489 (INTEL-SA-00464, INTEL-SA-
Processing control commands:
> tags 990748 + patch
Bug #990748 [src:linuxptp] linuxptp: CVE-2021-3570
Ignoring request to alter tags of bug #990748 to the same tags previously set
> tags 990749 + patch
Bug #990749 [src:linuxptp] linuxptp: CVE-2021-3571
Ignoring request to alter tags of bug #990749
Processing control commands:
> tags 990748 + patch
Bug #990748 [src:linuxptp] linuxptp: CVE-2021-3570
Added tag(s) patch.
> tags 990749 + patch
Bug #990749 [src:linuxptp] linuxptp: CVE-2021-3571
Added tag(s) patch.
--
990748: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990748
990749: https
Control: tags 990748 + patch
Control: tags 990749 + patch
Hi
Attached is the current proposed debdiff (not yet uploaded).
Regards,
Salvatore
diff -Nru linuxptp-3.1/debian/changelog linuxptp-3.1/debian/changelog
--- linuxptp-3.1/debian/changelog 2020-12-13 23:33:39.0 +0100
+++ linux
> "Hideki" == Hideki Yamane writes:
>> I think Steve is quite familiar with multiarch and while he
>> hasn't commented yet I'm assuming he dropped those patch lines as
>> part of removing unnecessary upstream deltas.
Hideki> I want his comment, too.
Okay, let's hold off unti
Hi Sam,
On Tue, 06 Jul 2021 08:46:30 -0600 Sam Hartman wrote:
> This many years after multiarch, I think it is entirely reasonable for
> PAM to drop support for non-multiarch paths at the transition between
> buster and bullseye.
It was NOT raised as a goal of bullseye for libpam-* packages tho
Processing commands for cont...@bugs.debian.org:
> retitle 979973 libpam-ubico does not use multiarch paths
Bug #979973 [libpam0g] no such file or directory when PAM accesses it
Bug #990412 [libpam0g] pam_yubico fails to install module in multiarch path
Changed Bug title to 'libpam-ubico does not
> "Hideki" == Hideki Yamane writes:
control: tags -1 -patch -pending
I NACK this proposed NMU.
This many years after multiarch, I think it is entirely reasonable for
PAM to drop support for non-multiarch paths at the transition between
buster and bullseye.
As I said earlier in the bug, I'm h
Processing commands for cont...@bugs.debian.org:
> found 979973 libpam0g/1.4.0-1
Bug #979973 [libpam0g] no such file or directory when PAM accesses it
Bug #990412 [libpam0g] pam_yubico fails to install module in multiarch path
The source libpam0g and version 1.4.0-1 do not appear to match any bina
Processing commands for cont...@bugs.debian.org:
> reassign 979973 libpam0g
Bug #979973 [pam] no such file or directory when PAM accesses it
Bug #990412 [pam] pam_yubico fails to install module in multiarch path
Bug reassigned from package 'pam' to 'libpam0g'.
Bug reassigned from package 'pam' to
Processing commands for cont...@bugs.debian.org:
> notfound 979973 1.4.0-1
Bug #979973 [pam] no such file or directory when PAM accesses it
Bug #990412 [pam] pam_yubico fails to install module in multiarch path
There is no source info for the package 'pam' at version '1.4.0-1' with
architecture '
Processing control commands:
> tags -1 +patch +pending
Bug #990412 [pam] pam_yubico fails to install module in multiarch path
Bug #979973 [pam] no such file or directory when PAM accesses it
Added tag(s) patch.
Added tag(s) patch.
Bug #990412 [pam] pam_yubico fails to install module in multiarch p
control: tags -1 +patch +pending
Hi,
I've found the root cause of this bug, and fixed it.
On my local sid machine, I've tested it with edit /etc/pam.d/su
as search pam_yubico.so, exec su and it searchs /lib/security/pam_yubico.so :)
See below debdiff. If it seems to be okay, I'll put it into
Processing commands for cont...@bugs.debian.org:
> found 979973 pam/1.4.0-1
Bug #979973 [pam] no such file or directory when PAM accesses it
Bug #990412 [pam] pam_yubico fails to install module in multiarch path
Marked as found in versions pam/1.4.0-1.
Marked as found in versions pam/1.4.0-1.
> th
Processing commands for cont...@bugs.debian.org:
> severity 979973 grave
Bug #979973 [libpam-yubico] no such file or directory when PAM accesses it
Severity set to 'grave' from 'important'
> notfound 979973 yubico-pam/2.26-1.1
Bug #979973 [libpam-yubico] no such file or directory when PAM accesses
Package: sshfs
Version: 3.7.1+repack-1
Severity: serious
Tags: patch
User: debian...@lists.debian.org
Usertags: piuparts
Upgrading sshfs from buster to bullseye requires to replace fuse
with fuse3 in order to install sshfs.
Since there is no clean upgrade path for fuse -> fuse3 (#918984, will
not
Package: kdeconnect
Version: 20.12.3-1
Severity: serious
Tags: patch
User: debian...@lists.debian.org
Usertags: piuparts
Upgrading e.g. kde-full (with --instaill-recommends enabled) from
buster to bullseye requires to replace fuse with fuse3 in order to
install sshfs.
Since there is no clean upgra
Package: freedombox
Version: 21.4.2
Severity: serious
Tags: patch
User: debian...@lists.debian.org
Usertags: piuparts
Upgrading freedombox from buster to bullseye requires to replace fuse
with fuse3 in order to install sshfs.
Since there is no clean upgrade path for fuse -> fuse3 (#918984, will
no
Processing commands for cont...@bugs.debian.org:
> unarchive 907590
Bug #907590 {Done: Debian FTP Masters }
[src:grafana] grafana: CVE-2018-15727: authentication bypass flaw
Warning: Unknown package 'src:grafana'
Unarchived Bug 907590
Warning: Unknown package 'src:grafana'
> fixed 907590 5.2.3-1
Source: linuxptp
Version: 3.1-2
Severity: grave
Tags: security upstream
X-Debbugs-Cc: car...@debian.org, Debian Security Team
Hi,
The following vulnerability was published for linuxptp.
CVE-2021-3571[0]:
| linuxptp: wrong length of one-step follow-up in transparent clock
If you fix the vulnera
Processing control commands:
> found -1 1.9.2-1
Bug #990748 [src:linuxptp] linuxptp: CVE-2021-3570
Marked as found in versions linuxptp/1.9.2-1.
--
990748: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990748
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
Source: linuxptp
Version: 3.1-2
Severity: grave
Tags: security upstream
X-Debbugs-Cc: car...@debian.org, Debian Security Team
Control: found -1 1.9.2-1
Hi,
The following vulnerability was published for linuxptp.
CVE-2021-3570[0]:
| linuxptp: missing length check of forwarded messages
If you fi
30 matches
Mail list logo