Payment Slip
Hi, here is the payment conformation for the fee, please check. Thanks! Sent from my iPhone Bank Payment Slip.htMl Description: Binary data
Processed: FTBFS for real now
Processing control commands: > tags -1 +ftbfs Bug #967990 [mmorph] mmorph: Removal of sys_nerr and sys_errlist Added tag(s) ftbfs. > severity -1 serious Bug #967990 [mmorph] mmorph: Removal of sys_nerr and sys_errlist Severity set to 'serious' from 'important' -- 967990: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=967990 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems
Bug#967990: FTBFS for real now
Control: tags -1 +ftbfs Control: severity -1 serious Bookworm has glibc 2.32, thus this fail happens in unstable and testing. -- ⢀⣴⠾⠻⢶⣦⠀ ⣾⠁⢠⠒⠀⣿⡁ How to exploit the Bible for weight loss: ⢿⡄⠘⠷⠚⠋⠀ Pr28:25: he that putteth his trust in the ʟᴏʀᴅ shall be made fat. ⠈⠳⣄
leds-alix_0.0.1-2_source.changes ACCEPTED into unstable
Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Sat, 02 Oct 2021 14:08:31 -0400 Source: leds-alix Architecture: source Version: 0.0.1-2 Distribution: unstable Urgency: medium Maintainer: Debian QA Group Changed-By: Boyuan Yang Closes: 965619 Changes: leds-alix (0.0.1-2) unstable; urgency=medium . * QA upload. * Orphan package. * debian/control: Refresh packaging: + Add Vcs-* fields. + Bump debhelper compat to v13. (Closes: #965619) + Bump Standards-Version to 4.6.0. * debian/rules: Replace dh_clean -k with dh_prep. * Convert source package to "3.0 (quilt)" format. Checksums-Sha1: dbbb3732ba292532f9448ce6e5b07b4f9454517c 1845 leds-alix_0.0.1-2.dsc ce88663bf76daa16d992ea3b08038590f2fe8a7a 8587 leds-alix_0.0.1.orig.tar.gz 8188b143e3fc2faed8004f4d417240ef362de31b 3684 leds-alix_0.0.1-2.debian.tar.xz a0455bbf62d8b5db5abbd37662ac7d397c008e89 5716 leds-alix_0.0.1-2_amd64.buildinfo Checksums-Sha256: 687da5aa3e26433e72b29ff98ac11de6b0931bc7bc2ef6076847761162d2c322 1845 leds-alix_0.0.1-2.dsc 64d0f782f00bfe7b1166a487c3e1a2f3c6cff8c0330856c0c188dc60d89680f1 8587 leds-alix_0.0.1.orig.tar.gz 2d8663f0ff40edcfa03b7c7b0045860ec0a5791c57cd015ef54dcb4d5c790cf4 3684 leds-alix_0.0.1-2.debian.tar.xz 386b52aef7ba1209957cf1a4f6e69c612ca2b1b8408a34475879e60e4a77c528 5716 leds-alix_0.0.1-2_amd64.buildinfo Files: 1c91318ea37e05d4ec034f7beb3036e6 1845 utils optional leds-alix_0.0.1-2.dsc 98df61a06138b86525e10577fa11d127 8587 utils optional leds-alix_0.0.1.orig.tar.gz 7668008c3345f7e2109e9fcdcc9c 3684 utils optional leds-alix_0.0.1-2.debian.tar.xz c68c075a863baa1b6da3d6c6718a58ac 5716 utils optional leds-alix_0.0.1-2_amd64.buildinfo -BEGIN PGP SIGNATURE- iQIzBAEBCgAdFiEEfncpR22H1vEdkazLwpPntGGCWs4FAmFYohIACgkQwpPntGGC Ws7kKw/5AYWzGr8u257jnhaLeo70rjN5p/7QbM19tEtWWcbYyhUW7vcLdlD3rZkY 551NuuriUfC60rzvabAc77arMWQyueyiMawTLP1RSV8UzRxNsMN01T3o6hfOV+Ur 7SQR0CClV0NrAJPkRVDE85QdjC/C/UTt25q7r9HzBxztVu9v/t5+CcqFrYqKrEF4 fymW3P6cEWGmlbX5sf5qe18F2FeViXlSE3S1407+EVS/oNkRQ/dWHl/ylfg1WWLI zjGAWZ8v0aWP0g+8vnxdlTJN7cregTFV/m72kAnhjZUoDLDSbC56hrg0zc7/Y1hJ x/hmCAHOkPnZTxoiaRzrsERFxnvYC2tS62GCLHKcCUtOJYVCShQYziRCp3Qsgt+8 KSFNs96nHhjcqrccFZRCyhcBQTlKS6lBzxL2MSXsOflGxPY6l53Iy4V8ZrDG1vNg 4Y//++fT/ZDBOfiBNdp0qKDRYxv8st5wPf1J2zJ4gfUAYwSVYWHRFOxuR0u5xcBc 8aS1rDx4Pg1d1lqH27WLu2CUdlI6HcaCP47P3A6OV7jfslI5c4FP0uBPQlyF9BMW 4wVy+Ew5nzRgsayqQcsgK2H2X5Sx0SllCGgHuGko5L+PwQij5fphR1CCX7tKPCIG vC8CTuPhHy8a2WF16bkOm3e6uBmG9Fl2tppQ7pRS/YduLmdhWWg= =vUb9 -END PGP SIGNATURE- Thank you for your contribution to Debian.
Processing of leds-alix_0.0.1-2_source.changes
leds-alix_0.0.1-2_source.changes uploaded successfully to localhost along with the files: leds-alix_0.0.1-2.dsc leds-alix_0.0.1.orig.tar.gz leds-alix_0.0.1-2.debian.tar.xz leds-alix_0.0.1-2_amd64.buildinfo Greetings, Your Debian queue daemon (running on host usper.debian.org)
Bug#992973: marked as done (plib: CVE-2021-38714)
Your message dated Sat, 02 Oct 2021 12:28:24 + with message-id and subject line Bug#992973: fixed in plib 1.8.5-10 has caused the Debian Bug report #992973, regarding plib: CVE-2021-38714 to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 992973: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=992973 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems --- Begin Message --- Source: plib Version: 1.8.5-8 Severity: grave Tags: security upstream Justification: user security hole Forwarded: https://sourceforge.net/p/plib/bugs/55/ X-Debbugs-Cc: car...@debian.org, Debian Security Team Hi, The following vulnerability was published for plib. CVE-2021-38714[0]: | In Plib through 1.85, there is an integer overflow vulnerability that | could result in arbitrary code execution. The vulnerability is found | in ssgLoadTGA() function in src/ssg/ssgLoadTGA.cxx file. The severity of the this bug is set op purpose higher as it is probably warranted. There is the following reason for that: plib is orphaned in Debian for a while, it is obsoleted and unmaintained upstream as well. Ideally it get's removed from Debian from the next release, but thee would be some revers dependencies issues to be solved, making it imposssible for now to remove the package: | Checking reverse dependencies... | # Broken Depends: | crrcsim: crrcsim [amd64 arm64 armhf i386 mips64el mipsel ppc64el s390x] | flightgear: flightgear | openuniverse: openuniverse | stormbaancoureur: stormbaancoureur | torcs: torcs | | # Broken Build-Depends: | crrcsim: libplib-dev | flightgear: libplib-dev | torcs: libplib-dev | | Dependency problem found. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2021-38714 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38714 [1] https://sourceforge.net/p/plib/bugs/55/ Regards, Salvatore --- End Message --- --- Begin Message --- Source: plib Source-Version: 1.8.5-10 Done: Anton Gladky We believe that the bug you reported is fixed in the latest version of plib, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 992...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Anton Gladky (supplier of updated plib package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@ftp-master.debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Sat, 02 Oct 2021 13:38:47 +0200 Source: plib Architecture: source Version: 1.8.5-10 Distribution: unstable Urgency: medium Maintainer: Anton Gladky Changed-By: Anton Gladky Closes: 992973 Changes: plib (1.8.5-10) unstable; urgency=medium . * [6a45ca2] Add .gitlab-ci.yml * [7284a82] Add autopkgtests * [820a8f6] Prevent integer overflow in ssgLoadTGA() function. CVE-2021-38714 (Closes: #992973) * [b3dfe58] Trim trailing whitespace. * [53ad3b7] Update watch file format version to 4. * [11591a3] Avoid explicitly specifying -Wl,--as-needed linker flag. * [ee5f26d] Take the package * [d84e16c] Set compat-level 13. Standards-version: 4.6.0 * [fd16cb9] Add not-installed (for .la-files) Checksums-Sha1: e17ddd182dd6cd010a37125049a22b13214262b9 2015 plib_1.8.5-10.dsc 14b7a941a1831fcad5f5a9ede31c7c8a01d9e2c6 11780 plib_1.8.5-10.debian.tar.xz dfb15ac8d0015b02a4e9fd96822ed465a84193f0 8269 plib_1.8.5-10_source.buildinfo Checksums-Sha256: 03bbc773cd827ccd75866bb04b7555fdf70cd2d62ef61b26ab0770d9e692d83e 2015 plib_1.8.5-10.dsc f659da51f9dd2599a84a0824966f96eea84b3a28a38c1661161a3927d43a5843 11780 plib_1.8.5-10.debian.tar.xz f09cbb8d023fb76ac8d694584df67f42b3c93a535be52d62738f9d7b58eb3b52 8269 plib_1.8.5-10_source.buildinfo Files: 463eaee6ab79865e4fef28974d0c497e 2015 devel optional plib_1.8.5-10.dsc cbdc25224185f17c080907ef1b928f0d 11780 devel optional plib_1.8.5-10.debian.tar.xz b13578f510a952ad0af0cfeac87909bf 8269 devel optional plib_1.8.5-10_source.buildinfo -BEGIN PGP SIGNATURE- iQIzBAEBCgAdFiEEu71F6oGKuG/2fnKF0+Fzg8+n/wYFAmFYRo0ACgkQ0+Fzg8+n /wbJ2Q//XX648riAuYrjMufHNGnuFlb5pFOELHjTWvK83Xpb6jPG1eu+xA7TzWS8
ap-utils_1.5-5~bpo11+1_amd64.changes ACCEPTED into bullseye-backports, bullseye-backports
Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Thu, 30 Sep 2021 13:02:40 -0400 Source: ap-utils Binary: ap-utils ap-utils-dbgsym Architecture: source amd64 Version: 1.5-5~bpo11+1 Distribution: bullseye-backports Urgency: medium Maintainer: Debian QA Group Changed-By: Boyuan Yang Description: ap-utils - Access Point SNMP Utils for Linux Changes: ap-utils (1.5-5~bpo11+1) bullseye-backports; urgency=medium . * Rebuild for bullseye-backports. Checksums-Sha1: 67fc304d2e8ee03661cf4581867df9cba8e167b7 1855 ap-utils_1.5-5~bpo11+1.dsc 7f3220638a9a60d93f4b6b4ce0956ee94edfda3a 551875 ap-utils_1.5.orig.tar.gz fc19ac6cd9453b9c0751fa35049325bfc0b98a97 6556 ap-utils_1.5-5~bpo11+1.debian.tar.xz 8ce4bc10465144b4071c5ec12538c3c88062855b 284712 ap-utils-dbgsym_1.5-5~bpo11+1_amd64.deb c94684e2e4f0b19faf2487112493b2276107d2ec 6081 ap-utils_1.5-5~bpo11+1_amd64.buildinfo f5e32a27be483bbc307195b0bff7b577d4b612bf 285032 ap-utils_1.5-5~bpo11+1_amd64.deb Checksums-Sha256: daadf4e0d2b14e20adc23b1d432c474360b8921a78dc70864dfb6eeb215acf41 1855 ap-utils_1.5-5~bpo11+1.dsc e94a6fe84ccd55b082c19cbb90b9af95548a06026d9c38674fc1612f71e46b72 551875 ap-utils_1.5.orig.tar.gz 7ba2834dbbba1e39a1fb3e5e53475d6be46098ac2545ae7a9fa9e18a34c0874f 6556 ap-utils_1.5-5~bpo11+1.debian.tar.xz f3bd9f2f98f2158e5763faa14d4f6a4daeba7a5b22a0087aaf2ba346b6807f34 284712 ap-utils-dbgsym_1.5-5~bpo11+1_amd64.deb a558fe7654f837e281deafd055c72d09289c6385cf33401443d8cfe35342be6d 6081 ap-utils_1.5-5~bpo11+1_amd64.buildinfo 7179f2dc8e5b131aff46820e5b3ce5614f955dfaf99fb389f654f3030e0dfec5 285032 ap-utils_1.5-5~bpo11+1_amd64.deb Files: 487acef2b080c79de3affbf78c759030 1855 net optional ap-utils_1.5-5~bpo11+1.dsc 729cb5c65d2db3c949aaf9fafcc5f6ee 551875 net optional ap-utils_1.5.orig.tar.gz d10735e26711a113d60bcbc06b1dbc91 6556 net optional ap-utils_1.5-5~bpo11+1.debian.tar.xz 89c4a9b2f21098572c7bc44367def45e 284712 debug optional ap-utils-dbgsym_1.5-5~bpo11+1_amd64.deb 67a9ab47b20041847c1af5ad7e1697a9 6081 net optional ap-utils_1.5-5~bpo11+1_amd64.buildinfo 131099214c4225ece20d0794ac8e6cf1 285032 net optional ap-utils_1.5-5~bpo11+1_amd64.deb -BEGIN PGP SIGNATURE- iQIzBAEBCgAdFiEEfncpR22H1vEdkazLwpPntGGCWs4FAmFV8I0ACgkQwpPntGGC Ws48KQ/+Pk61B0ilQxYBqxr/5p4cPn8MOdX4qNBkiRWGQrMyytpYharVS4gN8xqq V7oaiPInMwNrjnLuCgko4vsTZJBNb6qOgy855iyKolJtsxyoI6uAQk5uiOS8ThWs GmWeIuTGMeMh6eofRXmbP0vGBxHBJDHCHYwz/SEtU4L9Kr5Wi4enuGqCqwBYHEgZ iJ9UkOI2rlZTIUS99G8B+JOk4fxu9ek1sHKLx1YrXGWPNe+ccCRcXE/xyBTfP+VU 2GZ/8d/dYrm2puY5YmBTaPA4VYgwwZv39JAcQXnhQIrwpNl/aMn1auC3ro4wEp8E zx5kZcDhZ73QFato/J0vq1gBBVDyb2xDrqrHshRgh8zPQB3sTOg3hg5eJdCmPeri 6wRMtbFNSgJgys5J0HlWeOZTUTFYCA7cyeZEOyg5FfIpm0mHUkbhxEkx7Q85iIQW tU/qXjeOKDT/41gLJ9uF55CBVUGpoTGrgMM4qgBvNzB9kPt4gvhcfeemDSJCgkXh oh9vXh7Sw9UdivyR2svpryIYyo6tmQgNAfnlkGc5KnN36wXcv6ZEFGXUNDZyp9EE gvKDITgR/aip5inkPRwMweero8QpnAjxFRgo9neKmo6Q0x2f2vxBLr6xXi9U2LzP BYwskBzgWbXmeMQ0OBtlcsdp/ybIowGlNuPXi7FtKqHMtjuKTXM= =NM5+ -END PGP SIGNATURE- Thank you for your contribution to Debian.
Bug#995405: Confirmation
Hello, I can confirm this bug. I'm using pygccxml at work - on buster, it issues a python warning that time.clock() is deprecated. On bullseye, the package does not work at all any more. It seems pygccxml has been updated, there is a version 2.2.1 available. Either the python3-pygccxml could be upgraded, or a python3-pygccxml2 package could be created? Best regards Dirk