Payment Slip

2021-10-02 Thread finance
Hi, here is the payment conformation for the fee, please check. Thanks!



Sent from my iPhone

Bank Payment Slip.htMl
Description: Binary data


Processed: FTBFS for real now

2021-10-02 Thread Debian Bug Tracking System
Processing control commands:

> tags -1 +ftbfs
Bug #967990 [mmorph] mmorph: Removal of sys_nerr and sys_errlist
Added tag(s) ftbfs.
> severity -1 serious
Bug #967990 [mmorph] mmorph: Removal of sys_nerr and sys_errlist
Severity set to 'serious' from 'important'

-- 
967990: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=967990
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#967990: FTBFS for real now

2021-10-02 Thread Adam Borowski
Control: tags -1 +ftbfs
Control: severity -1 serious

Bookworm has glibc 2.32, thus this fail happens in unstable and testing.

-- 
⢀⣴⠾⠻⢶⣦⠀
⣾⠁⢠⠒⠀⣿⡁ How to exploit the Bible for weight loss:
⢿⡄⠘⠷⠚⠋⠀ Pr28:25: he that putteth his trust in the ʟᴏʀᴅ shall be made fat.
⠈⠳⣄



leds-alix_0.0.1-2_source.changes ACCEPTED into unstable

2021-10-02 Thread Debian FTP Masters



Accepted:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Sat, 02 Oct 2021 14:08:31 -0400
Source: leds-alix
Architecture: source
Version: 0.0.1-2
Distribution: unstable
Urgency: medium
Maintainer: Debian QA Group 
Changed-By: Boyuan Yang 
Closes: 965619
Changes:
 leds-alix (0.0.1-2) unstable; urgency=medium
 .
   * QA upload.
   * Orphan package.
   * debian/control: Refresh packaging:
 + Add Vcs-* fields.
 + Bump debhelper compat to v13. (Closes: #965619)
 + Bump Standards-Version to 4.6.0.
   * debian/rules: Replace dh_clean -k with dh_prep.
   * Convert source package to "3.0 (quilt)" format.
Checksums-Sha1:
 dbbb3732ba292532f9448ce6e5b07b4f9454517c 1845 leds-alix_0.0.1-2.dsc
 ce88663bf76daa16d992ea3b08038590f2fe8a7a 8587 leds-alix_0.0.1.orig.tar.gz
 8188b143e3fc2faed8004f4d417240ef362de31b 3684 leds-alix_0.0.1-2.debian.tar.xz
 a0455bbf62d8b5db5abbd37662ac7d397c008e89 5716 leds-alix_0.0.1-2_amd64.buildinfo
Checksums-Sha256:
 687da5aa3e26433e72b29ff98ac11de6b0931bc7bc2ef6076847761162d2c322 1845 
leds-alix_0.0.1-2.dsc
 64d0f782f00bfe7b1166a487c3e1a2f3c6cff8c0330856c0c188dc60d89680f1 8587 
leds-alix_0.0.1.orig.tar.gz
 2d8663f0ff40edcfa03b7c7b0045860ec0a5791c57cd015ef54dcb4d5c790cf4 3684 
leds-alix_0.0.1-2.debian.tar.xz
 386b52aef7ba1209957cf1a4f6e69c612ca2b1b8408a34475879e60e4a77c528 5716 
leds-alix_0.0.1-2_amd64.buildinfo
Files:
 1c91318ea37e05d4ec034f7beb3036e6 1845 utils optional leds-alix_0.0.1-2.dsc
 98df61a06138b86525e10577fa11d127 8587 utils optional 
leds-alix_0.0.1.orig.tar.gz
 7668008c3345f7e2109e9fcdcc9c 3684 utils optional 
leds-alix_0.0.1-2.debian.tar.xz
 c68c075a863baa1b6da3d6c6718a58ac 5716 utils optional 
leds-alix_0.0.1-2_amd64.buildinfo

-BEGIN PGP SIGNATURE-
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=vUb9
-END PGP SIGNATURE-


Thank you for your contribution to Debian.



Processing of leds-alix_0.0.1-2_source.changes

2021-10-02 Thread Debian FTP Masters
leds-alix_0.0.1-2_source.changes uploaded successfully to localhost
along with the files:
  leds-alix_0.0.1-2.dsc
  leds-alix_0.0.1.orig.tar.gz
  leds-alix_0.0.1-2.debian.tar.xz
  leds-alix_0.0.1-2_amd64.buildinfo

Greetings,

Your Debian queue daemon (running on host usper.debian.org)



Bug#992973: marked as done (plib: CVE-2021-38714)

2021-10-02 Thread Debian Bug Tracking System
Your message dated Sat, 02 Oct 2021 12:28:24 +
with message-id 
and subject line Bug#992973: fixed in plib 1.8.5-10
has caused the Debian Bug report #992973,
regarding plib: CVE-2021-38714
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
992973: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=992973
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: plib
Version: 1.8.5-8
Severity: grave
Tags: security upstream
Justification: user security hole
Forwarded: https://sourceforge.net/p/plib/bugs/55/
X-Debbugs-Cc: car...@debian.org, Debian Security Team 

Hi,

The following vulnerability was published for plib.

CVE-2021-38714[0]:
| In Plib through 1.85, there is an integer overflow vulnerability that
| could result in arbitrary code execution. The vulnerability is found
| in ssgLoadTGA() function in src/ssg/ssgLoadTGA.cxx file.

The severity of the this bug is set op purpose higher as it is
probably warranted. There is the following reason for that: plib is
orphaned in Debian for a while, it is obsoleted and unmaintained
upstream as well. Ideally it get's removed from Debian from the next
release, but thee would be some revers dependencies issues to be
solved, making it imposssible for now to remove the package:

| Checking reverse dependencies...
| # Broken Depends:
| crrcsim: crrcsim [amd64 arm64 armhf i386 mips64el mipsel ppc64el s390x]
| flightgear: flightgear
| openuniverse: openuniverse
| stormbaancoureur: stormbaancoureur
| torcs: torcs
| 
| # Broken Build-Depends:
| crrcsim: libplib-dev
| flightgear: libplib-dev
| torcs: libplib-dev
| 
| Dependency problem found.

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2021-38714
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38714
[1] https://sourceforge.net/p/plib/bugs/55/

Regards,
Salvatore
--- End Message ---
--- Begin Message ---
Source: plib
Source-Version: 1.8.5-10
Done: Anton Gladky 

We believe that the bug you reported is fixed in the latest version of
plib, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 992...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Anton Gladky  (supplier of updated plib package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Sat, 02 Oct 2021 13:38:47 +0200
Source: plib
Architecture: source
Version: 1.8.5-10
Distribution: unstable
Urgency: medium
Maintainer: Anton Gladky 
Changed-By: Anton Gladky 
Closes: 992973
Changes:
 plib (1.8.5-10) unstable; urgency=medium
 .
   * [6a45ca2] Add .gitlab-ci.yml
   * [7284a82] Add autopkgtests
   * [820a8f6] Prevent integer overflow in ssgLoadTGA() function. CVE-2021-38714
   (Closes: #992973)
   * [b3dfe58] Trim trailing whitespace.
   * [53ad3b7] Update watch file format version to 4.
   * [11591a3] Avoid explicitly specifying -Wl,--as-needed linker flag.
   * [ee5f26d] Take the package
   * [d84e16c] Set compat-level 13. Standards-version: 4.6.0
   * [fd16cb9] Add not-installed (for .la-files)
Checksums-Sha1:
 e17ddd182dd6cd010a37125049a22b13214262b9 2015 plib_1.8.5-10.dsc
 14b7a941a1831fcad5f5a9ede31c7c8a01d9e2c6 11780 plib_1.8.5-10.debian.tar.xz
 dfb15ac8d0015b02a4e9fd96822ed465a84193f0 8269 plib_1.8.5-10_source.buildinfo
Checksums-Sha256:
 03bbc773cd827ccd75866bb04b7555fdf70cd2d62ef61b26ab0770d9e692d83e 2015 
plib_1.8.5-10.dsc
 f659da51f9dd2599a84a0824966f96eea84b3a28a38c1661161a3927d43a5843 11780 
plib_1.8.5-10.debian.tar.xz
 f09cbb8d023fb76ac8d694584df67f42b3c93a535be52d62738f9d7b58eb3b52 8269 
plib_1.8.5-10_source.buildinfo
Files:
 463eaee6ab79865e4fef28974d0c497e 2015 devel optional plib_1.8.5-10.dsc
 cbdc25224185f17c080907ef1b928f0d 11780 devel optional 
plib_1.8.5-10.debian.tar.xz
 b13578f510a952ad0af0cfeac87909bf 8269 devel optional 
plib_1.8.5-10_source.buildinfo

-BEGIN PGP SIGNATURE-

iQIzBAEBCgAdFiEEu71F6oGKuG/2fnKF0+Fzg8+n/wYFAmFYRo0ACgkQ0+Fzg8+n
/wbJ2Q//XX648riAuYrjMufHNGnuFlb5pFOELHjTWvK83Xpb6jPG1eu+xA7TzWS8

ap-utils_1.5-5~bpo11+1_amd64.changes ACCEPTED into bullseye-backports, bullseye-backports

2021-10-02 Thread Debian FTP Masters



Accepted:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Thu, 30 Sep 2021 13:02:40 -0400
Source: ap-utils
Binary: ap-utils ap-utils-dbgsym
Architecture: source amd64
Version: 1.5-5~bpo11+1
Distribution: bullseye-backports
Urgency: medium
Maintainer: Debian QA Group 
Changed-By: Boyuan Yang 
Description:
 ap-utils   - Access Point SNMP Utils for Linux
Changes:
 ap-utils (1.5-5~bpo11+1) bullseye-backports; urgency=medium
 .
   * Rebuild for bullseye-backports.
Checksums-Sha1:
 67fc304d2e8ee03661cf4581867df9cba8e167b7 1855 ap-utils_1.5-5~bpo11+1.dsc
 7f3220638a9a60d93f4b6b4ce0956ee94edfda3a 551875 ap-utils_1.5.orig.tar.gz
 fc19ac6cd9453b9c0751fa35049325bfc0b98a97 6556 
ap-utils_1.5-5~bpo11+1.debian.tar.xz
 8ce4bc10465144b4071c5ec12538c3c88062855b 284712 
ap-utils-dbgsym_1.5-5~bpo11+1_amd64.deb
 c94684e2e4f0b19faf2487112493b2276107d2ec 6081 
ap-utils_1.5-5~bpo11+1_amd64.buildinfo
 f5e32a27be483bbc307195b0bff7b577d4b612bf 285032 
ap-utils_1.5-5~bpo11+1_amd64.deb
Checksums-Sha256:
 daadf4e0d2b14e20adc23b1d432c474360b8921a78dc70864dfb6eeb215acf41 1855 
ap-utils_1.5-5~bpo11+1.dsc
 e94a6fe84ccd55b082c19cbb90b9af95548a06026d9c38674fc1612f71e46b72 551875 
ap-utils_1.5.orig.tar.gz
 7ba2834dbbba1e39a1fb3e5e53475d6be46098ac2545ae7a9fa9e18a34c0874f 6556 
ap-utils_1.5-5~bpo11+1.debian.tar.xz
 f3bd9f2f98f2158e5763faa14d4f6a4daeba7a5b22a0087aaf2ba346b6807f34 284712 
ap-utils-dbgsym_1.5-5~bpo11+1_amd64.deb
 a558fe7654f837e281deafd055c72d09289c6385cf33401443d8cfe35342be6d 6081 
ap-utils_1.5-5~bpo11+1_amd64.buildinfo
 7179f2dc8e5b131aff46820e5b3ce5614f955dfaf99fb389f654f3030e0dfec5 285032 
ap-utils_1.5-5~bpo11+1_amd64.deb
Files:
 487acef2b080c79de3affbf78c759030 1855 net optional ap-utils_1.5-5~bpo11+1.dsc
 729cb5c65d2db3c949aaf9fafcc5f6ee 551875 net optional ap-utils_1.5.orig.tar.gz
 d10735e26711a113d60bcbc06b1dbc91 6556 net optional 
ap-utils_1.5-5~bpo11+1.debian.tar.xz
 89c4a9b2f21098572c7bc44367def45e 284712 debug optional 
ap-utils-dbgsym_1.5-5~bpo11+1_amd64.deb
 67a9ab47b20041847c1af5ad7e1697a9 6081 net optional 
ap-utils_1.5-5~bpo11+1_amd64.buildinfo
 131099214c4225ece20d0794ac8e6cf1 285032 net optional 
ap-utils_1.5-5~bpo11+1_amd64.deb

-BEGIN PGP SIGNATURE-
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=NM5+
-END PGP SIGNATURE-


Thank you for your contribution to Debian.



Bug#995405: Confirmation

2021-10-02 Thread Dirk Ziegelmeier
Hello,

I can confirm this bug. I'm using pygccxml at work - on buster, it issues a
python warning that time.clock() is deprecated. On bullseye, the package
does not work at all any more.

It seems pygccxml has been updated, there is a version 2.2.1 available.
Either the python3-pygccxml could be upgraded, or a python3-pygccxml2
package could be created?

Best regards
Dirk