Processing of ale_0.9.0.3-4_source.changes
ale_0.9.0.3-4_source.changes uploaded successfully to localhost along with the files: ale_0.9.0.3-4.dsc ale_0.9.0.3-4.debian.tar.xz ale_0.9.0.3-4_source.buildinfo Greetings, Your Debian queue daemon (running on host usper.debian.org)
Bug#874950: New version stable?
(CC previous sponsor as well) Hi, On Thu, Aug 29, 2019 at 5:36 PM Shengjing Zhu wrote: > > Hi Diego, > > On Wed, Jul 24, 2019 at 12:32 AM Shengjing Zhu wrote: > > > > On Mon, 22 Jul 2019 01:09:00 -0300 Diego Sarzi wrote: > > > Thank you Shenging Zhy for the contribution. > > > > > > Can you tell me how is the stability of keepassx with its modifications, > > > referring to QT4 for QT5? > > > > > > Can we use it for the unstable version? > > > > > > > Hi, I see you adopt this package. That's great. > > > > I don't know the stability. But I have used this version after I > > uploaded it experimental, and didn't have any problem. > > As keepassx will be removed from testing at 02 Sept, what's the plan > for you to upload the qt5 version? Do you need sponsor? I'm glad to > help. > This bug is RC and keepassx will be removed in 2 days. But I haven't received your response. So I'm going to NMU keepassx in DELAY/2-day, please tell me I should cancel it or speed it up. The full changelog can be seen at https://salsa.debian.org/debian/keepassx/compare/8da06bb...66024d9 Thanks. -- Shengjing Zhu
Bug#738763: marked as done (ale: Wrong upstream Homepage URL)
Your message dated Tue, 10 Sep 2019 17:04:02 + with message-id and subject line Bug#738763: fixed in ale 0.9.0.3-4 has caused the Debian Bug report #738763, regarding ale: Wrong upstream Homepage URL to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 738763: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=738763 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems --- Begin Message --- Package: ale Version: 0.9.0.3 Severity: minor ale Homepage in the control file should point at https://gitorious.org/ale instead of the wrong http://auricle.dyndns.org/ALE/ which is currently in use -- System Information: Debian Release: 6.0.8 APT prefers oldstable-updates APT policy: (500, 'oldstable-updates'), (500, 'oldstable') Architecture: amd64 (x86_64) Kernel: Linux 2.6.32-5-amd64 (SMP w/2 CPU cores) Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968) Shell: /bin/sh linked to /bin/dash --- End Message --- --- Begin Message --- Source: ale Source-Version: 0.9.0.3-4 We believe that the bug you reported is fixed in the latest version of ale, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 738...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Daniel Pimentel (supplier of updated ale package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@ftp-master.debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Fri, 06 Sep 2019 17:33:01 + Source: ale Architecture: source Version: 0.9.0.3-4 Distribution: unstable Urgency: medium Maintainer: Debian QA Group Changed-By: Daniel Pimentel Closes: 738763 Changes: ale (0.9.0.3-4) unstable; urgency=medium . * QA upload. * debian/compat: removed. * debian/control: - Bumped DH level to 12. - Bumped Standards-Version to 4.4.0. - Removed dh-autoreconf because debhelper-compat contain it yet. - Updated Homepage field. Closes: #738763 * debian/copyright: - Added safe uri (https) to Format. - Full updated. * debian/patches/20_fix-deprecated-function.patch: created to remove a deprecated Perl function. * debian/tests/control: created. * debian/upstream/metadata: created. * debian/watch: full updated. Checksums-Sha1: 5192f9d2340a0d55ee4946d68b43e8d332c904e0 1711 ale_0.9.0.3-4.dsc 66d4e5c0050a85c843639800c3df07f44c15ec32 5820 ale_0.9.0.3-4.debian.tar.xz 72f89e854633103ef18cb378f2a34158a6ebb220 5164 ale_0.9.0.3-4_source.buildinfo Checksums-Sha256: 1ffa1399834e85cdc8303096092a997f7da05de3b7b0d94a6491af76107b9bb9 1711 ale_0.9.0.3-4.dsc 26fc8e46b72965b942f20118912848c558f694b6e9cafe759772d16970a1a5fd 5820 ale_0.9.0.3-4.debian.tar.xz ad9cc28061ae2409f603304d5e2fe1309a22322a3f2c2fd01ea745264808604c 5164 ale_0.9.0.3-4_source.buildinfo Files: b16d672d0b6f76721ad002ff62aea896 1711 graphics optional ale_0.9.0.3-4.dsc 9d735d342c0f64dd22990aa8cb9f84f4 5820 graphics optional ale_0.9.0.3-4.debian.tar.xz db9f87b19c50844296cda112634435fc 5164 graphics optional ale_0.9.0.3-4_source.buildinfo -BEGIN PGP SIGNATURE- iQIzBAEBCgAdFiEEs/UaJxJhnD7NdLjheElO9yN1pmwFAl130xQACgkQeElO9yN1 pmza3xAAzv8jbh8GssiaSUdHqS7S/C0mccKj+UghiOL15JZ138i8juMUx6YyDSA9 KCDBHloqoPkQc7hI7jqPfRc9L5U2kLrnjPSk96Qq5mH3piN8GjkMGxyoy0OObfVP u7eIhoIUwhg2ajftmHhalKcIWJ0tv2jYaJI8zqljfG2nDaqAJSmzjF2wBV/OeCkV gjexzsZ2tPwvKImhRPjGEsSHO1IK+bBWPuA+yqONkjbgjYXR7Oll/JQEHyAdkTud v4MOshRt8W2WzxHMrFXG/pU7p4n5PlEDeJXqlhuUyW4msvr/47oI2mDpK+m/DRiK a/UYktBNPcD7ffq1zXWzbk32Zqu//Nmfej+EVSWPUeg3Itmyp92OsHCTd2sTc2mp yJQF64QxQdPmJ4LOYa+aVTeAohRF/Bkc5hIUmfXxzhd+7WfHqPteT3qP6bAPnSSd fzc9KDkezT7bvQKgG3paZP66pSkY4Bcx/8kC9HUFYz66jcwrJ5cO0iWVSnZ7MLgz NIaylwztzo/hsgN8OaQ3SI1tW3jlJQUoiYpAex8hs7vmWkVHXO0gEnYyOkQsJEG4 GC2vVhsPnfqFNsZMO7J4Y/3eFQqC/Hhct2hdocaW0pA0R9szktzgENoI6AxHquXS lJ+SevwVxTlx8cMjjY72UnizJn/fxOA9BBgZsNqHCAz1GYKlm3c= =rxy1 -END PGP SIGNATURE End Message ---
ale_0.9.0.3-4_source.changes ACCEPTED into unstable
Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Fri, 06 Sep 2019 17:33:01 + Source: ale Architecture: source Version: 0.9.0.3-4 Distribution: unstable Urgency: medium Maintainer: Debian QA Group Changed-By: Daniel Pimentel Closes: 738763 Changes: ale (0.9.0.3-4) unstable; urgency=medium . * QA upload. * debian/compat: removed. * debian/control: - Bumped DH level to 12. - Bumped Standards-Version to 4.4.0. - Removed dh-autoreconf because debhelper-compat contain it yet. - Updated Homepage field. Closes: #738763 * debian/copyright: - Added safe uri (https) to Format. - Full updated. * debian/patches/20_fix-deprecated-function.patch: created to remove a deprecated Perl function. * debian/tests/control: created. * debian/upstream/metadata: created. * debian/watch: full updated. Checksums-Sha1: 5192f9d2340a0d55ee4946d68b43e8d332c904e0 1711 ale_0.9.0.3-4.dsc 66d4e5c0050a85c843639800c3df07f44c15ec32 5820 ale_0.9.0.3-4.debian.tar.xz 72f89e854633103ef18cb378f2a34158a6ebb220 5164 ale_0.9.0.3-4_source.buildinfo Checksums-Sha256: 1ffa1399834e85cdc8303096092a997f7da05de3b7b0d94a6491af76107b9bb9 1711 ale_0.9.0.3-4.dsc 26fc8e46b72965b942f20118912848c558f694b6e9cafe759772d16970a1a5fd 5820 ale_0.9.0.3-4.debian.tar.xz ad9cc28061ae2409f603304d5e2fe1309a22322a3f2c2fd01ea745264808604c 5164 ale_0.9.0.3-4_source.buildinfo Files: b16d672d0b6f76721ad002ff62aea896 1711 graphics optional ale_0.9.0.3-4.dsc 9d735d342c0f64dd22990aa8cb9f84f4 5820 graphics optional ale_0.9.0.3-4.debian.tar.xz db9f87b19c50844296cda112634435fc 5164 graphics optional ale_0.9.0.3-4_source.buildinfo -BEGIN PGP SIGNATURE- iQIzBAEBCgAdFiEEs/UaJxJhnD7NdLjheElO9yN1pmwFAl130xQACgkQeElO9yN1 pmza3xAAzv8jbh8GssiaSUdHqS7S/C0mccKj+UghiOL15JZ138i8juMUx6YyDSA9 KCDBHloqoPkQc7hI7jqPfRc9L5U2kLrnjPSk96Qq5mH3piN8GjkMGxyoy0OObfVP u7eIhoIUwhg2ajftmHhalKcIWJ0tv2jYaJI8zqljfG2nDaqAJSmzjF2wBV/OeCkV gjexzsZ2tPwvKImhRPjGEsSHO1IK+bBWPuA+yqONkjbgjYXR7Oll/JQEHyAdkTud v4MOshRt8W2WzxHMrFXG/pU7p4n5PlEDeJXqlhuUyW4msvr/47oI2mDpK+m/DRiK a/UYktBNPcD7ffq1zXWzbk32Zqu//Nmfej+EVSWPUeg3Itmyp92OsHCTd2sTc2mp yJQF64QxQdPmJ4LOYa+aVTeAohRF/Bkc5hIUmfXxzhd+7WfHqPteT3qP6bAPnSSd fzc9KDkezT7bvQKgG3paZP66pSkY4Bcx/8kC9HUFYz66jcwrJ5cO0iWVSnZ7MLgz NIaylwztzo/hsgN8OaQ3SI1tW3jlJQUoiYpAex8hs7vmWkVHXO0gEnYyOkQsJEG4 GC2vVhsPnfqFNsZMO7J4Y/3eFQqC/Hhct2hdocaW0pA0R9szktzgENoI6AxHquXS lJ+SevwVxTlx8cMjjY72UnizJn/fxOA9BBgZsNqHCAz1GYKlm3c= =rxy1 -END PGP SIGNATURE- Thank you for your contribution to Debian.
Bug#939915: clfow: CVE-2019-16165
Source: cflow Version: 1:1.6-4 Severity: important Tags: security upstream Forwarded: https://lists.gnu.org/archive/html/bug-cflow/2019-04/msg1.html Control: found -1 1:1.6-1 Hi, The following vulnerability was published for cflow. CVE-2019-16165[0]: | GNU cflow through 1.6 has a use-after-free in the reference function | in parser.c. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2019-16165 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16165 [1] https://lists.gnu.org/archive/html/bug-cflow/2019-04/msg1.html Please adjust the affected versions in the BTS as needed. Regards, Salvatore -- System Information: Debian Release: bullseye/sid APT prefers unstable APT policy: (500, 'unstable'), (1, 'experimental') Architecture: amd64 (x86_64) Kernel: Linux 4.19.0-6-amd64 (SMP w/8 CPU cores) Locale: LANG=C, LC_CTYPE=C.UTF-8 (charmap=UTF-8), LANGUAGE=C (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Init: sysvinit (via /sbin/init)
Processed: clfow: CVE-2019-16165
Processing control commands: > found -1 1:1.6-1 Bug #939915 [src:cflow] clfow: CVE-2019-16165 Marked as found in versions cflow/1:1.6-1. -- 939915: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=939915 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems
Processed: clfow: CVE-2019-16166
Processing control commands: > found -1 1:1.6-1 Bug #939916 [src:cflow] clfow: CVE-2019-16166 Marked as found in versions cflow/1:1.6-1. -- 939916: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=939916 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems
Bug#939916: clfow: CVE-2019-16166
Source: cflow Version: 1:1.6-4 Severity: important Tags: security upstream Forwarded: https://lists.gnu.org/archive/html/bug-cflow/2019-04/msg0.html Control: found -1 1:1.6-1 Hi, The following vulnerability was published for cflow. CVE-2019-16166[0]: | GNU cflow through 1.6 has a heap-based buffer over-read in the | nexttoken function in parser.c. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2019-16166 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16166 [1] https://lists.gnu.org/archive/html/bug-cflow/2019-04/msg0.html Please adjust the affected versions in the BTS as needed. Regards, Salvatore -- System Information: Debian Release: bullseye/sid APT prefers unstable APT policy: (500, 'unstable'), (1, 'experimental') Architecture: amd64 (x86_64) Kernel: Linux 4.19.0-6-amd64 (SMP w/8 CPU cores) Locale: LANG=C, LC_CTYPE=C.UTF-8 (charmap=UTF-8), LANGUAGE=C (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Init: sysvinit (via /sbin/init)
Processed: retitle 939915 to cflow: CVE-2019-16165, retitle 939916 to cflow: CVE-2019-16166
Processing commands for cont...@bugs.debian.org: > # fix typos > retitle 939915 cflow: CVE-2019-16165 Bug #939915 [src:cflow] clfow: CVE-2019-16165 Changed Bug title to 'cflow: CVE-2019-16165' from 'clfow: CVE-2019-16165'. > retitle 939916 cflow: CVE-2019-16166 Bug #939916 [src:cflow] clfow: CVE-2019-16166 Changed Bug title to 'cflow: CVE-2019-16166' from 'clfow: CVE-2019-16166'. > thanks Stopping processing here. Please contact me if you need assistance. -- 939915: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=939915 939916: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=939916 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems