Processing of ale_0.9.0.3-4_source.changes

2019-09-10 Thread Debian FTP Masters
ale_0.9.0.3-4_source.changes uploaded successfully to localhost
along with the files:
  ale_0.9.0.3-4.dsc
  ale_0.9.0.3-4.debian.tar.xz
  ale_0.9.0.3-4_source.buildinfo

Greetings,

Your Debian queue daemon (running on host usper.debian.org)



Bug#874950: New version stable?

2019-09-10 Thread Shengjing Zhu
(CC previous sponsor as well)

Hi,

On Thu, Aug 29, 2019 at 5:36 PM Shengjing Zhu  wrote:
>
> Hi Diego,
>
> On Wed, Jul 24, 2019 at 12:32 AM Shengjing Zhu  wrote:
> >
> > On Mon, 22 Jul 2019 01:09:00 -0300 Diego Sarzi  wrote:
> > > Thank you Shenging Zhy for the contribution.
> > >
> > > Can you tell me how is the stability of keepassx with its modifications,
> > > referring to QT4 for QT5?
> > >
> > > Can we use it for the unstable version?
> > >
> >
> > Hi, I see you adopt this package. That's great.
> >
> > I don't know the stability. But I have used this version after I
> > uploaded it experimental, and didn't have any problem.
>
> As keepassx will be removed from testing at 02 Sept, what's the plan
> for you to upload the qt5 version? Do you need sponsor? I'm glad to
> help.
>

This bug is RC and keepassx will be removed in 2 days.
But I haven't received your response.
So I'm going to NMU keepassx in DELAY/2-day, please tell me I should
cancel it or speed it up.

The full changelog can be seen at
https://salsa.debian.org/debian/keepassx/compare/8da06bb...66024d9

Thanks.

--
Shengjing Zhu



Bug#738763: marked as done (ale: Wrong upstream Homepage URL)

2019-09-10 Thread Debian Bug Tracking System
Your message dated Tue, 10 Sep 2019 17:04:02 +
with message-id 
and subject line Bug#738763: fixed in ale 0.9.0.3-4
has caused the Debian Bug report #738763,
regarding ale: Wrong upstream Homepage URL
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
738763: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=738763
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: ale
Version: 0.9.0.3
Severity: minor

ale Homepage in the control file should point at https://gitorious.org/ale 
instead of the wrong http://auricle.dyndns.org/ALE/ which is currently in use


-- System Information:
Debian Release: 6.0.8
  APT prefers oldstable-updates
  APT policy: (500, 'oldstable-updates'), (500, 'oldstable')
Architecture: amd64 (x86_64)

Kernel: Linux 2.6.32-5-amd64 (SMP w/2 CPU cores)
Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968)
Shell: /bin/sh linked to /bin/dash
--- End Message ---
--- Begin Message ---
Source: ale
Source-Version: 0.9.0.3-4

We believe that the bug you reported is fixed in the latest version of
ale, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 738...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Daniel Pimentel  (supplier of updated ale package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Fri, 06 Sep 2019 17:33:01 +
Source: ale
Architecture: source
Version: 0.9.0.3-4
Distribution: unstable
Urgency: medium
Maintainer: Debian QA Group 
Changed-By: Daniel Pimentel 
Closes: 738763
Changes:
 ale (0.9.0.3-4) unstable; urgency=medium
 .
   * QA upload.
   * debian/compat: removed.
   * debian/control:
   - Bumped DH level to 12.
   - Bumped Standards-Version to 4.4.0.
   - Removed dh-autoreconf because debhelper-compat contain it yet.
   - Updated Homepage field. Closes: #738763
   * debian/copyright:
   - Added safe uri (https) to Format.
   - Full updated.
   * debian/patches/20_fix-deprecated-function.patch: created to remove a
 deprecated Perl function.
   * debian/tests/control: created.
   * debian/upstream/metadata: created.
   * debian/watch: full updated.
Checksums-Sha1:
 5192f9d2340a0d55ee4946d68b43e8d332c904e0 1711 ale_0.9.0.3-4.dsc
 66d4e5c0050a85c843639800c3df07f44c15ec32 5820 ale_0.9.0.3-4.debian.tar.xz
 72f89e854633103ef18cb378f2a34158a6ebb220 5164 ale_0.9.0.3-4_source.buildinfo
Checksums-Sha256:
 1ffa1399834e85cdc8303096092a997f7da05de3b7b0d94a6491af76107b9bb9 1711 
ale_0.9.0.3-4.dsc
 26fc8e46b72965b942f20118912848c558f694b6e9cafe759772d16970a1a5fd 5820 
ale_0.9.0.3-4.debian.tar.xz
 ad9cc28061ae2409f603304d5e2fe1309a22322a3f2c2fd01ea745264808604c 5164 
ale_0.9.0.3-4_source.buildinfo
Files:
 b16d672d0b6f76721ad002ff62aea896 1711 graphics optional ale_0.9.0.3-4.dsc
 9d735d342c0f64dd22990aa8cb9f84f4 5820 graphics optional 
ale_0.9.0.3-4.debian.tar.xz
 db9f87b19c50844296cda112634435fc 5164 graphics optional 
ale_0.9.0.3-4_source.buildinfo

-BEGIN PGP SIGNATURE-
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=rxy1
-END PGP SIGNATURE End Message ---


ale_0.9.0.3-4_source.changes ACCEPTED into unstable

2019-09-10 Thread Debian FTP Masters



Accepted:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Fri, 06 Sep 2019 17:33:01 +
Source: ale
Architecture: source
Version: 0.9.0.3-4
Distribution: unstable
Urgency: medium
Maintainer: Debian QA Group 
Changed-By: Daniel Pimentel 
Closes: 738763
Changes:
 ale (0.9.0.3-4) unstable; urgency=medium
 .
   * QA upload.
   * debian/compat: removed.
   * debian/control:
   - Bumped DH level to 12.
   - Bumped Standards-Version to 4.4.0.
   - Removed dh-autoreconf because debhelper-compat contain it yet.
   - Updated Homepage field. Closes: #738763
   * debian/copyright:
   - Added safe uri (https) to Format.
   - Full updated.
   * debian/patches/20_fix-deprecated-function.patch: created to remove a
 deprecated Perl function.
   * debian/tests/control: created.
   * debian/upstream/metadata: created.
   * debian/watch: full updated.
Checksums-Sha1:
 5192f9d2340a0d55ee4946d68b43e8d332c904e0 1711 ale_0.9.0.3-4.dsc
 66d4e5c0050a85c843639800c3df07f44c15ec32 5820 ale_0.9.0.3-4.debian.tar.xz
 72f89e854633103ef18cb378f2a34158a6ebb220 5164 ale_0.9.0.3-4_source.buildinfo
Checksums-Sha256:
 1ffa1399834e85cdc8303096092a997f7da05de3b7b0d94a6491af76107b9bb9 1711 
ale_0.9.0.3-4.dsc
 26fc8e46b72965b942f20118912848c558f694b6e9cafe759772d16970a1a5fd 5820 
ale_0.9.0.3-4.debian.tar.xz
 ad9cc28061ae2409f603304d5e2fe1309a22322a3f2c2fd01ea745264808604c 5164 
ale_0.9.0.3-4_source.buildinfo
Files:
 b16d672d0b6f76721ad002ff62aea896 1711 graphics optional ale_0.9.0.3-4.dsc
 9d735d342c0f64dd22990aa8cb9f84f4 5820 graphics optional 
ale_0.9.0.3-4.debian.tar.xz
 db9f87b19c50844296cda112634435fc 5164 graphics optional 
ale_0.9.0.3-4_source.buildinfo

-BEGIN PGP SIGNATURE-

iQIzBAEBCgAdFiEEs/UaJxJhnD7NdLjheElO9yN1pmwFAl130xQACgkQeElO9yN1
pmza3xAAzv8jbh8GssiaSUdHqS7S/C0mccKj+UghiOL15JZ138i8juMUx6YyDSA9
KCDBHloqoPkQc7hI7jqPfRc9L5U2kLrnjPSk96Qq5mH3piN8GjkMGxyoy0OObfVP
u7eIhoIUwhg2ajftmHhalKcIWJ0tv2jYaJI8zqljfG2nDaqAJSmzjF2wBV/OeCkV
gjexzsZ2tPwvKImhRPjGEsSHO1IK+bBWPuA+yqONkjbgjYXR7Oll/JQEHyAdkTud
v4MOshRt8W2WzxHMrFXG/pU7p4n5PlEDeJXqlhuUyW4msvr/47oI2mDpK+m/DRiK
a/UYktBNPcD7ffq1zXWzbk32Zqu//Nmfej+EVSWPUeg3Itmyp92OsHCTd2sTc2mp
yJQF64QxQdPmJ4LOYa+aVTeAohRF/Bkc5hIUmfXxzhd+7WfHqPteT3qP6bAPnSSd
fzc9KDkezT7bvQKgG3paZP66pSkY4Bcx/8kC9HUFYz66jcwrJ5cO0iWVSnZ7MLgz
NIaylwztzo/hsgN8OaQ3SI1tW3jlJQUoiYpAex8hs7vmWkVHXO0gEnYyOkQsJEG4
GC2vVhsPnfqFNsZMO7J4Y/3eFQqC/Hhct2hdocaW0pA0R9szktzgENoI6AxHquXS
lJ+SevwVxTlx8cMjjY72UnizJn/fxOA9BBgZsNqHCAz1GYKlm3c=
=rxy1
-END PGP SIGNATURE-


Thank you for your contribution to Debian.



Bug#939915: clfow: CVE-2019-16165

2019-09-10 Thread Salvatore Bonaccorso
Source: cflow
Version: 1:1.6-4
Severity: important
Tags: security upstream
Forwarded: https://lists.gnu.org/archive/html/bug-cflow/2019-04/msg1.html
Control: found -1 1:1.6-1

Hi,

The following vulnerability was published for cflow.

CVE-2019-16165[0]:
| GNU cflow through 1.6 has a use-after-free in the reference function
| in parser.c.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2019-16165
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16165
[1] https://lists.gnu.org/archive/html/bug-cflow/2019-04/msg1.html

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

-- System Information:
Debian Release: bullseye/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 4.19.0-6-amd64 (SMP w/8 CPU cores)
Locale: LANG=C, LC_CTYPE=C.UTF-8 (charmap=UTF-8), LANGUAGE=C (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: sysvinit (via /sbin/init)



Processed: clfow: CVE-2019-16165

2019-09-10 Thread Debian Bug Tracking System
Processing control commands:

> found -1 1:1.6-1
Bug #939915 [src:cflow] clfow: CVE-2019-16165
Marked as found in versions cflow/1:1.6-1.

-- 
939915: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=939915
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Processed: clfow: CVE-2019-16166

2019-09-10 Thread Debian Bug Tracking System
Processing control commands:

> found -1 1:1.6-1
Bug #939916 [src:cflow] clfow: CVE-2019-16166
Marked as found in versions cflow/1:1.6-1.

-- 
939916: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=939916
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#939916: clfow: CVE-2019-16166

2019-09-10 Thread Salvatore Bonaccorso
Source: cflow
Version: 1:1.6-4
Severity: important
Tags: security upstream
Forwarded: https://lists.gnu.org/archive/html/bug-cflow/2019-04/msg0.html
Control: found -1 1:1.6-1

Hi,

The following vulnerability was published for cflow.

CVE-2019-16166[0]:
| GNU cflow through 1.6 has a heap-based buffer over-read in the
| nexttoken function in parser.c.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2019-16166
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16166
[1] https://lists.gnu.org/archive/html/bug-cflow/2019-04/msg0.html

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

-- System Information:
Debian Release: bullseye/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 4.19.0-6-amd64 (SMP w/8 CPU cores)
Locale: LANG=C, LC_CTYPE=C.UTF-8 (charmap=UTF-8), LANGUAGE=C (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: sysvinit (via /sbin/init)



Processed: retitle 939915 to cflow: CVE-2019-16165, retitle 939916 to cflow: CVE-2019-16166

2019-09-10 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> # fix typos
> retitle 939915 cflow: CVE-2019-16165
Bug #939915 [src:cflow] clfow: CVE-2019-16165
Changed Bug title to 'cflow: CVE-2019-16165' from 'clfow: CVE-2019-16165'.
> retitle 939916 cflow: CVE-2019-16166
Bug #939916 [src:cflow] clfow: CVE-2019-16166
Changed Bug title to 'cflow: CVE-2019-16166' from 'clfow: CVE-2019-16166'.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
939915: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=939915
939916: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=939916
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems