Bug#1061476: marked as done (transition: elpi)

2024-02-23 Thread Debian Bug Tracking System
Your message dated Sat, 24 Feb 2024 08:38:30 +0100
with message-id <8c57e80b2c2462872fff67aea5a5af69197654a1.ca...@gmail.com>
and subject line Abandon this transition
has caused the Debian Bug report #1061476,
regarding transition: elpi
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1061476: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061476
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: release.debian.org
Usertags: transition
X-Debbugs-Cc: jpu...@debian.org
Severity: normal

there is a new upstream for elpi in the OCaml packages, which has an
impact on a few Coq packages.

I checked locally (using sbuild in a chroot) everything could move
fine.

Several packages need a new version and then some need just a rebuild.
A ben description of the plan is in post scriptum.

Waiting for your ACK to upload the new packages sources.

Thanks,

J.Puydt

PS:
 dw coq-elpi 2.0.0-1 . ANY . -m 'elpi >= 1.18.1-1'
 dw coq-hierarchy-builder_1.7.0-1 . ANY . -m 'coq-elpi >= 2.0.0-1'
 dw ssreflect_2.2.0-1 . ANY . -m 'coq-hierarchy-builder >= 1.7.0-1'
 dw coq-relation-algebra_1.7.10-1 . ANY . -m 'ssreflect >= 2.2.0-1'
 dw mathcomp-finmap_2.1.0-1 . ANY . -m 'ssreflect >= 2.2.0-1'
 nmu coq-deriving_0.2.0-1+b1 . ANY . -m 'Rebuild because of upload of
ssreflect=2.2.0-1'
 dw coq-deriving_0.2.0-1+b1 . ANY . -m 'ssreflect >= 2.2.0-1'
 nmu coq-reglang_1.2.1-1+b1 . ANY . -m 'Rebuild because of upload of
ssreflect=2.2.0-1'
 dw coq-reglang_1.2.1-1+b1 . ANY . -m 'ssreflect >= 2.2.0-1'
 nmu coquelicot_3.4.1-1+b1 . ANY . -m 'Rebuild because of upload of
ssreflect=2.2.0-1'
 dw coquelicot_3.4.1-1+b1 . ANY . -m 'ssreflect >= 2.2.0-1'
 nmu mathcomp-bigenough_1.0.1-12+b1 . ANY . -m 'Rebuild because of
upload of ssreflect=2.2.0-1'
 dw mathcomp-bigenough_1.0.1-12+b1 . ANY . -m 'ssreflect >= 2.2.0-1'
 nmu mathcomp-zify_1.5.0+2.0+8.16-1+b1 . ANY . -m 'Rebuild because of
upload of ssreflect=2.2.0-1'
 dw mathcomp-zify_1.5.0+2.0+8.16-1+b1 . ANY . -m 'ssreflect >= 2.2.0-1'
 nmu coq-quickchick_2.0.2-1+b1 . ANY . -m 'Rebuild because of upload of
ssreflect=2.2.0-1'
 dw coq-quickchick_2.0.2-1+b1 . ANY . -m 'ssreflect >= 2.2.0-1'
 nmu coq-extructures_0.4.0-1+b1 . ANY . -m 'Rebuild because of upload
of ssreflect=2.2.0-1 coq-deriving=0.2.0-1+b1'
 dw coq-extructures_0.4.0-1+b1 . ANY . -m 'ssreflect >= 2.2.0-1'
 dw coq-extructures_0.4.0-1+b1 . ANY . -m 'coq-deriving >= 0.2.0-1+b1'
 nmu coq-interval_4.9.0-1+b2 . ANY . -m 'Rebuild because of upload of
ssreflect=2.2.0-1 coquelicot=3.4.1-1+b1'
 dw coq-interval_4.9.0-1+b2 . ANY . -m 'ssreflect >= 2.2.0-1'
 dw coq-interval_4.9.0-1+b2 . ANY . -m 'coquelicot >= 3.4.1-1+b1'
 nmu mathcomp-algebra-tactics_1.2.3-1+b1 . ANY . -m 'Rebuild because of
upload of ssreflect=2.2.0-1 mathcomp-zify=1.5.0+2.0+8.16-1+b1 coq-
elpi=2.0.0-1'
 dw mathcomp-algebra-tactics_1.2.3-1+b1 . ANY . -m 'ssreflect >= 2.2.0-
1'
 dw mathcomp-algebra-tactics_1.2.3-1+b1 . ANY . -m 'mathcomp-zify >=
1.5.0+2.0+8.16-1+b1'
 dw mathcomp-algebra-tactics_1.2.3-1+b1 . ANY . -m 'coq-elpi >= 2.0.0-
1'
 nmu mathcomp-multinomials_2.2.0-1+b1 . ANY . -m 'Rebuild because of
upload of ssreflect=2.2.0-1 mathcomp-finmap=2.1.0-1 mathcomp-
bigenough=1.0.1-12+b1'
 dw mathcomp-multinomials_2.2.0-1+b1 . ANY . -m 'ssreflect >= 2.2.0-1'
 dw mathcomp-multinomials_2.2.0-1+b1 . ANY . -m 'mathcomp-finmap >=
2.1.0-1'
 dw mathcomp-multinomials_2.2.0-1+b1 . ANY . -m 'mathcomp-bigenough >=
1.0.1-12+b1'
 nmu mathcomp-real-closed_2.0.0-1+b1 . ANY . -m 'Rebuild because of
upload of ssreflect=2.2.0-1 mathcomp-bigenough=1.0.1-12+b1'
 dw mathcomp-real-closed_2.0.0-1+b1 . ANY . -m 'ssreflect >= 2.2.0-1'
 dw mathcomp-real-closed_2.0.0-1+b1 . ANY . -m 'mathcomp-bigenough >=
1.0.1-12+b1'
 nmu coqeal_2.0.1-1+b1 . ANY . -m 'Rebuild because of upload of
mathcomp-real-closed=2.0.0-1+b1 ssreflect=2.2.0-1'
 dw coqeal_2.0.1-1+b1 . ANY . -m 'mathcomp-real-closed >= 2.0.0-1+b1'
 dw coqeal_2.0.1-1+b1 . ANY . -m 'ssreflect >= 2.2.0-1'
--- End Message ---
--- Begin Message ---
Hi,

I'm already working on the next big transition for the Coq ecosystem in
Debian, and this one will just be part of it.

Cheers,

J.Puydt--- End Message ---


Bug#1064551: bookworm-pu: libjwt/1.10.2-1+deb11u1

2024-02-23 Thread Thorsten Alteholz

Package: release.debian.org
Severity: normal
Tags: bookworm
User: release.debian@packages.debian.org
Usertags: pu


The attached debdiff for libjwt fixes CVE-2024-25189 in Bookworm. It is 
marked as no-dsa by the security team.

The fix is straightfoward and should not make any problems.

  Thorsten
diff -Nru libjwt-1.10.2/debian/changelog libjwt-1.10.2/debian/changelog
--- libjwt-1.10.2/debian/changelog  2019-07-14 19:03:00.0 +0200
+++ libjwt-1.10.2/debian/changelog  2024-02-19 22:03:02.0 +0100
@@ -1,3 +1,10 @@
+libjwt (1.10.2-1+deb12u1) bookworm; urgency=medium
+
+  * CVE-2024-25189 (Closes: #1063534)
+fix a timing side channel via strcmp()
+
+ -- Thorsten Alteholz   Mon, 19 Feb 2024 22:03:02 +0100
+
 libjwt (1.10.2-1) unstable; urgency=medium
 
   * New upstream release
diff -Nru libjwt-1.10.2/debian/libjwt0.symbols 
libjwt-1.10.2/debian/libjwt0.symbols
--- libjwt-1.10.2/debian/libjwt0.symbols2019-01-13 15:13:51.0 
+0100
+++ libjwt-1.10.2/debian/libjwt0.symbols2024-02-19 22:03:02.0 
+0100
@@ -38,5 +38,6 @@
  jwt_sign_sha_hmac@Base 1.9.0
  jwt_sign_sha_pem@Base 1.9.0
  jwt_str_alg@Base 1.9.0
+ jwt_strcmp@Base 1.10.2
  jwt_verify_sha_hmac@Base 1.9.0
  jwt_verify_sha_pem@Base 1.9.0
diff -Nru libjwt-1.10.2/debian/libjwt-gnutls0.symbols 
libjwt-1.10.2/debian/libjwt-gnutls0.symbols
--- libjwt-1.10.2/debian/libjwt-gnutls0.symbols 2019-01-13 15:13:51.0 
+0100
+++ libjwt-1.10.2/debian/libjwt-gnutls0.symbols 2024-02-19 22:03:02.0 
+0100
@@ -38,5 +38,6 @@
  jwt_sign_sha_hmac@Base 1.9.0
  jwt_sign_sha_pem@Base 1.9.0
  jwt_str_alg@Base 1.9.0
+ jwt_strcmp@Base 1.10.2
  jwt_verify_sha_hmac@Base 1.9.0
  jwt_verify_sha_pem@Base 1.9.0
diff -Nru libjwt-1.10.2/debian/patches/CVE-2024-25189-1.patch 
libjwt-1.10.2/debian/patches/CVE-2024-25189-1.patch
--- libjwt-1.10.2/debian/patches/CVE-2024-25189-1.patch 1970-01-01 
01:00:00.0 +0100
+++ libjwt-1.10.2/debian/patches/CVE-2024-25189-1.patch 2024-02-19 
22:03:02.0 +0100
@@ -0,0 +1,130 @@
+commit f73bac57c5bece16ac24f1a70022aa34355fc1bf
+Author: Ben Collins 
+Date:   Fri Feb 9 09:03:35 2024 -0500
+
+Implement a safer strcmp() function
+
+As noted, the strcmp() function can be used for time-based side attacks.
+
+I tried to test this and could not find a reasonable way to implement
+this attack for several reasons:
+
+1) strcmp() is optimized to compare 4 and 8 bytes at a time when possible
+   on almost every modern system, making the attack almost impossible.
+2) Running 128 million iterations of strcmp() for a single byte attack
+   gave sub-nanosecond average differences (locally on same excution stack)
+   and almost as often as the comparison was correct, it was also wrong in
+   the reverse sense (i.e. two byte strcmp() took less time than single
+   byte).
+3) Adding noise from network, application stack, web server, etc. would
+   only add to the failure rate of guessing the differences above.
+
+Erwan noted that there are proofs out there showing that signal noise
+reduction can make this guessing more "accurate", but this proof also
+noted it would take up to 4 billion guesses to completely cover this
+attack surface. The claim was that 50k attempts per second would break
+a 256-bit hmac in 22 hours. While this isn't impossible, it's very
+implausible.
+
+However, for the sake of cryptographic correctness, I implemented
+jwt_strcmp() which always compares all bytes, and does so up to the
+longest string in the 2-string set, without passing string boundaries.
+
+This makes it time-consistent for len(max(a,b)) comparisons. I proofed
+this using a 128 million interation average for various scenarious.
+
+Reported-by: Erwan Legrand 
+Signed-off-by: Ben Collins 
+
+Index: libjwt-1.10.2/libjwt/jwt-gnutls.c
+===
+--- libjwt-1.10.2.orig/libjwt/jwt-gnutls.c 2024-02-19 22:38:58.575655983 
+0100
 libjwt-1.10.2/libjwt/jwt-gnutls.c  2024-02-19 22:38:58.571655984 +0100
+@@ -90,7 +90,7 @@
+   jwt_Base64encode(buf, sig_check, len);
+   jwt_base64uri_encode(buf);
+ 
+-  if (!strcmp(sig, buf))
++  if (!jwt_strcmp(sig, buf))
+   ret = 0;
+ 
+   free(sig_check);
+Index: libjwt-1.10.2/libjwt/jwt-openssl.c
+===
+--- libjwt-1.10.2.orig/libjwt/jwt-openssl.c2024-02-19 22:38:58.575655983 
+0100
 libjwt-1.10.2/libjwt/jwt-openssl.c 2024-02-19 22:38:58.571655984 +0100
+@@ -140,7 +140,7 @@
+   jwt_base64uri_encode(buf);
+ 
+   /* And now... */
+-  ret = strcmp(buf, sig) ? EINVAL : 0;
++  ret = jwt_strcmp(buf, sig) ? EINVAL : 0;
+ 
+ jwt_verify_hmac_done:
+   BIO_free_all(b64);
+Index: libjwt-1.10.2/libjwt/jwt-private.h

Bug#1064550: bullseye-pu: libjwt/1.10.2-1+deb11u1

2024-02-23 Thread Thorsten Alteholz

Package: release.debian.org
Severity: normal
Tags: bullseye
User: release.debian@packages.debian.org
Usertags: pu


The attached debdiff for libjwt fixes CVE-2024-25189 in Bullseye. It is 
marked as no-dsa by the security team.

The fix is straightfoward and should not make any problems.

  Thorsten
diff -Nru libjwt-1.10.2/debian/changelog libjwt-1.10.2/debian/changelog
--- libjwt-1.10.2/debian/changelog  2019-07-14 19:03:00.0 +0200
+++ libjwt-1.10.2/debian/changelog  2024-02-20 23:03:02.0 +0100
@@ -1,3 +1,10 @@
+libjwt (1.10.2-1+deb11u1) bullseye; urgency=medium
+
+  * CVE-2024-25189 (Closes: #1063534)
+fix a timing side channel via strcmp()
+
+ -- Thorsten Alteholz   Tue, 20 Feb 2024 23:03:02 +0100
+
 libjwt (1.10.2-1) unstable; urgency=medium
 
   * New upstream release
diff -Nru libjwt-1.10.2/debian/libjwt0.symbols 
libjwt-1.10.2/debian/libjwt0.symbols
--- libjwt-1.10.2/debian/libjwt0.symbols2019-01-13 15:13:51.0 
+0100
+++ libjwt-1.10.2/debian/libjwt0.symbols2024-02-20 23:03:02.0 
+0100
@@ -38,5 +38,6 @@
  jwt_sign_sha_hmac@Base 1.9.0
  jwt_sign_sha_pem@Base 1.9.0
  jwt_str_alg@Base 1.9.0
+ jwt_strcmp@Base 1.10.2
  jwt_verify_sha_hmac@Base 1.9.0
  jwt_verify_sha_pem@Base 1.9.0
diff -Nru libjwt-1.10.2/debian/libjwt-gnutls0.symbols 
libjwt-1.10.2/debian/libjwt-gnutls0.symbols
--- libjwt-1.10.2/debian/libjwt-gnutls0.symbols 2019-01-13 15:13:51.0 
+0100
+++ libjwt-1.10.2/debian/libjwt-gnutls0.symbols 2024-02-20 23:03:02.0 
+0100
@@ -38,5 +38,6 @@
  jwt_sign_sha_hmac@Base 1.9.0
  jwt_sign_sha_pem@Base 1.9.0
  jwt_str_alg@Base 1.9.0
+ jwt_strcmp@Base 1.10.2
  jwt_verify_sha_hmac@Base 1.9.0
  jwt_verify_sha_pem@Base 1.9.0
diff -Nru libjwt-1.10.2/debian/patches/CVE-2024-25189-1.patch 
libjwt-1.10.2/debian/patches/CVE-2024-25189-1.patch
--- libjwt-1.10.2/debian/patches/CVE-2024-25189-1.patch 1970-01-01 
01:00:00.0 +0100
+++ libjwt-1.10.2/debian/patches/CVE-2024-25189-1.patch 2024-02-20 
23:03:02.0 +0100
@@ -0,0 +1,130 @@
+commit f73bac57c5bece16ac24f1a70022aa34355fc1bf
+Author: Ben Collins 
+Date:   Fri Feb 9 09:03:35 2024 -0500
+
+Implement a safer strcmp() function
+
+As noted, the strcmp() function can be used for time-based side attacks.
+
+I tried to test this and could not find a reasonable way to implement
+this attack for several reasons:
+
+1) strcmp() is optimized to compare 4 and 8 bytes at a time when possible
+   on almost every modern system, making the attack almost impossible.
+2) Running 128 million iterations of strcmp() for a single byte attack
+   gave sub-nanosecond average differences (locally on same excution stack)
+   and almost as often as the comparison was correct, it was also wrong in
+   the reverse sense (i.e. two byte strcmp() took less time than single
+   byte).
+3) Adding noise from network, application stack, web server, etc. would
+   only add to the failure rate of guessing the differences above.
+
+Erwan noted that there are proofs out there showing that signal noise
+reduction can make this guessing more "accurate", but this proof also
+noted it would take up to 4 billion guesses to completely cover this
+attack surface. The claim was that 50k attempts per second would break
+a 256-bit hmac in 22 hours. While this isn't impossible, it's very
+implausible.
+
+However, for the sake of cryptographic correctness, I implemented
+jwt_strcmp() which always compares all bytes, and does so up to the
+longest string in the 2-string set, without passing string boundaries.
+
+This makes it time-consistent for len(max(a,b)) comparisons. I proofed
+this using a 128 million interation average for various scenarious.
+
+Reported-by: Erwan Legrand 
+Signed-off-by: Ben Collins 
+
+Index: libjwt-1.10.2/libjwt/jwt-gnutls.c
+===
+--- libjwt-1.10.2.orig/libjwt/jwt-gnutls.c 2024-02-19 22:38:58.575655983 
+0100
 libjwt-1.10.2/libjwt/jwt-gnutls.c  2024-02-19 22:38:58.571655984 +0100
+@@ -90,7 +90,7 @@
+   jwt_Base64encode(buf, sig_check, len);
+   jwt_base64uri_encode(buf);
+ 
+-  if (!strcmp(sig, buf))
++  if (!jwt_strcmp(sig, buf))
+   ret = 0;
+ 
+   free(sig_check);
+Index: libjwt-1.10.2/libjwt/jwt-openssl.c
+===
+--- libjwt-1.10.2.orig/libjwt/jwt-openssl.c2024-02-19 22:38:58.575655983 
+0100
 libjwt-1.10.2/libjwt/jwt-openssl.c 2024-02-19 22:38:58.571655984 +0100
+@@ -140,7 +140,7 @@
+   jwt_base64uri_encode(buf);
+ 
+   /* And now... */
+-  ret = strcmp(buf, sig) ? EINVAL : 0;
++  ret = jwt_strcmp(buf, sig) ? EINVAL : 0;
+ 
+ jwt_verify_hmac_done:
+   BIO_free_all(b64);
+Index: libjwt-1.10.2/libjwt/jwt-private.h

NEW changes in stable-new

2024-02-23 Thread Debian FTP Masters
Processing changes file: 
fpga-icestorm_0~20230218gitd20a5e9-1~deb12u1_mipsel-buildd.changes
  ACCEPT



NEW changes in oldstable-new

2024-02-23 Thread Debian FTP Masters
Processing changes file: 
nvidia-graphics-drivers_470.223.02-2_amd64-buildd.changes
  ACCEPT
Processing changes file: 
nvidia-graphics-drivers_470.223.02-2_arm64-buildd.changes
  ACCEPT
Processing changes file: 
nvidia-graphics-drivers_470.223.02-2_armhf-buildd.changes
  ACCEPT
Processing changes file: 
nvidia-graphics-drivers_470.223.02-2_i386-buildd.changes
  ACCEPT
Processing changes file: 
nvidia-graphics-drivers_470.223.02-2_ppc64el-buildd.changes
  ACCEPT



NEW changes in stable-new

2024-02-23 Thread Debian FTP Masters
Processing changes file: 
fpga-icestorm_0~20230218gitd20a5e9-1~deb12u1_all-buildd.changes
  ACCEPT
Processing changes file: 
fpga-icestorm_0~20230218gitd20a5e9-1~deb12u1_amd64-buildd.changes
  ACCEPT
Processing changes file: 
fpga-icestorm_0~20230218gitd20a5e9-1~deb12u1_arm64-buildd.changes
  ACCEPT
Processing changes file: 
fpga-icestorm_0~20230218gitd20a5e9-1~deb12u1_armel-buildd.changes
  ACCEPT
Processing changes file: 
fpga-icestorm_0~20230218gitd20a5e9-1~deb12u1_armhf-buildd.changes
  ACCEPT
Processing changes file: 
fpga-icestorm_0~20230218gitd20a5e9-1~deb12u1_i386-buildd.changes
  ACCEPT
Processing changes file: 
fpga-icestorm_0~20230218gitd20a5e9-1~deb12u1_mips64el-buildd.changes
  ACCEPT
Processing changes file: 
fpga-icestorm_0~20230218gitd20a5e9-1~deb12u1_ppc64el-buildd.changes
  ACCEPT
Processing changes file: 
fpga-icestorm_0~20230218gitd20a5e9-1~deb12u1_s390x-buildd.changes
  ACCEPT
Processing changes file: 
prometheus-node-exporter-collectors_0.0~git20230203.6f710f8-1+deb12u1_all-buildd.changes
  ACCEPT
Processing changes file: 
python-channels-redis_4.0.0-1+deb12u1_all-buildd.changes
  ACCEPT
Processing changes file: rustc-web_1.70.0+dfsg1-7~deb12u1_s390x-buildd.changes
  ACCEPT



NEW changes in stable-new

2024-02-23 Thread Debian FTP Masters
Processing changes file: rustc-web_1.70.0+dfsg1-7~deb12u1_i386-buildd.changes
  ACCEPT



Bug#1057089: bookworm-pu: package usrmerge/37~deb12u1

2024-02-23 Thread Andreas Beckmann

On 30/11/2023 09.49, Marco d'Itri wrote:

On Nov 29, Andreas Beckmann  wrote:


Improve the usrmerge experience in bookworm.

Great idea, thank you for working on this!


The bookworm branch and a signed tag can be found in

https://salsa.debian.org/anbe/usrmerge.git

(IIRC merge requests don't handle tags, therefore I'm not creating one.)


Andreas



NEW changes in oldstable-new

2024-02-23 Thread Debian FTP Masters
Processing changes file: nvidia-graphics-drivers_470.223.02-2_source.changes
  ACCEPT



NEW changes in stable-new

2024-02-23 Thread Debian FTP Masters
Processing changes file: 
fpga-icestorm_0~20230218gitd20a5e9-1~deb12u1_source.changes
  ACCEPT
Processing changes file: imagemagick_6.9.11.60+dfsg-1.6+deb12u1_source.changes
  ACCEPT
Processing changes file: 
imagemagick_6.9.11.60+dfsg-1.6+deb12u1_all-buildd.changes
  ACCEPT
Processing changes file: 
imagemagick_6.9.11.60+dfsg-1.6+deb12u1_amd64-buildd.changes
  ACCEPT
Processing changes file: 
imagemagick_6.9.11.60+dfsg-1.6+deb12u1_arm64-buildd.changes
  ACCEPT
Processing changes file: 
imagemagick_6.9.11.60+dfsg-1.6+deb12u1_armel-buildd.changes
  ACCEPT
Processing changes file: 
imagemagick_6.9.11.60+dfsg-1.6+deb12u1_armhf-buildd.changes
  ACCEPT
Processing changes file: 
imagemagick_6.9.11.60+dfsg-1.6+deb12u1_i386-buildd.changes
  ACCEPT
Processing changes file: 
imagemagick_6.9.11.60+dfsg-1.6+deb12u1_mips64el-buildd.changes
  ACCEPT
Processing changes file: 
imagemagick_6.9.11.60+dfsg-1.6+deb12u1_mipsel-buildd.changes
  ACCEPT
Processing changes file: 
imagemagick_6.9.11.60+dfsg-1.6+deb12u1_ppc64el-buildd.changes
  ACCEPT
Processing changes file: 
imagemagick_6.9.11.60+dfsg-1.6+deb12u1_s390x-buildd.changes
  ACCEPT
Processing changes file: 
prometheus-node-exporter-collectors_0.0~git20230203.6f710f8-1+deb12u1_source.changes
  ACCEPT
Processing changes file: python-channels-redis_4.0.0-1+deb12u1_source.changes
  ACCEPT



Processed: python-channels-redis 4.0.0-1+deb12u1 flagged for acceptance

2024-02-23 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> package release.debian.org
Limiting to bugs with field 'package' containing at least one of 
'release.debian.org'
Limit currently set to 'package':'release.debian.org'

> tags 1064276 = bookworm pending
Bug #1064276 [release.debian.org] bookworm-pu: package 
python-channels-redis/4.0.0-1+deb12u1
Added tag(s) pending; removed tag(s) confirmed.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
1064276: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1064276
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Processed: prometheus-node-exporter-collectors 0.0~git20230203.6f710f8-1+deb12u1 flagged for acceptance

2024-02-23 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> package release.debian.org
Limiting to bugs with field 'package' containing at least one of 
'release.debian.org'
Limit currently set to 'package':'release.debian.org'

> tags 1055115 = bookworm pending
Bug #1055115 [release.debian.org] bookworm-pu: package 
prometheus-node-exporter-collectors/0.0~git20230203.6f710f8-1+deb12u1
Added tag(s) pending; removed tag(s) confirmed.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
1055115: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055115
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#1064276: python-channels-redis 4.0.0-1+deb12u1 flagged for acceptance

2024-02-23 Thread Jonathan Wiltshire
package release.debian.org
tags 1064276 = bookworm pending
thanks

Hi,

The upload referenced by this bug report has been flagged for acceptance into 
the proposed-updates queue for Debian bookworm.

Thanks for your contribution!

Upload details
==

Package: python-channels-redis
Version: 4.0.0-1+deb12u1

Explanation: 



Bug#1063823: nvidia-graphics-drivers 470.223.02-2 flagged for acceptance

2024-02-23 Thread Jonathan Wiltshire
package release.debian.org
tags 1063823 = bullseye pending
thanks

Hi,

The upload referenced by this bug report has been flagged for acceptance into 
the proposed-updates queue for Debian bullseye.

Thanks for your contribution!

Upload details
==

Package: nvidia-graphics-drivers
Version: 470.223.02-2

Explanation: end support for Tesla 450 drivers; build libnvidia-fbc1 for arm64



Bug#1055115: prometheus-node-exporter-collectors 0.0~git20230203.6f710f8-1+deb12u1 flagged for acceptance

2024-02-23 Thread Jonathan Wiltshire
package release.debian.org
tags 1055115 = bookworm pending
thanks

Hi,

The upload referenced by this bug report has been flagged for acceptance into 
the proposed-updates queue for Debian bookworm.

Thanks for your contribution!

Upload details
==

Package: prometheus-node-exporter-collectors
Version: 0.0~git20230203.6f710f8-1+deb12u1

Explanation: do not adversely affect mirror network; fix deadlock with other 
apt update runs



Processed: nvidia-graphics-drivers 470.223.02-2 flagged for acceptance

2024-02-23 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> package release.debian.org
Limiting to bugs with field 'package' containing at least one of 
'release.debian.org'
Limit currently set to 'package':'release.debian.org'

> tags 1063823 = bullseye pending
Bug #1063823 [release.debian.org] bullseye-pu: package 
nvidia-graphics-drivers/470.223.02-2
Added tag(s) pending; removed tag(s) confirmed.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
1063823: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1063823
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



NEW changes in stable-new

2024-02-23 Thread Debian FTP Masters
Processing changes file: rustc-web_1.70.0+dfsg1-7~deb12u1_arm64-buildd.changes
  ACCEPT



NEW changes in oldstable-new

2024-02-23 Thread Debian FTP Masters
Processing changes file: imagemagick_6.9.11.60+dfsg-1.3+deb11u3_source.changes
  ACCEPT
Processing changes file: 
imagemagick_6.9.11.60+dfsg-1.3+deb11u3_all-buildd.changes
  ACCEPT
Processing changes file: 
imagemagick_6.9.11.60+dfsg-1.3+deb11u3_amd64-buildd.changes
  ACCEPT
Processing changes file: 
imagemagick_6.9.11.60+dfsg-1.3+deb11u3_arm64-buildd.changes
  ACCEPT
Processing changes file: 
imagemagick_6.9.11.60+dfsg-1.3+deb11u3_armel-buildd.changes
  ACCEPT
Processing changes file: 
imagemagick_6.9.11.60+dfsg-1.3+deb11u3_armhf-buildd.changes
  ACCEPT
Processing changes file: 
imagemagick_6.9.11.60+dfsg-1.3+deb11u3_i386-buildd.changes
  ACCEPT
Processing changes file: 
imagemagick_6.9.11.60+dfsg-1.3+deb11u3_mips64el-buildd.changes
  ACCEPT
Processing changes file: 
imagemagick_6.9.11.60+dfsg-1.3+deb11u3_mipsel-buildd.changes
  ACCEPT
Processing changes file: 
imagemagick_6.9.11.60+dfsg-1.3+deb11u3_ppc64el-buildd.changes
  ACCEPT
Processing changes file: 
imagemagick_6.9.11.60+dfsg-1.3+deb11u3_s390x-buildd.changes
  ACCEPT



NEW changes in stable-new

2024-02-23 Thread Debian FTP Masters
Processing changes file: rustc-web_1.70.0+dfsg1-7~deb12u1_amd64.changes
  ACCEPT



Bug#1064031: rustc-web 1.70.0+dfsg1-7~deb12u1 flagged for acceptance

2024-02-23 Thread Adam D Barratt
package release.debian.org
tags 1064031 = bookworm pending
thanks

Hi,

The upload referenced by this bug report has been flagged for acceptance into 
the proposed-updates queue for Debian bookworm.

Thanks for your contribution!

Upload details
==

Package: rustc-web
Version: 1.70.0+dfsg1-7~deb12u1

Explanation: new source package to support builds of web browsers



Processed: rustc-web 1.70.0+dfsg1-7~deb12u1 flagged for acceptance

2024-02-23 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> package release.debian.org
Limiting to bugs with field 'package' containing at least one of 
'release.debian.org'
Limit currently set to 'package':'release.debian.org'

> tags 1064031 = bookworm pending
Bug #1064031 [release.debian.org] bookworm-pu: package 
rustc-web/1.70.0+dfsg1-7~deb12u1
Added tag(s) pending; removed tag(s) confirmed.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
1064031: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1064031
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



NEW changes in stable-new

2024-02-23 Thread Debian FTP Masters
Processing changes file: firefox-esr_115.8.0esr-1~deb12u1_source.changes
  ACCEPT
Processing changes file: firefox-esr_115.8.0esr-1~deb12u1_all-buildd.changes
  ACCEPT
Processing changes file: firefox-esr_115.8.0esr-1~deb12u1_amd64-buildd.changes
  ACCEPT
Processing changes file: firefox-esr_115.8.0esr-1~deb12u1_arm64-buildd.changes
  ACCEPT
Processing changes file: firefox-esr_115.8.0esr-1~deb12u1_armhf-buildd.changes
  ACCEPT
Processing changes file: firefox-esr_115.8.0esr-1~deb12u1_i386-buildd.changes
  ACCEPT
Processing changes file: 
firefox-esr_115.8.0esr-1~deb12u1_mips64el-buildd.changes
  ACCEPT
Processing changes file: firefox-esr_115.8.0esr-1~deb12u1_ppc64el-buildd.changes
  ACCEPT
Processing changes file: firefox-esr_115.8.0esr-1~deb12u1_s390x-buildd.changes
  ACCEPT