mintstick 1.6.0-3 is marked for autoremoval from testing on 2024-06-09
It (build-)depends on packages with these RC bugs:
1069904: python3-gnupg: Autopkgtests failed
https://bugs.debian.org/1069904
This mail is generated by:
gthumb_3.12.6-1~bpo12+1_source.changes uploaded successfully to localhost
along with the files:
gthumb_3.12.6-1~bpo12+1.dsc
gthumb_3.12.6.orig.tar.xz
gthumb_3.12.6-1~bpo12+1.debian.tar.xz
gthumb_3.12.6-1~bpo12+1_amd64.buildinfo
Greetings,
Your Debian queue daemon (running on host
Thank you for your contribution to Debian.
Mapping bookworm-backports to stable-backports.
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Sat, 04 May 2024 21:06:29 -0400
Source: gthumb
Architecture: source
Version: 3:3.12.6-1~bpo12+1
Distribution:
Thank you for your contribution to Debian.
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Sat, 04 May 2024 21:09:10 +0200
Source: scsitools
Architecture: source
Version: 0.12-6
Distribution: unstable
Urgency: medium
Maintainer: Debian QA Group
Changed-By: Petter
scsitools_0.12-6_source.changes uploaded successfully to localhost
along with the files:
scsitools_0.12-6.dsc
scsitools_0.12-6.debian.tar.xz
scsitools_0.12-6_source.buildinfo
Greetings,
Your Debian queue daemon (running on host usper.debian.org)
Processing commands for cont...@bugs.debian.org:
> tags 1070370 + upstream
Bug #1070370 [src:dmitry] dmitry: CVE-2017-7938 CVE-2020-14931 CVE-2024-31837
Added tag(s) upstream.
> found 1070370 1.3a-3
Bug #1070370 [src:dmitry] dmitry: CVE-2017-7938 CVE-2020-14931 CVE-2024-31837
Marked as found in
Thank you for your contribution to Debian.
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Sat, 04 May 2024 19:48:21 +0200
Source: fondu
Architecture: source
Version: 0.0.20060102-7
Distribution: unstable
Urgency: medium
Maintainer: Debian QA Group
Changed-By:
fondu_0.0.20060102-7_source.changes uploaded successfully to localhost
along with the files:
fondu_0.0.20060102-7.dsc
fondu_0.0.20060102-7.debian.tar.xz
fondu_0.0.20060102-7_source.buildinfo
Greetings,
Your Debian queue daemon (running on host usper.debian.org)
Source: dmitry
X-Debbugs-CC: t...@security.debian.org
Severity: important
Tags: security
Hi,
The following vulnerabilities were published for dmitry.
CVE-2017-7938[0]:
| Stack-based buffer overflow in DMitry (Deepmagic Information
| Gathering Tool) version 1.3a (Unix) allows attackers to cause
udo_6.4.1-8_source.changes uploaded successfully to localhost
along with the files:
udo_6.4.1-8.dsc
udo_6.4.1-8.debian.tar.xz
udo_6.4.1-8_source.buildinfo
Greetings,
Your Debian queue daemon (running on host usper.debian.org)
Thank you for your contribution to Debian.
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Sat, 04 May 2024 16:53:29 +0200
Source: udo
Architecture: source
Version: 6.4.1-8
Distribution: unstable
Urgency: medium
Maintainer: Debian QA Group
Changed-By: Petter
ncdt_2.1-6_source.changes uploaded successfully to localhost
along with the files:
ncdt_2.1-6.dsc
ncdt_2.1-6.debian.tar.xz
ncdt_2.1-6_source.buildinfo
Greetings,
Your Debian queue daemon (running on host usper.debian.org)
Thank you for your contribution to Debian.
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Sat, 04 May 2024 16:25:32 +0200
Source: ncdt
Architecture: source
Version: 2.1-6
Distribution: unstable
Urgency: medium
Maintainer: Debian QA Group
Changed-By: Petter
On 04/05/2024 13.02, Andreas Beckmann wrote:
I have patched sendmail in order to enable O RejectNUL=True directive,
but I do not achieved the fact to enable it by default.
Andreas could you get a glimpse at how to render RejectNUL a default ?
Second attempt. Completely untested. This
gpsmanshp_1.2.3-7_source.changes uploaded successfully to localhost
along with the files:
gpsmanshp_1.2.3-7.dsc
gpsmanshp_1.2.3-7.debian.tar.xz
gpsmanshp_1.2.3-7_source.buildinfo
Greetings,
Your Debian queue daemon (running on host usper.debian.org)
Thank you for your contribution to Debian.
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Sat, 04 May 2024 13:57:47 +0200
Source: gpsmanshp
Architecture: source
Version: 1.2.3-7
Distribution: unstable
Urgency: medium
Maintainer: Debian QA Group
Changed-By: Petter
On 01/05/2024 16.14, Bastien Roucariès wrote:
Dear Maintainer,
unfortunately sendmail is orphaned ...
CVE-2023-51765 is not fully fixed at least for forwarding bad mail.
We must reject NUL including mail as a stop gap method.
I have patched sendmail in order to enable O RejectNUL=True
Thank you for your contribution to Debian.
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Sat, 04 May 2024 11:51:02 +0200
Source: mathtex
Architecture: source
Version: 1.03-3
Distribution: unstable
Urgency: medium
Maintainer: Debian QA Group
Changed-By: Petter
Processing commands for cont...@bugs.debian.org:
> retitle 1061205 qt6-tools: Please upgrade to llvm-toolchain-18
Bug #1061205 [src:qt6-tools] Please upgrade to llvm-toolchain-17
Changed Bug title to 'qt6-tools: Please upgrade to llvm-toolchain-18' from
'Please upgrade to llvm-toolchain-17'.
>
mathtex_1.03-3_source.changes uploaded successfully to localhost
along with the files:
mathtex_1.03-3.dsc
mathtex_1.03-3.debian.tar.xz
mathtex_1.03-3_source.buildinfo
Greetings,
Your Debian queue daemon (running on host usper.debian.org)
Your message dated Sat, 04 May 2024 08:35:34 +
with message-id
and subject line Bug#1010023: fixed in microdc2 0.15.6-6
has caused the Debian Bug report #1010023,
regarding microdc2: NMU 0.15.6-4.1
to be marked as done.
This means that you claim that the problem has been dealt with.
If this
Your message dated Sat, 04 May 2024 08:34:58 +
with message-id
and subject line Bug#971421: fixed in extra-xdg-menus 1.0-7
has caused the Debian Bug report #971421,
regarding extra-xdg-menus: manpage example uses --system to enable locally
to be marked as done.
This means that you claim that
Your message dated Sat, 04 May 2024 08:34:58 +
with message-id
and subject line Bug#692216: fixed in extra-xdg-menus 1.0-7
has caused the Debian Bug report #692216,
regarding extra-xdg-menus: Hamradio directory icon doesn't show up in menu
to be marked as done.
This means that you claim that
Thank you for your contribution to Debian.
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Sat, 04 May 2024 09:57:08 +0200
Source: microdc2
Architecture: source
Version: 0.15.6-6
Distribution: unstable
Urgency: medium
Maintainer: Debian QA Group
Changed-By: Petter
Thank you for your contribution to Debian.
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Sat, 04 May 2024 09:36:08 +0200
Source: extra-xdg-menus
Architecture: source
Version: 1.0-7
Distribution: unstable
Urgency: medium
Maintainer: Debian QA Group
Changed-By:
microdc2_0.15.6-6_source.changes uploaded successfully to localhost
along with the files:
microdc2_0.15.6-6.dsc
microdc2_0.15.6-6.debian.tar.xz
microdc2_0.15.6-6_source.buildinfo
Greetings,
Your Debian queue daemon (running on host usper.debian.org)
extra-xdg-menus_1.0-7_source.changes uploaded successfully to localhost
along with the files:
extra-xdg-menus_1.0-7.dsc
extra-xdg-menus_1.0-7.debian.tar.xz
extra-xdg-menus_1.0-7_source.buildinfo
Greetings,
Your Debian queue daemon (running on host usper.debian.org)
Thank you for your contribution to Debian.
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Sat, 04 May 2024 07:54:05 +0200
Source: hugs98
Architecture: source
Version: 98.200609.21-7
Distribution: unstable
Urgency: medium
Maintainer: Debian QA Group
Changed-By:
hugs98_98.200609.21-7_source.changes uploaded successfully to localhost
along with the files:
hugs98_98.200609.21-7.dsc
hugs98_98.200609.21-7.debian.tar.xz
hugs98_98.200609.21-7_source.buildinfo
Greetings,
Your Debian queue daemon (running on host usper.debian.org)
29 matches
Mail list logo