mintstick is marked for autoremoval from testing

2024-05-04 Thread Debian testing autoremoval watch
mintstick 1.6.0-3 is marked for autoremoval from testing on 2024-06-09 It (build-)depends on packages with these RC bugs: 1069904: python3-gnupg: Autopkgtests failed https://bugs.debian.org/1069904 This mail is generated by:

Processing of gthumb_3.12.6-1~bpo12+1_source.changes

2024-05-04 Thread Debian FTP Masters
gthumb_3.12.6-1~bpo12+1_source.changes uploaded successfully to localhost along with the files: gthumb_3.12.6-1~bpo12+1.dsc gthumb_3.12.6.orig.tar.xz gthumb_3.12.6-1~bpo12+1.debian.tar.xz gthumb_3.12.6-1~bpo12+1_amd64.buildinfo Greetings, Your Debian queue daemon (running on host

gthumb_3.12.6-1~bpo12+1_source.changes ACCEPTED into stable-backports

2024-05-04 Thread Debian FTP Masters
Thank you for your contribution to Debian. Mapping bookworm-backports to stable-backports. Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Sat, 04 May 2024 21:06:29 -0400 Source: gthumb Architecture: source Version: 3:3.12.6-1~bpo12+1 Distribution:

scsitools_0.12-6_source.changes ACCEPTED into unstable

2024-05-04 Thread Debian FTP Masters
Thank you for your contribution to Debian. Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Sat, 04 May 2024 21:09:10 +0200 Source: scsitools Architecture: source Version: 0.12-6 Distribution: unstable Urgency: medium Maintainer: Debian QA Group Changed-By: Petter

Processing of scsitools_0.12-6_source.changes

2024-05-04 Thread Debian FTP Masters
scsitools_0.12-6_source.changes uploaded successfully to localhost along with the files: scsitools_0.12-6.dsc scsitools_0.12-6.debian.tar.xz scsitools_0.12-6_source.buildinfo Greetings, Your Debian queue daemon (running on host usper.debian.org)

Processed: tagging 1070370, found 1070370 in 1.3a-3, found 1070370 in 1.3a-1.2, found 1070370 in 1.3a-1.1 ...

2024-05-04 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > tags 1070370 + upstream Bug #1070370 [src:dmitry] dmitry: CVE-2017-7938 CVE-2020-14931 CVE-2024-31837 Added tag(s) upstream. > found 1070370 1.3a-3 Bug #1070370 [src:dmitry] dmitry: CVE-2017-7938 CVE-2020-14931 CVE-2024-31837 Marked as found in

fondu_0.0.20060102-7_source.changes ACCEPTED into unstable

2024-05-04 Thread Debian FTP Masters
Thank you for your contribution to Debian. Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Sat, 04 May 2024 19:48:21 +0200 Source: fondu Architecture: source Version: 0.0.20060102-7 Distribution: unstable Urgency: medium Maintainer: Debian QA Group Changed-By:

Processing of fondu_0.0.20060102-7_source.changes

2024-05-04 Thread Debian FTP Masters
fondu_0.0.20060102-7_source.changes uploaded successfully to localhost along with the files: fondu_0.0.20060102-7.dsc fondu_0.0.20060102-7.debian.tar.xz fondu_0.0.20060102-7_source.buildinfo Greetings, Your Debian queue daemon (running on host usper.debian.org)

Bug#1070370: dmitry: CVE-2017-7938 CVE-2020-14931 CVE-2024-31837

2024-05-04 Thread Moritz Mühlenhoff
Source: dmitry X-Debbugs-CC: t...@security.debian.org Severity: important Tags: security Hi, The following vulnerabilities were published for dmitry. CVE-2017-7938[0]: | Stack-based buffer overflow in DMitry (Deepmagic Information | Gathering Tool) version 1.3a (Unix) allows attackers to cause

Processing of udo_6.4.1-8_source.changes

2024-05-04 Thread Debian FTP Masters
udo_6.4.1-8_source.changes uploaded successfully to localhost along with the files: udo_6.4.1-8.dsc udo_6.4.1-8.debian.tar.xz udo_6.4.1-8_source.buildinfo Greetings, Your Debian queue daemon (running on host usper.debian.org)

udo_6.4.1-8_source.changes ACCEPTED into unstable

2024-05-04 Thread Debian FTP Masters
Thank you for your contribution to Debian. Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Sat, 04 May 2024 16:53:29 +0200 Source: udo Architecture: source Version: 6.4.1-8 Distribution: unstable Urgency: medium Maintainer: Debian QA Group Changed-By: Petter

Processing of ncdt_2.1-6_source.changes

2024-05-04 Thread Debian FTP Masters
ncdt_2.1-6_source.changes uploaded successfully to localhost along with the files: ncdt_2.1-6.dsc ncdt_2.1-6.debian.tar.xz ncdt_2.1-6_source.buildinfo Greetings, Your Debian queue daemon (running on host usper.debian.org)

ncdt_2.1-6_source.changes ACCEPTED into unstable

2024-05-04 Thread Debian FTP Masters
Thank you for your contribution to Debian. Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Sat, 04 May 2024 16:25:32 +0200 Source: ncdt Architecture: source Version: 2.1-6 Distribution: unstable Urgency: medium Maintainer: Debian QA Group Changed-By: Petter

Bug#1070190: sendmail-bin: CVE-2023-51765 SMTP smuggling with NUL followup

2024-05-04 Thread Andreas Beckmann
On 04/05/2024 13.02, Andreas Beckmann wrote: I have patched sendmail in order to enable O RejectNUL=True directive, but I do not achieved the fact to enable it by default. Andreas could you get a glimpse at how to render  RejectNUL a default ? Second attempt. Completely untested. This

Processing of gpsmanshp_1.2.3-7_source.changes

2024-05-04 Thread Debian FTP Masters
gpsmanshp_1.2.3-7_source.changes uploaded successfully to localhost along with the files: gpsmanshp_1.2.3-7.dsc gpsmanshp_1.2.3-7.debian.tar.xz gpsmanshp_1.2.3-7_source.buildinfo Greetings, Your Debian queue daemon (running on host usper.debian.org)

gpsmanshp_1.2.3-7_source.changes ACCEPTED into unstable

2024-05-04 Thread Debian FTP Masters
Thank you for your contribution to Debian. Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Sat, 04 May 2024 13:57:47 +0200 Source: gpsmanshp Architecture: source Version: 1.2.3-7 Distribution: unstable Urgency: medium Maintainer: Debian QA Group Changed-By: Petter

Bug#1070190: sendmail-bin: CVE-2023-51765 SMTP smuggling with NUL followup

2024-05-04 Thread Andreas Beckmann
On 01/05/2024 16.14, Bastien Roucariès wrote: Dear Maintainer, unfortunately sendmail is orphaned ... CVE-2023-51765 is not fully fixed at least for forwarding bad mail. We must reject NUL including mail as a stop gap method. I have patched sendmail in order to enable O RejectNUL=True

mathtex_1.03-3_source.changes ACCEPTED into unstable

2024-05-04 Thread Debian FTP Masters
Thank you for your contribution to Debian. Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Sat, 04 May 2024 11:51:02 +0200 Source: mathtex Architecture: source Version: 1.03-3 Distribution: unstable Urgency: medium Maintainer: Debian QA Group Changed-By: Petter

Processed (with 1 error): retitle

2024-05-04 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > retitle 1061205 qt6-tools: Please upgrade to llvm-toolchain-18 Bug #1061205 [src:qt6-tools] Please upgrade to llvm-toolchain-17 Changed Bug title to 'qt6-tools: Please upgrade to llvm-toolchain-18' from 'Please upgrade to llvm-toolchain-17'. >

Processing of mathtex_1.03-3_source.changes

2024-05-04 Thread Debian FTP Masters
mathtex_1.03-3_source.changes uploaded successfully to localhost along with the files: mathtex_1.03-3.dsc mathtex_1.03-3.debian.tar.xz mathtex_1.03-3_source.buildinfo Greetings, Your Debian queue daemon (running on host usper.debian.org)

Bug#1010023: marked as done (microdc2: NMU 0.15.6-4.1)

2024-05-04 Thread Debian Bug Tracking System
Your message dated Sat, 04 May 2024 08:35:34 + with message-id and subject line Bug#1010023: fixed in microdc2 0.15.6-6 has caused the Debian Bug report #1010023, regarding microdc2: NMU 0.15.6-4.1 to be marked as done. This means that you claim that the problem has been dealt with. If this

Bug#971421: marked as done (extra-xdg-menus: manpage example uses --system to enable locally)

2024-05-04 Thread Debian Bug Tracking System
Your message dated Sat, 04 May 2024 08:34:58 + with message-id and subject line Bug#971421: fixed in extra-xdg-menus 1.0-7 has caused the Debian Bug report #971421, regarding extra-xdg-menus: manpage example uses --system to enable locally to be marked as done. This means that you claim that

Bug#692216: marked as done (extra-xdg-menus: Hamradio directory icon doesn't show up in menu)

2024-05-04 Thread Debian Bug Tracking System
Your message dated Sat, 04 May 2024 08:34:58 + with message-id and subject line Bug#692216: fixed in extra-xdg-menus 1.0-7 has caused the Debian Bug report #692216, regarding extra-xdg-menus: Hamradio directory icon doesn't show up in menu to be marked as done. This means that you claim that

microdc2_0.15.6-6_source.changes ACCEPTED into unstable

2024-05-04 Thread Debian FTP Masters
Thank you for your contribution to Debian. Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Sat, 04 May 2024 09:57:08 +0200 Source: microdc2 Architecture: source Version: 0.15.6-6 Distribution: unstable Urgency: medium Maintainer: Debian QA Group Changed-By: Petter

extra-xdg-menus_1.0-7_source.changes ACCEPTED into unstable

2024-05-04 Thread Debian FTP Masters
Thank you for your contribution to Debian. Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Sat, 04 May 2024 09:36:08 +0200 Source: extra-xdg-menus Architecture: source Version: 1.0-7 Distribution: unstable Urgency: medium Maintainer: Debian QA Group Changed-By:

Processing of microdc2_0.15.6-6_source.changes

2024-05-04 Thread Debian FTP Masters
microdc2_0.15.6-6_source.changes uploaded successfully to localhost along with the files: microdc2_0.15.6-6.dsc microdc2_0.15.6-6.debian.tar.xz microdc2_0.15.6-6_source.buildinfo Greetings, Your Debian queue daemon (running on host usper.debian.org)

Processing of extra-xdg-menus_1.0-7_source.changes

2024-05-04 Thread Debian FTP Masters
extra-xdg-menus_1.0-7_source.changes uploaded successfully to localhost along with the files: extra-xdg-menus_1.0-7.dsc extra-xdg-menus_1.0-7.debian.tar.xz extra-xdg-menus_1.0-7_source.buildinfo Greetings, Your Debian queue daemon (running on host usper.debian.org)

hugs98_98.200609.21-7_source.changes ACCEPTED into unstable

2024-05-04 Thread Debian FTP Masters
Thank you for your contribution to Debian. Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Sat, 04 May 2024 07:54:05 +0200 Source: hugs98 Architecture: source Version: 98.200609.21-7 Distribution: unstable Urgency: medium Maintainer: Debian QA Group Changed-By:

Processing of hugs98_98.200609.21-7_source.changes

2024-05-04 Thread Debian FTP Masters
hugs98_98.200609.21-7_source.changes uploaded successfully to localhost along with the files: hugs98_98.200609.21-7.dsc hugs98_98.200609.21-7.debian.tar.xz hugs98_98.200609.21-7_source.buildinfo Greetings, Your Debian queue daemon (running on host usper.debian.org)