Processing of ale_0.9.0.3-4_source.changes

2019-09-10 Thread Debian FTP Masters
ale_0.9.0.3-4_source.changes uploaded successfully to localhost along with the files: ale_0.9.0.3-4.dsc ale_0.9.0.3-4.debian.tar.xz ale_0.9.0.3-4_source.buildinfo Greetings, Your Debian queue daemon (running on host usper.debian.org)

Bug#874950: New version stable?

2019-09-10 Thread Shengjing Zhu
(CC previous sponsor as well) Hi, On Thu, Aug 29, 2019 at 5:36 PM Shengjing Zhu wrote: > > Hi Diego, > > On Wed, Jul 24, 2019 at 12:32 AM Shengjing Zhu wrote: > > > > On Mon, 22 Jul 2019 01:09:00 -0300 Diego Sarzi wrote: > > > Thank you Shenging Zhy for the contribution. > > > > > > Can you

Bug#738763: marked as done (ale: Wrong upstream Homepage URL)

2019-09-10 Thread Debian Bug Tracking System
Your message dated Tue, 10 Sep 2019 17:04:02 + with message-id and subject line Bug#738763: fixed in ale 0.9.0.3-4 has caused the Debian Bug report #738763, regarding ale: Wrong upstream Homepage URL to be marked as done. This means that you claim that the problem has been dealt with. If

ale_0.9.0.3-4_source.changes ACCEPTED into unstable

2019-09-10 Thread Debian FTP Masters
Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Fri, 06 Sep 2019 17:33:01 + Source: ale Architecture: source Version: 0.9.0.3-4 Distribution: unstable Urgency: medium Maintainer: Debian QA Group Changed-By: Daniel Pimentel Closes: 738763 Changes: ale

Bug#939915: clfow: CVE-2019-16165

2019-09-10 Thread Salvatore Bonaccorso
Source: cflow Version: 1:1.6-4 Severity: important Tags: security upstream Forwarded: https://lists.gnu.org/archive/html/bug-cflow/2019-04/msg1.html Control: found -1 1:1.6-1 Hi, The following vulnerability was published for cflow. CVE-2019-16165[0]: | GNU cflow through 1.6 has a

Processed: clfow: CVE-2019-16165

2019-09-10 Thread Debian Bug Tracking System
Processing control commands: > found -1 1:1.6-1 Bug #939915 [src:cflow] clfow: CVE-2019-16165 Marked as found in versions cflow/1:1.6-1. -- 939915: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=939915 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems

Processed: clfow: CVE-2019-16166

2019-09-10 Thread Debian Bug Tracking System
Processing control commands: > found -1 1:1.6-1 Bug #939916 [src:cflow] clfow: CVE-2019-16166 Marked as found in versions cflow/1:1.6-1. -- 939916: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=939916 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems

Bug#939916: clfow: CVE-2019-16166

2019-09-10 Thread Salvatore Bonaccorso
Source: cflow Version: 1:1.6-4 Severity: important Tags: security upstream Forwarded: https://lists.gnu.org/archive/html/bug-cflow/2019-04/msg0.html Control: found -1 1:1.6-1 Hi, The following vulnerability was published for cflow. CVE-2019-16166[0]: | GNU cflow through 1.6 has a heap-based

Processed: retitle 939915 to cflow: CVE-2019-16165, retitle 939916 to cflow: CVE-2019-16166

2019-09-10 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > # fix typos > retitle 939915 cflow: CVE-2019-16165 Bug #939915 [src:cflow] clfow: CVE-2019-16165 Changed Bug title to 'cflow: CVE-2019-16165' from 'clfow: CVE-2019-16165'. > retitle 939916 cflow: CVE-2019-16166 Bug #939916 [src:cflow] clfow: