Processed: tagging 1015549, tagging 1015547, tagging 1015546, tagging 1015545, tagging 1015544, tagging 1015543 ...

2023-10-13 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > tags 1015549 - bookworm Bug #1015549 [src:mpeg2dec] mpeg2dec: ftbfs with LTO (link time optimization) enabled Removed tag(s) bookworm. > tags 1015547 - bookworm Bug #1015547 [src:mosquitto] mosquitto: ftbfs with LTO (link time optimization)

Bug#1053878: gpac: CVE-2023-42298 CVE-2023-5520

2023-10-13 Thread Moritz Mühlenhoff
Source: gpac X-Debbugs-CC: t...@security.debian.org Severity: important Tags: security Hi, The following vulnerabilities were published for gpac. CVE-2023-42298[0]: | An issue in GPAC GPAC v.2.2.1 and before allows a local attacker to | cause a denial of service via the Q_DecCoordOnUnitSphere

Processed: tagging 1007049, tagging 1007084, tagging 1007061, tagging 1007085, tagging 1007086, tagging 1007081 ...

2023-10-13 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > tags 1007049 - bookworm Bug #1007049 {Done: Bastian Germann } [src:appconfig] appconfig: please consider upgrading to 3.0 source format Removed tag(s) bookworm. > tags 1007084 - bookworm Bug #1007084 {Done: Bastian Germann } [src:devio] devio:

Processed: tagging 1015428, tagging 1015711, tagging 1015708, tagging 1015709, tagging 1015703, tagging 1015704 ...

2023-10-13 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > tags 1015428 + sid trixie Bug #1015428 [src:inputplug] inputplug: ftbfs with LTO (link time optimization) enabled Added tag(s) trixie and sid. > tags 1015711 - bookworm Bug #1015711 [src:xorg-server] xorg-server: ftbfs with LTO (link time

Processed: tagging 1015385, tagging 1015382, tagging 1015380, tagging 1015381, tagging 1015379, tagging 1015378 ...

2023-10-13 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > tags 1015385 - bookworm Bug #1015385 [src:diagnostics] diagnostics: ftbfs with LTO (link time optimization) enabled Removed tag(s) bookworm. > tags 1015382 - bookworm Bug #1015382 [src:deepin-calculator] deepin-calculator: ftbfs with LTO (link

Processing of giftrans_1.12.2-20_source.changes

2023-10-13 Thread Debian FTP Masters
giftrans_1.12.2-20_source.changes uploaded successfully to localhost along with the files: giftrans_1.12.2-20.dsc giftrans_1.12.2-20.debian.tar.xz giftrans_1.12.2-20_source.buildinfo Greetings, Your Debian queue daemon (running on host usper.debian.org)

Processing of freepwing_1.5-3_source.changes

2023-10-13 Thread Debian FTP Masters
freepwing_1.5-3_source.changes uploaded successfully to localhost along with the files: freepwing_1.5-3.dsc freepwing_1.5-3.debian.tar.xz freepwing_1.5-3_source.buildinfo Greetings, Your Debian queue daemon (running on host usper.debian.org)

Bug#1002527: "milter-greylist -u user" considered harmful

2023-10-13 Thread Amin Bandali
X-Debbugs-CC: m...@renich.org, b...@debian.org, t...@zhadum.org.uk, t...@debian.org Hello, How do folks feel about the attached patch (against https://salsa.debian.org/debian/milter-greylist)? It implements Matthias's proposal of allowing the use of a user (and/or group) other than 'greylist'

Processed: tags changes for 1002527

2023-10-13 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > tags 1002527 patch Bug #1002527 [milter-greylist] milter-greylist -u user does not correctly ensure user can update greylist.db Added tag(s) patch. > thanks Stopping processing here. Please contact me if you need assistance. -- 1002527:

freepwing_1.5-3_source.changes ACCEPTED into unstable

2023-10-13 Thread Debian FTP Masters
Thank you for your contribution to Debian. Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Sat, 14 Oct 2023 01:50:09 + Source: freepwing Architecture: source Version: 1.5-3 Distribution: unstable Urgency: medium Maintainer: Debian QA Group Changed-By: David da

Bug#1002739: marked as done (giftrans: CVE-2021-45972: Stack based buffer overflow in the giftrans function)

2023-10-13 Thread Debian Bug Tracking System
Your message dated Fri, 13 Oct 2023 22:13:04 + with message-id and subject line Bug#1002739: fixed in giftrans 1.12.2-20 has caused the Debian Bug report #1002739, regarding giftrans: CVE-2021-45972: Stack based buffer overflow in the giftrans function to be marked as done. This means that

Bug#928899: marked as done (giftrans FTCBFS: uses the wrong compiler)

2023-10-13 Thread Debian Bug Tracking System
Your message dated Fri, 13 Oct 2023 22:13:04 + with message-id and subject line Bug#928899: fixed in giftrans 1.12.2-20 has caused the Debian Bug report #928899, regarding giftrans FTCBFS: uses the wrong compiler to be marked as done. This means that you claim that the problem has been dealt

giftrans_1.12.2-20_source.changes ACCEPTED into unstable

2023-10-13 Thread Debian FTP Masters
Thank you for your contribution to Debian. Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Fri, 13 Oct 2023 21:33:05 + Source: giftrans Architecture: source Version: 1.12.2-20 Distribution: unstable Urgency: medium Maintainer: Debian QA Group Changed-By: David

toxic is marked for autoremoval from testing

2023-10-13 Thread Debian testing autoremoval watch
toxic 0.11.1-3 is marked for autoremoval from testing on 2023-11-18 It (build-)depends on packages with these RC bugs: 1053501: libtoxcore: flaky autopkgtest: save_load (Timeout) https://bugs.debian.org/1053501 This mail is generated by:

pstotext is marked for autoremoval from testing

2023-10-13 Thread Debian testing autoremoval watch
pstotext 1.9-7 is marked for autoremoval from testing on 2023-10-27 It is affected by these RC bugs: 895513: pstotext: pstotext doesn't work any more: Unrecoverable error: undefined in DELAYBIND https://bugs.debian.org/895513 This mail is generated by: