extra-xdg-menus_1.0-7_source.changes uploaded successfully to localhost
along with the files:
extra-xdg-menus_1.0-7.dsc
extra-xdg-menus_1.0-7.debian.tar.xz
extra-xdg-menus_1.0-7_source.buildinfo
Greetings,
Your Debian queue daemon (running on host usper.debian.org)
microdc2_0.15.6-6_source.changes uploaded successfully to localhost
along with the files:
microdc2_0.15.6-6.dsc
microdc2_0.15.6-6.debian.tar.xz
microdc2_0.15.6-6_source.buildinfo
Greetings,
Your Debian queue daemon (running on host usper.debian.org)
Thank you for your contribution to Debian.
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Sat, 04 May 2024 09:36:08 +0200
Source: extra-xdg-menus
Architecture: source
Version: 1.0-7
Distribution: unstable
Urgency: medium
Maintainer: Debian QA Group
Changed-By: Pet
Thank you for your contribution to Debian.
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Sat, 04 May 2024 09:57:08 +0200
Source: microdc2
Architecture: source
Version: 0.15.6-6
Distribution: unstable
Urgency: medium
Maintainer: Debian QA Group
Changed-By: Petter
Your message dated Sat, 04 May 2024 08:34:58 +
with message-id
and subject line Bug#692216: fixed in extra-xdg-menus 1.0-7
has caused the Debian Bug report #692216,
regarding extra-xdg-menus: Hamradio directory icon doesn't show up in menu
to be marked as done.
This means that you claim that
Your message dated Sat, 04 May 2024 08:34:58 +
with message-id
and subject line Bug#971421: fixed in extra-xdg-menus 1.0-7
has caused the Debian Bug report #971421,
regarding extra-xdg-menus: manpage example uses --system to enable locally
to be marked as done.
This means that you claim that
Your message dated Sat, 04 May 2024 08:35:34 +
with message-id
and subject line Bug#1010023: fixed in microdc2 0.15.6-6
has caused the Debian Bug report #1010023,
regarding microdc2: NMU 0.15.6-4.1
to be marked as done.
This means that you claim that the problem has been dealt with.
If this i
mathtex_1.03-3_source.changes uploaded successfully to localhost
along with the files:
mathtex_1.03-3.dsc
mathtex_1.03-3.debian.tar.xz
mathtex_1.03-3_source.buildinfo
Greetings,
Your Debian queue daemon (running on host usper.debian.org)
Processing commands for cont...@bugs.debian.org:
> retitle 1061205 qt6-tools: Please upgrade to llvm-toolchain-18
Bug #1061205 [src:qt6-tools] Please upgrade to llvm-toolchain-17
Changed Bug title to 'qt6-tools: Please upgrade to llvm-toolchain-18' from
'Please upgrade to llvm-toolchain-17'.
> re
Thank you for your contribution to Debian.
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Sat, 04 May 2024 11:51:02 +0200
Source: mathtex
Architecture: source
Version: 1.03-3
Distribution: unstable
Urgency: medium
Maintainer: Debian QA Group
Changed-By: Petter Rei
On 01/05/2024 16.14, Bastien Roucariès wrote:
Dear Maintainer,
unfortunately sendmail is orphaned ...
CVE-2023-51765 is not fully fixed at least for forwarding bad mail.
We must reject NUL including mail as a stop gap method.
I have patched sendmail in order to enable O RejectNUL=True dire
Thank you for your contribution to Debian.
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Sat, 04 May 2024 13:57:47 +0200
Source: gpsmanshp
Architecture: source
Version: 1.2.3-7
Distribution: unstable
Urgency: medium
Maintainer: Debian QA Group
Changed-By: Petter
gpsmanshp_1.2.3-7_source.changes uploaded successfully to localhost
along with the files:
gpsmanshp_1.2.3-7.dsc
gpsmanshp_1.2.3-7.debian.tar.xz
gpsmanshp_1.2.3-7_source.buildinfo
Greetings,
Your Debian queue daemon (running on host usper.debian.org)
On 04/05/2024 13.02, Andreas Beckmann wrote:
I have patched sendmail in order to enable O RejectNUL=True directive,
but I do not achieved the fact to enable it by default.
Andreas could you get a glimpse at how to render RejectNUL a default ?
Second attempt. Completely untested. This should
Thank you for your contribution to Debian.
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Sat, 04 May 2024 16:25:32 +0200
Source: ncdt
Architecture: source
Version: 2.1-6
Distribution: unstable
Urgency: medium
Maintainer: Debian QA Group
Changed-By: Petter Reinhol
ncdt_2.1-6_source.changes uploaded successfully to localhost
along with the files:
ncdt_2.1-6.dsc
ncdt_2.1-6.debian.tar.xz
ncdt_2.1-6_source.buildinfo
Greetings,
Your Debian queue daemon (running on host usper.debian.org)
Thank you for your contribution to Debian.
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Sat, 04 May 2024 16:53:29 +0200
Source: udo
Architecture: source
Version: 6.4.1-8
Distribution: unstable
Urgency: medium
Maintainer: Debian QA Group
Changed-By: Petter Reinho
udo_6.4.1-8_source.changes uploaded successfully to localhost
along with the files:
udo_6.4.1-8.dsc
udo_6.4.1-8.debian.tar.xz
udo_6.4.1-8_source.buildinfo
Greetings,
Your Debian queue daemon (running on host usper.debian.org)
Source: dmitry
X-Debbugs-CC: t...@security.debian.org
Severity: important
Tags: security
Hi,
The following vulnerabilities were published for dmitry.
CVE-2017-7938[0]:
| Stack-based buffer overflow in DMitry (Deepmagic Information
| Gathering Tool) version 1.3a (Unix) allows attackers to cause a
fondu_0.0.20060102-7_source.changes uploaded successfully to localhost
along with the files:
fondu_0.0.20060102-7.dsc
fondu_0.0.20060102-7.debian.tar.xz
fondu_0.0.20060102-7_source.buildinfo
Greetings,
Your Debian queue daemon (running on host usper.debian.org)
Thank you for your contribution to Debian.
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Sat, 04 May 2024 19:48:21 +0200
Source: fondu
Architecture: source
Version: 0.0.20060102-7
Distribution: unstable
Urgency: medium
Maintainer: Debian QA Group
Changed-By: Pett
Processing commands for cont...@bugs.debian.org:
> tags 1070370 + upstream
Bug #1070370 [src:dmitry] dmitry: CVE-2017-7938 CVE-2020-14931 CVE-2024-31837
Added tag(s) upstream.
> found 1070370 1.3a-3
Bug #1070370 [src:dmitry] dmitry: CVE-2017-7938 CVE-2020-14931 CVE-2024-31837
Marked as found in ve
scsitools_0.12-6_source.changes uploaded successfully to localhost
along with the files:
scsitools_0.12-6.dsc
scsitools_0.12-6.debian.tar.xz
scsitools_0.12-6_source.buildinfo
Greetings,
Your Debian queue daemon (running on host usper.debian.org)
Thank you for your contribution to Debian.
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Sat, 04 May 2024 21:09:10 +0200
Source: scsitools
Architecture: source
Version: 0.12-6
Distribution: unstable
Urgency: medium
Maintainer: Debian QA Group
Changed-By: Petter R
Thank you for your contribution to Debian.
Mapping bookworm-backports to stable-backports.
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Sat, 04 May 2024 21:06:29 -0400
Source: gthumb
Architecture: source
Version: 3:3.12.6-1~bpo12+1
Distribution: bookworm-backports
gthumb_3.12.6-1~bpo12+1_source.changes uploaded successfully to localhost
along with the files:
gthumb_3.12.6-1~bpo12+1.dsc
gthumb_3.12.6.orig.tar.xz
gthumb_3.12.6-1~bpo12+1.debian.tar.xz
gthumb_3.12.6-1~bpo12+1_amd64.buildinfo
Greetings,
Your Debian queue daemon (running on host
mintstick 1.6.0-3 is marked for autoremoval from testing on 2024-06-09
It (build-)depends on packages with these RC bugs:
1069904: python3-gnupg: Autopkgtests failed
https://bugs.debian.org/1069904
This mail is generated by:
https://salsa.debian.org/release-team/release-tools/-/blob/master/mai
Thank you for your contribution to Debian.
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Sun, 05 May 2024 08:14:21 +0200
Source: fldiff
Architecture: source
Version: 1.1+0-7
Distribution: unstable
Urgency: medium
Maintainer: Debian QA Group
Changed-By: Petter Rei
fldiff_1.1+0-7_source.changes uploaded successfully to localhost
along with the files:
fldiff_1.1+0-7.dsc
fldiff_1.1+0-7.debian.tar.xz
fldiff_1.1+0-7_source.buildinfo
Greetings,
Your Debian queue daemon (running on host usper.debian.org)
29 matches
Mail list logo