openrefine 3.7.8-1 MIGRATED to testing

2024-04-11 Thread Debian testing watch
FYI: The status of the openrefine source package in Debian's testing distribution has changed. Previous version: (not in testing) Current version: 3.7.8-1 -- This email is automatically generated once a day. As the installation of new packages into testing happens multiple times a day you

Processed: re: openjfx: FTBFS on arm{el, hf}: /usr/include/features-time64.h:26:5: error: #error "_TIME_BITS=64 is allowed only with _FILE_OFFSET_BITS=64"

2024-04-11 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > Tags 1068159 +patch Bug #1068159 [src:openjfx] openjfx: FTBFS on arm{el,hf}: /usr/include/features-time64.h:26:5: error: #error "_TIME_BITS=64 is allowed only with _FILE_OFFSET_BITS=64" Added tag(s) patch. > Thanks Stopping processing here.

Bug#1068159: openjfx: FTBFS on arm{el, hf}: /usr/include/features-time64.h:26:5: error: #error "_TIME_BITS=64 is allowed only with _FILE_OFFSET_BITS=64"

2024-04-11 Thread Peter Green
Tags 1068159 +patch Thanks The build failure is caused by the following in modules/javafx.media/src/main/native/gstreamer/gstreamer-lite/projects/build/linux/common/config.h > /* Number of bits in a file offset, on hosts where this is settable. */ > #undef _FILE_OFFSET_BITS Looking at the

Processed: notfound 1068806 in 1.5.0dfsg1-2, found 1068806 in 1.5.0+dfsg1-2, tagging 1068806 ...

2024-04-11 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > notfound 1068806 1.5.0dfsg1-2 Bug #1068806 [src:osmo-bts] Update Build-Depends for the time64 library renames The source 'osmo-bts' and version '1.5.0dfsg1-2' do not appear to match any binary packages No longer marked as found in versions

Processed (with 1 error): tagging 1068815, tagging 1068816, tagging 1068817, tagging 168818, tagging 1068820, tagging 1068819 ...

2024-04-11 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > tags 1068815 + upstream Bug #1068815 [src:undertow] undertow: CVE-2023-1973 Added tag(s) upstream. > tags 1068816 + upstream Bug #1068816 [src:undertow] undertow: CVE-2024-1459 Added tag(s) upstream. > tags 1068817 + upstream Bug #1068817

Bug#1068817: undertow: CVE-2024-1635

2024-04-11 Thread Moritz Mühlenhoff
Source: undertow X-Debbugs-CC: t...@security.debian.org Severity: important Tags: security Hi, The following vulnerability was published for undertow. CVE-2024-1635[0]: | A vulnerability was found in Undertow. This vulnerability impacts a | server that supports the wildfly-http-client protocol.

Bug#1068816: undertow: CVE-2024-1459

2024-04-11 Thread Moritz Mühlenhoff
Source: undertow X-Debbugs-CC: t...@security.debian.org Severity: grave Tags: security Hi, The following vulnerability was published for undertow. CVE-2024-1459[0]: | A path traversal vulnerability was found in Undertow. This issue may | allow a remote attacker to append a specially-crafted

Bug#1068815: undertow: CVE-2023-1973

2024-04-11 Thread Moritz Mühlenhoff
Source: undertow X-Debbugs-CC: t...@security.debian.org Severity: important Tags: security Hi, The following vulnerability was published for undertow. CVE-2023-1973[0]: The only reference is at Red Hat: https://bugzilla.redhat.com/show_bug.cgi?id=2185662 If you fix the vulnerability please