Bug#827511: marked as done (hunspell integration Consts obsolete?)

2016-06-18 Thread Debian Bug Tracking System
Your message dated Sun, 19 Jun 2016 05:28:06 + with message-id and subject line Bug#827606: Removed package(s) from unstable has caused the Debian Bug report #827511, regarding hunspell integration Consts obsolete? to be marked as done. This means that

Bug#827502: marked as done (omegat: Recommends libhunspell-1.3-0 but that package no longer exists in Stretch)

2016-06-18 Thread Debian Bug Tracking System
Your message dated Sun, 19 Jun 2016 05:28:06 + with message-id and subject line Bug#827606: Removed package(s) from unstable has caused the Debian Bug report #827502, regarding omegat: Recommends libhunspell-1.3-0 but that package no longer exists in

Bug#737369: marked as done (omegat: We are two years behind upstream. (Has this package been abandoned?))

2016-06-18 Thread Debian Bug Tracking System
Your message dated Sun, 19 Jun 2016 05:28:06 + with message-id and subject line Bug#827606: Removed package(s) from unstable has caused the Debian Bug report #737369, regarding omegat: We are two years behind upstream. (Has this package been abandoned?)

Bug#827606: Removed package(s) from unstable

2016-06-18 Thread Debian FTP Masters
We believe that the bug you reported is now fixed; the following package(s) have been removed from unstable: omegat | 2.3.0.1+dfsg-4 | source, all --- Reason --- ROM; out of date; request of upstream -- Note that

Bug#827607: Removed package(s) from unstable

2016-06-18 Thread Debian FTP Masters
We believe that the bug you reported is now fixed; the following package(s) have been removed from unstable: omegat-plugin-tokenizer | 0.4.2+dfsg-2 | source, all --- Reason --- ROM; out of date; RM of omegat -- Note

Bug#827606: Removed package(s) from unstable

2016-06-18 Thread Debian FTP Masters
Version: 2.3.0.1+dfsg-4+rm Dear submitter, as the package omegat has just been removed from the Debian archive unstable we hereby close the associated bug reports. We are sorry that we couldn't deal with your issue properly. For details on the removal, please see https://bugs.debian.org/827606

Bug#827620: marked as done (netty: CVE-2016-4970: Infinite loop vulnerability when handling renegotiation using SslProvider.OpenSsl)

2016-06-18 Thread Debian Bug Tracking System
Your message dated Sat, 18 Jun 2016 22:25:04 + with message-id and subject line Bug#827620: fixed in netty 1:4.0.37-1 has caused the Debian Bug report #827620, regarding netty: CVE-2016-4970: Infinite loop vulnerability when handling renegotiation using

netty_4.0.37-1_amd64.changes ACCEPTED into unstable

2016-06-18 Thread Debian FTP Masters
Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Sat, 18 Jun 2016 14:45:03 -0700 Source: netty Binary: libnetty-java Architecture: source all Version: 1:4.0.37-1 Distribution: unstable Urgency: high Maintainer: Debian Java Maintainers

Bug#827620: netty: CVE-2016-4970: Infinite loop vulnerability when handling renegotiation using SslProvider.OpenSsl

2016-06-18 Thread tony mancill
On 06/18/2016 11:51 AM, Salvatore Bonaccorso wrote: > Source: netty > Version: 1:4.0.36-2 > Severity: important > Tags: security upstream > > Hi, > > the following vulnerability was published for netty. Can you please > double-check this issue. According the upstream all versions > 4.0.0.Final -

Bug#827577: cronometer: cannot select text in cronometer

2016-06-18 Thread tony mancill
On 06/17/2016 07:23 PM, koanhead wrote: > Package: cronometer > Version: 0.9.9+dfsg-1 > Severity: normal > > Dear Maintainer, > > When attempting to select text in Recipe Editor, Nutrients tab, General tab, > all the data in the table is 'grayed out' and not selectable. This makes it >

Processing of netty_4.0.37-1_amd64.changes

2016-06-18 Thread Debian FTP Masters
netty_4.0.37-1_amd64.changes uploaded successfully to localhost along with the files: netty_4.0.37-1.dsc netty_4.0.37.orig.tar.xz netty_4.0.37-1.debian.tar.xz libnetty-java_4.0.37-1_all.deb Greetings, Your Debian queue daemon (running on host franck.debian.org) __ This is the

h2database_1.4.192-2_source.changes ACCEPTED into unstable

2016-06-18 Thread Debian FTP Masters
Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Sat, 18 Jun 2016 23:41:19 +0200 Source: h2database Binary: libh2-java libh2-java-doc Architecture: source Version: 1.4.192-2 Distribution: unstable Urgency: medium Maintainer: Debian Java Maintainers

Processing of h2database_1.4.192-2_source.changes

2016-06-18 Thread Debian FTP Masters
h2database_1.4.192-2_source.changes uploaded successfully to localhost along with the files: h2database_1.4.192-2.dsc h2database_1.4.192-2.debian.tar.xz Greetings, Your Debian queue daemon (running on host franck.debian.org) __ This is the maintainer address of Debian's Java team

Bug#827620: netty: CVE-2016-4970: Infinite loop vulnerability when handling renegotiation using SslProvider.OpenSsl

2016-06-18 Thread Salvatore Bonaccorso
Source: netty Version: 1:4.0.36-2 Severity: important Tags: security upstream Hi, the following vulnerability was published for netty. Can you please double-check this issue. According the upstream all versions 4.0.0.Final - 4.0.36.Final and 4.1.0.Final would be affected, and fixed in