Processed: tagging 737951

2020-07-10 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> tags 737951 - moreinfo
Bug #737951 [mdadm] mdadm: udev rules files ignores raid=noautodetect kernel 
parameter
Removed tag(s) moreinfo.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
737951: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=737951
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Processing of m2vrequantiser_1.1-5_source.changes

2020-07-10 Thread Debian FTP Masters
m2vrequantiser_1.1-5_source.changes uploaded successfully to localhost
along with the files:
  m2vrequantiser_1.1-5.dsc
  m2vrequantiser_1.1-5.debian.tar.xz
  m2vrequantiser_1.1-5_source.buildinfo

Greetings,

Your Debian queue daemon (running on host usper.debian.org)



m2vrequantiser_1.1-5_source.changes ACCEPTED into unstable

2020-07-10 Thread Debian FTP Masters



Accepted:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Thu, 11 Jun 2020 11:03:56 -0300
Source: m2vrequantiser
Architecture: source
Version: 1.1-5
Distribution: unstable
Urgency: medium
Maintainer: Debian QA Group 
Changed-By: Fabio Augusto De Muzio Tobich 
Changes:
 m2vrequantiser (1.1-5) unstable; urgency=medium
 .
   * QA upload.
   * debian/control: added 'Rules-Requires-Root: no' to source stanza.
   * debian/copyright: updated packaging years.
   * debian/patches/: updated patches headers.
   * debian/rules:
   - Added DEB_BUILD_MAINT_OPTIONS variable to improve GCC hardening.
   - Removed unnecessary dh argument.
   * debian/tests/control: created to perform trivial CI test.
   * debian/upstream/metadata: created.
   * debian/watch:
   - Bumped version to 4.
   - Improved search regex.
Checksums-Sha1:
 54f6b48cf0658d46c6f5df8f9162bf9cb3dc8d80 1903 m2vrequantiser_1.1-5.dsc
 fb06f21650e49802d3a3a83586cc96bb26741aac 4948 
m2vrequantiser_1.1-5.debian.tar.xz
 1b321cee8e87d9ff93a52f3d51a3605113f044bd 5804 
m2vrequantiser_1.1-5_source.buildinfo
Checksums-Sha256:
 ea2312443bb9cff8ef86a4fe3cc7bd7d0bf3691833a4041cb622df707cdd2559 1903 
m2vrequantiser_1.1-5.dsc
 ef67b57442b3c2f21bb195885390497707e2abc5a54491f595f3fe8b6ff18a53 4948 
m2vrequantiser_1.1-5.debian.tar.xz
 d37ad78f68ffe8d620a5f0ecce08e7620115912e4f0bae5abcf50e7a81c2872c 5804 
m2vrequantiser_1.1-5_source.buildinfo
Files:
 223a9713d810f1c78138a165c87c751e 1903 video optional m2vrequantiser_1.1-5.dsc
 80baa07d53cb4456397839eb71f8e1ab 4948 video optional 
m2vrequantiser_1.1-5.debian.tar.xz
 01af8a006d3b0ba5d0c319c831a6b7e2 5804 video optional 
m2vrequantiser_1.1-5_source.buildinfo

-BEGIN PGP SIGNATURE-

iQIzBAEBCAAdFiEEst7mYDbECCn80PEM/A2xu81GC94FAl8IV68ACgkQ/A2xu81G
C953uw//WqeiWFvMYL7BWiyE671rdK94CWxl+P8xMo1+LzvgEoo3mzR1TCdqSW4F
4QpLnxm8enuyhVVWB511FJ6XTkMZto3BOaVr2HaVnMu0dRReIkNhAL5DLTtp29Sc
Bm3s185xmZLVcgZpWWycPTIOO30hvKyei72K5QVsKKOtglHYtHMuKHDTTZIE81l2
aYIQF31Qd1f3cTpG7BYfsDD64fwwWnb0Jr41ahnLK5vCW6HTdt7GBv+0LUC+pxZN
OZmmVBp4wKjnUYjV6H+GGKaDsGfy8F1A4FTrjbz10RX8ZtshqVuTqV/WJPlvqeqq
Csmdb6CquuF3A3Yx5svIxVfJXiYwo6yvhc3je0jmfqqoO8kMOBsEpEzWQDW55Sco
gwW8L+lx5GcTiW/nH/f5J1cLPbsJ69NKgNmS2l7aObo6Ulu7zx0c8aUuaiQxZn7x
nqVt5XNEeXzgkNNM+EYgLgO1gr1FhYt468I3tniPpZVyCNlbDhCFzmNNqFtthv2J
kGvMAN57uWtt3eLutVnd5h+XWHGckkj+FmZVmuDe3tdQrN0qcUiHiJwx9XhXe/sX
WimhniM9fQ8LFET8ArLToPuxou5ES7KhIopppn8fprlfHrgL3KiO++nX4W9k9qNs
8XCbIiceSN8dEcceQ6KvhGwXlN/MuHRPIAyeVhQcBS7uoFu5bZc=
=CvFk
-END PGP SIGNATURE-


Thank you for your contribution to Debian.



Bug#949393: marked as done (storebackup: CVE-2020-7040: denial of service and symlink attack vector via fixed lockfile path /tmp/storeBackup.lock)

2020-07-10 Thread Debian Bug Tracking System
Your message dated Fri, 10 Jul 2020 15:02:09 +
with message-id 
and subject line Bug#949393: fixed in storebackup 3.2.1-2~deb10u1
has caused the Debian Bug report #949393,
regarding storebackup: CVE-2020-7040: denial of service and symlink attack 
vector via fixed lockfile path /tmp/storeBackup.lock
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
949393: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=949393
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: storebackup
Version: 3.2.1-1
Severity: grave
Tags: security upstream

Hi,

The following vulnerability was published for storebackup.

CVE-2020-7040[0]:
|storeBackup: denial of service and symlink attack vector via fixed
|lockfile path /tmp/storeBackup.lock

The RC severity per se is a bit exagerated for the issue, but given
the package is orphaned we should be careful on including the package
in bullseye.

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2020-7040
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7040
[1] https://www.openwall.com/lists/oss-security/2020/01/20/3
[2] https://bugzilla.suse.com/show_bug.cgi?id=1156767

Regards,
Salvatore
--- End Message ---
--- Begin Message ---
Source: storebackup
Source-Version: 3.2.1-2~deb10u1
Done: Adrian Bunk 

We believe that the bug you reported is fixed in the latest version of
storebackup, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 949...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Adrian Bunk  (supplier of updated storebackup package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Thu, 09 Jul 2020 14:59:51 +0300
Source: storebackup
Architecture: source
Version: 3.2.1-2~deb10u1
Distribution: buster
Urgency: medium
Maintainer: Debian QA Group 
Changed-By: Adrian Bunk 
Closes: 949393
Changes:
 storebackup (3.2.1-2~deb10u1) buster; urgency=medium
 .
   * QA upload.
   * Rebuild for buster.
 .
 storebackup (3.2.1-2) unstable; urgency=medium
 .
   * QA upload.
   * Set maintainer to Debian QA Group. (see #856299)
   * Add patch to change the way the lockfile is opened in the Perl code.
 (Fixes: CVE-2020-7040) (Closes: #949393)
Checksums-Sha1:
 df336890c1d9d6e90c58fc9a39ba2a682956bbdc 1916 storebackup_3.2.1-2~deb10u1.dsc
 faf60740a718a2ad339978e01b015bc9ca350659 8920 
storebackup_3.2.1-2~deb10u1.debian.tar.xz
Checksums-Sha256:
 a156fbed669820fd705074b8730cbf1090eb4d21c05a6976b460296eec9462e6 1916 
storebackup_3.2.1-2~deb10u1.dsc
 45691f54126d53aca02338453a761c2dfbe22c21bf642c6e217f74ff530af339 8920 
storebackup_3.2.1-2~deb10u1.debian.tar.xz
Files:
 afdc74a765f782581dbf156880abea0e 1916 utils optional 
storebackup_3.2.1-2~deb10u1.dsc
 7c5a6d4b803350bca130dc898eea4571 8920 utils optional 
storebackup_3.2.1-2~deb10u1.debian.tar.xz

-BEGIN PGP SIGNATURE-
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=gB2y
-END PGP SIGNATURE End Message ---


Bug#949393: marked as done (storebackup: CVE-2020-7040: denial of service and symlink attack vector via fixed lockfile path /tmp/storeBackup.lock)

2020-07-10 Thread Debian Bug Tracking System
Your message dated Fri, 10 Jul 2020 15:02:32 +
with message-id 
and subject line Bug#949393: fixed in storebackup 3.2.1-2~deb9u1
has caused the Debian Bug report #949393,
regarding storebackup: CVE-2020-7040: denial of service and symlink attack 
vector via fixed lockfile path /tmp/storeBackup.lock
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
949393: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=949393
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: storebackup
Version: 3.2.1-1
Severity: grave
Tags: security upstream

Hi,

The following vulnerability was published for storebackup.

CVE-2020-7040[0]:
|storeBackup: denial of service and symlink attack vector via fixed
|lockfile path /tmp/storeBackup.lock

The RC severity per se is a bit exagerated for the issue, but given
the package is orphaned we should be careful on including the package
in bullseye.

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2020-7040
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7040
[1] https://www.openwall.com/lists/oss-security/2020/01/20/3
[2] https://bugzilla.suse.com/show_bug.cgi?id=1156767

Regards,
Salvatore
--- End Message ---
--- Begin Message ---
Source: storebackup
Source-Version: 3.2.1-2~deb9u1
Done: Adrian Bunk 

We believe that the bug you reported is fixed in the latest version of
storebackup, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 949...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Adrian Bunk  (supplier of updated storebackup package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Thu, 09 Jul 2020 14:54:23 +0300
Source: storebackup
Binary: storebackup
Architecture: source
Version: 3.2.1-2~deb9u1
Distribution: stretch
Urgency: medium
Maintainer: Debian QA Group 
Changed-By: Adrian Bunk 
Description:
 storebackup - fancy compressing managing checksumming deduplicating hard-linkin
Closes: 949393
Changes:
 storebackup (3.2.1-2~deb9u1) stretch; urgency=medium
 .
   * QA upload.
   * Rebuild for stretch.
 .
 storebackup (3.2.1-2) unstable; urgency=medium
 .
   * QA upload.
   * Set maintainer to Debian QA Group. (see #856299)
   * Add patch to change the way the lockfile is opened in the Perl code.
 (Fixes: CVE-2020-7040) (Closes: #949393)
Checksums-Sha1:
 dae8a3ec72893cb4de688e0063276c8dda51cfb3 1912 storebackup_3.2.1-2~deb9u1.dsc
 f2ec33d5ef6d5ff57d3591e3c6f425dd23ce8ec9 8924 
storebackup_3.2.1-2~deb9u1.debian.tar.xz
Checksums-Sha256:
 bd959ebab6f454fcd9ee0ea8d9dbe71f6fadcadee700334456c13f8bc6b2d5b5 1912 
storebackup_3.2.1-2~deb9u1.dsc
 c9a98527d0c1fbb2cdc95c39df297420ae00a3b10670ab83032bb86475260f9c 8924 
storebackup_3.2.1-2~deb9u1.debian.tar.xz
Files:
 068a7551d3a2bccfd0b9933b4349c476 1912 utils optional 
storebackup_3.2.1-2~deb9u1.dsc
 4c1d579c6f40f320c8e48e40f21cca81 8924 utils optional 
storebackup_3.2.1-2~deb9u1.debian.tar.xz

-BEGIN PGP SIGNATURE-

iQIzBAEBCgAdFiEEOvp1f6xuoR0v9F3wiNJCh6LYmLEFAl8HBlgACgkQiNJCh6LY
mLHjbw//Z0OwqqXWC+YtAsOQj+sTCRZkbPx7BMo8jKytO83T25MKSy0J/5kTnDDa
2wyUxKiLZyTIkhkZugcqTnDeuDG/MLBL2JtoSJuWIfLHZi4mfgTkUegVfVBuauXR
nAGnWokOPJY4NcaLaxgRGuRcWvFQEXJ4+erXzv5xuTAfVBfGUuCQntO1FIacrYp7
MVSwKny/J3hy7oskGLHpINZSGgsZZ5lI7cEPNaXnvKYdDnU9i4/8h0DY0gLAy3Jn
/OXm6v4p9BipcfCwPDlmwhsoVQiO3QGRsBx1dar5LancsagxxC57tsVbnCftyOdl
7wAO7YV3OIukurYWHazT84OHgtrrfsjquGxFwLit2R2vk009OS3G5qlwCXhgwhDi
RDoo50P/0sOC0kAxbonWQyo91hTaWCDEwwZ7mE5b+uUkYoiDxSKi7LC9pO+UCb39
ew/vPdNNIe/bNJ5DK/0QBXfFBC8M2uEc3PPjsOR8ATyUixk9BM7DRTBeRMeUW9uh
SI7FYBntkIt0wYA6UBOZsL6Tnk1DZO2MvPWaIVsuTluaQ36JkMDjEv25h9rQI1Kh
Dr5/z5dPE6hsRSl01dJdH0oQ9OXuEW/S8gMiB4M+aN7qPt44uS0mHjpDnwF7osN5
BPZiCcKmo7MIscYk41jPAgmWJBAOvxo8BB1pGWMpv4f0p3esapY=
=l9/x
-END PGP SIGNATURE End Message ---


storebackup_3.2.1-2~deb10u1_source.changes ACCEPTED into proposed-updates->stable-new, proposed-updates

2020-07-10 Thread Debian FTP Masters



Accepted:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Thu, 09 Jul 2020 14:59:51 +0300
Source: storebackup
Architecture: source
Version: 3.2.1-2~deb10u1
Distribution: buster
Urgency: medium
Maintainer: Debian QA Group 
Changed-By: Adrian Bunk 
Closes: 949393
Changes:
 storebackup (3.2.1-2~deb10u1) buster; urgency=medium
 .
   * QA upload.
   * Rebuild for buster.
 .
 storebackup (3.2.1-2) unstable; urgency=medium
 .
   * QA upload.
   * Set maintainer to Debian QA Group. (see #856299)
   * Add patch to change the way the lockfile is opened in the Perl code.
 (Fixes: CVE-2020-7040) (Closes: #949393)
Checksums-Sha1:
 df336890c1d9d6e90c58fc9a39ba2a682956bbdc 1916 storebackup_3.2.1-2~deb10u1.dsc
 faf60740a718a2ad339978e01b015bc9ca350659 8920 
storebackup_3.2.1-2~deb10u1.debian.tar.xz
Checksums-Sha256:
 a156fbed669820fd705074b8730cbf1090eb4d21c05a6976b460296eec9462e6 1916 
storebackup_3.2.1-2~deb10u1.dsc
 45691f54126d53aca02338453a761c2dfbe22c21bf642c6e217f74ff530af339 8920 
storebackup_3.2.1-2~deb10u1.debian.tar.xz
Files:
 afdc74a765f782581dbf156880abea0e 1916 utils optional 
storebackup_3.2.1-2~deb10u1.dsc
 7c5a6d4b803350bca130dc898eea4571 8920 utils optional 
storebackup_3.2.1-2~deb10u1.debian.tar.xz

-BEGIN PGP SIGNATURE-

iQIzBAEBCgAdFiEEOvp1f6xuoR0v9F3wiNJCh6LYmLEFAl8HCj0ACgkQiNJCh6LY
mLF29A//air5pKkMUsXQ7+Sc6qErPc/5i8fNTxZbJkYFFcOid103+xBt6gaSw/4j
cSQqJqlgN1gdgKHzbSwpBckp4F/5z5e2ejiEh2Jdk7pg2kpUR9tZHz41kaAlBOBq
SvXL9JowEzN1y1R4LftN3QAD8+xb9Fyht6JLRvz6rFY5m7QLaqyM6vB2WvqP2pO2
EsVp2wuw+IUveTNxTvRk6FjwwAGobDFZmMGbWTLQS3OzxG8cFwqUh10WvGXsppC0
DebrEvUwyQs/60KvwKFjIT4nJRyQHVTqAB2vtq1F0ofS16Icq9pjVOxGO2meTGZH
y5351dbLf9jKxknB3qNDoGxURy8SC4pIMTKZQsLiWZq87vvoM/Q577X9CvF3jgaI
gKcCC/lVbgRVVRw/CWbkoOxkJnBH/h9a0pS+JkVDR9vHKHPIG5Atu4CV71CiD+Mr
gogjwZnVubMgNdE/sYinydLUjUR9OtIXU3xsjCXNyJbmWiJ6am46BcOB0R1ZUMiW
ZmvvLkKOYjIhsMBCSNkQLmMmxGbp3b46Kh2oANCVFo2loOvhh/H2vbxifF45pFPD
5fkonOJJfGfWO4e8Ig5vlao2AKZAsQMiQdUULLrKY6hBhsaPPN3DW3fucKCrGjPS
6zhmkbRT/DnkBcMVS4TYid9X4vm0hgaeQU+waA5rowbwhDjhg64=
=gB2y
-END PGP SIGNATURE-


Thank you for your contribution to Debian.



storebackup_3.2.1-2~deb9u1_source.changes ACCEPTED into oldstable-proposed-updates->oldstable-new, oldstable-proposed-updates

2020-07-10 Thread Debian FTP Masters



Accepted:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Thu, 09 Jul 2020 14:54:23 +0300
Source: storebackup
Binary: storebackup
Architecture: source
Version: 3.2.1-2~deb9u1
Distribution: stretch
Urgency: medium
Maintainer: Debian QA Group 
Changed-By: Adrian Bunk 
Description:
 storebackup - fancy compressing managing checksumming deduplicating hard-linkin
Closes: 949393
Changes:
 storebackup (3.2.1-2~deb9u1) stretch; urgency=medium
 .
   * QA upload.
   * Rebuild for stretch.
 .
 storebackup (3.2.1-2) unstable; urgency=medium
 .
   * QA upload.
   * Set maintainer to Debian QA Group. (see #856299)
   * Add patch to change the way the lockfile is opened in the Perl code.
 (Fixes: CVE-2020-7040) (Closes: #949393)
Checksums-Sha1:
 dae8a3ec72893cb4de688e0063276c8dda51cfb3 1912 storebackup_3.2.1-2~deb9u1.dsc
 f2ec33d5ef6d5ff57d3591e3c6f425dd23ce8ec9 8924 
storebackup_3.2.1-2~deb9u1.debian.tar.xz
Checksums-Sha256:
 bd959ebab6f454fcd9ee0ea8d9dbe71f6fadcadee700334456c13f8bc6b2d5b5 1912 
storebackup_3.2.1-2~deb9u1.dsc
 c9a98527d0c1fbb2cdc95c39df297420ae00a3b10670ab83032bb86475260f9c 8924 
storebackup_3.2.1-2~deb9u1.debian.tar.xz
Files:
 068a7551d3a2bccfd0b9933b4349c476 1912 utils optional 
storebackup_3.2.1-2~deb9u1.dsc
 4c1d579c6f40f320c8e48e40f21cca81 8924 utils optional 
storebackup_3.2.1-2~deb9u1.debian.tar.xz

-BEGIN PGP SIGNATURE-
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=l9/x
-END PGP SIGNATURE-


Thank you for your contribution to Debian.



Processing of ruli_0.36-1_source.changes

2020-07-10 Thread Debian FTP Masters
ruli_0.36-1_source.changes uploaded successfully to localhost
along with the files:
  ruli_0.36-1.dsc
  ruli_0.36.orig.tar.gz
  ruli_0.36-1.debian.tar.xz
  ruli_0.36-1_amd64.buildinfo

Greetings,

Your Debian queue daemon (running on host usper.debian.org)



Bug#956983: marked as done (aewm: ftbfs with GCC-10)

2020-07-10 Thread Debian Bug Tracking System
Your message dated Fri, 10 Jul 2020 19:33:24 +
with message-id 
and subject line Bug#956983: fixed in aewm 1.3.12-6
has caused the Debian Bug report #956983,
regarding aewm: ftbfs with GCC-10
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
956983: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=956983
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: src:aewm
Version: 1.3.12-5
Severity: normal
Tags: sid bullseye
User: debian-...@lists.debian.org
Usertags: ftbfs-gcc-10

Please keep this issue open in the bug tracker for the package it
was filed for.  If a fix in another package is required, please
file a bug for the other package (or clone), and add a block in this
package. Please keep the issue open until the package can be built in
a follow-up test rebuild.

The package fails to build in a test rebuild on at least amd64 with
gcc-10/g++-10, but succeeds to build with gcc-9/g++-9. The
severity of this report will be raised before the bullseye release,
so nothing has to be done for the buster release.

The full build log can be found at:
http://people.debian.org/~doko/logs/gcc10-20200225/aewm_1.3.12-5_unstable_gcc10.log
The last lines of the build log are at the end of this report.

To build with GCC 10, either set CC=gcc-10 CXX=g++-10 explicitly,
or install the gcc, g++, gfortran, ... packages from experimental.

  apt-get -t=experimental install g++ 

Common build failures are new warnings resulting in build failures with
-Werror turned on, or new/dropped symbols in Debian symbols files.
For other C/C++ related build failures see the porting guide at
http://gcc.gnu.org/gcc-10/porting_to.html

[...]
 from /usr/include/gtk-2.0/gtk/gtkdialog.h:35,
 from /usr/include/gtk-2.0/gtk/gtkaboutdialog.h:32,
 from /usr/include/gtk-2.0/gtk/gtk.h:33,
 from aepanel.c:14:
/usr/include/gtk-2.0/gtk/gtktypeutils.h:236:1: warning: ‘GTypeDebugFlags’ is 
deprecated [-Wdeprecated-declarations]
  236 | voidgtk_type_init   (GTypeDebugFlagsdebug_flags);
  | ^~~~
In file included from /usr/include/glib-2.0/gobject/gobject.h:24,
 from /usr/include/glib-2.0/gobject/gbinding.h:29,
 from /usr/include/glib-2.0/glib-object.h:23,
 from /usr/include/glib-2.0/gio/gioenums.h:28,
 from /usr/include/glib-2.0/gio/giotypes.h:28,
 from /usr/include/glib-2.0/gio/gio.h:26,
 from /usr/include/gtk-2.0/gdk/gdkapplaunchcontext.h:30,
 from /usr/include/gtk-2.0/gdk/gdk.h:32,
 from /usr/include/gtk-2.0/gdk/gdkprivate.h:30,
 from /usr/include/gtk-2.0/gdk/gdkx.h:30,
 from aepanel.c:13:
/usr/include/glib-2.0/gobject/gtype.h:679:1: note: declared here
  679 | {
  | ^
In file included from /usr/include/gtk-2.0/gtk/gtktoolitem.h:31,
 from /usr/include/gtk-2.0/gtk/gtktoolbutton.h:30,
 from /usr/include/gtk-2.0/gtk/gtkmenutoolbutton.h:30,
 from /usr/include/gtk-2.0/gtk/gtk.h:126,
 from aemenu.c:9:
/usr/include/gtk-2.0/gtk/gtktooltips.h:73:3: warning: ‘GTimeVal’ is deprecated: 
Use 'GDateTime' instead [-Wdeprecated-declarations]
   73 |   GTimeVal last_popdown;
  |   ^~~~
In file included from /usr/include/glib-2.0/glib/galloca.h:32,
 from /usr/include/glib-2.0/glib.h:30,
 from /usr/include/glib-2.0/gobject/gbinding.h:28,
 from /usr/include/glib-2.0/glib-object.h:23,
 from /usr/include/glib-2.0/gio/gioenums.h:28,
 from /usr/include/glib-2.0/gio/giotypes.h:28,
 from /usr/include/glib-2.0/gio/gio.h:26,
 from /usr/include/gtk-2.0/gdk/gdkapplaunchcontext.h:30,
 from /usr/include/gtk-2.0/gdk/gdk.h:32,
 from /usr/include/gtk-2.0/gtk/gtk.h:32,
 from aemenu.c:9:
/usr/include/glib-2.0/glib/gtypes.h:551:8: note: declared here
  551 | struct _GTimeVal
  |^
In file included from /usr/include/gtk-2.0/gtk/gtktoolitem.h:31,
 from /usr/include/gtk-2.0/gtk/gtktoolbutton.h:30,
 from /usr/include/gtk-2.0/gtk/gtkmenutoolbutton.h:30,
 from /usr/include/gtk-2.0/gtk/gtk.h:126,
 from aepanel.c:14:
/usr/include/gtk-2.0/gtk/gtktooltips.h:73:3: warning: ‘GTimeVal’ is deprecated: 
Use 'GDateTime' instead [-Wdeprecated-declarations]
   73 |   GTimeVal last_popdown;
  |   ^~~~
In file included from /u

Processing of aewm_1.3.12-6_source.changes

2020-07-10 Thread Debian FTP Masters
aewm_1.3.12-6_source.changes uploaded successfully to localhost
along with the files:
  aewm_1.3.12-6.dsc
  aewm_1.3.12-6.debian.tar.xz
  aewm_1.3.12-6_amd64.buildinfo

Greetings,

Your Debian queue daemon (running on host usper.debian.org)



aewm_1.3.12-6_source.changes ACCEPTED into unstable

2020-07-10 Thread Debian FTP Masters



Accepted:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Fri, 10 Jul 2020 19:58:05 +0100
Source: aewm
Architecture: source
Version: 1.3.12-6
Distribution: unstable
Urgency: medium
Maintainer: Debian QA Group 
Changed-By: Sudip Mukherjee 
Closes: 956983
Changes:
 aewm (1.3.12-6) unstable; urgency=medium
 .
   * QA upload.
   * Fix ftbfs with GCC-10. (Closes: #956983)
   * Update compat level to 13.
Checksums-Sha1:
 06b826c55b76e749ceb7c3d47dbb6a7d1f81e68e 1926 aewm_1.3.12-6.dsc
 a146c97c70e01b83ca588992301faa4e68c1f95a 7856 aewm_1.3.12-6.debian.tar.xz
 22652fcd91d8a4c81b6a0318bb8acbf8f8c9e9a4 10749 aewm_1.3.12-6_amd64.buildinfo
Checksums-Sha256:
 b1f8f779c56e3390e04bae6564f03a7ca8fcced12f8968144d9a682bd4c96435 1926 
aewm_1.3.12-6.dsc
 6dba06f299c3cc70e179aebafd95d4f578e6a64f433bb35f52fdb3974198e616 7856 
aewm_1.3.12-6.debian.tar.xz
 ffe803479dbe26e39f5c44c8bc6c6ecaa564da3ada43d7519f2630051305e4d9 10749 
aewm_1.3.12-6_amd64.buildinfo
Files:
 8db1b11abb903a0cf9865f57e769ead8 1926 x11 optional aewm_1.3.12-6.dsc
 37179d0ea000a1066a367a96360901f5 7856 x11 optional aewm_1.3.12-6.debian.tar.xz
 c0d91397e1acfda2d074e498fc96549b 10749 x11 optional 
aewm_1.3.12-6_amd64.buildinfo

-BEGIN PGP SIGNATURE-
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=Iv+o
-END PGP SIGNATURE-


Thank you for your contribution to Debian.



ruli_0.36-1_source.changes ACCEPTED into unstable

2020-07-10 Thread Debian FTP Masters



Accepted:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Fri, 10 Jul 2020 15:01:10 -0400
Source: ruli
Architecture: source
Version: 0.36-1
Distribution: unstable
Urgency: medium
Maintainer: Debian QA Group 
Changed-By: Boyuan Yang 
Changes:
 ruli (0.36-1) unstable; urgency=medium
 .
   * QA upload.
   * New upstream release.
   * debian/rules: Use dh sequencer.
   * debian/watch: Update and use version 4.
   * debian/: Apply "wrap-and-sort -abst".
   * debian/source/format: Use "3.0 (quilt)".
Checksums-Sha1:
 95217b8dec554a76ab021642a130ca2504bd5143 1920 ruli_0.36-1.dsc
 c16714a4bd9dbb89985850267ed04ffce9f16d85 128290 ruli_0.36.orig.tar.gz
 c973f335b67de0da200fbedf5ce550d729c15760 3968 ruli_0.36-1.debian.tar.xz
 b549b9779fe512d760547c63d957df1a94e2eeab 6460 ruli_0.36-1_amd64.buildinfo
Checksums-Sha256:
 a8a56fbf5ef8e92e0e59d1610d8cf211b05fbda40f2c7caaf26ab57d811226b5 1920 
ruli_0.36-1.dsc
 11d32def5b514748fbd9ea8c88049ae99e1bb358efc74eb91a4d268a3999dbfa 128290 
ruli_0.36.orig.tar.gz
 15521acc08b11560f19f5b80425346f60e689dc5561f9a6e746d851b10c22b5c 3968 
ruli_0.36-1.debian.tar.xz
 c4d93c94d652bd4d561596df5fcb0215b816f2dac6e3f96b62c43fb8fa4c7938 6460 
ruli_0.36-1_amd64.buildinfo
Files:
 3a7373226c786169fdffd997cd03d9f9 1920 libs optional ruli_0.36-1.dsc
 e73fbfdeadddb68a703a70cea5271468 128290 libs optional ruli_0.36.orig.tar.gz
 0dc65fb0e22ee1432b3c52215c74e147 3968 libs optional ruli_0.36-1.debian.tar.xz
 71c69cbd343c54809a3b0cfd0c73448b 6460 libs optional ruli_0.36-1_amd64.buildinfo

-BEGIN PGP SIGNATURE-
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=xYy7
-END PGP SIGNATURE-


Thank you for your contribution to Debian.



Bug#957106: marked as done (cpu: ftbfs with GCC-10)

2020-07-10 Thread Debian Bug Tracking System
Your message dated Fri, 10 Jul 2020 20:49:30 +
with message-id 
and subject line Bug#957106: fixed in cpu 1.4.3-13
has caused the Debian Bug report #957106,
regarding cpu: ftbfs with GCC-10
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
957106: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=957106
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: src:cpu
Version: 1.4.3-12
Severity: normal
Tags: sid bullseye
User: debian-...@lists.debian.org
Usertags: ftbfs-gcc-10

Please keep this issue open in the bug tracker for the package it
was filed for.  If a fix in another package is required, please
file a bug for the other package (or clone), and add a block in this
package. Please keep the issue open until the package can be built in
a follow-up test rebuild.

The package fails to build in a test rebuild on at least amd64 with
gcc-10/g++-10, but succeeds to build with gcc-9/g++-9. The
severity of this report will be raised before the bullseye release,
so nothing has to be done for the buster release.

The full build log can be found at:
http://people.debian.org/~doko/logs/gcc10-20200225/cpu_1.4.3-12_unstable_gcc10.log
The last lines of the build log are at the end of this report.

To build with GCC 10, either set CC=gcc-10 CXX=g++-10 explicitly,
or install the gcc, g++, gfortran, ... packages from experimental.

  apt-get -t=experimental install g++ 

Common build failures are new warnings resulting in build failures with
-Werror turned on, or new/dropped symbols in Debian symbols files.
For other C/C++ related build failures see the porting guide at
http://gcc.gnu.org/gcc-10/porting_to.html

[...]
libtool: link: gcc -shared  -fPIC -DPIC  .libs/bitvector.o .libs/getopt.o 
.libs/getopt1.o .libs/xmem.o .libs/helper.o .libs/cgetpwent.o 
.libs/parseconfig.o .libs/dll.o .libs/base64.o .libs/md5.o .libs/sha1.o 
.libs/hash.o .libs/fileaction.o .libs/parser.o   -lldap -llber -lcrack -lcrypt 
-ldl  -g -O2 -fstack-protector-strong -Wl,-z -Wl,relro -Wl,-z -Wl,now   
-Wl,-soname -Wl,libcputil.so.0 -o .libs/libcputil.so.0.0.0
libtool: link: (cd ".libs" && rm -f "libcputil.so.0" && ln -s 
"libcputil.so.0.0.0" "libcputil.so.0")
libtool: link: (cd ".libs" && rm -f "libcputil.so" && ln -s 
"libcputil.so.0.0.0" "libcputil.so")
libtool: link: ar cr .libs/libcputil.a  bitvector.o getopt.o getopt1.o xmem.o 
helper.o cgetpwent.o parseconfig.o dll.o base64.o md5.o sha1.o hash.o 
fileaction.o parser.o
libtool: link: ranlib .libs/libcputil.a
libtool: link: ( cd ".libs" && rm -f "libcputil.la" && ln -s "../libcputil.la" 
"libcputil.la" )
make[4]: Leaving directory '/<>/src/util'
make[3]: Leaving directory '/<>/src/util'
Making all in main
make[3]: Entering directory '/<>/src/main'
Making all in .
make[4]: Entering directory '/<>/src/main'
gcc -DHAVE_CONFIG_H -I. -I../../src/include   -Wdate-time -D_FORTIFY_SOURCE=2 
-DCONFIGFILE=\"/etc/cpu/cpu.conf\" -g -O2 -fdebug-prefix-map=/<>=. 
-fstack-protector-strong -Wformat -Werror=format-security -DLDAP_DEPRECATED -w 
-c -o cpu.o cpu.c
/bin/bash ../../libtool  --tag=CC   --mode=link gcc 
-DCONFIGFILE=\"/etc/cpu/cpu.conf\" -g -O2 -fdebug-prefix-map=/<>=. 
-fstack-protector-strong -Wformat -Werror=format-security -DLDAP_DEPRECATED -w  
-Wl,-z,relro -Wl,-z,now -o cpu cpu.o ../../src/util/libcputil.la -lldap -llber 
-lcrack -lcrypt -ldl 
libtool: link: gcc -DCONFIGFILE=\"/etc/cpu/cpu.conf\" -g -O2 
-fdebug-prefix-map=/<>=. -fstack-protector-strong -Wformat 
-Werror=format-security -DLDAP_DEPRECATED -w -Wl,-z -Wl,relro -Wl,-z -Wl,now -o 
.libs/cpu cpu.o  ../../src/util/.libs/libcputil.so -lldap -llber -lcrack 
-lcrypt -ldl
make[4]: Leaving directory '/<>/src/main'
make[3]: Leaving directory '/<>/src/main'
Making all in plugins
make[3]: Entering directory '/<>/src/plugins'
Making all in .
make[4]: Entering directory '/<>/src/plugins'
make[4]: Nothing to be done for 'all-am'.
make[4]: Leaving directory '/<>/src/plugins'
Making all in ldap
make[4]: Entering directory '/<>/src/plugins/ldap'
Making all in .
make[5]: Entering directory '/<>/src/plugins/ldap'
/bin/bash ../../../libtool  --tag=CC   --mode=compile gcc -DHAVE_CONFIG_H -I. 
-I../../../src/include   -Wdate-time -D_FORTIFY_SOURCE=2  -g -O2 
-fdebug-prefix-map=/<>=. -fstack-protector-strong -Wformat 
-Werror=format-security -DLDAP_DEPRECATED -w -c -o ldap_errors.lo ldap_errors.c
/bin/bash ../../../libtool  --tag=CC   --mode=compile gcc -DHAVE_CONFIG_H -I. 
-I../../../src/include   -Wdate-time -D_FORTIFY_SOURCE=2  -g -O2 
-fdebug-prefix-map=/<>=. -fstack-protector-strong -Wformat 
-Werror=format-security -DLDAP_

Processing of cpu_1.4.3-13_source.changes

2020-07-10 Thread Debian FTP Masters
cpu_1.4.3-13_source.changes uploaded successfully to localhost
along with the files:
  cpu_1.4.3-13.dsc
  cpu_1.4.3-13.debian.tar.xz
  cpu_1.4.3-13_amd64.buildinfo

Greetings,

Your Debian queue daemon (running on host usper.debian.org)



cpu_1.4.3-13_source.changes ACCEPTED into unstable

2020-07-10 Thread Debian FTP Masters



Accepted:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Fri, 10 Jul 2020 21:12:27 +0100
Source: cpu
Architecture: source
Version: 1.4.3-13
Distribution: unstable
Urgency: medium
Maintainer: Debian QA Group 
Changed-By: Sudip Mukherjee 
Closes: 957106
Changes:
 cpu (1.4.3-13) unstable; urgency=medium
 .
   * QA upload.
 .
   [ Ondřej Nový ]
   * d/changelog: Remove trailing whitespaces
   * d/control: Remove trailing whitespaces
   * d/watch: Use https protocol
 .
   [ Debian Janitor ]
   * Trim trailing whitespace.
   * Bump debhelper from old 9 to 12.
   * Set upstream metadata fields: Archive, Bug-Submit.
   * Drop unnecessary dependency on dh-autoconf.
   * Drop unnecessary dh arguments: --parallel
 .
   [ Sudip Mukherjee ]
   * Fix ftbfs with GCC-10. (Closes: #957106)
   * Update Standards-Version to 4.5.0
   * Update compat level to 13.
Checksums-Sha1:
 81510431af7d4386f711fcc0d05acb16c8193149 1803 cpu_1.4.3-13.dsc
 2c2aa32493abc9339aa11f117103ad7387bc006e 29520 cpu_1.4.3-13.debian.tar.xz
 598f04a7434e3e04350ee2be35968a0b41fa40e4 5991 cpu_1.4.3-13_amd64.buildinfo
Checksums-Sha256:
 e8b8dcc5c38c53cf5b21a8072635683b67f9e1b652536563fccead0328e577c5 1803 
cpu_1.4.3-13.dsc
 3ee197ae84d6bf84417043689293a9ae31b2dc5d104451789a1bfd31e3843070 29520 
cpu_1.4.3-13.debian.tar.xz
 8962487fdeb936aafe6499bccc58a4de80c0ef451132d548ee3da133f831f1f6 5991 
cpu_1.4.3-13_amd64.buildinfo
Files:
 b778babde173401244266db629d12c95 1803 admin optional cpu_1.4.3-13.dsc
 8ce5784612a486d77b9109618411812b 29520 admin optional 
cpu_1.4.3-13.debian.tar.xz
 64dc4ff227e72e5979dc6f8a754af6d8 5991 admin optional 
cpu_1.4.3-13_amd64.buildinfo

-BEGIN PGP SIGNATURE-
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=qiH5
-END PGP SIGNATURE-


Thank you for your contribution to Debian.



Processing of sgml-spell-checker_0.0.20040919-5_source.changes

2020-07-10 Thread Debian FTP Masters
sgml-spell-checker_0.0.20040919-5_source.changes uploaded successfully to 
localhost
along with the files:
  sgml-spell-checker_0.0.20040919-5.dsc
  sgml-spell-checker_0.0.20040919-5.debian.tar.xz
  sgml-spell-checker_0.0.20040919-5_source.buildinfo

Greetings,

Your Debian queue daemon (running on host usper.debian.org)



sgml-spell-checker_0.0.20040919-5_source.changes REJECTED

2020-07-10 Thread Debian FTP Masters



sgml-spell-checker_0.0.20040919-5.dsc: Invalid size hash for 
sgml-spell-checker_0.0.20040919.orig.tar.gz:
According to the control file the size hash should be 27431,
but sgml-spell-checker_0.0.20040919.orig.tar.gz has 27339.

If you did not include sgml-spell-checker_0.0.20040919.orig.tar.gz in your 
upload, a different version
might already be known to the archive software.



===

Please feel free to respond to this email if you don't understand why
your files were rejected, or if you upload new files which address our
concerns.



Processing of sgml-spell-checker_0.0.20040919-5_source.changes

2020-07-10 Thread Debian FTP Masters
sgml-spell-checker_0.0.20040919-5_source.changes uploaded successfully to 
localhost
along with the files:
  sgml-spell-checker_0.0.20040919-5.dsc
  sgml-spell-checker_0.0.20040919-5.debian.tar.xz
  sgml-spell-checker_0.0.20040919-5_source.buildinfo

Greetings,

Your Debian queue daemon (running on host usper.debian.org)



sgml-spell-checker_0.0.20040919-5_source.changes ACCEPTED into unstable

2020-07-10 Thread Debian FTP Masters



Accepted:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Fri, 12 Jun 2020 17:55:46 -0300
Source: sgml-spell-checker
Architecture: source
Version: 0.0.20040919-5
Distribution: unstable
Urgency: medium
Maintainer: Debian QA Group 
Changed-By: Jair Reis 
Changes:
 sgml-spell-checker (0.0.20040919-5) unstable; urgency=medium
 .
   * QA upload.
   * debian/control: added the Vcs-* fields and URLs of the salsa.debian.org.
   * debian/salsa-ci.yml: added to provide CI tests for Salsa.
Checksums-Sha1:
 ccf9bb19b1a6c05bbe606633519bdffa2c54808d 2058 
sgml-spell-checker_0.0.20040919-5.dsc
 fd6fcc1e5381709ca605a915bc7824181b083ff7 2960 
sgml-spell-checker_0.0.20040919-5.debian.tar.xz
 423a9a70526ddeca8516d4a2acbf209334855633 5145 
sgml-spell-checker_0.0.20040919-5_source.buildinfo
Checksums-Sha256:
 37d1dc499dc383a4bf675de4cbde4a80c03531df697a648a9478b1e53c11db74 2058 
sgml-spell-checker_0.0.20040919-5.dsc
 864d93550492e875f1aabdd1a12de4a616122736e79b7cbcd23fd69b93c7079e 2960 
sgml-spell-checker_0.0.20040919-5.debian.tar.xz
 d0a626685911d3beaffede4505041a8156380f58b08af62abd428610bfd0d7b8 5145 
sgml-spell-checker_0.0.20040919-5_source.buildinfo
Files:
 69b766d8d9256f155b6e5c6d311d912b 2058 text optional 
sgml-spell-checker_0.0.20040919-5.dsc
 19a847eee99dd9a873fa9fbff8740788 2960 text optional 
sgml-spell-checker_0.0.20040919-5.debian.tar.xz
 9908a3772d2b3868a8044494137bbe76 5145 text optional 
sgml-spell-checker_0.0.20040919-5_source.buildinfo

-BEGIN PGP SIGNATURE-
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=lZtk
-END PGP SIGNATURE-


Thank you for your contribution to Debian.