Processed: tagging 1028592

2023-08-04 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> tags 1028592 + ftbfs
Bug #1028592 [src:tagcoll2,src:libwibble] tagcoll2 2.0.14-2 fails to build on 
sid
Added tag(s) ftbfs.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
1028592: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1028592
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#1043033: ghostscript: CVE-2023-38559

2023-08-04 Thread Salvatore Bonaccorso
Source: ghostscript
Version: 10.01.2~dfsg-1
Severity: important
Tags: security upstream
Forwarded: https://bugs.ghostscript.com/show_bug.cgi?id=706897
X-Debbugs-Cc: car...@debian.org, Debian Security Team 
Control: found -1 10.0.0~dfsg-11+deb12u1
Control: found -1 10.0.0~dfsg-11
Control: found -1 9.53.3~dfsg-7+deb11u5
Control: found -1 9.53.3~dfsg-7

Hi,

The following vulnerability was published for ghostscript.

CVE-2023-38559[0]:
| A buffer overflow flaw was found in base/gdevdevn.c:1973 in
| devn_pcx_write_rle() in ghostscript. This issue may allow a local
| attacker to cause a denial of service via outputting a crafted PDF
| file for a DEVN device with gs.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2023-38559
https://www.cve.org/CVERecord?id=CVE-2023-38559
[1] https://bugs.ghostscript.com/show_bug.cgi?id=706897 (private)
[2] 
https://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=d81b82c70bc1fb9991bb95f1201abb5dea55f57f

Regards,
Salvatore



Processed: ghostscript: CVE-2023-38559

2023-08-04 Thread Debian Bug Tracking System
Processing control commands:

> found -1 10.0.0~dfsg-11+deb12u1
Bug #1043033 [src:ghostscript] ghostscript: CVE-2023-38559
Marked as found in versions ghostscript/10.0.0~dfsg-11+deb12u1.
> found -1 10.0.0~dfsg-11
Bug #1043033 [src:ghostscript] ghostscript: CVE-2023-38559
Marked as found in versions ghostscript/10.0.0~dfsg-11.
> found -1 9.53.3~dfsg-7+deb11u5
Bug #1043033 [src:ghostscript] ghostscript: CVE-2023-38559
Marked as found in versions ghostscript/9.53.3~dfsg-7+deb11u5.
> found -1 9.53.3~dfsg-7
Bug #1043033 [src:ghostscript] ghostscript: CVE-2023-38559
Marked as found in versions ghostscript/9.53.3~dfsg-7.

-- 
1043033: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1043033
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Processing of dbus-c++_0.9.0-13_amd64.changes

2023-08-04 Thread Debian FTP Masters
dbus-c++_0.9.0-13_amd64.changes uploaded successfully to localhost
along with the files:
  dbus-c++_0.9.0-13.dsc
  dbus-c++_0.9.0-13.debian.tar.xz
  dbus-c++_0.9.0-13_amd64.buildinfo
  libdbus-c++-1-0v5-dbgsym_0.9.0-13_amd64.deb
  libdbus-c++-1-0v5_0.9.0-13_amd64.deb
  libdbus-c++-bin-dbgsym_0.9.0-13_amd64.deb
  libdbus-c++-bin_0.9.0-13_amd64.deb
  libdbus-c++-dev_0.9.0-13_amd64.deb
  libdbus-c++-doc_0.9.0-13_all.deb
  libdbus-c++-ecore-1-0-dbgsym_0.9.0-13_amd64.deb
  libdbus-c++-ecore-1-0_0.9.0-13_amd64.deb
  libdbus-c++-glib-1-0-dbgsym_0.9.0-13_amd64.deb
  libdbus-c++-glib-1-0_0.9.0-13_amd64.deb

Greetings,

Your Debian queue daemon (running on host usper.debian.org)



dbus-c++_0.9.0-13_amd64.changes REJECTED

2023-08-04 Thread Debian FTP Masters



dbus-c++ source: lintian output: 
'latest-debian-changelog-entry-without-new-date ', automatically rejected 
package.

binary:libdbus-c++-ecore-1-0 is NEW.
binary:libdbus-c++-glib-1-0 is NEW.
binary:libdbus-c++-ecore-1-0 is NEW.
binary:libdbus-c++-glib-1-0 is NEW.

===

Please feel free to respond to this email if you don't understand why
your files were rejected, or if you upload new files which address our
concerns.



Processing of dbus-c++_0.9.0-13_amd64.changes

2023-08-04 Thread Debian FTP Masters
dbus-c++_0.9.0-13_amd64.changes uploaded successfully to localhost
along with the files:
  dbus-c++_0.9.0-13.dsc
  dbus-c++_0.9.0-13.debian.tar.xz
  dbus-c++_0.9.0-13_amd64.buildinfo
  libdbus-c++-1-0v5-dbgsym_0.9.0-13_amd64.deb
  libdbus-c++-1-0v5_0.9.0-13_amd64.deb
  libdbus-c++-bin-dbgsym_0.9.0-13_amd64.deb
  libdbus-c++-bin_0.9.0-13_amd64.deb
  libdbus-c++-dev_0.9.0-13_amd64.deb
  libdbus-c++-doc_0.9.0-13_all.deb
  libdbus-c++-ecore-1-0-dbgsym_0.9.0-13_amd64.deb
  libdbus-c++-ecore-1-0_0.9.0-13_amd64.deb
  libdbus-c++-glib-1-0-dbgsym_0.9.0-13_amd64.deb
  libdbus-c++-glib-1-0_0.9.0-13_amd64.deb

Greetings,

Your Debian queue daemon (running on host usper.debian.org)



dbus-c++_0.9.0-13_amd64.changes is NEW

2023-08-04 Thread Debian FTP Masters
binary:libdbus-c++-ecore-1-0 is NEW.
binary:libdbus-c++-glib-1-0 is NEW.
binary:libdbus-c++-ecore-1-0 is NEW.
binary:libdbus-c++-glib-1-0 is NEW.

Your package has been put into the NEW queue, which requires manual action
from the ftpteam to process. The upload was otherwise valid (it had a good
OpenPGP signature and file hashes are valid), so please be patient.

Packages are routinely processed through to the archive, and do feel
free to browse the NEW queue[1].

If there is an issue with the upload, you will receive an email from a
member of the ftpteam.

If you have any questions, you may reply to this email.

[1]: https://ftp-master.debian.org/new.html
 or https://ftp-master.debian.org/backports-new.html for *-backports



Processed: Re: Bug#1042911: Breaks Emacs 29.1 upgrade: muse-split.el:41:2: Error: Cannot open load file: No such file or directory, assoc

2023-08-04 Thread Debian Bug Tracking System
Processing control commands:

> tags -1 patch
Bug #1042911 [elpa-muse] Breaks Emacs 29.1 upgrade: muse-split.el:41:2: Error: 
Cannot open load file: No such file or directory, assoc
Added tag(s) patch.

-- 
1042911: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1042911
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#1042911: Breaks Emacs 29.1 upgrade: muse-split.el:41:2: Error: Cannot open load file: No such file or directory, assoc

2023-08-04 Thread Manphiz
control: tags -1 patch

Manphiz  writes:

> Nicholas D Steeves  writes:
>
>> Hello,
>>
>> Would you like to fix this RC bug and adopt the package?
>>
>>   https://bugs.debian.org/1042911
>>
>> and the orphan bug is here: #1016558
>>
>> Best,
>> Nicholas
>>
>
> Hi Nicolas,
>
> Thanks for reaching out!  Looks like this was caused by the removal of
> the obsolete "assoc" package in Emacs 29.1 which had been deprecated
> since 24.  I'll try to work on a fix later this week.

Hi Nicholas,

I have now prepared a merge request to migrate away from assoc.el[1] and
also forwarded the patch upstream.  Also set the package as team
maintained and add myself as an upload.  PTAL.  Thanks!

[1] https://salsa.debian.org/emacsen-team/muse-el/-/merge_requests/3

-- 
Manphiz



dmucs is marked for autoremoval from testing

2023-08-04 Thread Debian testing autoremoval watch
dmucs 0.6.1-3 is marked for autoremoval from testing on 2023-08-04

It is affected by these RC bugs:
1037619: dmucs: ftbfs with GCC-13
 https://bugs.debian.org/1037619



This mail is generated by:
https://salsa.debian.org/release-team/release-tools/-/blob/master/mailer/mail_autoremovals.pl

Autoremoval data is generated by:
https://salsa.debian.org/qa/udd/-/blob/master/udd/testing_autoremovals_gatherer.pl



Bug#1037619: marked as done (dmucs: ftbfs with GCC-13)

2023-08-04 Thread Debian Bug Tracking System
Your message dated Sat, 05 Aug 2023 05:49:50 +
with message-id 
and subject line Bug#1037619: fixed in dmucs 0.6.1-4
has caused the Debian Bug report #1037619,
regarding dmucs: ftbfs with GCC-13
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1037619: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1037619
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: src:dmucs
Version: 0.6.1-3
Severity: normal
Tags: sid trixie
User: debian-...@lists.debian.org
Usertags: ftbfs-gcc-13

[This bug is targeted to the upcoming trixie release]

Please keep this issue open in the bug tracker for the package it
was filed for.  If a fix in another package is required, please
file a bug for the other package (or clone), and add a block in this
package. Please keep the issue open until the package can be built in
a follow-up test rebuild.

The package fails to build in a test rebuild on at least amd64 with
gcc-13/g++-13, but succeeds to build with gcc-12/g++-12. The
severity of this report will be raised before the trixie release.

The full build log can be found at:
http://qa-logs.debian.net/2023/05/22/logs/dmucs_0.6.1-3_unstable_gccexp.log
The last lines of the build log are at the end of this report.

To build with GCC 13, either set CC=gcc-13 CXX=g++-13 explicitly,
or install the gcc, g++, gfortran, ... packages from experimental.

  apt-get -t=experimental install g++ 

Common build failures are new warnings resulting in build failures with
-Werror turned on, or new/dropped symbols in Debian symbols files.
For other C/C++ related build failures see the porting guide at
http://gcc.gnu.org/gcc-13/porting_to.html

[...]
cc -g -O2 -ffile-prefix-map=/<>=. -fstack-protector-strong 
-Wformat -Werror=format-security -Wall -O -I./HDR -Wdate-time 
-D_FORTIFY_SOURCE=2  -c -o Svprintf.o Svprintf.c
cc -g -O2 -ffile-prefix-map=/<>=. -fstack-protector-strong 
-Wformat -Werror=format-security -Wall -O -I./HDR -Wdate-time 
-D_FORTIFY_SOURCE=2  -c -o sprt.o sprt.c
cc -g -O2 -ffile-prefix-map=/<>=. -fstack-protector-strong 
-Wformat -Werror=format-security -Wall -O -I./HDR -Wdate-time 
-D_FORTIFY_SOURCE=2  -c -o Smaskwait.o Smaskwait.c
cc -g -O2 -ffile-prefix-map=/<>=. -fstack-protector-strong 
-Wformat -Werror=format-security -Wall -O -I./HDR -Wdate-time 
-D_FORTIFY_SOURCE=2  -c -o Sread.o Sread.c
cc -g -O2 -ffile-prefix-map=/<>=. -fstack-protector-strong 
-Wformat -Werror=format-security -Wall -O -I./HDR -Wdate-time 
-D_FORTIFY_SOURCE=2  -c -o Swait.o Swait.c
cc -g -O2 -ffile-prefix-map=/<>=. -fstack-protector-strong 
-Wformat -Werror=format-security -Wall -O -I./HDR -Wdate-time 
-D_FORTIFY_SOURCE=2  -c -o srmtrblk.o srmtrblk.c
cc -g -O2 -ffile-prefix-map=/<>=. -fstack-protector-strong 
-Wformat -Werror=format-security -Wall -O -I./HDR -Wdate-time 
-D_FORTIFY_SOURCE=2  -c -o Smkskt.o Smkskt.c
cc -g -O2 -ffile-prefix-map=/<>=. -fstack-protector-strong 
-Wformat -Werror=format-security -Wall -O -I./HDR -Wdate-time 
-D_FORTIFY_SOURCE=2  -c -o Sreadbytes.o Sreadbytes.c
cc -g -O2 -ffile-prefix-map=/<>=. -fstack-protector-strong 
-Wformat -Werror=format-security -Wall -O -I./HDR -Wdate-time 
-D_FORTIFY_SOURCE=2  -c -o Swrite.o Swrite.c
cc -g -O2 -ffile-prefix-map=/<>=. -fstack-protector-strong 
-Wformat -Werror=format-security -Wall -O -I./HDR -Wdate-time 
-D_FORTIFY_SOURCE=2  -c -o stpblk.o stpblk.c
cc -g -O2 -ffile-prefix-map=/<>=. -fstack-protector-strong 
-Wformat -Werror=format-security -Wall -O -I./HDR -Wdate-time 
-D_FORTIFY_SOURCE=2  -c -o Sopen.o Sopen.c
cc -g -O2 -ffile-prefix-map=/<>=. -fstack-protector-strong 
-Wformat -Werror=format-security -Wall -O -I./HDR -Wdate-time 
-D_FORTIFY_SOURCE=2  -c -o Srmsrvr.o Srmsrvr.c
cc -g -O2 -ffile-prefix-map=/<>=. -fstack-protector-strong 
-Wformat -Werror=format-security -Wall -O -I./HDR -Wdate-time 
-D_FORTIFY_SOURCE=2  -c -o error.o error.c
cc -g -O2 -ffile-prefix-map=/<>=. -fstack-protector-strong 
-Wformat -Werror=format-security -Wall -O -I./HDR -Wdate-time 
-D_FORTIFY_SOURCE=2  -c -o stpnxt.o stpnxt.c
cc -g -O2 -ffile-prefix-map=/<>=. -fstack-protector-strong 
-Wformat -Werror=format-security -Wall -O -I./HDR -Wdate-time 
-D_FORTIFY_SOURCE=2  -c -o Sopenv.o Sopenv.c
cc -g -O2 -ffile-prefix-map=/<>=. -fstack-protector-strong 
-Wformat -Werror=format-security -Wall -O -I./HDR -Wdate-time 
-D_FORTIFY_SOURCE=2  -c -o Sscanf.o Sscanf.c
cc -g -O2 -ffile-prefix-map=/<>=. -fstack-protector-strong 
-Wformat -Werror=format-security -Wall -O -I./HDR -Wdate-time 
-D_FORTIFY_SOURCE=2  -c -o fopenv.o fopenv.c
cc -g -O2 -ffile-prefix-map=/<>=. -fstack-protector-strong 
-Wf

Processing of dmucs_0.6.1-4_source.changes

2023-08-04 Thread Debian FTP Masters
dmucs_0.6.1-4_source.changes uploaded successfully to localhost
along with the files:
  dmucs_0.6.1-4.dsc
  dmucs_0.6.1-4.debian.tar.xz
  dmucs_0.6.1-4_source.buildinfo

Greetings,

Your Debian queue daemon (running on host usper.debian.org)



dmucs_0.6.1-4_source.changes ACCEPTED into unstable

2023-08-04 Thread Debian FTP Masters
Thank you for your contribution to Debian.



Accepted:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Sat, 05 Aug 2023 05:23:45 +
Source: dmucs
Architecture: source
Version: 0.6.1-4
Distribution: unstable
Urgency: medium
Maintainer: Debian QA Group 
Changed-By: David da Silva Polverari 
Closes: 1037619
Changes:
 dmucs (0.6.1-4) unstable; urgency=medium
 .
   * QA upload.
   * debian/control: bumped Standards-Version to 4.6.2.
   * debian/patches/50_fix-FTBS-GCC-13.patch: added to fix FTBFS with GCC-13.
 (Closes: #1037619)
Checksums-Sha1:
 8b5e52fa97f6dd873225d26646d2ecc4477c3127 1700 dmucs_0.6.1-4.dsc
 7d0b12aca66312b59a26894e21492c231b856f1a 53992 dmucs_0.6.1-4.debian.tar.xz
 f42c30eb326f8980ec6fba2cd7fc075989d98b67 5595 dmucs_0.6.1-4_source.buildinfo
Checksums-Sha256:
 5f8c12676874d786e9350e50ec0f400511f2f0dd6fcdaf38c53b9f0d208145d3 1700 
dmucs_0.6.1-4.dsc
 4c5b4d163c70ecf938c2bb560ae7d1e78d7d96541b9437c9fdcab994ff5a4d58 53992 
dmucs_0.6.1-4.debian.tar.xz
 38643093cb66c981114d4b88415fab4b2b9e245394d0a60867875bed0c92c83b 5595 
dmucs_0.6.1-4_source.buildinfo
Files:
 6721d203f90268d7d7432f299ff1e27e 1700 devel optional dmucs_0.6.1-4.dsc
 7a895dc5851b9d62d534b0fa0a8c04bf 53992 devel optional 
dmucs_0.6.1-4.debian.tar.xz
 9afb7a3321273208f73b7ef3ffd3df4b 5595 devel optional 
dmucs_0.6.1-4_source.buildinfo

-BEGIN PGP SIGNATURE-

iQIzBAEBCAAdFiEEDTUunGhzKyZWj9leHIjoaIRpgN4FAmTN3ekACgkQHIjoaIRp
gN4qzw//Wn5OIj67wU0V+txqVjTgp7DekpccF5dH+h/GX0iqUdaEDIbgqdWW6eMW
SQTmDo7l3rZ9lBw8iIO0ONgUTYQWMVs3SY304Nq8rU44sbRDXPgyxevEzsDN3Jlk
qPvF72gt6dakjU6OIarHBf1yo3A+X9wzRedKYEKABSMyIG32IPN9YRmSgmShzK9r
+FiYBg6WNuwZ9aOYdWDbClZL2t9k2BwB65TC8KNukxdY0LCs5oHAxiJhaoh0FjRR
w1KOHjc1QqK9Me9wSvjPNdyOC+4jSntICLq1yrB4QT9kBjchAHnCUrEbi/ZOxxjL
8wKw0QhWkLQB1GZx1/QdOm35wTw0HTxAhWXznqNWRCKCO2Z/i1NxURvteylEPUD/
6GT/NyWdGASdb+uHyjSiYOu97AxCPPoi02shVbeQUUqjo6/KQEn6LSoq5m266nJK
tqAH2FAYceQjYRfNcNp5J6y8zQ3uZ9+IdrNHwtyy7Qc1PjBUcjB6JWor4TSewido
oMwQ1ye5D/+Y2gYW7ZZi5n+ea++kbBy9j5gyWZ8vEDT82xl9ULYTDxBajbvm67T1
GdlZ+p8hPHJSToT7SdkcWSw1ifBckixXZmAyFCq/UChg3CtKPKXimFAq12SrtfnO
VyGXiHW9/4x4rnxjIY7nZEQO+ZJ/padlkDkKu5LANp9e9c2ONkI=
=4K6C
-END PGP SIGNATURE-