Bug#724713: (no subject)

2013-10-10 Thread Rebecca N. Palmer
The Breaks: is correct; the problem is known upstream (http://bugs.jython.org/issue2087), but there is currently no fix. If you're trying to rebuild sikuli for the opencv2.4 transition, you might want to use testing-proposed-updates (http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=712615#45).

Bug#705468: marked as done (libytnef: Buffer overflow (CVE-2010-5109))

2013-10-10 Thread Debian Bug Tracking System
Your message dated Thu, 10 Oct 2013 12:48:28 + with message-id and subject line Bug#705468: fixed in libytnef 1.5-5 has caused the Debian Bug report #705468, regarding libytnef: Buffer overflow (CVE-2010-5109) to be marked as done. This means that you claim that the problem has been dealt wit

libytnef_1.5-5_amd64.changes ACCEPTED into unstable

2013-10-10 Thread Debian FTP Masters
Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Thu, 10 Oct 2013 14:16:21 +0200 Source: libytnef Binary: libytnef0 libytnef0-dev Architecture: source amd64 Version: 1.5-5 Distribution: unstable Urgency: low Maintainer: Debian QA Group Changed-By: Matthias Klose Descr

Processing of libytnef_1.5-5_amd64.changes

2013-10-10 Thread Debian FTP Masters
libytnef_1.5-5_amd64.changes uploaded successfully to localhost along with the files: libytnef_1.5-5.dsc libytnef_1.5-5.debian.tar.gz libytnef0_1.5-5_amd64.deb libytnef0-dev_1.5-5_amd64.deb Greetings, Your Debian queue daemon (running on host franck.debian.org) -- To UNSUBSCRIB