Processed: severity of 772648 is serious

2014-12-09 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > # we plan to release a DSA for this issue, so the fix should go also into > Jessie. Thorsten prepared an update for wheezy-security > severity 772648 serious Bug #772648 [graphviz] graphviz: format string vulnerability (CVE-2014-9157) Severity se

Processed: tagging 772648

2014-12-09 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > tags 772648 + security Bug #772648 [graphviz] graphviz: format string vulnerability (CVE-2014-9157) Ignoring request to alter tags of bug #772648 to the same tags previously set > thanks Stopping processing here. Please contact me if you need ass

Processed: owner 772648

2014-12-09 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > owner 772648 ! Bug #772648 [graphviz] graphviz: format string vulnerability (CVE-2014-9157) Owner recorded as Maxime Chatelle . > thanks Stopping processing here. Please contact me if you need assistance. -- 772648: http://bugs.debian.org/cgi-bi

Processed: tagging 772648

2014-12-09 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > tags 772648 + patch upstream fixed-upstream security Bug #772648 [graphviz] graphviz: format string vulnerability (CVE-2014-9157) Added tag(s) upstream, security, and fixed-upstream. > thanks Stopping processing here. Please contact me if you nee

Processed: found 772648 in 2.26.3-14

2014-12-09 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > found 772648 2.26.3-14 Bug #772648 [graphviz] graphviz: format string vulnerability (CVE-2014-9157) Marked as found in versions graphviz/2.26.3-14. > thanks Stopping processing here. Please contact me if you need assistance. -- 772648: http://bu

changetrack_4.7-3_amd64.changes ACCEPTED into experimental

2014-12-09 Thread Debian FTP Masters
Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Tue, 09 Dec 2014 11:18:02 -0200 Source: changetrack Binary: changetrack Architecture: source all Version: 4.7-3 Distribution: experimental Urgency: low Maintainer: Debian QA Group Changed-By: Joao Pedro Avelino Lara Des

Processing of changetrack_4.7-3_amd64.changes

2014-12-09 Thread Debian FTP Masters
changetrack_4.7-3_amd64.changes uploaded successfully to localhost along with the files: changetrack_4.7-3.dsc changetrack_4.7-3.debian.tar.xz changetrack_4.7-3_all.deb Greetings, Your Debian queue daemon (running on host franck.debian.org) -- To UNSUBSCRIBE, email to debian-qa-p

Processing of changetrack_4.7-3_amd64.changes

2014-12-09 Thread Debian FTP Masters
changetrack_4.7-3_all.deb has incorrect size; deleting it Greetings, Your Debian queue daemon (running on host franck.debian.org) -- To UNSUBSCRIBE, email to debian-qa-packages-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org Archiv

Bug#772658: proll: build-depends on sparc-utils

2014-12-09 Thread Ralf Treinen
Source: proll Version: 18-6 Severity: serious Tags: jessie User: trei...@debian.org Usertags: edos-uninstallable Hi, proll build-depends on sparc-utils, which does not exist in jessie (it was removed from testing on 2014-04-27). -Ralf. -- To UNSUBSCRIBE, email to debian-qa-packages-requ...@li

Bug#772648: graphviz: format string vulnerability (CVE-2014-9157)

2014-12-09 Thread Marc Deslauriers
Package: graphviz Version: 2.38.0-6 Severity: normal Tags: patch User: ubuntu-de...@lists.ubuntu.com Usertags: origin-ubuntu vivid ubuntu-patch *** /tmp/tmp5q_TKj/bug_body In Ubuntu, the attached patch was applied to achieve the following: * SECURITY UPDATE: Format string vulnerability may a

Zitzakken en beanbags voor Kerstmis!

2014-12-09 Thread Barbara van Zitzak King
Deze email nieuwsbrief werd in grafisch HTML formaat verzonden. Als u deze tekstversie ziet, verkiest uw email programma "gewone tekst" emails. U kan de originele nieuwsbrief online bekijken: http://sendmail.itdude.be/