fwsnort_1.6.5-4_amd64.changes ACCEPTED into unstable

2017-05-14 Thread Debian FTP Masters
Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Sun, 14 May 2017 22:57:20 +0200 Source: fwsnort Binary: fwsnort Architecture: source all Version: 1.6.5-4 Distribution: unstable Urgency: medium Maintainer: Debian QA Group Changed-By: Axel Beckert Description: fwsno

Processing of fwsnort_1.6.5-4_amd64.changes

2017-05-14 Thread Debian FTP Masters
fwsnort_1.6.5-4_amd64.changes uploaded successfully to localhost along with the files: fwsnort_1.6.5-4.dsc fwsnort_1.6.5-4.debian.tar.xz fwsnort_1.6.5-4_all.deb fwsnort_1.6.5-4_amd64.buildinfo Greetings, Your Debian queue daemon (running on host usper.debian.org)

Bug#862485: marked as done (fwsnort mustn't set iptables rules when purged)

2017-05-14 Thread Debian Bug Tracking System
Your message dated Sun, 14 May 2017 21:18:36 + with message-id and subject line Bug#862485: fixed in fwsnort 1.6.5-4 has caused the Debian Bug report #862485, regarding fwsnort mustn't set iptables rules when purged to be marked as done. This means that you claim that the problem has been dea

Processed: tagging 862485

2017-05-14 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > tags 862485 + pending Bug #862485 [fwsnort] fwsnort mustn't set iptables rules when purged Added tag(s) pending. > thanks Stopping processing here. Please contact me if you need assistance. -- 862485: http://bugs.debian.org/cgi-bin/bugreport.cgi

Bug#862485: fwsnort mustn't set iptables rules when purged

2017-05-14 Thread Axel Beckert
Axel Beckert wrote: > Point taken. Will move that line (or an "fwsnort --ipt-flush") into a > (to be created) prerm and do another QA upload. (Unless you're already > onto it. Feel free to do that.) Unfortunately "fwsnort --ipt-flush" only flushes the chains but does not remove the chains: # ip

Processed: Set version and tag

2017-05-14 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > found 862556 1.5-6 Bug #862556 [libytnef] heap-buffer-overflow vulnerability in the SIZECHCK There is no source info for the package 'libytnef' at version '1.5-6' with architecture '' Unable to make a source version for version '1.5-6' Marked as

Bug#862556: heap-buffer-overflow vulnerability in the SIZECHCK

2017-05-14 Thread bingosxs
Package: libytnef Version: 1.5-6+deb8u1 Severity: normal Tags: security Hi, We found a heap-buffer-overflow vulnerability in the libytnef. This affects both 1.5-6+deb8u1 and 1.9.1 . The cause is an incorrect boundary checking in SIZECHCK macro in lib/ytnef.c:39 -- #define SIZECHE

Processed: Bring the bug metadata back to a correct state

2017-05-14 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > retitle 784682 systemd unable to boot when snoopy is enabled Bug #784682 [snoopy] "Please backport new version to jessie" Changed Bug title to 'systemd unable to boot when snoopy is enabled' from '"Please backport new version to jessie"'. > sever