wvdial_1.61-6_source.changes ACCEPTED into unstable

2022-02-07 Thread Debian FTP Masters
Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Sun, 06 Feb 2022 20:38:20 -0300 Source: wvdial Architecture: source Version: 1.61-6 Distribution: unstable Urgency: medium Maintainer: Debian QA Group Changed-By: Joao Eriberto Mota Filho Changes: wvdial (1.61-6) un

Processing of wvdial_1.61-6_source.changes

2022-02-07 Thread Debian FTP Masters
wvdial_1.61-6_source.changes uploaded successfully to localhost along with the files: wvdial_1.61-6.dsc wvdial_1.61-6.debian.tar.xz wvdial_1.61-6_source.buildinfo Greetings, Your Debian queue daemon (running on host usper.debian.org)

Benachrichtigung

2022-02-07 Thread packages
Hallo! Wie Sie vielleicht bemerkt haben, habe ich Ihnen eine E-Mail von Ihrem Konto gesendet. Das bedeutet, dass ich vollen Zugriff auf Ihr Konto habe. Ich beobachte dich jetzt seit einigen Monaten. Tatsache ist, dass Sie über eine Website für Erwachsene, die Sie besucht haben, mit Njrat infizier

Bug#1004933: Removed package(s) from unstable

2022-02-07 Thread Debian FTP Masters
Version: 1.9+srconly-3+rm Dear submitter, as the package gif2apng has just been removed from the Debian archive unstable we hereby close the associated bug reports. We are sorry that we couldn't deal with your issue properly. For details on the removal, please see https://bugs.debian.org/100493

Bug#1004933: Removed package(s) from unstable

2022-02-07 Thread Debian FTP Masters
We believe that the bug you reported is now fixed; the following package(s) have been removed from unstable: gif2apng | 1.9+srconly-3 | source, amd64, arm64, armel, armhf, i386, mips64el, mipsel, ppc64el, s390x --- Reason --- RoQA; dead upstream, open security i

Bug#1002687: marked as done (gif2apng: CVE-2021-45911: Heap based buffer overflow in processing of delays in the main function)

2022-02-07 Thread Debian Bug Tracking System
Your message dated Mon, 07 Feb 2022 21:43:10 + with message-id and subject line Bug#1004933: Removed package(s) from unstable has caused the Debian Bug report #1002687, regarding gif2apng: CVE-2021-45911: Heap based buffer overflow in processing of delays in the main function to be marked as

Bug#932931: marked as done (gif2apng FTCBFS: uses the build architecture compiler)

2022-02-07 Thread Debian Bug Tracking System
Your message dated Mon, 07 Feb 2022 21:43:10 + with message-id and subject line Bug#1004933: Removed package(s) from unstable has caused the Debian Bug report #932931, regarding gif2apng FTCBFS: uses the build architecture compiler to be marked as done. This means that you claim that the prob

Bug#1002668: marked as done (gif2apng: CVE-2021-45909: Heap based buffer overflow in the DecodeLZW function)

2022-02-07 Thread Debian Bug Tracking System
Your message dated Mon, 07 Feb 2022 21:43:10 + with message-id and subject line Bug#1004933: Removed package(s) from unstable has caused the Debian Bug report #1002668, regarding gif2apng: CVE-2021-45909: Heap based buffer overflow in the DecodeLZW function to be marked as done. This means t

Bug#1002669: marked as done (gif2apng: CVE-2021-45907 CVE-2021-45908: Two stack based buffer overflows in the DecodeLZW function)

2022-02-07 Thread Debian Bug Tracking System
Your message dated Mon, 07 Feb 2022 21:43:10 + with message-id and subject line Bug#1004933: Removed package(s) from unstable has caused the Debian Bug report #1002669, regarding gif2apng: CVE-2021-45907 CVE-2021-45908: Two stack based buffer overflows in the DecodeLZW function to be marked a

Bug#1002667: marked as done (gif2apng: CVE-2021-45910: Heap based buffer overflow in the main function)

2022-02-07 Thread Debian Bug Tracking System
Your message dated Mon, 07 Feb 2022 21:43:10 + with message-id and subject line Bug#1004933: Removed package(s) from unstable has caused the Debian Bug report #1002667, regarding gif2apng: CVE-2021-45910: Heap based buffer overflow in the main function to be marked as done. This means that y

Bug#1002621: marked as done (gif2apng: Stack based overflow in the handling of input and output file name)

2022-02-07 Thread Debian Bug Tracking System
Your message dated Mon, 07 Feb 2022 21:43:10 + with message-id and subject line Bug#1004933: Removed package(s) from unstable has caused the Debian Bug report #1002621, regarding gif2apng: Stack based overflow in the handling of input and output file name to be marked as done. This means tha

delta_2006.08.03-11_source.changes ACCEPTED into unstable

2022-02-07 Thread Debian FTP Masters
Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Mon, 07 Feb 2022 16:41:42 -0300 Source: delta Architecture: source Version: 2006.08.03-11 Distribution: unstable Urgency: medium Maintainer: Debian QA Group Changed-By: Joao Eriberto Mota Filho Closes: 1005138 Change

Processing of delta_2006.08.03-11_source.changes

2022-02-07 Thread Debian FTP Masters
delta_2006.08.03-11_source.changes uploaded successfully to localhost along with the files: delta_2006.08.03-11.dsc delta_2006.08.03-11.debian.tar.xz delta_2006.08.03-11_source.buildinfo Greetings, Your Debian queue daemon (running on host usper.debian.org)

Bug#1005138: marked as done (delta FTBFS with DEB_BUILD_OPTIONS=nocheck)

2022-02-07 Thread Debian Bug Tracking System
Your message dated Mon, 07 Feb 2022 20:48:32 + with message-id and subject line Bug#1005138: fixed in delta 2006.08.03-11 has caused the Debian Bug report #1005138, regarding delta FTBFS with DEB_BUILD_OPTIONS=nocheck to be marked as done. This means that you claim that the problem has been d

Bug#1005138: delta FTBFS with DEB_BUILD_OPTIONS=nocheck

2022-02-07 Thread Eriberto
Hi Helmut, Thanks a lot for your help. Cheers, Eriberto

Bug#1005138: delta FTBFS with DEB_BUILD_OPTIONS=nocheck

2022-02-07 Thread Helmut Grohne
Source: delta Version: 2006.08.03-10 Severity: important Tags: ftbfs patch X-Debbugs-Cc: Joao Eriberto Mota Filho User: debian-cr...@lists.debian.org Usertags: ftcbfs delta fails to build from source when DEB_BUILD_OPTIONS contains nocheck. In that case, the execute_before_dh_auto_test is skipped

gthumb_3.12.0-2_source.changes ACCEPTED into unstable

2022-02-07 Thread Debian FTP Masters
Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Mon, 07 Feb 2022 10:39:44 -0500 Source: gthumb Built-For-Profiles: noudeb Architecture: source Version: 3:3.12.0-2 Distribution: unstable Urgency: medium Maintainer: Debian QA Group Changed-By: Jeremy Bicha Changes:

Processing of gthumb_3.12.0-2_source.changes

2022-02-07 Thread Debian FTP Masters
gthumb_3.12.0-2_source.changes uploaded successfully to localhost along with the files: gthumb_3.12.0-2.dsc gthumb_3.12.0-2.debian.tar.xz gthumb_3.12.0-2_source.buildinfo Greetings, Your Debian queue daemon (running on host usper.debian.org)

Bug#1005109: ipod-time-sync: error while loading shared libraries: libsgutils2-1.45.so.2: cannot open shared object file: No such file or directory

2022-02-07 Thread sergio
Package: libgpod-common Version: 0.8.3-16 Severity: important Dear Maintainer, % ipod-time-sync /dev/sdd ipod-time-sync: error while loading shared libraries: libsgutils2-1.45.so.2: cannot open shared object file: No such file or directory zsh: exit 127 ipod-time-sync /dev/sdd % ldd =ipod-ti