Thank you for your contribution to Debian.
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Thu, 14 Sep 2023 06:37:04 +0200
Source: ghostscript
Architecture: source
Version: 10.02.0~dfsg-2
Distribution: unstable
Urgency: medium
Maintainer: Debian QA Group
Changed-By
Your message dated Thu, 14 Sep 2023 07:08:21 +0200
with message-id
and subject line Re: Accepted ghostscript 10.02.0~dfsg-1 (source) into unstable
has caused the Debian Bug report #1043033,
regarding ghostscript: CVE-2023-38559
to be marked as done.
This means that you claim that the problem has
ghostscript_10.02.0~dfsg-2_source.changes uploaded successfully to localhost
along with the files:
ghostscript_10.02.0~dfsg-2.dsc
ghostscript_10.02.0~dfsg-2.debian.tar.xz
ghostscript_10.02.0~dfsg-2_amd64.buildinfo
Greetings,
Your Debian queue daemon (running on host usper.debian.org
Source: ghostscript
Source-Version: 10.02.0~dfsg-1
On Wed, Sep 13, 2023 at 09:21:09PM +, Debian FTP Masters wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
>
> Format: 1.8
> Date: Wed, 13 Sep 2023 20:18:16 +0200
> Source: ghostscript
> Architecture: source
> Version: 10.02.0~dfsg-1
Thank you for your contribution to Debian.
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Wed, 13 Sep 2023 20:18:16 +0200
Source: ghostscript
Architecture: source
Version: 10.02.0~dfsg-1
Distribution: unstable
Urgency: medium
Maintainer: Debian QA Group
Changed-By
ghostscript_10.02.0~dfsg-1_source.changes uploaded successfully to localhost
along with the files:
ghostscript_10.02.0~dfsg-1.dsc
ghostscript_10.02.0~dfsg.orig.tar.xz
ghostscript_10.02.0~dfsg-1.debian.tar.xz
ghostscript_10.02.0~dfsg-1_amd64.buildinfo
Greetings,
Your Debian queue d
Source: gpac
Severity: grave
Tags: security upstream
Justification: user security hole
X-Debbugs-Cc: car...@debian.org, Debian Security Team
Hi
Some of the CVEs in #1033116 seems to not have been addressed (and in
part were addressed in a DSA already). Here a fresh bug for the
remaining ones.
H
Package: ftp.debian.org
Control: affects -1 + src:python-fswrap
X-Debbugs-Cc: python-fsw...@packages.debian.org
User: ftp.debian@packages.debian.org
Usertags: override
Severity: normal
Dear Debian FTP Masters,
Currently, binary package python3-fswrap is of Priority: extra.
==
Processing commands for cont...@bugs.debian.org:
> # see https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036701#17
> reopen 1036701
Bug #1036701 [src:gpac] gpac: CVE-2023-2837 CVE-2023-2838 CVE-2023-2839
CVE-2023-2840
Bug 1036701 is not marked as done; doing nothing.
> thanks
Stopping processi
Processing commands for cont...@bugs.debian.org:
> reopen 1036701
Bug #1036701 {Done: Shengjing Zhu } [src:gpac] gpac:
CVE-2023-2837 CVE-2023-2838 CVE-2023-2839 CVE-2023-2840
'reopen' may be inappropriate when a bug has been closed with a version;
all fixed versions will be cleared, and you may n
Processing commands for cont...@bugs.debian.org:
> reopen 1034890
Bug #1034890 {Done: Shengjing Zhu } [src:gpac] gpac:
CVE-2023-0841
'reopen' may be inappropriate when a bug has been closed with a version;
all fixed versions will be cleared, and you may need to re-add them.
Bug reopened
No longer
Thank you for your contribution to Debian.
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Wed, 13 Sep 2023 14:56:05 +0800
Source: gpac
Architecture: source
Version: 2.2.1+dfsg1-2
Distribution: unstable
Urgency: medium
Maintainer: Debian QA Group
Changed-By: Shengj
gpac_2.2.1+dfsg1-2_source.changes uploaded successfully to localhost
along with the files:
gpac_2.2.1+dfsg1-2.dsc
gpac_2.2.1+dfsg1-2.debian.tar.xz
gpac_2.2.1+dfsg1-2_source.buildinfo
Greetings,
Your Debian queue daemon (running on host usper.debian.org)
13 matches
Mail list logo