Processing of x52pro_0.2.0-1_source.changes

2025-01-01 Thread Debian FTP Masters
x52pro_0.2.0-1_source.changes uploaded successfully to localhost along with the files: x52pro_0.2.0-1.dsc x52pro_0.2.0.orig.tar.gz x52pro_0.2.0-1.debian.tar.xz x52pro_0.2.0-1_source.buildinfo Greetings, Your Debian queue daemon (running on host usper.debian.org)

Bug#1030477: marked as done (libx52pro0: New upstream release 0.3.0)

2025-01-01 Thread Debian Bug Tracking System
Your message dated Thu, 02 Jan 2025 07:34:07 + with message-id and subject line Bug#1030477: fixed in x52pro 0.2.0-1 has caused the Debian Bug report #1030477, regarding libx52pro0: New upstream release 0.3.0 to be marked as done. This means that you claim that the problem has been dealt with

Bug#810466: marked as done (x52pro: please switch to libusb 1.0)

2025-01-01 Thread Debian Bug Tracking System
Your message dated Thu, 02 Jan 2025 07:34:07 + with message-id and subject line Bug#810466: fixed in x52pro 0.2.0-1 has caused the Debian Bug report #810466, regarding x52pro: please switch to libusb 1.0 to be marked as done. This means that you claim that the problem has been dealt with. If

x52pro_0.2.0-1_source.changes ACCEPTED into unstable

2025-01-01 Thread Debian FTP Masters
Thank you for your contribution to Debian. Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Thu, 02 Jan 2025 08:16:53 +0100 Source: x52pro Architecture: source Version: 0.2.0-1 Distribution: unstable Urgency: medium Maintainer: Debian QA Group Changed-By: Petter Rei

Bug#1091383: pagure: security issues

2025-01-01 Thread Rebecca N. Palmer
Control: tags -1 pending As previously stated on #debian-security, there are actually four security issues here, fixed by consecutive upstream commits: - This issue: generate_archive() allows file access via symlinks CVE-2024-47515 - Similar issues in _update_file_in_git() (with symlinks)

Processed: pagure: security issues

2025-01-01 Thread Debian Bug Tracking System
Processing control commands: > tags -1 pending Bug #1091383 [src:pagure] pagure: CVE-2024-47515 Added tag(s) pending. -- 1091383: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1091383 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems

Bug#351328: icheck is on Salsa in debian team

2025-01-01 Thread Andreas Tille
Hi, thank you for your contribution to icheck. I've just moved it to Salsa[1] and you are kindly invited to push patches there or file MRs. Kind regards Andreas. [1] https://salsa.debian.org/debian/icheck -- https://fam-tille.de

Processing of icheck_0.9.7-8_source.changes

2025-01-01 Thread Debian FTP Masters
icheck_0.9.7-8_source.changes uploaded successfully to localhost along with the files: icheck_0.9.7-8.dsc icheck_0.9.7-8.debian.tar.xz icheck_0.9.7-8_amd64.buildinfo Greetings, Your Debian queue daemon (running on host usper.debian.org)

icheck_0.9.7-8_source.changes ACCEPTED into unstable

2025-01-01 Thread Debian FTP Masters
Thank you for your contribution to Debian. Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Wed, 01 Jan 2025 10:31:55 +0100 Source: icheck Architecture: source Version: 0.9.7-8 Distribution: unstable Urgency: medium Maintainer: Debian QA Group Changed-By: Andreas Ti