Processing of libytnef_1.9.2-2_amd64.changes

2017-05-24 Thread Debian FTP Masters
libytnef_1.9.2-2_amd64.changes uploaded successfully to localhost along with the files: libytnef_1.9.2-2.dsc libytnef_1.9.2-2.debian.tar.xz libytnef0-dbgsym_1.9.2-2_amd64.deb libytnef0-dev_1.9.2-2_amd64.deb libytnef0_1.9.2-2_amd64.deb libytnef_1.9.2-2_amd64.buildinfo ytnef-tools-dbgsy

libytnef_1.9.2-2_amd64.changes ACCEPTED into unstable

2017-05-24 Thread Debian FTP Masters
Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Mon, 22 May 2017 23:51:52 +0200 Source: libytnef Binary: libytnef0 libytnef0-dev ytnef-tools Architecture: source amd64 Version: 1.9.2-2 Distribution: unstable Urgency: medium Maintainer: Debian QA Group Changed-By: Jo

Bug#862556: marked as done (CVE-2017-9058: Heap-based buffer overflow due to incorrect boundary checking)

2017-05-24 Thread Debian Bug Tracking System
Your message dated Wed, 24 May 2017 09:05:44 + with message-id and subject line Bug#862556: fixed in libytnef 1.9.2-2 has caused the Debian Bug report #862556, regarding CVE-2017-9058: Heap-based buffer overflow due to incorrect boundary checking to be marked as done. This means that you cla

Processed: usrmerge is not yet ready for a stable release

2017-05-24 Thread Debian Bug Tracking System
Processing control commands: > block -1 by 860523 810158 759410 837928 Bug #863269 [usrmerge] usrmerge is not yet ready for a stable release 863269 was not blocked by any bugs. 863269 was not blocking any bugs. Added blocking bug(s) of 863269: 837928, 860523, 759410, and 810158 -- 863269: http:/