Processing of gnupod-tools_0.99.8-3_source.changes

2017-07-30 Thread Debian FTP Masters
gnupod-tools_0.99.8-3_source.changes uploaded successfully to localhost along with the files: gnupod-tools_0.99.8-3.dsc gnupod-tools_0.99.8-3.diff.gz gnupod-tools_0.99.8-3_source.buildinfo Greetings, Your Debian queue daemon (running on host usper.debian.org)

gnupod-tools_0.99.8-3_source.changes ACCEPTED into unstable

2017-07-30 Thread Debian FTP Masters
Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Sun, 30 Jul 2017 13:54:36 +0200 Source: gnupod-tools Binary: gnupod-tools Architecture: source Version: 0.99.8-3 Distribution: unstable Urgency: medium Maintainer: Debian QA Group Changed-By: Petter Reinholdtsen Descr

Processing of gnupod-tools_0.99.8-4_source.changes

2017-07-30 Thread Debian FTP Masters
gnupod-tools_0.99.8-4_source.changes uploaded successfully to localhost along with the files: gnupod-tools_0.99.8-4.dsc gnupod-tools_0.99.8-4.diff.gz gnupod-tools_0.99.8-4_source.buildinfo Greetings, Your Debian queue daemon (running on host usper.debian.org)

gnupod-tools_0.99.8-4_source.changes ACCEPTED into unstable

2017-07-30 Thread Debian FTP Masters
Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Sun, 30 Jul 2017 15:42:24 +0200 Source: gnupod-tools Binary: gnupod-tools Architecture: source Version: 0.99.8-4 Distribution: unstable Urgency: medium Maintainer: Debian QA Group Changed-By: Petter Reinholdtsen Descr

Processing of gnupod-tools_0.99.8-5_source.changes

2017-07-30 Thread Debian FTP Masters
gnupod-tools_0.99.8-5_source.changes uploaded successfully to localhost along with the files: gnupod-tools_0.99.8-5.dsc gnupod-tools_0.99.8-5.diff.gz gnupod-tools_0.99.8-5_source.buildinfo Greetings, Your Debian queue daemon (running on host usper.debian.org)

gnupod-tools_0.99.8-5_source.changes ACCEPTED into unstable

2017-07-30 Thread Debian FTP Masters
Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Sun, 30 Jul 2017 18:59:50 +0200 Source: gnupod-tools Binary: gnupod-tools Architecture: source Version: 0.99.8-5 Distribution: unstable Urgency: medium Maintainer: Debian QA Group Changed-By: Petter Reinholdtsen Descr

Processed: your mail

2017-07-30 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > tags 816705 + a11y Bug #816705 [debian-installer-launcher] debian-installer-launcher: Set gtk2 variables for accessibility Added tag(s) a11y. > tags 792750 + a11y Bug #792750 [gnome-orca] gnome-orca: orca doesn't come back automatically in navi

Processed: Bug#868537 tagged as pending

2017-07-30 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > tag 868537 pending Bug #868537 [src:abiword] File conflict between abiword-dbgsym and abiword-plugin-grammar-dbgsym Added tag(s) pending. > -- Stopping processing here. Please contact me if you need assistance. -- 868537: https://bugs.debian.or

Bug#870193: libytnef: CVE-2017-9472: heap-based buffer overflow in SwapDWord

2017-07-30 Thread Salvatore Bonaccorso
Source: libytnef Version: 1.9.2-2 Severity: important Tags: security upstream Forwarded: https://github.com/Yeraze/ytnef/issues/41 Hi, the following vulnerability was published for libytnef. CVE-2017-9472[0]: | In ytnef 1.9.2, the SwapDWord function in lib/ytnef.c allows remote | attackers to ca

Bug#870192: libytnef: CVE-2017-9474: heap-based buffer overflow in DecompressRTF

2017-07-30 Thread Salvatore Bonaccorso
Source: libytnef Version: 1.9.2-2 Severity: important Tags: upstream security Forwarded: https://github.com/Yeraze/ytnef/issues/40 Hi, the following vulnerability was published for libytnef. CVE-2017-9474[0]: | In ytnef 1.9.2, the DecompressRTF function in lib/ytnef.c allows remote | attackers t

Bug#870194: libytnef: CVE-2017-9471: heap-based-buffer overflow in SwapWord

2017-07-30 Thread Salvatore Bonaccorso
Source: libytnef Version: 1.9.2-2 Severity: important Tags: security upstream Forwarded: https://github.com/Yeraze/ytnef/issues/39 Hi, the following vulnerability was published for libytnef. CVE-2017-9471[0]: | In ytnef 1.9.2, the SwapWord function in lib/ytnef.c allows remote | attackers to cau

Bug#870196: libytnef: CVE-2017-9470: NULL pointer dereference in MAPIPrint

2017-07-30 Thread Salvatore Bonaccorso
Source: libytnef Version: 1.9.2-2 Severity: important Tags: upstream security Forwarded: https://github.com/Yeraze/ytnef/issues/37 Hi, the following vulnerability was published for libytnef. CVE-2017-9470[0]: | In ytnef 1.9.2, the MAPIPrint function in lib/ytnef.c allows remote | attackers to ca

Bug#870197: libytnef: CVE-2017-9473: memory allocation failure in TNEFFillMapi

2017-07-30 Thread Salvatore Bonaccorso
Source: libytnef Version: 1.9.2-2 Severity: important Tags: security upstream Forwarded: https://github.com/Yeraze/ytnef/issues/42 Hi, the following vulnerability was published for libytnef. CVE-2017-9473[0]: | In ytnef 1.9.2, the TNEFFillMapi function in lib/ytnef.c allows remote | attackers to