Bug#1056147: midge possibly contains non-DFSG-free examples

2023-11-19 Thread Ivan Shmakov
Control: tag -1 patch I have now uploaded a possible repackaged .orig.tar.bz2: http://users.am-1.org/~ivan/src/sfn.2xNKGoveuNoRGASEQosuADUES3vYQfQmWVeMuitdtLI.tar.bz2 It was produced with the following shell command (where 39 blocks starting with 180 cover the entirety of

Processed: Re: midge possibly contains non-DFSG-free examples

2023-11-19 Thread Debian Bug Tracking System
Processing control commands: > tag -1 patch Bug #1056147 [src:midge] midge possibly contains non-DFSG-free examples Added tag(s) patch. -- 1056147: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056147 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems

Bug#1056251: RM: cpufreqd -- RoQA; orphaned, uses obsolete cpufrequtils

2023-11-19 Thread Chris Hofstaedtler
Package: ftp.debian.org Severity: normal User: ftp.debian@packages.debian.org Usertags: remove X-Debbugs-Cc: cpufr...@packages.debian.org Control: affects -1 + src:cpufreqd Dear ftpmasters, please remove cpufreqd. It is orphaned in Debian, had its last maintainer upload over 10 years ago, ups

Bug#1056276: E: The repository 'http://ftp.us.debian.org/debian bookworm-security Release' does not have a Release file.

2023-11-19 Thread John Watjen
Source: bookworm Version: 1.1.2+git20210715-2 Severity: important X-Debbugs-Cc: q53...@aol.com Dear Maintainer, *** Reporter, please consider answering these questions, where appropriate *** * What led up to the situation? * What exactly did you do (or not do) that was effective (or i

Bug#1056282: gpac: CVE-2023-47384 CVE-2023-4785 CVE-2023-48011 CVE-2023-48013 CVE-2023-48014 CVE-2023-5998 CVE-2023-46001

2023-11-19 Thread Moritz Mühlenhoff
Source: gpac X-Debbugs-CC: t...@security.debian.org Severity: grave Tags: security Hi, The following vulnerabilities were published for gpac. CVE-2023-47384[0]: | MP4Box GPAC v2.3-DEV-rev617-g671976fcc-master was discovered to | contain a memory leak in the function gf_isom_add_chapter at | /iso

Processed: retitle 1056282 to gpac: CVE-2023-47384 CVE-2023-48011 CVE-2023-48013 CVE-2023-48014 CVE-2023-5998 CVE-2023-46001

2023-11-19 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > retitle 1056282 gpac: CVE-2023-47384 CVE-2023-48011 CVE-2023-48013 > CVE-2023-48014 CVE-2023-5998 CVE-2023-46001 Bug #1056282 [src:gpac] gpac: CVE-2023-47384 CVE-2023-4785 CVE-2023-48011 CVE-2023-48013 CVE-2023-48014 CVE-2023-5998 CVE-2023-46001

Processed: tagging 1056284, tagging 1056283, tagging 1056282 ...

2023-11-19 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > tags 1056284 + upstream Bug #1056284 [src:nss] nss: CVE-2023-5388 Added tag(s) upstream. > tags 1056283 + upstream fixed-upstream Bug #1056283 [src:postgresql-15] postgresql-15: CVE-2023-5868 CVE-2023-5869 CVE-2023-5870 Added tag(s) upstream and

Bug#1052574: geotranz: FTBFS with OpenJDK 21 due to unsupported javac source/target level 7

2023-11-19 Thread Vladimir Petko
Dear Maintainers, Would it be possible to consider the attached debdiff as a fix for this issue? Testing done: - build in sid chroot - build in sid chroot with default Java 21 Thank you for considering this patch!!! Best Regards, Vladimir. geotranz_1052574.debdiff Description: Binary data

Bug#1053018: Additional information

2023-11-19 Thread Vladimir Petko
Dear Maintainers, Would it be possible to consider a merge request[1] that addresses this issue? Best Regards, Vladimir. [1] https://salsa.debian.org/java-team/closure-compiler/-/merge_requests/2