Thank you for your contribution to Debian.
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Fri, 24 May 2024 13:23:00 +0200
Source: ferm
Architecture: source
Version: 2.5.1-2
Distribution: unstable
Urgency: medium
Maintainer: Debian QA Group
Changed-By: Helmut Grohn
ferm_2.5.1-2_source.changes uploaded successfully to localhost
along with the files:
ferm_2.5.1-2.dsc
ferm_2.5.1-2.debian.tar.xz
ferm_2.5.1-2_amd64.buildinfo
Greetings,
Your Debian queue daemon (running on host usper.debian.org)
Thank you for your contribution to Debian.
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Fri, 24 May 2024 13:32:37 +0200
Source: ipvsadm
Architecture: source
Version: 1:1.31-2
Distribution: unstable
Urgency: medium
Maintainer: Debian QA Group
Changed-By: Helmut G
ipvsadm_1.31-2_source.changes uploaded successfully to localhost
along with the files:
ipvsadm_1.31-2.dsc
ipvsadm_1.31-2.debian.tar.xz
ipvsadm_1.31-2_amd64.buildinfo
Greetings,
Your Debian queue daemon (running on host usper.debian.org)
Processing commands for cont...@bugs.debian.org:
> forwarded 173801 https://github.com/samhocevar/rinetd/issues/12
Bug #173801 [rinetd] Never re-resolves hosts
Set Bug forwarded-to-address to
'https://github.com/samhocevar/rinetd/issues/12'.
> --
Stopping processing here.
Please contact me if yo
Your message dated Fri, 24 May 2024 14:13:53 +0200
with message-id
and subject line Re: rinetd: ships sysv-init script without systemd unit
has caused the Debian Bug report #1039348,
regarding rinetd: ships sysv-init script without systemd unit
to be marked as done.
This means that you claim that
On 2024-05-24, at 12:05:27 +, Debian FTP Masters wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
>
> Format: 1.8
> Date: Fri, 24 May 2024 13:32:37 +0200
> Source: ipvsadm
> Architecture: source
> Version: 1:1.31-2
> Distribution: unstable
> Urgency: medium
> Maintainer: Debian QA Gr
Source: cjson
X-Debbugs-CC: t...@security.debian.org
Severity: important
Tags: security
Hi,
The following vulnerability was published for cjson.
CVE-2024-31755[0]:
| cJSON v1.7.17 was discovered to contain a segmentation violation,
| which can trigger through the second parameter of function
| c
Processing commands for cont...@bugs.debian.org:
> forwarded 1071743 https://github.com/lief-project/LIEF/issues/1038
Bug #1071743 [src:lief] lief: CVE-2024-31636
Set Bug forwarded-to-address to
'https://github.com/lief-project/LIEF/issues/1038'.
> forwarded 1071742 https://github.com/DaveGamble/
Package: src:cider
Version: 0.19.0+dfsg-3
Severity: serious
Tags: ftbfs
Dear maintainer:
During a rebuild of all packages in unstable, your package failed to build:
[...]
debian/rules build
dh build --with elpa --
10 matches
Mail list logo