FYI: The status of the openrefine source package
in Debian's testing distribution has changed.
Previous version: (not in testing)
Current version: 3.7.8-1
--
This email is automatically generated once a day. As the installation of
new packages into testing happens multiple times a day you
Processing commands for cont...@bugs.debian.org:
> Tags 1068159 +patch
Bug #1068159 [src:openjfx] openjfx: FTBFS on arm{el,hf}:
/usr/include/features-time64.h:26:5: error: #error "_TIME_BITS=64 is allowed
only with _FILE_OFFSET_BITS=64"
Added tag(s) patch.
> Thanks
Stopping processing here.
Tags 1068159 +patch
Thanks
The build failure is caused by the following in
modules/javafx.media/src/main/native/gstreamer/gstreamer-lite/projects/build/linux/common/config.h
> /* Number of bits in a file offset, on hosts where this is settable. */
> #undef _FILE_OFFSET_BITS
Looking at the
Processing commands for cont...@bugs.debian.org:
> notfound 1068806 1.5.0dfsg1-2
Bug #1068806 [src:osmo-bts] Update Build-Depends for the time64 library renames
The source 'osmo-bts' and version '1.5.0dfsg1-2' do not appear to match any
binary packages
No longer marked as found in versions
Processing commands for cont...@bugs.debian.org:
> tags 1068815 + upstream
Bug #1068815 [src:undertow] undertow: CVE-2023-1973
Added tag(s) upstream.
> tags 1068816 + upstream
Bug #1068816 [src:undertow] undertow: CVE-2024-1459
Added tag(s) upstream.
> tags 1068817 + upstream
Bug #1068817
Source: undertow
X-Debbugs-CC: t...@security.debian.org
Severity: important
Tags: security
Hi,
The following vulnerability was published for undertow.
CVE-2024-1635[0]:
| A vulnerability was found in Undertow. This vulnerability impacts a
| server that supports the wildfly-http-client protocol.
Source: undertow
X-Debbugs-CC: t...@security.debian.org
Severity: grave
Tags: security
Hi,
The following vulnerability was published for undertow.
CVE-2024-1459[0]:
| A path traversal vulnerability was found in Undertow. This issue may
| allow a remote attacker to append a specially-crafted
Source: undertow
X-Debbugs-CC: t...@security.debian.org
Severity: important
Tags: security
Hi,
The following vulnerability was published for undertow.
CVE-2023-1973[0]:
The only reference is at Red Hat:
https://bugzilla.redhat.com/show_bug.cgi?id=2185662
If you fix the vulnerability please