LAST_UPDATED: Mon Oct 10 03:12:04 UTC 2016 (revision 240907)
Target: i686-gnu
gcc version 6.2.0 20161010 (Debian 6.2.0-6)
Native configuration is i686-pc-gnu
=== g++ tests ===
Running target unix
FAIL: g++.dg/abi/abi-tag23.C -std=gnu++98 (test for warnings, line 22)
FAIL: g+
Processing commands for cont...@bugs.debian.org:
> retitle 840889 libiberty: CVE-2016-6131
Bug #840889 {Done: Matthias Klose } [src:libiberty]
CVE-2016-4491 and CVE-2016-6131 not fixed in libiberty_20161011-1
Changed Bug title to 'libiberty: CVE-2016-6131' from 'CVE-2016-4491 and
CVE-2016-6131 n
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Mon, 17 Oct 2016 11:37:08 +0200
Source: libiberty
Binary: libiberty-dev
Architecture: source
Version: 20161017-1
Distribution: unstable
Urgency: medium
Maintainer: Debian GCC Maintainers
Changed-By: Matthias Klose
Your message dated Mon, 17 Oct 2016 10:28:57 +
with message-id
and subject line Bug#840889: fixed in libiberty 20161017-1
has caused the Debian Bug report #840889,
regarding CVE-2016-4491 and CVE-2016-6131 not fixed in libiberty_20161011-1
to be marked as done.
This means that you claim that
libiberty_20161017-1_source.changes uploaded successfully to localhost
along with the files:
libiberty_20161017-1.dsc
libiberty_20161017.orig.tar.xz
libiberty_20161017-1.debian.tar.xz
Greetings,
Your Debian queue daemon (running on host franck.debian.org)
5 matches
Mail list logo