Results for 6.2.0 20161010 (Debian 6.2.0-6) testsuite on i686-pc-gnu

2016-10-17 Thread Matthias Klose
LAST_UPDATED: Mon Oct 10 03:12:04 UTC 2016 (revision 240907) Target: i686-gnu gcc version 6.2.0 20161010 (Debian 6.2.0-6) Native configuration is i686-pc-gnu === g++ tests === Running target unix FAIL: g++.dg/abi/abi-tag23.C -std=gnu++98 (test for warnings, line 22) FAIL: g+

Processed: retitle 840889 to libiberty: CVE-2016-6131

2016-10-17 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > retitle 840889 libiberty: CVE-2016-6131 Bug #840889 {Done: Matthias Klose } [src:libiberty] CVE-2016-4491 and CVE-2016-6131 not fixed in libiberty_20161011-1 Changed Bug title to 'libiberty: CVE-2016-6131' from 'CVE-2016-4491 and CVE-2016-6131 n

libiberty_20161017-1_source.changes ACCEPTED into unstable

2016-10-17 Thread Debian FTP Masters
Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Mon, 17 Oct 2016 11:37:08 +0200 Source: libiberty Binary: libiberty-dev Architecture: source Version: 20161017-1 Distribution: unstable Urgency: medium Maintainer: Debian GCC Maintainers Changed-By: Matthias Klose

Bug#840889: marked as done (CVE-2016-4491 and CVE-2016-6131 not fixed in libiberty_20161011-1)

2016-10-17 Thread Debian Bug Tracking System
Your message dated Mon, 17 Oct 2016 10:28:57 + with message-id and subject line Bug#840889: fixed in libiberty 20161017-1 has caused the Debian Bug report #840889, regarding CVE-2016-4491 and CVE-2016-6131 not fixed in libiberty_20161011-1 to be marked as done. This means that you claim that

Processing of libiberty_20161017-1_source.changes

2016-10-17 Thread Debian FTP Masters
libiberty_20161017-1_source.changes uploaded successfully to localhost along with the files: libiberty_20161017-1.dsc libiberty_20161017.orig.tar.xz libiberty_20161017-1.debian.tar.xz Greetings, Your Debian queue daemon (running on host franck.debian.org)