Bug#951770: libpam-radius-auth: do not release in bullseye without active maintainer

2020-02-21 Thread Salvatore Bonaccorso
Source: libpam-radius-auth Version: 1.4.0-3 Severity: serious Justification: should not be released in bullseye without active maintainer libpam-radius-auth has been orphaned in Debian since several years and QA maintained. It did had at least the CVE-2015-9542 security issue. There are no packag

Processed: severity of 951396 is grave

2020-02-21 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > severity 951396 grave Bug #951396 {Done: Utkarsh Gupta } [src:libpam-radius-auth] libpam-radius-auth: CVE-2015-9542 Severity set to 'grave' from 'important' > thanks Stopping processing here. Please contact me if you need assistance. -- 951396:

zope.security_5.1.0-1_source.changes ACCEPTED into unstable

2020-02-21 Thread Debian FTP Masters
Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Fri, 21 Feb 2020 13:25:27 +0100 Source: zope.security Architecture: source Version: 5.1.0-1 Distribution: unstable Urgency: medium Maintainer: Debian QA Group Changed-By: Matthias Klose Changes: zope.security (5.1.0

Processing of zope.security_5.1.0-1_source.changes

2020-02-21 Thread Debian FTP Masters
zope.security_5.1.0-1_source.changes uploaded successfully to localhost along with the files: zope.security_5.1.0-1.dsc zope.security_5.1.0.orig.tar.gz zope.security_5.1.0-1.debian.tar.xz zope.security_5.1.0-1_source.buildinfo Greetings, Your Debian queue daemon (running on host u

libpam-radius-auth_1.4.0-3_source.changes ACCEPTED into unstable

2020-02-21 Thread Debian FTP Masters
Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Fri, 21 Feb 2020 15:47:11 +0530 Source: libpam-radius-auth Architecture: source Version: 1.4.0-3 Distribution: unstable Urgency: medium Maintainer: Debian QA Group Changed-By: Utkarsh Gupta Closes: 951396 Changes: l

Processing of libpam-radius-auth_1.4.0-3_source.changes

2020-02-21 Thread Debian FTP Masters
libpam-radius-auth_1.4.0-3_source.changes uploaded successfully to localhost along with the files: libpam-radius-auth_1.4.0-3.dsc libpam-radius-auth_1.4.0-3.debian.tar.xz libpam-radius-auth_1.4.0-3_amd64.buildinfo Greetings, Your Debian queue daemon (running on host usper.debian.org

Bug#951396: marked as done (libpam-radius-auth: CVE-2015-9542)

2020-02-21 Thread Debian Bug Tracking System
Your message dated Fri, 21 Feb 2020 10:49:29 + with message-id and subject line Bug#951396: fixed in libpam-radius-auth 1.4.0-3 has caused the Debian Bug report #951396, regarding libpam-radius-auth: CVE-2015-9542 to be marked as done. This means that you claim that the problem has been dealt