Processed: bug 1023804 is forwarded to https://github.com/mnauw/git-remote-hg/issues/53

2022-12-04 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > forwarded 1023804 https://github.com/mnauw/git-remote-hg/issues/53 Bug #1023804 [src:git-remote-hg] git-remote-hg: autopkgtest needs update for new version of git: transport 'file' not allowed Set Bug forwarded-to-address to 'https://github.com/

Bug#1022526: marked as done (python-ssdeep: FTBFS: distutils.errors.DistutilsClassError: command class must subclass Command)

2022-12-04 Thread Debian Bug Tracking System
Your message dated Sun, 04 Dec 2022 21:22:01 + with message-id and subject line Bug#1022526: fixed in python-ssdeep 3.4.1-1 has caused the Debian Bug report #1022526, regarding python-ssdeep: FTBFS: distutils.errors.DistutilsClassError: command class must subclass Command to be marked as don

awstats_7.8-3_sourceonly.changes ACCEPTED into unstable

2022-12-04 Thread Debian FTP Masters
Thank you for your contribution to Debian. Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Sun, 04 Dec 2022 20:52:31 +0100 Source: awstats Architecture: source Version: 7.8-3 Distribution: unstable Urgency: medium Maintainer: Debian QA Group Changed-By: Salvatore B

Bug#1025410: marked as done (awstats: CVE-2022-46391: XSS due to printing response from Net::XWhois without proper checks)

2022-12-04 Thread Debian Bug Tracking System
Your message dated Sun, 04 Dec 2022 20:34:40 + with message-id and subject line Bug#1025410: fixed in awstats 7.8-3 has caused the Debian Bug report #1025410, regarding awstats: CVE-2022-46391: XSS due to printing response from Net::XWhois without proper checks to be marked as done. This mea

Processing of awstats_7.8-3_sourceonly.changes

2022-12-04 Thread Debian FTP Masters
awstats_7.8-3_sourceonly.changes uploaded successfully to localhost along with the files: awstats_7.8-3.dsc awstats_7.8-3.debian.tar.xz Greetings, Your Debian queue daemon (running on host usper.debian.org)

Processed: unarchive again for bullseye

2022-12-04 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > unarchive 997222 Bug #997222 {Done: Håvard Flaget Aasen } [src:libexplain] libexplain: FTBFS: libexplain/iocontrol/siocadddlci.c:51:12: error: invalid application of ‘sizeof’ to incomplete type ‘struct dlci_add’ Unarchived Bug 997222 > End of me

ghostscript_10.0.0~dfsg-8_source.changes ACCEPTED into unstable

2022-12-04 Thread Debian FTP Masters
Thank you for your contribution to Debian. Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Sun, 04 Dec 2022 16:00:05 +0100 Source: ghostscript Architecture: source Version: 10.0.0~dfsg-8 Distribution: unstable Urgency: medium Maintainer: Debian QA Group Changed-By:

Processing of ghostscript_10.0.0~dfsg-8_source.changes

2022-12-04 Thread Debian FTP Masters
ghostscript_10.0.0~dfsg-8_source.changes uploaded successfully to localhost along with the files: ghostscript_10.0.0~dfsg-8.dsc ghostscript_10.0.0~dfsg-8.debian.tar.xz Greetings, Your Debian queue daemon (running on host usper.debian.org)

Bug#1023330: marked as done (ghostscript 10.0.0~dfsg-6: x11 support missing, thus 'gv 1:3.7.4-2+b1' is failing)

2022-12-04 Thread Debian Bug Tracking System
Your message dated Sun, 04 Dec 2022 15:20:50 + with message-id and subject line Bug#1023330: fixed in ghostscript 10.0.0~dfsg-8 has caused the Debian Bug report #1023330, regarding ghostscript 10.0.0~dfsg-6: x11 support missing, thus 'gv 1:3.7.4-2+b1' is failing to be marked as done. This me

Processed: reassign 1024318 to ghostscript, severity of 1023330 is grave, forcibly merging 1023330 1024318

2022-12-04 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > reassign 1024318 ghostscript 10.0.0~dfsg-6 Bug #1024318 [gv] gv: x11 output driver not found Bug reassigned from package 'gv' to 'ghostscript'. No longer marked as found in versions gv/1:3.7.4-2. Ignoring request to alter fixed versions of bug #10

Bug#1025410: awstats: CVE-2022-46391: XSS due to printing response from Net::XWhois without proper checks

2022-12-04 Thread Salvatore Bonaccorso
Source: awstats Version: 7.8-2 Severity: important Tags: security upstream Forwarded: https://github.com/eldy/AWStats/pull/226 X-Debbugs-Cc: car...@debian.org, Debian Security Team Hi, The following vulnerability was published for awstats. CVE-2022-46391[0]: | AWStats 7.x through 7.8 allows XSS