jalview is marked for autoremoval from testing

2022-04-29 Thread Debian testing autoremoval watch
jalview 2.11.1.4+dfsg-3 is marked for autoremoval from testing on 2022-06-04 It (build-)depends on packages with these RC bugs: 1009961: ngs-sdk: fails to migrate to testing for too long: autopkgtest issue https://bugs.debian.org/1009961 This mail is generated by: https://salsa.debian.org/rele

gkl is marked for autoremoval from testing

2022-04-29 Thread Debian testing autoremoval watch
gkl 0.8.9+dfsg-4 is marked for autoremoval from testing on 2022-06-04 It (build-)depends on packages with these RC bugs: 1009961: ngs-sdk: fails to migrate to testing for too long: autopkgtest issue https://bugs.debian.org/1009961 This mail is generated by: https://salsa.debian.org/release-tea

Bug#1010381: commons-daemon: FTBFS on riscv64: error: Unsupported CPU architecture "riscv64"

2022-04-29 Thread Bo YU
Source: commons-daemon Version: 1.0.15-8 Severity: normal Tags: ftbfs patch User: debian-ri...@lists.debian.org Usertags: riscv64 X-Debbugs-Cc: debian-ri...@lists.debian.org Dear Maintainer, The commons-daemon has a ftbfs issue on riscv64: ``` ... configure:2916: result: none needed configure:29

Bug#1006647: marked as done (libeclipse-jdt-core-java 4.21 breaks Java 8 compatibility for Tomcat)

2022-04-29 Thread Debian Bug Tracking System
Your message dated Fri, 29 Apr 2022 21:33:48 + with message-id and subject line Bug#1006647: fixed in tomcat9 9.0.62-1 has caused the Debian Bug report #1006647, regarding libeclipse-jdt-core-java 4.21 breaks Java 8 compatibility for Tomcat to be marked as done. This means that you claim that

tomcat9_9.0.62-1_source.changes ACCEPTED into unstable

2022-04-29 Thread Debian FTP Masters
Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Fri, 29 Apr 2022 23:10:59 +0200 Source: tomcat9 Architecture: source Version: 9.0.62-1 Distribution: unstable Urgency: medium Maintainer: Debian Java Maintainers Changed-By: Markus Koschany Closes: 1006647 Changes:

Bug#1004284: marked as done (tomcat9: postinst creates wrong userhome via systemd-sysusers)

2022-04-29 Thread Debian Bug Tracking System
Your message dated Fri, 29 Apr 2022 23:20:34 +0200 with message-id <40bf48867e3b632f1618dd22c73f0417e86775f7.ca...@debian.org> and subject line Re: tomcat9: postinst creates wrong userhome via systemd-sysusers has caused the Debian Bug report #1004284, regarding tomcat9: postinst creates wrong use

Processing of tomcat9_9.0.62-1_source.changes

2022-04-29 Thread Debian FTP Masters
tomcat9_9.0.62-1_source.changes uploaded successfully to localhost along with the files: tomcat9_9.0.62-1.dsc tomcat9_9.0.62.orig.tar.xz tomcat9_9.0.62-1.debian.tar.xz tomcat9_9.0.62-1_source.buildinfo Greetings, Your Debian queue daemon (running on host usper.debian.org) __ This

Processed: Bug#1006647 marked as pending in tomcat9

2022-04-29 Thread Debian Bug Tracking System
Processing control commands: > tag -1 pending Bug #1006647 [tomcat9] libeclipse-jdt-core-java 4.21 breaks Java 8 compatibility for Tomcat Added tag(s) pending. -- 1006647: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1006647 Debian Bug Tracking System Contact ow...@bugs.debian.org with pro

Processed: tagging 1010339

2022-04-29 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > tags 1010339 + upstream Bug #1010339 {Done: Markus Koschany } [src:libowasp-esapi-java] libowasp-esapi-java: CVE-2022-24891 CVE-2022-23457 - cross-site-scripting and control-flow bypass Added tag(s) upstream. > thanks Stopping processing here.

Bug#1008668: bug #1008668: tomcat9: logrotated is not able to truncate catalina.out

2022-04-29 Thread Thorsten Glaser
On Fri, 29 Apr 2022, Evren Yurtesen wrote: > > What is the problem with logrotate? It happily rotates files owned > > by anyone in Debian. > > Because in Ubuntu rsyslog drops privileges to `syslog` user. > Therefore, the log files generated by rsyslog are owned by the > `syslog` user. But tomca

Bug#1010339: marked as done (libowasp-esapi-java: CVE-2022-24891 CVE-2022-23457 - cross-site-scripting and control-flow bypass)

2022-04-29 Thread Debian Bug Tracking System
Your message dated Fri, 29 Apr 2022 14:34:21 + with message-id and subject line Bug#1010339: fixed in libowasp-esapi-java 2.4.0.0-1 has caused the Debian Bug report #1010339, regarding libowasp-esapi-java: CVE-2022-24891 CVE-2022-23457 - cross-site-scripting and control-flow bypass to be mark

libowasp-esapi-java_2.4.0.0-1_source.changes ACCEPTED into unstable

2022-04-29 Thread Debian FTP Masters
Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Fri, 29 Apr 2022 15:30:01 +0200 Source: libowasp-esapi-java Architecture: source Version: 2.4.0.0-1 Distribution: unstable Urgency: medium Maintainer: Debian Java Maintainers Changed-By: Markus Koschany Closes: 1010

Processing of libowasp-esapi-java_2.4.0.0-1_source.changes

2022-04-29 Thread Debian FTP Masters
libowasp-esapi-java_2.4.0.0-1_source.changes uploaded successfully to localhost along with the files: libowasp-esapi-java_2.4.0.0-1.dsc libowasp-esapi-java_2.4.0.0.orig.tar.gz libowasp-esapi-java_2.4.0.0-1.debian.tar.xz libowasp-esapi-java_2.4.0.0-1_amd64.buildinfo Greetings, Your

libtwelvemonkeys-java_3.8.2-1_source.changes ACCEPTED into unstable

2022-04-29 Thread Debian FTP Masters
Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Fri, 29 Apr 2022 14:28:43 +0200 Source: libtwelvemonkeys-java Architecture: source Version: 3.8.2-1 Distribution: unstable Urgency: medium Maintainer: Debian Java Maintainers Changed-By: Markus Koschany Changes: li

Processing of libtwelvemonkeys-java_3.8.2-1_source.changes

2022-04-29 Thread Debian FTP Masters
libtwelvemonkeys-java_3.8.2-1_source.changes uploaded successfully to localhost along with the files: libtwelvemonkeys-java_3.8.2-1.dsc libtwelvemonkeys-java_3.8.2.orig.tar.xz libtwelvemonkeys-java_3.8.2-1.debian.tar.xz libtwelvemonkeys-java_3.8.2-1_amd64.buildinfo Greetings, Your

libpdfbox2-java_2.0.26-1_source.changes ACCEPTED into unstable

2022-04-29 Thread Debian FTP Masters
Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Fri, 29 Apr 2022 13:38:11 +0200 Source: libpdfbox2-java Architecture: source Version: 2.0.26-1 Distribution: unstable Urgency: medium Maintainer: Debian Java Maintainers Changed-By: Markus Koschany Changes: libpdfb

Processing of libpdfbox2-java_2.0.26-1_source.changes

2022-04-29 Thread Debian FTP Masters
libpdfbox2-java_2.0.26-1_source.changes uploaded successfully to localhost along with the files: libpdfbox2-java_2.0.26-1.dsc libpdfbox2-java_2.0.26.orig.tar.xz libpdfbox2-java_2.0.26-1.debian.tar.xz libpdfbox2-java_2.0.26-1_amd64.buildinfo Greetings, Your Debian queue daemon (run

Bug#1010339: libowasp-esapi-java: CVE-2022-24891 CVE-2022-23457 - cross-site-scripting and control-flow bypass

2022-04-29 Thread Neil Williams
Source: libowasp-esapi-java Version: 2.2.3.1-1 Severity: important Tags: security X-Debbugs-Cc: codeh...@debian.org, Debian Security Team Hi, The following vulnerabilities were published for libowasp-esapi-java. CVE-2022-24891[0]: | ESAPI (The OWASP Enterprise Security API) is a free, open sou

Bug#1008668: bug #1008668: tomcat9: logrotated is not able to truncate catalina.out

2022-04-29 Thread Timo Aaltonen
Evren Yurtesen kirjoitti 29.4.2022 klo 8.42: One solution would be undoing https://bugs.launchpad.net/ubuntu/+source/rsyslog/+bug/388608 at Ubuntu. But I do not know how to reach to correct people at Ubuntu side. I also do not think I could convince them that this is creating problems. try u