Bug#1064554: marked as done (jruby fails to build from source in unstable)

2024-02-28 Thread Debian Bug Tracking System
Your message dated Thu, 29 Feb 2024 06:10:06 + with message-id and subject line Bug#1064554: fixed in jruby 9.4.6.0+ds-1 has caused the Debian Bug report #1064554, regarding jruby fails to build from source in unstable to be marked as done. This means that you claim that the problem has been

jruby_9.4.6.0+ds-1_source.changes ACCEPTED into unstable

2024-02-28 Thread Debian FTP Masters
Thank you for your contribution to Debian. Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Wed, 28 Feb 2024 19:39:52 -0500 Source: jruby Architecture: source Version: 9.4.6.0+ds-1 Distribution: unstable Urgency: medium Maintainer: Debian Java Maintainers

xperia-flashtool is marked for autoremoval from testing

2024-02-28 Thread Debian testing autoremoval watch
xperia-flashtool 0.9.34+ds-1 is marked for autoremoval from testing on 2024-03-15 It (build-)depends on packages with these RC bugs: 1062110: android-libboringssl: identified for time_t transition but no ABI in shlibs https://bugs.debian.org/1062110 1062209: android-libbase:

Processing of jruby_9.4.6.0+ds-1_source.changes

2024-02-28 Thread Debian FTP Masters
jruby_9.4.6.0+ds-1_source.changes uploaded successfully to localhost along with the files: jruby_9.4.6.0+ds-1.dsc jruby_9.4.6.0+ds.orig-rubygems.tar.xz jruby_9.4.6.0+ds.orig.tar.xz jruby_9.4.6.0+ds-1.debian.tar.xz jruby_9.4.6.0+ds-1_amd64.buildinfo Greetings, Your Debian queue

Processed: severity of 1061888 is serious, severity of 1061920 is serious, severity of 1062060 is serious ...

2024-02-28 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > # time_t transition started > severity 1061888 serious Bug #1061888 [src:anfo] anfo: NMU diff for 64-bit time_t transition Severity set to 'serious' from 'important' > severity 1061920 serious Bug #1061920 [src:arrayfire] arrayfire: NMU diff for

Processed: tagging 1064966, bug 1064966 is forwarded to https://github.com/apache/james-mime4j/pull/91 ...

2024-02-28 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > tags 1064966 + upstream Bug #1064966 [src:apache-mime4j] apache-mime4j: CVE-2024-21742 Added tag(s) upstream. > forwarded 1064966 https://github.com/apache/james-mime4j/pull/91 Bug #1064966 [src:apache-mime4j] apache-mime4j: CVE-2024-21742 Set

Bug#1064966: apache-mime4j: CVE-2024-21742

2024-02-28 Thread Moritz Mühlenhoff
Source: apache-mime4j X-Debbugs-CC: t...@security.debian.org Severity: important Tags: security Hi, The following vulnerability was published for apache-mime4j. CVE-2024-21742[0]: | Improper input validation allows for header injection in MIME4J | library when using MIME4J DOM for composing

lucene9_9.10.0+dfsg-1_source.changes ACCEPTED into unstable

2024-02-28 Thread Debian FTP Masters
Thank you for your contribution to Debian. Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Wed, 28 Feb 2024 02:00:15 -0500 Source: lucene9 Architecture: source Version: 9.10.0+dfsg-1 Distribution: unstable Urgency: medium Maintainer: Debian Java Maintainers