java-package is marked for autoremoval from testing

2024-04-06 Thread Debian testing autoremoval watch
java-package 0.63 is marked for autoremoval from testing on 2024-04-27 It is affected by these RC bugs: 1067929: java-package: Update Depends for the time64 renames https://bugs.debian.org/1067929 This mail is generated by:

libjxmpp-java 1.0.1-4 MIGRATED to testing

2024-04-06 Thread Debian testing watch
FYI: The status of the libjxmpp-java source package in Debian's testing distribution has changed. Previous version: 1.0.1-3 Current version: 1.0.1-4 -- This email is automatically generated once a day. As the installation of new packages into testing happens multiple times a day you will

Bug#1064192: marked as done (openrefine: CVE-2024-23833)

2024-04-06 Thread Debian Bug Tracking System
Your message dated Sat, 06 Apr 2024 20:37:30 + with message-id and subject line Bug#1064192: fixed in openrefine 3.7.8-1 has caused the Debian Bug report #1064192, regarding openrefine: CVE-2024-23833 to be marked as done. This means that you claim that the problem has been dealt with. If

openrefine_3.7.8-1_source.changes ACCEPTED into unstable

2024-04-06 Thread Debian FTP Masters
Thank you for your contribution to Debian. Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Sat, 06 Apr 2024 21:45:36 +0200 Source: openrefine Architecture: source Version: 3.7.8-1 Distribution: unstable Urgency: high Maintainer: Debian Java Maintainers

Processing of openrefine_3.7.8-1_source.changes

2024-04-06 Thread Debian FTP Masters
openrefine_3.7.8-1_source.changes uploaded successfully to localhost along with the files: openrefine_3.7.8-1.dsc openrefine_3.7.8.orig.tar.xz openrefine_3.7.8-1.debian.tar.xz openrefine_3.7.8-1_amd64.buildinfo Greetings, Your Debian queue daemon (running on host

Bug#1068233: snappy-java: please add support for loong64

2024-04-06 Thread tony mancill
On Tue, Apr 02, 2024 at 11:44:10AM +, wuruilong wrote: > Source: snappy-java > Severity: wishlist > X-Debbugs-Cc: wuruil...@loongson.cn > > Dear Maintainer, > > According to the upstream commit, the loong64 architecture needs to update > the attachment code to compile correctly. > The

Bug#1039607: libjansi-java: causes maven to always output escape character

2024-04-06 Thread tony mancill
On Sat, Apr 06, 2024 at 11:09:07AM +0200, Emmanuel Bourg wrote: > Le 05/01/2024 à 07:22, tony mancill a écrit : > > > However, for the short-term, I believe we can achieve the desired > > behavior and fix the issue for most use cases by > > > > 1. Patching the mvn wrapper script in our maven

openjdk-8_8u402-ga-8_source.changes ACCEPTED into unstable

2024-04-06 Thread Debian FTP Masters
Thank you for your contribution to Debian. Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA384 Format: 1.8 Date: Sat, 06 Apr 2024 17:27:18 +0200 Source: openjdk-8 Architecture: source Version: 8u402-ga-8 Distribution: unstable Urgency: low Maintainer: Java Maintenance Changed-By:

Processing of openjdk-8_8u402-ga-8_source.changes

2024-04-06 Thread Debian FTP Masters
openjdk-8_8u402-ga-8_source.changes uploaded successfully to localhost along with the files: openjdk-8_8u402-ga-8.dsc openjdk-8_8u402-ga-8.debian.tar.xz Greetings, Your Debian queue daemon (running on host usper.debian.org) __ This is the maintainer address of Debian's Java team

Bug#1027309: marked as done (jetty9: dpkg-source died)

2024-04-06 Thread Debian Bug Tracking System
Your message dated Sat, 06 Apr 2024 15:46:27 +0200 with message-id and subject line Close 1027309, not a bug has caused the Debian Bug report #1027309, regarding jetty9: dpkg-source died to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case

Bug#1066878: marked as done (tomcat10: CVE-2024-24549)

2024-04-06 Thread Debian Bug Tracking System
Your message dated Sat, 06 Apr 2024 12:21:29 + with message-id and subject line Bug#1066878: fixed in tomcat10 10.1.20-1 has caused the Debian Bug report #1066878, regarding tomcat10: CVE-2024-24549 to be marked as done. This means that you claim that the problem has been dealt with. If this

Bug#1066877: marked as done (tomcat10: CVE-2024-23672)

2024-04-06 Thread Debian Bug Tracking System
Your message dated Sat, 06 Apr 2024 12:21:29 + with message-id and subject line Bug#1066877: fixed in tomcat10 10.1.20-1 has caused the Debian Bug report #1066877, regarding tomcat10: CVE-2024-23672 to be marked as done. This means that you claim that the problem has been dealt with. If this

tomcat10_10.1.20-1_source.changes ACCEPTED into unstable

2024-04-06 Thread Debian FTP Masters
Thank you for your contribution to Debian. Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Sat, 06 Apr 2024 13:43:19 +0200 Source: tomcat10 Architecture: source Version: 10.1.20-1 Distribution: unstable Urgency: high Maintainer: Debian Java Maintainers

Processed: Re: tomcat10: catalina.out is not recreated after deletion

2024-04-06 Thread Debian Bug Tracking System
Processing control commands: > tags -1 moreinfo Bug #1060381 [tomcat10] tomcat10: catalina.out is not recreated after deletion Ignoring request to alter tags of bug #1060381 to the same tags previously set -- 1060381: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1060381 Debian Bug Tracking

Bug#1060381: tomcat10: catalina.out is not recreated after deletion

2024-04-06 Thread Markus Koschany
Control: tags -1 moreinfo [already CCed the submitter but forgot to add the bug report] Hello Daniel, On Wed, 10 Jan 2024 12:42:34 +0100 Daniel von Obernitz wrote: > Package: tomcat10 > Version: 10.1.6-1+deb12u1 > Severity: normal > X-Debbugs-Cc: t...@security.debian.org > > Dear Maintainer,

Processing of tomcat10_10.1.20-1_source.changes

2024-04-06 Thread Debian FTP Masters
tomcat10_10.1.20-1_source.changes uploaded successfully to localhost along with the files: tomcat10_10.1.20-1.dsc tomcat10_10.1.20.orig.tar.xz tomcat10_10.1.20-1.debian.tar.xz tomcat10_10.1.20-1_amd64.buildinfo Greetings, Your Debian queue daemon (running on host

Processed: Re: tomcat10: catalina.out is not recreated after deletion

2024-04-06 Thread Debian Bug Tracking System
Processing control commands: > tags -1 moreinfo Bug #1060381 [tomcat10] tomcat10: catalina.out is not recreated after deletion Added tag(s) moreinfo. -- 1060381: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1060381 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems __

Bug#1064923: marked as done (jetty9: CVE-2024-22201)

2024-04-06 Thread Debian Bug Tracking System
Your message dated Sat, 06 Apr 2024 11:20:05 + with message-id and subject line Bug#1064923: fixed in jetty9 9.4.54-1 has caused the Debian Bug report #1064923, regarding jetty9: CVE-2024-22201 to be marked as done. This means that you claim that the problem has been dealt with. If this is

jetty9_9.4.54-1_source.changes ACCEPTED into unstable

2024-04-06 Thread Debian FTP Masters
Thank you for your contribution to Debian. Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Sat, 06 Apr 2024 12:54:58 +0200 Source: jetty9 Architecture: source Version: 9.4.54-1 Distribution: unstable Urgency: high Maintainer: Debian Java Maintainers Changed-By:

Processing of jetty9_9.4.54-1_source.changes

2024-04-06 Thread Debian FTP Masters
jetty9_9.4.54-1_source.changes uploaded successfully to localhost along with the files: jetty9_9.4.54-1.dsc jetty9_9.4.54.orig.tar.xz jetty9_9.4.54-1.debian.tar.xz jetty9_9.4.54-1_amd64.buildinfo Greetings, Your Debian queue daemon (running on host usper.debian.org) __ This is

Bug#1039607: libjansi-java: causes maven to always output escape character

2024-04-06 Thread Emmanuel Bourg
Le 05/01/2024 à 07:22, tony mancill a écrit : However, for the short-term, I believe we can achieve the desired behavior and fix the issue for most use cases by 1. Patching the mvn wrapper script in our maven package to set jansi.mode=force (and thus colorize output) unless the --batch-mode

Bug#1068463: marked as done (procyon: Untrusted code execution via cwd in classpath)

2024-04-06 Thread Debian Bug Tracking System
Your message dated Sat, 06 Apr 2024 09:21:26 + with message-id and subject line Bug#1068463: fixed in procyon 0.6.0-2 has caused the Debian Bug report #1068463, regarding procyon: Untrusted code execution via cwd in classpath to be marked as done. This means that you claim that the problem

procyon_0.6.0-2_source.changes ACCEPTED into unstable

2024-04-06 Thread Debian FTP Masters
Thank you for your contribution to Debian. Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Sat, 06 Apr 2024 10:46:00 +0200 Source: procyon Architecture: source Version: 0.6.0-2 Distribution: unstable Urgency: medium Maintainer: Debian Java Maintainers Changed-By:

access-modifier-checker_1.33-1_source.changes ACCEPTED into unstable

2024-04-06 Thread Debian FTP Masters
Thank you for your contribution to Debian. Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Sat, 06 Apr 2024 10:53:25 +0200 Source: access-modifier-checker Architecture: source Version: 1.33-1 Distribution: unstable Urgency: medium Maintainer: Debian Java

Processing of access-modifier-checker_1.33-1_source.changes

2024-04-06 Thread Debian FTP Masters
access-modifier-checker_1.33-1_source.changes uploaded successfully to localhost along with the files: access-modifier-checker_1.33-1.dsc access-modifier-checker_1.33.orig.tar.xz access-modifier-checker_1.33-1.debian.tar.xz access-modifier-checker_1.33-1_source.buildinfo Greetings,

Processing of procyon_0.6.0-2_source.changes

2024-04-06 Thread Debian FTP Masters
procyon_0.6.0-2_source.changes uploaded successfully to localhost along with the files: procyon_0.6.0-2.dsc procyon_0.6.0-2.debian.tar.xz procyon_0.6.0-2_source.buildinfo Greetings, Your Debian queue daemon (running on host usper.debian.org) __ This is the maintainer address of

Processed: Bug#1068463 marked as pending in procyon

2024-04-06 Thread Debian Bug Tracking System
Processing control commands: > tag -1 pending Bug #1068463 [procyon-decompiler] procyon: Untrusted code execution via cwd in classpath Added tag(s) pending. -- 1068463: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1068463 Debian Bug Tracking System Contact ow...@bugs.debian.org with