Bug#1086218: ibqt5waylandclient5: Plasmashell memory leak due to large clipboard history (fixed upstream)

2024-10-28 Thread Tim
Package: libqt5waylandclient5 Version: 5.15.8-2 Severity: important Dear Maintainer, My plasmashell frequently consumes all the memory on my machine due to this bug: https://bugs.kde.org/show_bug.cgi?id=466589 This patch appears to have been the fix: https://invent.kde.org/qt/qt/qtwayland/-/c

Bug#1014124: marked as done (buffer overflow in the mng plugin for Qt (CVE-2020-23884))

2024-10-28 Thread Debian Bug Tracking System
Your message dated Tue, 29 Oct 2024 00:27:53 + with message-id and subject line Bug#1014124: fixed in qtimageformats-opensource-src 5.15.15-3 has caused the Debian Bug report #1014124, regarding buffer overflow in the mng plugin for Qt (CVE-2020-23884) to be marked as done. This means that yo

Bug#1046162: marked as done (qtimageformats-opensource-src: Fails to build source after successful build)

2024-10-28 Thread Debian Bug Tracking System
Your message dated Tue, 29 Oct 2024 00:27:53 + with message-id and subject line Bug#1046162: fixed in qtimageformats-opensource-src 5.15.15-3 has caused the Debian Bug report #1046162, regarding qtimageformats-opensource-src: Fails to build source after successful build to be marked as done.

qtimageformats-opensource-src_5.15.15-3_source.changes ACCEPTED into unstable

2024-10-28 Thread Debian FTP Masters
Thank you for your contribution to Debian. Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Tue, 29 Oct 2024 00:08:53 +0300 Source: qtimageformats-opensource-src Architecture: source Version: 5.15.15-3 Distribution: unstable Urgency: medium Maintainer: Debian Qt/KDE

qt6-declarative_6.7.2+dfsg-10_source.changes ACCEPTED into unstable

2024-10-28 Thread Debian FTP Masters
Thank you for your contribution to Debian. Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Mon, 28 Oct 2024 21:43:37 +0100 Source: qt6-declarative Architecture: source Version: 6.7.2+dfsg-10 Distribution: unstable Urgency: medium Maintainer: Debian Qt/KDE Maintainer

Processing of qtimageformats-opensource-src_5.15.15-3_source.changes

2024-10-28 Thread Debian FTP Masters
qtimageformats-opensource-src_5.15.15-3_source.changes uploaded successfully to localhost along with the files: qtimageformats-opensource-src_5.15.15-3.dsc qtimageformats-opensource-src_5.15.15-3.debian.tar.xz qtimageformats-opensource-src_5.15.15-3_source.buildinfo Greetings, Your

Processing of qt6-declarative_6.7.2+dfsg-10_source.changes

2024-10-28 Thread Debian FTP Masters
qt6-declarative_6.7.2+dfsg-10_source.changes uploaded successfully to localhost along with the files: qt6-declarative_6.7.2+dfsg-10.dsc qt6-declarative_6.7.2+dfsg-10.debian.tar.xz qt6-declarative_6.7.2+dfsg-10_source.buildinfo Greetings, Your Debian queue daemon (running on host usp

Processed: Bug#1014124 marked as pending in qtimageformats-opensource-src

2024-10-28 Thread Debian Bug Tracking System
Processing control commands: > tag -1 pending Bug #1014124 [qt5-image-formats-plugins] buffer overflow in the mng plugin for Qt (CVE-2020-23884) Added tag(s) pending. -- 1014124: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014124 Debian Bug Tracking System Contact ow...@bugs.debian.org w

Processed: Bug#1046162 marked as pending in qtimageformats-opensource-src

2024-10-28 Thread Debian Bug Tracking System
Processing control commands: > tag -1 pending Bug #1046162 [src:qtimageformats-opensource-src] qtimageformats-opensource-src: Fails to build source after successful build Added tag(s) pending. -- 1046162: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1046162 Debian Bug Tracking System Conta

Processed: kmail-account-wizard: CVE-2024-50624

2024-10-28 Thread Debian Bug Tracking System
Processing control commands: > fixed -1 4:24.08.0-1 Bug #1086198 [src:kmail-account-wizard] kmail-account-wizard: CVE-2024-50624 Marked as fixed in versions kmail-account-wizard/4:24.08.0-1. -- 1086198: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1086198 Debian Bug Tracking System Contact

Bug#1086198: kmail-account-wizard: CVE-2024-50624

2024-10-28 Thread Salvatore Bonaccorso
Source: kmail-account-wizard Version: 4:22.12.3-3 Severity: important Tags: security upstream Forwarded: https://bugs.kde.org/show_bug.cgi?id=487882 X-Debbugs-Cc: car...@debian.org, Debian Security Team Control: fixed -1 4:24.08.0-1 Hi, The following vulnerability was published for kmail-account