Finding fresh policy Processing upload ncurses_6.2-ok2_source.changes Beginning processing. Verifying signature on ncurses_6.2-ok2_source.changes Verifying signature on ncurses_6.2-ok2.dsc Performing DSC verification. ncurses_6.2-ok2_source.buildinfo can be unsigned. Verifying the changes file. Verifying files in upload. Verifying source file ncurses_6.2-ok2.dsc ncurses_6.2.orig.tar.gz found in Primary Archive for openKylin Verifying uploaded source package by unpacking it. Copying copyright contents. Found changelog Cleaning up source tree. Done Verifying source file ncurses_6.2.orig.tar.gz Verifying source file ncurses_6.2-ok2.debian.tar.xz Verifying buildinfo file ncurses_6.2-ok2_source.buildinfo Finding and applying overrides. Checking for ncurses/6.2-ok2 source ancestry Finished checking upload. Creating queue entry ncurses diff from 6.2-ok1 (in Openkylin) to 6.2-ok2 requested Setting it to UNAPPROVED Building recipients list. Adding recipient: 'Cibot ' Sent a mail: Subject: [openkylin/yangtze-proposed] ncurses 6.2-ok2 (Waiting for approval) Sender: OKBS notice Recipients: Cibot Bcc: Local Root Body: ncurses (6.2-ok2) yangtze; urgency=medium * pankw [CVE-2023-29491] ncurses before 6.4 20230408, when used by a setuid application, allows local users to trigger security-relevant memory corruption via malformed data in a terminfo database file that is found in $HOME/.terminfo or reached via the TERMINFO or TERM environment variable. Date: Sat, 15 Jul 2023 19:40:45 +0800 Changed-By: pankewen Maintainer: Craig Small Signed-By: Cibot https://build.openkylin.top/openkylin/+source/ncurses/6.2-ok2 == OK: ncurses_6.2.orig.tar.gz OK: ncurses_6.2-ok2.debian.tar.xz OK: ncurses_6.2-ok2.dsc -> Component: main Section: libs This upload awaits approval by a distro manager No announcement sent Thank you for your contribution to openKylin. -- You are receiving this email because you made this upload. Committing the transaction and any mails associated with this upload.