Re: Bug#516875: ITP: libxfce4menu -- freedesktop.org compliant menu implementation for Xfce

2009-02-24 Thread Andreas Tille
On Tue, 24 Feb 2009, Yves-Alexis Perez wrote: * Package name: libxfce4menu Version : 4.6.0 Upstream Author : Jannis Pohlmann jan...@xfce.org * URL : http://www.xfce.org.org/ * License : GPL-2+ Programming Lang: C Description : freedesktop.org compliant

Re: Bug#516875: ITP: libxfce4menu -- freedesktop.org compliant menu implementation for Xfce

2009-02-24 Thread Yves-Alexis Perez
On mar, 2009-02-24 at 09:05 +0100, Andreas Tille wrote: libxfce4menu is an XDG-compliant menu implementation for Xfce Desktop Environment. Could you please be a little bit more verbose. I had the (maybe wrong) assumption that xfce4 would be XDG-compliant without any additional

Bug#516880: ITP: argvalidate -- simple argument validator library for Python

2009-02-24 Thread Stephan Peijnik
Package: wnpp Severity: wishlist Owner: Stephan Peijnik deb...@sp.or.at * Package name: argvalidate Version : 0.8.0 Upstream Author : Stephan Peijnik step...@peijnik.at * URL : http://bitbucket.org/sp/python-argvalidate * License : GPL Programming Lang:

Re: Refactoring the Debtags web interface

2009-02-24 Thread Enrico Zini
On Mon, Feb 23, 2009 at 10:19:21PM -0500, Sam Hartman wrote: I find it deeply ironic that I'm arguing against security. However, let's remember that we're talking about debtags. It's always important to think about your threat model and about how much complexity you're willing to spend in

Re: Refactoring the Debtags web interface

2009-02-24 Thread Yves-Alexis Perez
On mar, 2009-02-24 at 10:27 +, Enrico Zini wrote: I can implement OpenID in a new Debtags web application, but people would have to get their identities out of something like their blogs. We could implement a Debian OpenID provider, but it'll have to be something else than the normal user

Bug#516898: ITP: scheme9 -- Scheme 9 from Empty Space R4RS Scheme interpreter

2009-02-24 Thread Barak A. Pearlmutter
Package: wnpp Severity: wishlist Owner: Barak A. Pearlmutter b...@debian.org * Package name: scheme9 Version : 2009.02.09 Upstream Author : Nils M Holm n...@t3x.org * URL : http://t3x.org/s9fes/ * License : ideosyncratic near-MIT/X Programming Lang: C,

Re: Is the FHS dead ?

2009-02-24 Thread Luke L
On Mon, Feb 16, 2009 at 4:14 AM, Josselin Mouette j...@debian.org wrote: Hi, I wanted to discuss the python-support directory tree location (and similar issues) with the FHS maintainers, however it occurred to me that the mailing list is completely dead, and the standard doesn’t seem very

link exchainge request

2009-02-24 Thread nitin rana
*Plz Add My Id* {*nitinrana.anewin...@gmail.com*} Thanks

Re: Bug#516659: ITP: w3bfukk0r -- scan webservers for hidden directories (forced browsing)

2009-02-24 Thread Jon Dowland
On Sun, Feb 22, 2009 at 07:27:43PM -0600, Ron Johnson wrote: But what (besides web crawling) is the (legal) purpose of that? And why does it need a word list? It seems to me that this tool is as open to abuse as nmap, ping, wget, and several other apps we distribute. -- Jon Dowland

Re: Is the FHS dead ?

2009-02-24 Thread Gunnar Wolf
Theodore Tso dijo [Fri, Feb 20, 2009 at 11:57:32PM -0500]: Well, realistically we didn't have very good participation from anyone other than one or two *BSD folks, and at the time some of the changes that were made for compatibility with *BSD (and, to be fair, to be closer to the rest of the

handling group membership in and outside d-i

2009-02-24 Thread Jon Dowland
Hi folks, I filed a bug against gnome-power-manager a little while ago because I could not suspend. It turned out my user was not in the powerdev group. It was Joss' initial belief that the non-root user that you create in d-i is added to a fixed set of groups, including powerdev. For the

Re: Is the FHS dead ?

2009-02-24 Thread Paul Wise
On Tue, Feb 24, 2009 at 9:46 PM, Luke L lukehasnon...@gmail.com wrote: Something to think about: Shouldn't SQL databases and web servers, and file servers, be under /srv/? /srv/www, /srv/mysql, /srv/smb, etc.? The bikeshed shall be coloured 'yes'. -- bye, pabs

Re: Is the FHS dead ?

2009-02-24 Thread Theodore Tso
On Tue, Feb 24, 2009 at 08:20:31AM -0600, Gunnar Wolf wrote: Interesting. And yes, illustrative of the historically (and, should I add, ridiculous? No, I'd better not ;-) ) rivality between Linux and the *BSDs, big egos included. Well, the last time we tried to make reasonable accomodations

Come join me on Motorcycle Accessories Warehouse

2009-02-24 Thread motohart
Motorcycle Accessories Warehouse: motorcycle accessories, motorcycle accessories warehouse, wholesale motorcycle a this may be of interest for you so please do visit it. Click the link below to Join: http://motohart.ning.com/?xgi=b6jveyp If your email program doesn't

Re: handling group membership in and outside d-i

2009-02-24 Thread Daniel Moerner
On Tue, Feb 24, 2009 at 6:11 AM, Jon Dowland jon+debian-de...@alcopop.org wrote: Hi folks, I filed a bug against gnome-power-manager a little while ago because I could not suspend. It turned out my user was not in the powerdev group. Hi, there are already some bugs open about this, because

Security Issue of .desktop files

2009-02-24 Thread Daniel Ruoso
Hello, Last week, an old security issue in desktop environments went through a widely public discussion (including on slashdot)[1][2]. As I said, this issue is not new[3], but there seem to be no action on the upstream to fix it. After taking an extensive look in all the history of this

Re: Security Issue of .desktop files

2009-02-24 Thread Josselin Mouette
Le mardi 24 février 2009 à 15:21 -0300, Daniel Ruoso a écrit : Last week, an old security issue in desktop environments went through a widely public discussion (including on slashdot)[1][2]. As I said, this issue is not new[3], but there seem to be no action on the upstream to fix it. On the

Re: Security Issue of .desktop files

2009-02-24 Thread Daniel Ruoso
Em Ter, 2009-02-24 às 19:35 +0100, Josselin Mouette escreveu: Le mardi 24 février 2009 à 15:21 -0300, Daniel Ruoso a écrit : Last week, an old security issue in desktop environments went through a widely public discussion (including on slashdot)[1][2]. As I said, this issue is not new[3],

Re: Security Issue of .desktop files

2009-02-24 Thread Yves-Alexis Perez
On mar, 2009-02-24 at 15:21 -0300, Daniel Ruoso wrote: Last week, an old security issue in desktop environments went through a widely public discussion (including on slashdot)[1][2]. As I said, this issue is not new[3], but there seem to be no action on the upstream to fix it. In Xfce this

Re: Bug#516659: ITP: w3bfukk0r -- scan webservers for hidden directories (forced browsing)

2009-02-24 Thread Ron Johnson
On 02/24/2009 08:13 AM, Jon Dowland wrote: On Sun, Feb 22, 2009 at 07:27:43PM -0600, Ron Johnson wrote: But what (besides web crawling) is the (legal) purpose of that? And why does it need a word list? It seems to me that this tool is as open to abuse as nmap, ping, wget, and several other

Re: Security Issue of .desktop files

2009-02-24 Thread Daniel Ruoso
Em Ter, 2009-02-24 às 19:53 +0100, Yves-Alexis Perez escreveu: On mar, 2009-02-24 at 15:21 -0300, Daniel Ruoso wrote: Last week, an old security issue in desktop environments went through a widely public discussion (including on slashdot)[1][2]. As I said, this issue is not new[3], but

Re: Security Issue of .desktop files

2009-02-24 Thread Yves-Alexis Perez
On mar, 2009-02-24 at 16:11 -0300, Daniel Ruoso wrote: The issue here is about recognizing that .desktop files are executables, and, as such, must have the x bit set in order to be executed. Depending who executes its. On Xfce, a suspected malicious file won't be executed. Consider the user

Re: Whoos with GnuTLS and md5-signed certificates

2009-02-24 Thread Florian Weimer
* Florian Weimer: Would those who have an interest in this topic please test the patch in http://bugs.debian.org/cgi-bin/bugreport.cgi?msg=97;bug=514807;mbox=yes and report if it improves things for them? Thanks. For the record, it's very likely that we are soon to release updates with

Re: Security Issue of .desktop files

2009-02-24 Thread Emilio Pozuelo Monfort
Daniel Ruoso wrote: Em Ter, 2009-02-24 às 19:35 +0100, Josselin Mouette escreveu: Le mardi 24 février 2009 à 15:21 -0300, Daniel Ruoso a écrit : Last week, an old security issue in desktop environments went through a widely public discussion (including on slashdot)[1][2]. As I said, this

Bug#516972: ITP: vilistextum -- a HTML to text converter

2009-02-24 Thread Siegfried-Angel Gevatter Pujals
Package: wnpp Severity: wishlist Owner: Siegfried-Angel Gevatter Pujals rai...@ubuntu.com * Package name: vilistextum Version : 2.6.7 Upstream Author : Patric Müller bh...@gmx.net * URL : http://bhaak.dyndns.org/vilistextum/ * License : GPLv2 Programming

Re: Bug#516659: ITP: w3bfukk0r -- scan webservers for hidden directories (forced browsing)

2009-02-24 Thread Holger Levsen
Hi, On Dienstag, 24. Februar 2009, Ron Johnson wrote: The apps you specify have obvious non-abusive uses. What (besides penetration testing) are such uses for w3bfukk0r? penetration testing is a useful use. you might even do it for others. (As Noah Slater pointed out, it's hard to lose a

Bug#516976: ITP: clive-utils -- additional utilities for clive

2009-02-24 Thread Damyan Ivanov
Package: wnpp Severity: wishlist Owner: Damyan Ivanov d...@debian.org * Package name: clive-utils Version : 2.1.3 Upstream Author : Toni Gundogdu lega...@gmail.com * URL : http://code.google.com/p/clive-utils/ * License : BSD Programming Lang: Perl

Re: Bug#516659: ITP: w3bfukk0r -- scan webservers for hidden?directories (forced browsing)

2009-02-24 Thread Noah Slater
On Tue, Feb 24, 2009 at 09:17:35PM +0100, Holger Levsen wrote: (As Noah Slater pointed out, it's hard to lose a directory on your own machine...) you can loose access to your machine... At which point you may as well call it someone else's machine. -- Noah Slater,

Re: Security Issue of .desktop files

2009-02-24 Thread Daniel Ruoso
Em Ter, 2009-02-24 às 20:27 +0100, Yves-Alexis Perez escreveu: By who? The Browser? Fix the browser? Please take a look at all the discussion in the bug reports, I don't think we need to repeat all the argumentation here. daniel -- To UNSUBSCRIBE, email to

Re: Security Issue of .desktop files

2009-02-24 Thread Daniel Ruoso
Em Ter, 2009-02-24 às 20:49 +0100, Emilio Pozuelo Monfort escreveu: Daniel Ruoso wrote: Em Ter, 2009-02-24 às 19:35 +0100, Josselin Mouette escreveu: Le mardi 24 février 2009 à 15:21 -0300, Daniel Ruoso a écrit : Last week, an old security issue in desktop environments went through a

Re: Bug#516659: ITP: w3bfukk0r -- scan webservers for hidden?directories (forced browsing)

2009-02-24 Thread Holger Levsen
Hi, On Dienstag, 24. Februar 2009, Noah Slater wrote: you can loose access to your machine... At which point you may as well call it someone else's machine. I ment loosing/forgetting the passwords or the keys. regards, Holger signature.asc Description: This is a digitally signed

Re: Security Issue of .desktop files

2009-02-24 Thread Josselin Mouette
Le mardi 24 février 2009 à 17:36 -0300, Daniel Ruoso a écrit : I'm pretty happy with that solution (although I would prefer not having the launch anyway/mark as trusted box, but rather simply show the properties dialog for a non-executable-non-system-wide .desktop file (but I think that should

xcdroast does no longer work with wodim: Who to blame?

2009-02-24 Thread Andreas Tscharner
Hello World, xcdroast is looking for cdrecord, which does no longer exist in Debian Sid (apparently). And wodim does no longer provide a symlink as cdrecord or something (apparently). So: xcdroast does no longer work. Who is to blame (Bug entry): xcdroats or wodim? Best regards

Re: Security Issue of .desktop files

2009-02-24 Thread Daniel Ruoso
Em Ter, 2009-02-24 às 21:43 +0100, Josselin Mouette escreveu: I also would suggest that as a migration plan only, where we do turn all .desktop files into executables in the future, so we have a consistent environment. What is the purpose of having system .desktop files executable?

Re: Bug#516659: ITP: w3bfukk0r -- scan webservers for hidden?directories (forced browsing)

2009-02-24 Thread Ron Johnson
On 02/24/2009 02:38 PM, Holger Levsen wrote: Hi, On Dienstag, 24. Februar 2009, Noah Slater wrote: you can loose access to your machine... At which point you may as well call it someone else's machine. I ment loosing/forgetting the passwords Rescue disk!

Re: Security Issue of .desktop files

2009-02-24 Thread Michael S. Gilbert
On Tue, 24 Feb 2009 17:32:57 -0300, Daniel Ruoso wrote: By who? The Browser? Fix the browser? Please take a look at all the discussion in the bug reports, I don't think we need to repeat all the argumentation here. I think Yves is saying that the launcher issue is (and always was) correctly

Re: xcdroast does no longer work with wodim: Who to blame?

2009-02-24 Thread Reinhard Tartler
Andreas Tscharner a...@vis.ethz.ch writes: So: xcdroast does no longer work. Who is to blame (Bug entry): xcdroats or wodim? xcdroast -- Gruesse/greetings, Reinhard Tartler, KeyID 945348A4 -- To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org with a subject of unsubscribe.

Re: Security Issue of .desktop files

2009-02-24 Thread Daniel Ruoso
Em Ter, 2009-02-24 às 16:33 -0500, Michael S. Gilbert escreveu: I think Yves is saying that the launcher issue is (and always was) correctly handled in the XFCE desktop. This is a GNOME/KDE-specific problem. So if a .desktop file appears in the user's Desktop without the x bit set and the

Re: Security Issue of .desktop files

2009-02-24 Thread Yves-Alexis Perez
On mar, 2009-02-24 at 18:35 -0300, Daniel Ruoso wrote: So if a .desktop file appears in the user's Desktop without the x bit set and the user clicks it, it won't get executed.. Not exactly. The “safe” .desktop file was in the link I pasted on another mail in the thread: /* check if the file

Re: Security Issue of .desktop files

2009-02-24 Thread Daniel Ruoso
Em Ter, 2009-02-24 às 22:53 +0100, Yves-Alexis Perez escreveu: On mar, 2009-02-24 at 18:35 -0300, Daniel Ruoso wrote: So if a .desktop file appears in the user's Desktop without the x bit set and the user clicks it, it won't get executed.. Not exactly. The “safe” .desktop file was in the

Bug #513073 - debhelper impossible to unpack on Win32 due to case insensitivity - please reopen

2009-02-24 Thread Sjors Gielen
Hello Joey and list, I'd like to ask you to reopen this bug. I have sent you a patch which fixes debhelper so it can unpack on case insensitive file systems or operating systems. debhelper has in its main directory, next to the regular debian directory, also a Debian directory which contains

Re: Security Issue of .desktop files

2009-02-24 Thread Armin Berres
On Tue, 24 Feb 09 17:36, Daniel Ruoso wrote: Em Ter, 2009-02-24 às 20:49 +0100, Emilio Pozuelo Monfort escreveu: Daniel Ruoso wrote: Em Ter, 2009-02-24 às 19:35 +0100, Josselin Mouette escreveu: Le mardi 24 février 2009 à 15:21 -0300, Daniel Ruoso a écrit : Last week, an old security

Re: Security Issue of .desktop files

2009-02-24 Thread Yves-Alexis Perez
On mar, 2009-02-24 at 19:09 -0300, Daniel Ruoso wrote: So if the launcher use a plain name like Nude Shots, it will get executed? Please provide what you think is a bad .desktop and I'll let you know. Or you can try it yourself. Cheers, -- Yves-Alexis signature.asc Description: This is a

Re: Is the FHS dead ?

2009-02-24 Thread Russ Allbery
Luke L lukehasnon...@gmail.com writes: Something to think about: Shouldn't SQL databases and web servers, and file servers, be under /srv/? /srv/www, /srv/mysql, /srv/smb, etc.? The current FHS reserves /srv's namespace for the local administrator. My guess is that people won't want to go

Re: Bug #513073 - debhelper impossible to unpack on Win32 due to case insensitivity - please reopen

2009-02-24 Thread Neil Williams
On Tue, 24 Feb 2009 23:07:35 +0100 Sjors Gielen mailingl...@dazjorz.com wrote: I'd like to ask you to reopen this bug. I have sent you a patch which fixes debhelper so it can unpack on case insensitive file systems or operating systems. debhelper has in its main directory, next to the

Re: Security Issue of .desktop files

2009-02-24 Thread Michael S. Gilbert
On Tue, 24 Feb 2009 19:09:42 -0300, Daniel Ruoso wrote: So if a .desktop file appears in the user's Desktop without the x bit set and the user clicks it, it won't get executed.. Not exactly. The “safe” .desktop file was in the link I pasted on another mail in the thread: So if the

Re: Bug #513073 - debhelper impossible to unpack on Win32 due to case insensitivity - please reopen

2009-02-24 Thread Russ Allbery
Neil Williams codeh...@debian.org writes: Sjors Gielen mailingl...@dazjorz.com wrote: If I'm correct, OS X may work in case insensitive mode too. It's been a while since I used OSX but I certainly remember .DS_Store directories all over the place and various applications using a mix of

Re: Bug #513073 - debhelper impossible to unpack on Win32 due to case insensitivity - please reopen

2009-02-24 Thread Cyril Brulebois
Neil Williams codeh...@debian.org (24/02/2009): If I'm correct, OS X may work in case insensitive mode too. It's been a while since I used OSX but I certainly remember .DS_Store directories all over the place and various applications using a mix of capitalised and lower case directory

Bug#516991: ITP: dnssec-conf -- DNSSEC and DLV configuration tool

2009-02-24 Thread Ondřej Surý
X-Debbugs-Cc: debian-devel@lists.debian.org Package: wnpp Severity: wishlist Owner: Ondřej Surý ond...@debian.org * Package name: dnssec-conf Version : 1.15 Upstream Author : Paul Wouters p...@xelerance.com * URL : http://www.xelerance.com/software/dnssec-conf/ * License

Re: Security Issue of .desktop files

2009-02-24 Thread Yves-Alexis Perez
On mar, 2009-02-24 at 17:33 -0500, Michael S. Gilbert wrote: here is a .desktop file that looks like it is iceweasel, but really it downloads an essentially random file, but I could have made it do pretty much anything. Yes, tests may need to be narrowed. That should be part of the spec,

Re: Security Issue of .desktop files

2009-02-24 Thread Michael S. Gilbert
On Tue, 24 Feb 2009 23:44:31 +0100, Yves-Alexis Perez wrote: here is a .desktop file that looks like it is iceweasel, but really it downloads an essentially random file, but I could have made it do pretty much anything. Yes, tests may need to be narrowed. That should be part of the

Re: Security Issue of .desktop files

2009-02-24 Thread Matthew Johnson
On Tue Feb 24 23:44, Yves-Alexis Perez wrote: On mar, 2009-02-24 at 17:33 -0500, Michael S. Gilbert wrote: here is a .desktop file that looks like it is iceweasel, but really it downloads an essentially random file, but I could have made it do pretty much anything. Yes, tests may need

Re: Bug #513073 - debhelper impossible to unpack on Win32 due to case insensitivity - please reopen

2009-02-24 Thread Sjors Gielen
Neil Williams schreef: On Tue, 24 Feb 2009 23:07:35 +0100 Sjors Gielen mailingl...@dazjorz.com wrote: I'd like to ask you to reopen this bug. I have sent you a patch which fixes debhelper so it can unpack on case insensitive file systems or operating systems. debhelper has in its main

Re: Bug#516875: ITP: libxfce4menu -- freedesktop.org compliant menu implementation for Xfce

2009-02-24 Thread Charles Plessy
Le Tue, Feb 24, 2009 at 09:58:21AM +0100, Yves-Alexis Perez a écrit : libxfce4menu is an XDG-compliant menu implementation for Xfce Environment. Hi Yves, by the way, since the name of the XDG was changed to freedesktop.org, it is maybe better not to use this name directly. How about:

Re: Bug#516659: ITP: w3bfukk0r -- scan webservers for hidden?directories (forced browsing)

2009-02-24 Thread Nico Golde
Hi, * Noah Slater nsla...@tumbolia.org [2009-02-25 01:32]: On Tue, Feb 24, 2009 at 09:17:35PM +0100, Holger Levsen wrote: (As Noah Slater pointed out, it's hard to lose a directory on your own machine...) you can loose access to your machine... At which point you may as well call it

Re: ucf: Diversion of /u/b/ucf by etcgit

2009-02-24 Thread Manoj Srivastava
On Mon, Feb 23 2009, sean finney wrote: On Mon, Feb 23, 2009 at 09:24:17PM +0100, Frank Küster wrote: (1) I use the hooks provided by apt to get the original files from the package In other words, with ucf you get NOTHING, since there are no original files in the package. They are only

Re: Bug#516875: ITP: libxfce4menu -- freedesktop.org compliant menu implementation for Xfce

2009-02-24 Thread Yves-Alexis Perez
On mer, 2009-02-25 at 09:08 +0900, Charles Plessy wrote: Hi Yves, by the way, my name is Yves-Alexis. by the way, since the name of the XDG was changed to freedesktop.org, it is maybe better not to use this name directly. How about: libxfce4menu is a menu implementation for the Xfce

Re: Security Issue of .desktop files

2009-02-24 Thread Yves-Alexis Perez
On mar, 2009-02-24 at 23:36 +, Matthew Johnson wrote: Speaking as someone with a PhD in computer security (and my PhD was in this area) I can tell you that trying to use heuristics in order to determine if something is 'bad' does not, and it's fairly widely recognised cannot, work. Well,

Accepted firebird2.1 2.1.1.17910-release.ds1-3 (source all amd64)

2009-02-24 Thread Damyan Ivanov
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Tue, 24 Feb 2009 07:27:16 +0200 Source: firebird2.1 Binary: firebird2.1-super firebird2.1-classic libfbclient2 libfbembed2.1 firebird2.1-common firebird2.1-server-common firebird2.1-dev firebird2.1-examples firebird2.1-doc

Accepted gpscorrelate 1.5.6-2 (source amd64)

2009-02-24 Thread Stefano Zacchiroli
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Tue, 24 Feb 2009 08:22:13 +0100 Source: gpscorrelate Binary: gpscorrelate gpscorrelate-gui Architecture: source amd64 Version: 1.5.6-2 Distribution: unstable Urgency: low Maintainer: Debian QA Group packa...@qa.debian.org Changed-By:

Accepted shared-mime-info 0.60-1 (source amd64)

2009-02-24 Thread Sebastian Dröge
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Tue, 24 Feb 2009 09:36:28 +0100 Source: shared-mime-info Binary: shared-mime-info Architecture: source amd64 Version: 0.60-1 Distribution: unstable Urgency: low Maintainer: Filip Van Raemdonck mecha...@debian.org Changed-By:

Accepted nsis 2.44-1 (source amd64)

2009-02-24 Thread Paul Wise
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Tue, 24 Feb 2009 17:51:13 +0900 Source: nsis Binary: nsis Architecture: source amd64 Version: 2.44-1 Distribution: experimental Urgency: low Maintainer: Paul Wise p...@debian.org Changed-By: Paul Wise p...@debian.org Description:

Accepted libidn 1.12-1 (source i386)

2009-02-24 Thread Simon Josefsson
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Tue, 24 Feb 2009 10:19:44 +0100 Source: libidn Binary: idn libidn11-dev libidn11 Architecture: source i386 Version: 1.12-1 Distribution: unstable Urgency: low Maintainer: Anibal Monsalve Salazar ani...@debian.org Changed-By: Simon

Accepted cipux 3.4.0.0-1 (source all)

2009-02-24 Thread Jonas Smedegaard
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Tue, 24 Feb 2009 10:36:38 +0100 Source: cipux Binary: libcipux-perl Architecture: source all Version: 3.4.0.0-1 Distribution: unstable Urgency: low Maintainer: CipUX team cipux-de...@lists.alioth.debian.org Changed-By: Jonas

Accepted firebug 1.3.3-1 (source all)

2009-02-24 Thread Dmitry E. Oboukhov
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Tue, 24 Feb 2009 12:24:53 +0300 Source: firebug Binary: iceweasel-firebug Architecture: source all Version: 1.3.3-1 Distribution: unstable Urgency: low Maintainer: Dmitry E. Oboukhov un...@debian.org Changed-By: Dmitry E. Oboukhov

Accepted z88dk 1.8.ds1-5 (source i386 all)

2009-02-24 Thread Krystian Wlosek
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Tue, 23 Feb 2009 11:10:17 +0100 Source: z88dk Binary: z88dk-bin z88dk-doc z88dk-data z88dk Architecture: source i386 all Version: 1.8.ds1-5 Distribution: unstable Urgency: low Maintainer: tyg...@waw.pdi.net Changed-By: Krystian

Accepted python-django-debug-toolbar 0+git200901231854-2 (source all)

2009-02-24 Thread Chris Lamb
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Tue, 24 Feb 2009 10:26:27 + Source: python-django-debug-toolbar Binary: python-django-debug-toolbar Architecture: source all Version: 0+git200901231854-2 Distribution: unstable Urgency: low Maintainer: Chris Lamb la...@debian.org

Accepted vile 9.7k-1 (source all amd64)

2009-02-24 Thread Paul van Tilburg
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Tue, 24 Feb 2009 11:01:26 +0100 Source: vile Binary: vile-common vile vile-filters xvile Architecture: source all amd64 Version: 9.7k-1 Distribution: unstable Urgency: low Maintainer: Brendan O'Dea b...@debian.org Changed-By: Paul

Accepted suitesparse 1:3.2.0-4 (source all amd64)

2009-02-24 Thread Rafael Laboissiere
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Tue, 24 Feb 2009 11:08:12 +0100 Source: suitesparse Binary: libcolamd-3.2.0 libsuitesparse-3.2.0 libsuitesparse-dev libsuitesparse-dbg libsuitesparse-doc Architecture: source all amd64 Version: 1:3.2.0-4 Distribution: unstable

Accepted glide 2002.04.10ds1-2 (source i386)

2009-02-24 Thread Guillem Jover
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Tue, 24 Feb 2009 13:45:16 +0200 Source: glide Binary: glide2-bin libglide2 libglide2-dev libglide3 libglide3-dev Architecture: source i386 Version: 2002.04.10ds1-2 Distribution: unstable Urgency: low Maintainer: Guillem Jover

Accepted s3d 0.2.1-9 (source i386 all)

2009-02-24 Thread Sven Eckelmann
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Sun, 15 Feb 2009 13:29:04 +0100 Source: s3d Binary: s3d s3d-dbg libs3d2 libs3d-dev libs3dw2 libs3dw-dev s3d-data s3d-doc dotmcp kism3d meshs3d s3dfm s3dosm s3dvt s3dx11gate Architecture: source i386 all Version: 0.2.1-9

Accepted findlib 1.2.4-1 (source amd64)

2009-02-24 Thread Stefano Zacchiroli
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Tue, 24 Feb 2009 13:54:26 +0100 Source: findlib Binary: ocaml-findlib Architecture: source amd64 Version: 1.2.4-1 Distribution: unstable Urgency: low Maintainer: Stefano Zacchiroli z...@debian.org Changed-By: Stefano Zacchiroli

Accepted python-ptrace 0.6-1 (source all)

2009-02-24 Thread Pierre Chifflier
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Tue, 24 Feb 2009 14:22:15 +0100 Source: python-ptrace Binary: python-ptrace Architecture: source all Version: 0.6-1 Distribution: unstable Urgency: low Maintainer: Pierre Chifflier pol...@debian.org Changed-By: Pierre Chifflier

Accepted haskell-binary 0.5-1 (source all i386)

2009-02-24 Thread Kari Pahula
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Tue, 24 Feb 2009 16:13:02 +0200 Source: haskell-binary Binary: libghc6-binary-dev libghc6-binary-prof libhugs-binary libghc6-binary-doc Architecture: source all i386 Version: 0.5-1 Distribution: unstable Urgency: low Maintainer: Kari

Accepted xmonad 0.8.1-2 (source all amd64)

2009-02-24 Thread Joachim Breitner
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Tue, 24 Feb 2009 14:47:36 +0100 Source: xmonad Binary: xmonad libghc6-xmonad-dev libghc6-xmonad-prof libghc6-xmonad-doc Architecture: source all amd64 Version: 0.8.1-2 Distribution: unstable Urgency: low Maintainer: Joachim Breitner

Accepted glib2.0 2.19.8-2 (source all amd64)

2009-02-24 Thread Sebastian Dröge
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Tue, 24 Feb 2009 16:08:05 +0100 Source: glib2.0 Binary: libglib2.0-0 libglib2.0-udeb libglib2.0-dev libglib2.0-0-dbg libglib2.0-data libglib2.0-doc libgio-fam Architecture: source all amd64 Version: 2.19.8-2 Distribution:

Accepted nsd 2.3.7-2 (source amd64)

2009-02-24 Thread Ondřej Surý
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Tue, 24 Feb 2009 15:06:01 +0100 Source: nsd Binary: nsd Architecture: source amd64 Version: 2.3.7-2 Distribution: unstable Urgency: low Maintainer: Ondřej Surý ond...@debian.org Changed-By: Ondřej Surý ond...@debian.org Description:

Accepted camlp5 5.10-3 (source amd64)

2009-02-24 Thread Stefano Zacchiroli
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Tue, 24 Feb 2009 14:24:21 +0100 Source: camlp5 Binary: camlp5 Architecture: source amd64 Version: 5.10-3 Distribution: unstable Urgency: low Maintainer: Stefano Zacchiroli z...@debian.org Changed-By: Stefano Zacchiroli

Accepted plib 1.8.5-2 (source i386)

2009-02-24 Thread Bradley Smith
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Tue, 24 Feb 2009 13:38:02 + Source: plib Binary: libplib1 libplib-dev Architecture: source i386 Version: 1.8.5-2 Distribution: experimental Urgency: low Maintainer: Bradley Smith bradsm...@debian.org Changed-By: Bradley Smith

Accepted bogofilter 1.2.0-1 (source all)

2009-02-24 Thread Clint Adams
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Tue, 24 Feb 2009 08:59:46 -0500 Source: bogofilter Binary: bogofilter bogofilter-bdb bogofilter-qdbm bogofilter-sqlite bogofilter-tokyocabinet bogofilter-common Architecture: source all Version: 1.2.0-1 Distribution: unstable

Accepted gnurobots 2:1.2.0-3 (source i386)

2009-02-24 Thread Bradley Smith
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Tue, 24 Feb 2009 14:31:41 + Source: gnurobots Binary: gnurobots Architecture: source i386 Version: 2:1.2.0-3 Distribution: unstable Urgency: low Maintainer: Bradley Smith bradsm...@debian.org Changed-By: Bradley Smith

Accepted libhaml-ruby 2.0.9-1 (source all)

2009-02-24 Thread Gunnar Wolf
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Tue, 24 Feb 2009 07:45:50 -0600 Source: libhaml-ruby Binary: libhaml-ruby1.8 libhaml-ruby libhaml-ruby-doc haml-elisp Architecture: source all Version: 2.0.9-1 Distribution: unstable Urgency: low Maintainer: Gunnar Wolf

Accepted apt-xapian-index 0.18 (source all)

2009-02-24 Thread Enrico Zini
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Tue, 24 Feb 2009 15:08:57 + Source: apt-xapian-index Binary: apt-xapian-index Architecture: source all Version: 0.18 Distribution: unstable Urgency: low Maintainer: Enrico Zini enr...@debian.org Changed-By: Enrico Zini

Accepted gst-plugins-bad0.10 0.10.10-3 (source all amd64)

2009-02-24 Thread Sebastian Dröge
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Mon, 23 Feb 2009 12:14:32 +0100 Source: gst-plugins-bad0.10 Binary: gstreamer0.10-plugins-bad-doc gstreamer0.10-plugins-bad gstreamer0.10-sdl gstreamer0.10-plugins-bad-dbg Architecture: source all amd64 Version: 0.10.10-3

Accepted rosegarden 1:1.7.3-1 (source all amd64)

2009-02-24 Thread Mike O'Connor
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Tue, 24 Feb 2009 07:53:26 -0500 Source: rosegarden Binary: rosegarden rosegarden-data Architecture: source all amd64 Version: 1:1.7.3-1 Distribution: unstable Urgency: low Maintainer: Debian Multimedia Team

Accepted oldsys-preseed 3.3 (source i386)

2009-02-24 Thread Martin Michlmayr
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Tue, 24 Feb 2009 16:46:15 +0100 Source: oldsys-preseed Binary: oldsys-preseed Architecture: source i386 Version: 3.3 Distribution: unstable Urgency: low Maintainer: Debian Install System Team debian-b...@lists.debian.org Changed-By:

Accepted libtelepathy 0.3.3-2 (source i386)

2009-02-24 Thread Simon McVittie
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Tue, 24 Feb 2009 15:30:36 + Source: libtelepathy Binary: libtelepathy2 libtelepathy-dev libtelepathy-dbg Architecture: source i386 Version: 0.3.3-2 Distribution: unstable Urgency: low Maintainer: Debian Telepathy maintainers

Accepted telepathy-inspector 0.5.3-1 (source i386)

2009-02-24 Thread Simon McVittie
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Tue, 24 Feb 2009 15:52:01 + Source: telepathy-inspector Binary: telepathy-inspector Architecture: source i386 Version: 0.5.3-1 Distribution: unstable Urgency: low Maintainer: Debian Telepathy maintainers

Accepted cipux 3.4.0.1-1 (source all)

2009-02-24 Thread Jonas Smedegaard
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Tue, 24 Feb 2009 17:06:05 +0100 Source: cipux Binary: libcipux-perl Architecture: source all Version: 3.4.0.1-1 Distribution: unstable Urgency: low Maintainer: CipUX team cipux-de...@lists.alioth.debian.org Changed-By: Jonas

Accepted mimedefang 2.67-1 (source i386)

2009-02-24 Thread Christoph Martin
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Tue, 24 Feb 2009 16:20:36 +0100 Source: mimedefang Binary: mimedefang graphdefang Architecture: source i386 Version: 2.67-1 Distribution: unstable Urgency: low Maintainer: Christoph Martin christoph.mar...@uni-mainz.de Changed-By:

Accepted nsis 2.44-2 (source amd64)

2009-02-24 Thread Paul Wise
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Wed, 25 Feb 2009 01:03:19 +0900 Source: nsis Binary: nsis Architecture: source amd64 Version: 2.44-2 Distribution: unstable Urgency: low Maintainer: Paul Wise p...@debian.org Changed-By: Paul Wise p...@debian.org Description: nsis

Accepted numerix 0.22-5 (source all i386)

2009-02-24 Thread Samuel Mimram
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Tue, 24 Feb 2009 17:01:46 +0100 Source: numerix Binary: libnumerix-ocaml libnumerix-ocaml-dev numerix-doc Architecture: source all i386 Version: 0.22-5 Distribution: unstable Urgency: low Maintainer: Debian OCaml Maintainers

Accepted camlzip 1.04-2 (source i386)

2009-02-24 Thread Samuel Mimram
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Tue, 24 Feb 2009 17:48:49 +0100 Source: camlzip Binary: libzip-ocaml libzip-ocaml-dev Architecture: source i386 Version: 1.04-2 Distribution: unstable Urgency: low Maintainer: Debian OCaml Maintainers

Accepted module-build-cipux 0.3.1-1 (source all)

2009-02-24 Thread Jonas Smedegaard
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Tue, 24 Feb 2009 18:02:28 +0100 Source: module-build-cipux Binary: libmodule-build-cipux-perl Architecture: source all Version: 0.3.1-1 Distribution: unstable Urgency: low Maintainer: CipUX team cipux-de...@lists.alioth.debian.org

Accepted python-ptrace 0.6-2 (source all)

2009-02-24 Thread Pierre Chifflier
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Tue, 24 Feb 2009 18:17:58 +0100 Source: python-ptrace Binary: python-ptrace Architecture: source all Version: 0.6-2 Distribution: unstable Urgency: low Maintainer: Pierre Chifflier pol...@debian.org Changed-By: Pierre Chifflier

Accepted briquolo 0.5.7-3 (source all i386)

2009-02-24 Thread Bradley Smith
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Tue, 24 Feb 2009 16:10:31 + Source: briquolo Binary: briquolo briquolo-data Architecture: source all i386 Version: 0.5.7-3 Distribution: unstable Urgency: low Maintainer: Debian Games Team pkg-games-de...@lists.alioth.debian.org

Accepted bake 1.0-11 (source all)

2009-02-24 Thread Kartik Mistry
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Tue, 24 Feb 2009 22:34:40 +0530 Source: bake Binary: bake Architecture: source all Version: 1.0-11 Distribution: unstable Urgency: low Maintainer: Kartik Mistry kar...@debian.org Changed-By: Kartik Mistry kar...@debian.org

Accepted xf86-input-tslib 0.0.5-4 (source amd64)

2009-02-24 Thread Wen-Yen Chuang
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Mon, 23 Feb 2009 23:40:51 +0800 Source: xf86-input-tslib Binary: xserver-xorg-input-tslib Architecture: source amd64 Version: 0.0.5-4 Distribution: unstable Urgency: low Maintainer: Wen-Yen Chuang ca...@calno.com Changed-By: Wen-Yen

Accepted camlidl 1.05-11 (source i386)

2009-02-24 Thread Samuel Mimram
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Tue, 24 Feb 2009 18:17:23 +0100 Source: camlidl Binary: camlidl Architecture: source i386 Version: 1.05-11 Distribution: unstable Urgency: low Maintainer: Debian OCaml Maintainers debian-ocaml-ma...@lists.debian.org Changed-By:

Accepted clamtk 4.10-1 (source all)

2009-02-24 Thread David Paleino
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Tue, 24 Feb 2009 18:20:37 +0100 Source: clamtk Binary: clamtk Architecture: source all Version: 4.10-1 Distribution: unstable Urgency: low Maintainer: d.pale...@gmail.com Changed-By: David Paleino d.pale...@gmail.com Description:

  1   2   >