Your message dated Mon, 10 Feb 2014 20:27:41 +0100 with message-id <52f9282d.5050...@debian.org> and subject line chrony_1.29.1-1_amd64.changes ACCEPTED into unstable has caused the Debian Bug report #737907, regarding RFS: chrony/1.29.1-1 -- Set the computer clock from time servers to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 737907: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=737907 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems
--- Begin Message ---Package: sponsorship-requests Severity: important Dear mentors, I am looking for a sponsor for my package "chrony" * Package name : chrony Version : 1.29.1-1 Upstream Author : Miroslav Lichvar <mlich...@redhat.com> * URL : http://chrony.tuxfamily.org * License : GPL-2 Section : admin It builds those binary packages: chrony - Set the computer clock from time servers on the Net To access further information about this package, please visit the following URL: http://mentors.debian.net/package/chrony Alternatively, one can download the package with dget using this command: dget -x http://mentors.debian.net/debian/pool/main/c/chrony/chrony_1.29.1-1.dsc The new git repo for Debian can be seen here: http://anonscm.debian.org/gitweb/?p=collab-maint/chrony.git More information about hello can be obtained from http://chrony.tuxfamily.org/News.html Changes since the last upload: * New upstream release with bugfix: - Closes: #737644: Fixing vulnerability: CVE-2014-0021 - traffic amplification in cmdmon protocol (incompatible with previous protocol version, but chronyc supports both). Regards, Joachim Wiedornsignature.asc
Description: PGP signature
--- End Message ---
--- Begin Message ----------- Original Message -------- Subject: chrony_1.29.1-1_amd64.changes ACCEPTED into unstable Date: Mon, 10 Feb 2014 17:48:19 +0000 From: Debian FTP Masters <ftpmas...@ftp-master.debian.org> To: Joachim Wiedorn <ad_deb...@joonet.de>, <elb...@debian.org> Accepted: Format: 1.8 Date: Thu, 06 Feb 2014 15:51:47 +0100 Source: chrony Binary: chrony Architecture: source amd64 Version: 1.29.1-1 Distribution: unstable Urgency: high Maintainer: Joachim Wiedorn <ad_deb...@joonet.de> Changed-By: Joachim Wiedorn <ad_deb...@joonet.de> Description: chrony - Set the computer clock from time servers on the Net Closes: 737644 Changes: chrony (1.29.1-1) unstable; urgency=high . * New upstream release with bugfix: - Closes: #737644: Fixing vulnerability: CVE-2014-0021 - traffic amplification in cmdmon protocol (incompatible with previous protocol version, but chronyc supports both). Checksums-Sha1: 45eff660e89098f0df2cefd6947981fbb6dc2241 1564 chrony_1.29.1-1.dsc bf07c0afa6ab761d9863714497555fa5be578f3d 392889 chrony_1.29.1.orig.tar.gz 121e4609b16f397617926815a11c4f4ac2d99d0e 18902 chrony_1.29.1-1.debian.tar.gz 7971702476f69938131451ccd2fd0ee8160bcc4c 240342 chrony_1.29.1-1_amd64.deb Checksums-Sha256: 032b6eba540b485567a0d920b5e3c1f484d34bf2efbb4b81d83f53b658985857 1564 chrony_1.29.1-1.dsc 658c9bb4d8c8d8ec7d0908429aa266e5f8413ba86bd4acbfd2f9669f6065af27 392889 chrony_1.29.1.orig.tar.gz d9d72d46c97d90367c50ffec246db667e4499c2c5dcc2148fd3933c4b98c3c7e 18902 chrony_1.29.1-1.debian.tar.gz 37be1aa5be7e681f668f0ad84048dc2c0e17fc450720c96ce37e4f6171d7d0ed 240342 chrony_1.29.1-1_amd64.deb Files: 309cab60dfb937d2fde90b07aa2a3892 1564 admin extra chrony_1.29.1-1.dsc 9d49eadac5eb49daec8cc3d92a869b0c 392889 admin extra chrony_1.29.1.orig.tar.gz 22380129990986edea63fd73d3f5f7ce 18902 admin extra chrony_1.29.1-1.debian.tar.gz e1091f594849de79bb8acc5211d03451 240342 admin extra chrony_1.29.1-1_amd64.deb Thank you for your contribution to Debian.signature.asc
Description: OpenPGP digital signature
--- End Message ---