sleepd_2.08_source.changes ACCEPTED into unstable

2014-10-20 Thread Debian FTP Masters


Accepted:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Tue, 21 Oct 2014 06:49:01 +0200
Source: sleepd
Binary: sleepd
Architecture: source
Version: 2.08
Distribution: unstable
Urgency: medium
Maintainer: Debian QA Group 
Changed-By: Andrew Shadura 
Description:
 sleepd - puts an inactive or low battery laptop to sleep
Changes:
 sleepd (2.08) unstable; urgency=medium
 .
   * Fix battery percentage calculation.
Checksums-Sha1:
 d5ca12caf018ccf80c9bc02a3e4d50a560fda107 1517 sleepd_2.08.dsc
 e58ae80b5ef0b2317b947e67f535ebc97e8f42bf 32219 sleepd_2.08.tar.gz
Checksums-Sha256:
 2a93011d99f6988a96758462ac5984c1381c8a8e99c469b950b720d5498ab81f 1517 
sleepd_2.08.dsc
 d0b16c05b86920cc16879fc3dd16e0e65b802030d52a2b0d46cec37d064af2cf 32219 
sleepd_2.08.tar.gz
Files:
 10a511c836f609a2c6c59d5e61864f42 1517 admin optional sleepd_2.08.dsc
 2e304c269afb1b830e88092e83379acb 32219 admin optional sleepd_2.08.tar.gz

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.15 (GNU/Linux)
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=nr2s
-END PGP SIGNATURE-


Thank you for your contribution to Debian.


-- 
To UNSUBSCRIBE, email to debian-qa-packages-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/e1xgrc1-00077r...@franck.debian.org



Processing of sleepd_2.08_source.changes

2014-10-20 Thread Debian FTP Masters
sleepd_2.08_source.changes uploaded successfully to localhost
along with the files:
  sleepd_2.08.dsc
  sleepd_2.08.tar.gz

Greetings,

Your Debian queue daemon (running on host franck.debian.org)


-- 
To UNSUBSCRIBE, email to debian-qa-packages-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/e1xgrqg-0005cd...@franck.debian.org



opendict_0.6.5-3_amd64.changes ACCEPTED into unstable

2014-10-20 Thread Debian FTP Masters


Accepted:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.8
Date: Tue, 21 Oct 2014 13:27:11 +1300
Source: opendict
Binary: opendict
Architecture: source all
Version: 0.6.5-3
Distribution: unstable
Urgency: low
Maintainer: Debian QA Group 
Changed-By: Olly Betts 
Description:
 opendict   - computer dictionary for several dictionary formats
Changes:
 opendict (0.6.5-3) unstable; urgency=low
 .
   * QA upload.
 .
   * "Standards-Version: 3.9.6" - no changes required.
   * debian/patches/wxpy3.0-compat.patch:
 - Fix deprecation warning.
 - Fix assertion upon opening preferences dialog.
 - Hard require wxPython 3.0 for simplicity (jessie no longer has 2.8).
Checksums-Sha1:
 71048859cc0e404b20b360c5ea0d5a09fb35f77e 1723 opendict_0.6.5-3.dsc
 fb5d26bcd8c99c19cc8de5fd093ae7ac57f2a418 7552 opendict_0.6.5-3.debian.tar.xz
 4947a4531d4a8ef8f850a361430ed54a2d708637 116102 opendict_0.6.5-3_all.deb
Checksums-Sha256:
 899f7d7c4ce4c0ec775d53a77cda38b3d62f639d1717b0adadc91e6b74ae8813 1723 
opendict_0.6.5-3.dsc
 6314f30a67f093003d63bf95e4ba7a96db1e067886b4ae2e097b71a400bb6c1d 7552 
opendict_0.6.5-3.debian.tar.xz
 be7f12ab2cbace7a0249bf7180e0964fee80b377c356a1b3986ddac1bb02d270 116102 
opendict_0.6.5-3_all.deb
Files:
 b29046e702b2176586def93f7108eef3 1723 text optional opendict_0.6.5-3.dsc
 096156403f416605587708c35f75458f 7552 text optional 
opendict_0.6.5-3.debian.tar.xz
 886563851ae0814d8660f020f9f590c6 116102 text optional opendict_0.6.5-3_all.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1
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=M3Zn
-END PGP SIGNATURE-


Thank you for your contribution to Debian.


-- 
To UNSUBSCRIBE, email to debian-qa-packages-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/e1xgnsp-00016h...@franck.debian.org



Processing of opendict_0.6.5-3_amd64.changes

2014-10-20 Thread Debian FTP Masters
opendict_0.6.5-3_amd64.changes uploaded successfully to localhost
along with the files:
  opendict_0.6.5-3.dsc
  opendict_0.6.5-3.debian.tar.xz
  opendict_0.6.5-3_all.deb

Greetings,

Your Debian queue daemon (running on host franck.debian.org)


-- 
To UNSUBSCRIBE, email to debian-qa-packages-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/e1xgneb-00085u...@franck.debian.org



Bug#616473: marked as done (Support for IPv6 is possible)

2014-10-20 Thread Debian Bug Tracking System
Your message dated Mon, 20 Oct 2014 21:30:11 +
with message-id 
and subject line Bug#616473: fixed in tcpspy 1.7d-9
has caused the Debian Bug report #616473,
regarding Support for IPv6 is possible
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
616473: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=616473
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: tcpspy
Version: 1.7d-4
Severity: wishlist

This message is meant to give a preview of a possibility
to enhance the capabilities of tcspy with IPv6 support.
Presently I am beginning the hard testing of my patch,
after having implemented all needed changes.

As a small indication, here is an anonymised excerpt
from my system log (outgoing slogin via IPv6 folded
back with slogin using IPv4):

Mar  4 19:19:29 birger tcpspy[23397]: tcpspy started, monitoring connections
Mar  4 19:22:32 birger tcpspy[23397]: connect: user mats, \
  local 2001:470:dead:beef::123:35082, remote 2001:470:dead:beef::39:ssh
Mar  4 19:24:32 birger tcpspy[23397]: connect: user root, \
  local 192.168.0.123:ssh, remote 192.168.0.39:9847
Mar  4 19:26:11 birger tcpspy[23397]: disconnect: user root, \
  local 192.168.0.123:ssh, remote 192.168.0.39:9847
Mar  4 19:26:44 birger tcpspy[23397]: disconnect: user mats, \
  local 2001:470:dead:beef::123:35082, remote 2001:470:dead:beef::39:ssh

Best regards,
  Mats Erik Andersson, DM


--- End Message ---
--- Begin Message ---
Source: tcpspy
Source-Version: 1.7d-9

We believe that the bug you reported is fixed in the latest version of
tcpspy, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 616...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Joao Eriberto Mota Filho  (supplier of updated tcpspy 
package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.8
Date: Thu, 16 Oct 2014 17:07:26 -0300
Source: tcpspy
Binary: tcpspy
Architecture: source amd64
Version: 1.7d-9
Distribution: unstable
Urgency: medium
Maintainer: Debian QA Group 
Changed-By: Joao Eriberto Mota Filho 
Description:
 tcpspy - Incoming and Outgoing TCP/IP connections logger
Closes: 616355 616473 617424
Changes:
 tcpspy (1.7d-9) unstable; urgency=medium
 .
   * QA upload.
   * Upload to unstable.
   * Fixed a FTBFS in some architectures. Thanks a lot to
 Luis Valdes .
   * debian/control: updated the long description.
   * debian/copyright:
   - Migrated to 1.0 format.
   - Updated the upstream and packaging data.
   * debian/manpages: created to install all manpages.
   * debian/patches/:
   - Added the 'add_support_to_ipv6' patch, written by Mats Erik Andersson
  and reviewed by Joao Eriberto Mota Filho. This
 patch implements an previous patch from the same author too. Part of
 the patch was directly applied to debian/tcpspy.rules.5. Thanks a lot
 to Mats. (Closes: #616355, #616473)
   - Added the 'add_security' patch. Thanks again to Mats Erik Andersson
 . (Closes: #617424)
   - Updated the 'manpage' patch.
   * debian/tcpspy.8: removed because the upstream has a manpage too.
   * debian/tcpspy.init:
   - Added the 'Description' field to header.
   - Added a call to LSB init functions.
   - Added a test to check the '/etc/tcpspy.rules' file presence.
   - added the 'status' option.
Checksums-Sha1:
 08df890eae4b292739554917c730bacc02a2c883 1646 tcpspy_1.7d-9.dsc
 2faed868482b07de2a41ab7469219b64e7ab978f 12072 tcpspy_1.7d-9.debian.tar.xz
 878eefd97658a6748fd2a78fd397682fbb7b8066 31362 tcpspy_1.7d-9_amd64.deb
Checksums-Sha256:
 81d91ceceea6e7e88a7f60071335d9eaef33f403ae91729bc008f9f34c91bef5 1646 
tcpspy_1.7d-9.dsc
 af66de7855250d6d15351d0ac18c11fe1976a70bcbb535d80ccd768ab120a077 12072 
tcpspy_1.7d-9.debian.tar.xz
 54390783d2423de5b3d478917c219c20b6fb4d46f9b6a7d621771a122423d2f9 31362 
tcpspy_1.7d-9_amd64.deb
Files:
 b41bd31202bc395227bf2e0c9dde2749 1646 net optional tcpspy_1.7d-9.dsc
 dcda6c5773086e9749c19d6385280354 12072 net optional tcpspy_1.7d-9.debian.tar.xz
 647ee93ca620f2a39c9522d4e85026ec 31362 net optional tcpspy_1.7d-9_amd64.deb

-BEGIN PGP SIGNATURE-
Version:

Bug#617424: marked as done (Consider improving enclosure of daemon.)

2014-10-20 Thread Debian Bug Tracking System
Your message dated Mon, 20 Oct 2014 21:30:11 +
with message-id 
and subject line Bug#617424: fixed in tcpspy 1.7d-9
has caused the Debian Bug report #617424,
regarding Consider improving enclosure of daemon.
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
617424: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=617424
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: tcpspy
Version: 1.7d-4
Severity: wishlist
Tags: patch

Tcpspy is clearly intended to be a long living daemon.
As such it is reacting on an alarmingly large number
of signals. One could also argue that it would benefit
slightly from a stricter handling of file descriptors,
more in line with security measures for other daemons.
I contribute one mode of implementing these changes.

Best regards,
  Mats Erik Andersson, DM
Description: Improve security in daemonised execution.
 Ignore signals irrelevant to a long living daemon
 which was crafted with orderly shutdown.
 .
 Replace standard file descriptors with a tie to "/dev/null".
 .
 Yield controlling terminal properly by seting session ID.
Author: Mats Erik Andersson 
Forwarded: no
Last-Update: 2011-03-08

--- tcpspy-1.7d.debian/tcpspy.c	2002-01-25 02:01:02.0 +0100
+++ tcpspy-1.7d/tcpspy.c	2011-03-08 20:56:37.0 +0100
@@ -53,7 +53,10 @@
 #include 
 #include 
 #include 
+#include 	/* umask() */
+#include 	/* open /dev/null */
 #include 
+#include 	/* _PATH_DEVNULL */
 
 #include "log.h"
 #include "rcsid.h"
@@ -607,7 +610,16 @@
 
 	if (debug == 0) {
 		pid_t p;
+		int nullfd;
 
+		/* Hinder early disturbance generated by terminal. */
+		signal (SIGHUP,  SIG_IGN);
+		signal (SIGINT,  SIG_IGN);
+		signal (SIGQUIT, SIG_IGN);
+		signal (SIGTSTP, SIG_IGN);
+		signal (SIGUSR1, SIG_IGN);
+		signal (SIGUSR2, SIG_IGN);
+ 
 		/* 1st fork */
 		p = fork();
 		if (p < 0) {
@@ -617,6 +629,13 @@
 		} else if (p != 0)
 			exit (0);
 
+		/* Give up controlling terminal */
+		if (setsid () < 0) {
+			fprintf (stderr, "tcpspy: setsid: %s\n",
+	strerror (errno));
+			exit (EXIT_FAILURE);
+		}
+
 		/* 2nd fork */
 		p = fork();
 		if (p < 0) {
@@ -630,11 +649,22 @@
 		}
 
 		ioctl (STDIN_FILENO, TIOCNOTTY, NULL);
-		close (STDIN_FILENO); 
-		close (STDOUT_FILENO); 
-		close (STDERR_FILENO);
+
+		nullfd = open (_PATH_DEVNULL, O_RDWR, 0);
+		if (nullfd < 0) {
+			fprintf (stderr, "tcpspy: cannot open %s\n",
+	_PATH_DEVNULL);
+			exit (EXIT_FAILURE);
+		}
+
+		dup2 (nullfd, STDIN_FILENO);
+		dup2 (nullfd, STDOUT_FILENO);
+		dup2 (nullfd, STDERR_FILENO);
+		close (nullfd);
+
 		setpgid (0, 0);
 		chdir ("/");
+		umask (0);
 	} else
 		fprintf (stderr, "tcpspy 1.7d started (debug)\n");
 


signature.asc
Description: Digital signature
--- End Message ---
--- Begin Message ---
Source: tcpspy
Source-Version: 1.7d-9

We believe that the bug you reported is fixed in the latest version of
tcpspy, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 617...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Joao Eriberto Mota Filho  (supplier of updated tcpspy 
package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.8
Date: Thu, 16 Oct 2014 17:07:26 -0300
Source: tcpspy
Binary: tcpspy
Architecture: source amd64
Version: 1.7d-9
Distribution: unstable
Urgency: medium
Maintainer: Debian QA Group 
Changed-By: Joao Eriberto Mota Filho 
Description:
 tcpspy - Incoming and Outgoing TCP/IP connections logger
Closes: 616355 616473 617424
Changes:
 tcpspy (1.7d-9) unstable; urgency=medium
 .
   * QA upload.
   * Upload to unstable.
   * Fixed a FTBFS in some architectures. Thanks a lot to
 Luis Valdes .
   * debian/control: updated the long description.
   * debian/copyright:
   - Migrated to 1.0 format.
   - Updated the upstream and packaging data.
   * debian/manpages: created to install all manpages.
   * debian/patches/:
   - Added the 'add_support_to_ipv6' patch, written by Mats Erik Andersson
  and reviewed by Joao Eriberto Mota Filho. This
 patch implements an previous patch from the same author too. Part of
 the patch was directly applied to debian/tcpspy.rules.5. Th

Bug#616355: marked as done (Segmentation fault with simple rules.)

2014-10-20 Thread Debian Bug Tracking System
Your message dated Mon, 20 Oct 2014 21:30:11 +
with message-id 
and subject line Bug#616355: fixed in tcpspy 1.7d-9
has caused the Debian Bug report #616355,
regarding Segmentation fault with simple rules.
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
616355: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=616355
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: tcpspy
Version: 1.7d-4
Severity: important
Tags: patch

It is very simply to generate a segmentation fault with this software:

   tcpspy -d -e 'raddr 192.168.0.0/255.255.255.0'

and then a telnet call! The cause is a stack underrun, a pop command
on an empty stack causes the address exception.

The underlying problem is that a simple (singleton) rule still causes
a bytecode BC_OR onto the stack, forcing the evaluation engine to
continue where is really should finalize execution. The best remedy
seems to be the push of an initial FALSE onto the emptt stack.
That can never hurt any evaluation. Do not be fooled by the correct
evaluation of

   tcpspy -d -e 'raddr 192.168.0.1 or raddr 10.1.2.3.4'

since then the binary relation BC_OR is indeed correct.

My patch also suggests a slight alteration to matching with non-trivial
netmasks:

raddr 192.168.0.123/255.255.255.192

is now able to catch traffic, without the need for manual calculating
the reduction of '192.168.0.123' modulo '255.255.255.192'. It is an
unneccesary pain to to this by hand. Computers should do that for us.

Best regards,
  Mats Erik Andersson, DM
Description: Recover from stack underflow fault.
 When applied with a single rule like
   tcpspy -e 'raddr 10.1.2.3'
 an incorrect bytecode BC_OR is still put on the stack.
 This causes the rule traversal to pop an empty stack,
 thus causing a segmentation fault. The good remedy is
 initially to push a FALSE onto the empty stack, serving
 as a guard against a later evaluation. Composite rules
   tcpspy -e 'raddr 10.1.2.3 and laddr 10.1.2.33'
 are never causing this segfault.
 .
 In addition, to simplify for the user, the netmask
 is applied to both addresses, the observed address
 and the stored address. This avoids false negatives
 due to miscalculation by the administrator.
Author: Mats Erik Andersson 
Forwarded: no
Last-Update: 2011-03-03

diff -Naur tcpspy-1.7d.debian/rule.c tcpspy-1.7d/rule.c
--- tcpspy-1.7d.debian/rule.c	2002-01-25 02:00:50.0 +0100
+++ tcpspy-1.7d/rule.c	2011-03-03 18:35:44.0 +0100
@@ -293,6 +293,8 @@
 	static size_t stack_size = 0, stack_ptr = 0;
 
 	stack_ptr = 0;
+	PUSH(0);	/* Put a single FALSE onto the stack. This protects
+			 * against a segfault caused by simple rules. */
 
 	for (ip = 0; ip < code_length; ) {
 		c = NEXTCODE;
@@ -360,7 +362,7 @@
 
 SHORTCIRCUIT;
 
-PUSH (((mladdr & mask) == addr) ? 1 : 0);
+PUSH (((mladdr & mask) == (addr & mask)) ? 1 : 0);
 }
 break;	
 			case BC_RADDR:
@@ -375,7 +377,7 @@
 
 SHORTCIRCUIT;
 
-PUSH (((mraddr & mask) == addr) ? 1 : 0);
+PUSH (((mraddr & mask) == (addr & mask)) ? 1 : 0);
 }
 break;	
 


signature.asc
Description: Digital signature
--- End Message ---
--- Begin Message ---
Source: tcpspy
Source-Version: 1.7d-9

We believe that the bug you reported is fixed in the latest version of
tcpspy, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 616...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Joao Eriberto Mota Filho  (supplier of updated tcpspy 
package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.8
Date: Thu, 16 Oct 2014 17:07:26 -0300
Source: tcpspy
Binary: tcpspy
Architecture: source amd64
Version: 1.7d-9
Distribution: unstable
Urgency: medium
Maintainer: Debian QA Group 
Changed-By: Joao Eriberto Mota Filho 
Description:
 tcpspy - Incoming and Outgoing TCP/IP connections logger
Closes: 616355 616473 617424
Changes:
 tcpspy (1.7d-9) unstable; urgency=medium
 .
   * QA upload.
   * Upload to unstable.
   * Fixed a FTBFS in some architectures. Thanks a lot to
 Luis Valdes .
   * debian/control: updated the long description.
   * debian/copyright:
   - Migrated to 1.0 format.

tcpspy_1.7d-9_amd64.changes ACCEPTED into unstable

2014-10-20 Thread Debian FTP Masters


Accepted:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.8
Date: Thu, 16 Oct 2014 17:07:26 -0300
Source: tcpspy
Binary: tcpspy
Architecture: source amd64
Version: 1.7d-9
Distribution: unstable
Urgency: medium
Maintainer: Debian QA Group 
Changed-By: Joao Eriberto Mota Filho 
Description:
 tcpspy - Incoming and Outgoing TCP/IP connections logger
Closes: 616355 616473 617424
Changes:
 tcpspy (1.7d-9) unstable; urgency=medium
 .
   * QA upload.
   * Upload to unstable.
   * Fixed a FTBFS in some architectures. Thanks a lot to
 Luis Valdes .
   * debian/control: updated the long description.
   * debian/copyright:
   - Migrated to 1.0 format.
   - Updated the upstream and packaging data.
   * debian/manpages: created to install all manpages.
   * debian/patches/:
   - Added the 'add_support_to_ipv6' patch, written by Mats Erik Andersson
  and reviewed by Joao Eriberto Mota Filho. This
 patch implements an previous patch from the same author too. Part of
 the patch was directly applied to debian/tcpspy.rules.5. Thanks a lot
 to Mats. (Closes: #616355, #616473)
   - Added the 'add_security' patch. Thanks again to Mats Erik Andersson
 . (Closes: #617424)
   - Updated the 'manpage' patch.
   * debian/tcpspy.8: removed because the upstream has a manpage too.
   * debian/tcpspy.init:
   - Added the 'Description' field to header.
   - Added a call to LSB init functions.
   - Added a test to check the '/etc/tcpspy.rules' file presence.
   - added the 'status' option.
Checksums-Sha1:
 08df890eae4b292739554917c730bacc02a2c883 1646 tcpspy_1.7d-9.dsc
 2faed868482b07de2a41ab7469219b64e7ab978f 12072 tcpspy_1.7d-9.debian.tar.xz
 878eefd97658a6748fd2a78fd397682fbb7b8066 31362 tcpspy_1.7d-9_amd64.deb
Checksums-Sha256:
 81d91ceceea6e7e88a7f60071335d9eaef33f403ae91729bc008f9f34c91bef5 1646 
tcpspy_1.7d-9.dsc
 af66de7855250d6d15351d0ac18c11fe1976a70bcbb535d80ccd768ab120a077 12072 
tcpspy_1.7d-9.debian.tar.xz
 54390783d2423de5b3d478917c219c20b6fb4d46f9b6a7d621771a122423d2f9 31362 
tcpspy_1.7d-9_amd64.deb
Files:
 b41bd31202bc395227bf2e0c9dde2749 1646 net optional tcpspy_1.7d-9.dsc
 dcda6c5773086e9749c19d6385280354 12072 net optional tcpspy_1.7d-9.debian.tar.xz
 647ee93ca620f2a39c9522d4e85026ec 31362 net optional tcpspy_1.7d-9_amd64.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1
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=IpOQ
-END PGP SIGNATURE-


Thank you for your contribution to Debian.


-- 
To UNSUBSCRIBE, email to debian-qa-packages-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/e1xgkwp-0003np...@franck.debian.org



Bug#748195: marked as done (python-socksipy: Exceptions take only one parameter, don't give 2!)

2014-10-20 Thread Debian Bug Tracking System
Your message dated Mon, 20 Oct 2014 20:34:36 +
with message-id <544571dc.1030...@nirgal.com>
and subject line Re: python-socksipy: Exceptions take only one parameter, don't 
give 2!
has caused the Debian Bug report #748195,
regarding python-socksipy: Exceptions take only one parameter, don't give 2!
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
748195: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=748195
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: python-socksipy
Version: 1.0-1
Severity: minor
Tags: patch

Dear Maintainer,

When a connection can't be established an exception is raised.

This is good.

But exception __init__ take only one argument, and there are some places
in the code where 2 are given, resulting in TypeError exception being
raised, insteed of Socks5Error or simmilar.This is quite unfriendly, and
obviously not what was intended by the author.

Traceback (most recent call last):
(...)
  File "/usr/lib/python2.7/dist-packages/socks.py", line 369, in connect
self.__negotiatesocks5(destpair[0],destpair[1])
  File "/usr/lib/python2.7/dist-packages/socks.py", line 236, in
__negotiatesocks5
raise Socks5Error(ord(resp[1]),_generalerrors[ord(resp[1])])
TypeError: __init__() takes exactly 2 arguments (3 given)

Attached is a patch.

After patching, the proper exception is raised:

Traceback (most recent call last):
(...)
  File "/usr/lib/python2.7/dist-packages/socks.py", line 369, in connect
self.__negotiatesocks5(destpair[0],destpair[1])
  File "/usr/lib/python2.7/dist-packages/socks.py", line 236, in
__negotiatesocks5
raise Socks5Error((ord(resp[1]),_generalerrors[ord(resp[1])]))
socks.Socks5Error: (4, 'bad proxy type')

Thank you for maintaining that package :)


-- System Information:
Debian Release: 7.5
  APT prefers stable
  APT policy: (500, 'stable')
Architecture: amd64 (x86_64)

Kernel: Linux 3.2.0-4-amd64 (SMP w/1 CPU core)
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages python-socksipy depends on:
ii  python  2.7.3-4+deb7u1
ii  python-central  0.6.17

python-socksipy recommends no packages.

python-socksipy suggests no packages.

-- no debconf information
--- /usr/lib/python2.7/dist-packages/socks.py.orig	2006-10-25 22:19:26.0 +0200
+++ /usr/lib/python2.7/dist-packages/socks.py	2014-05-15 10:44:49.0 +0200
@@ -196,7 +196,7 @@
 			if authstat[1] != "\x00":
 # Authentication failed
 self.close()
-raise Socks5AuthError,((3,_socks5autherrors[3]))
+raise Socks5AuthError((3,_socks5autherrors[3]))
 			# Authentication succeeded
 		else:
 			# Reaching here is always bad
@@ -233,9 +233,9 @@
 			# Connection failed
 			self.close()
 			if ord(resp[1])<=8:
-raise Socks5Error(ord(resp[1]),_generalerrors[ord(resp[1])])
+raise Socks5Error((ord(resp[1]),_generalerrors[ord(resp[1])]))
 			else:
-raise Socks5Error(9,_generalerrors[9])
+raise Socks5Error((9,_generalerrors[9]))
 		# Get the bound address/port
 		elif resp[3] == "\x01":
 			boundaddr = self.__recvall(4)
--- End Message ---
--- Begin Message ---
Version: 1.02-1

This bug has been fixed upstream, and in sid.
Thank you :)



signature.asc
Description: OpenPGP digital signature
--- End Message ---


Processing of tcpspy_1.7d-9_amd64.changes

2014-10-20 Thread Debian FTP Masters
tcpspy_1.7d-9_amd64.changes uploaded successfully to localhost
along with the files:
  tcpspy_1.7d-9.dsc
  tcpspy_1.7d-9.debian.tar.xz
  tcpspy_1.7d-9_amd64.deb

Greetings,

Your Debian queue daemon (running on host franck.debian.org)


-- 
To UNSUBSCRIBE, email to debian-qa-packages-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/e1xgj0m-0006iu...@franck.debian.org



Bug#598102: please test the new scanbuttond in experimental

2014-10-20 Thread Rolf Leggewie
tags 598102 + moreinfo
thanks


Hello,

scanbd is due to replace scanbuttond.  If you can, please verify the
problems you reported by updating to the scanbuttond migration package
in experimental and report back if you still experience this issue.
Thank you.

Regards

Rolf Leggewie


-- 
To UNSUBSCRIBE, email to debian-qa-packages-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/54453cae.7040...@rolf.leggewie.biz



Bug#677584: scanbuttond is migrating to scanbd

2014-10-20 Thread Rolf Leggewie
Hello,

support for the ScanSnap S1500 for sane is marked as "complete".
scanbuttond is currently migrating to scanbd in Debian experimental.
scanbd uses sane for the backend and thus scanbd should now support the
S1500.  Otherwise, patches would need to go to libsane, anyhow.  I am
sure the migration package is still rough, so testing and bug reports
are very welcome. Please let me know if support for the S1500 is now
complete in scanbd.

Regards

Rolf


-- 
To UNSUBSCRIBE, email to debian-qa-packages-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/544539b6.4030...@rolf.leggewie.biz



Bug#731617: marked as done (Please switch from avahi to avahi-daemon in initscript LSB dependencies)

2014-10-20 Thread Debian Bug Tracking System
Your message dated Tue, 21 Oct 2014 01:27:10 +0900
with message-id <544537de.6080...@rolf.leggewie.biz>
and subject line no longer an issue in scanbd
has caused the Debian Bug report #731617,
regarding Please switch from avahi to avahi-daemon in initscript LSB 
dependencies
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
731617: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=731617
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: avahi-daemon
Version: 0.6.31-2
Severity: normal

Hi,

avahi-daemon package is shipping both an avahi-daemon.service and an LSB
initscript avahi-daemon. This will make systemd prefere the native
service.

The problem is that the LSB initscript is providing the "avahi" service.
This means that the other initscripts (that don't have a native systemd
service counterpart) will have a dependency against "avahi" that will be
translated to avahi.service which of course is not existing.

I see two solutions here. Either add Alias=avahi.service to the
avahi-daemon service file or add "avahi-daemon" to the list of Provides
of the LSB initscript and then make all other LSB initscript depend
against this new name.

I'm not sure which one is the prefered way.

Cheers

Laurent Bigonville

-- System Information:
Debian Release: jessie/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 3.11-1-amd64 (SMP w/8 CPU cores)
Locale: LANG=fr_BE.utf8, LC_CTYPE=fr_BE.utf8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages avahi-daemon depends on:
ii  adduser3.113+nmu3
ii  bind9-host [host]  1:9.9.3.dfsg.P2-4
ii  dbus   1.6.18-1
ii  host   1:9.9.3.dfsg.P2-4
ii  libavahi-common3   0.6.31-2
ii  libavahi-core7 0.6.31-2
ii  libc6  2.17-95
ii  libcap21:2.22-1.2
ii  libdaemon0 0.14-2
ii  libdbus-1-31.6.18-1
ii  libexpat1  2.1.0-4
ii  lsb-base   4.1+Debian12

Versions of packages avahi-daemon recommends:
ii  libnss-mdns  0.10-3.2

Versions of packages avahi-daemon suggests:
ii  avahi-autoipd  0.6.31-2

-- no debconf information
--- End Message ---
--- Begin Message ---
fixed 731617 1.4.0-1x3
thanks


Hello,

thank you for your report.  This does not affect the package after
migrating to scanbd which is in experimental.  Testing of and reporting
bugs against said package is very welcome.

Regards

Rolf--- End Message ---


Processed: no longer an issue in scanbd

2014-10-20 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> fixed 731617 1.4.0-1x3
Bug #731617 [scanbuttond] Please switch from avahi to avahi-daemon in 
initscript LSB dependencies
Marked as fixed in versions scanbd/1.4.0-1x3.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
731617: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=731617
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-qa-packages-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
https://lists.debian.org/handler.s.c.141382244719844.transcr...@bugs.debian.org



ALERTE : Le Maroc plus sûr que les États-Unis ?

2014-10-20 Thread LES ÉCO
Se désinscrire de la liste: 
http://link.email.wib.me/u/443/159bf02e855352fdba889a7d12fbc7a2c1117f11875b2e4b

Avenue Abdelmoumen, Rue Calavon n 4, Casablanca, 2, Maroc

Bug#766068: RFS: robocode 1.6.2+dfsg2-1 [ITA] [RC]

2014-10-20 Thread Miguel Landaeta
On Mon, Oct 20, 2014 at 11:58:06PM +0200, Markus Koschany wrote:
> Hi all,
> 
> I have recently adopted Robocode, a Java programming game, and I think
> [...]

Hi Markus,

I'll take care of it.

Cheers,

-- 
Miguel Landaeta, nomadium at debian.org
secure email with PGP 0x6E608B637D8967E9 available at http://miguel.cc/key.
"Faith means not wanting to know what is true." -- Nietzsche


signature.asc
Description: Digital signature


Processed: reopening 646247

2014-10-20 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> # typo in bug number in changelog, sorry for the noise
> reopen 646247
Bug #646247 {Done: Tristan Seligmann } [libinklevel5] 
[libinklevel5] requires deprecated usblp devices for USB printers ("Could not 
access '/dev/usb/lp0' or '/dev/usblp0'.")
'reopen' may be inappropriate when a bug has been closed with a version;
all fixed versions will be cleared, and you may need to re-add them.
Bug reopened
No longer marked as fixed in versions pythondialog/3.2.0-1.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
646247: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=646247
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-qa-packages-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
https://lists.debian.org/handler.s.c.14138077815272.transcr...@bugs.debian.org



Bug#646247: marked as done ([libinklevel5] requires deprecated usblp devices for USB printers ("Could not access '/dev/usb/lp0' or '/dev/usblp0'."))

2014-10-20 Thread Debian Bug Tracking System
Your message dated Mon, 20 Oct 2014 12:00:12 +
with message-id 
and subject line Bug#646247: fixed in pythondialog 3.2.0-1
has caused the Debian Bug report #646247,
regarding [libinklevel5] requires deprecated usblp devices for USB printers 
("Could not access '/dev/usb/lp0' or '/dev/usblp0'.")
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
646247: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=646247
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---

Package: libinklevel5
Version: 0.8.0-1.1+b1
Severity: serious

libinklevel requires /dev/usb/lp? or /dev/usblp? for USB printers. 
Otherwise, it returns DEV_USB_LP_INACCESSIBLE:



 case DEV_USB_LP_INACCESSIBLE:
   printf("Could not access '/dev/usb/lp%d' or '/dev/usblp%d'.\n",
  portnumber, portnumber);
   break;


get_device_id() contains:


 if (port == USB) {
   sprintf(device_file1, "/dev/usb/lp%d", portnumber);
   sprintf(device_file2, "/dev/usblp%d", portnumber);
   fd = open(device_file1, O_RDONLY);
   if (fd == -1) {
 fd = open(device_file2, O_RDONLY);
   }
   if (fd == -1) {
 return DEV_USB_LP_INACCESSIBLE;
   }
 }


Therefore, polling ink levels on USB printers fails if the usblp LKM is 
not loaded:



$ ink -p usb
Could not access '/dev/usb/lp0' or '/dev/usblp0'.
Could not get ink level.
chealer@vinci:~$


Both ink and Qink fail with USB printers. qink just complains "Printer 
error No printers detected on this system". Launching it as root won't 
help. However, printing works...


usblp used to be loaded when a USB printer was plugged in. usblp is now 
blacklisted by cups, since CUPS switched from usblp to libusb:



Drop usb-backend-both-usblp-and-libusb.dpatch. It's causing crashes, and
  upstream does not want it either. Instead, add a blacklist file
  debian/local/blacklist-cups-usblp.patch and install it into
  /etc/modprobe.d/; that way, we don't require kernels to disable usblp, and
  allow other spoolers than cups to work.

http://packages.debian.org/changelogs/pool/main/c/cups/current/changelog#version1.4.6-8


# cat /etc/modprobe.d/blacklist-cups-usblp.conf
# cups talks to the raw USB devices, so we need to blacklist usblp to 
avoid

# grabbing them
blacklist usblp
root@vinci:/etc#


A workaround is to purge cups, or to manually load usblp.

This means that ink and Qink won't just work for the vast majority of 
printers.


--- System information. ---
Architecture: i386
Kernel: Linux 3.0.0-2-amd64

Debian Release: wheezy/sid
990 testing security.debian.org
990 testing ftp.ca.debian.org
500 unstable ftp.ca.debian.org
1 experimental ftp.ca.debian.org

--- Package information. ---
Depends (Version) | Installed
-+-===
libc6 (>= 2.3) | 2.13-21
libieee1284-3 | 0.2.11-10


Package's Recommends field is empty.

Package's Suggests field is empty.





--- End Message ---
--- Begin Message ---
Source: pythondialog
Source-Version: 3.2.0-1

We believe that the bug you reported is fixed in the latest version of
pythondialog, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 646...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Tristan Seligmann  (supplier of updated pythondialog 
package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Sun, 19 Oct 2014 12:46:15 +0200
Source: pythondialog
Binary: python3-dialog
Architecture: source all
Version: 3.2.0-1
Distribution: unstable
Urgency: low
Maintainer: Debian Python Modules Team 

Changed-By: Tristan Seligmann 
Description:
 python3-dialog - Python module for making simple terminal-based user interfaces
Closes: 608408 615432 646247 673962
Changes:
 pythondialog (3.2.0-1) unstable; urgency=low
 .
   [ Florent Rougon ]
   * New upstream release.
 .
   * Add Build-Depends on python3-docutils,
 python3-sphinx (>= 1.0.7+dfsg-1~) and python3-pygments because this
 release brings a new Sphinx-based documentation.
 .
   * add-glossary-label: new patch to add a "glossary" label right before
 the Glossary (maybe upstream bug, but upstream-installed Sphinx didn't
 

Bug#766068: RFS: robocode 1.6.2+dfsg2-1 [ITA] [RC]

2014-10-20 Thread Markus Koschany
Hi all,

I have recently adopted Robocode, a Java programming game, and I think
it fits best into the Java team. It is currently affected by RC bug
#766068 that prevents users from starting the game. This is a rather old
version. Unfortunately it's too late now to package the latest release
since it is based on Maven and requires a couple of additional
dependencies which have not been packaged yet.

Nevertheless I would be glad if someone sponsored this package for me.

http://mentors.debian.net/debian/pool/main/r/robocode/robocode_1.6.2+dfsg2-1.dsc

http://anonscm.debian.org/cgit/pkg-java/robocode.git

Changelog:

* Acknowledge NMU by Simon Paillard. Unfortunately the changes were
  overridden by the last revision.
* Add myself to Uploaders and move the package under the umbrella
  of the Java team. (Closes: #590774)
* Repack robocode and remove sourceless Jacobe.jar file.
* Depend on default-jre | java6-runtime | java7-runtime instead
  of obsolete Java6 runtime environments alone. (Closes: #760954)
* Fix obsolete detection of Java6 runtime in robocode wrapper script,
  so that the game can be executed again. (Closes: #766068)
* Declare compliance with Debian Policy 3.9.6.
* Use compat level 9 and require debhelper >= 9.
* Update Vcs-fields to canonical address and move the package to
  pkg-java Git repository.
* wrap-and-sort -sa.
* Remove build-dependency on quilt since source format 3.0 uses quilt by
  default.
* Recommend default-jdk instead of specific JDK versions.
* Suggest Eclipse IDE.
* Rename README.Debian-source to README.source
* Add robocode.menu file. (Closes: #738018)
* Add keywords to desktop file.
* Add build-arch and build-indep targets to debian/rules.

Regards,

Markus



signature.asc
Description: OpenPGP digital signature


Bug#764992: I am also hitting this problem...

2014-10-20 Thread David Goodenough
It looks like:-

https://bugzilla.redhat.com/show_bug.cgi?id=1078057

I am hitting it on a UEFI disk /dev/sda1, which is mounted as /boot/efi

The RedHat bug says this is a regression introduced in dosfstools-3.0.26. It 
seems to work with dosfstools-3.0.25.

I am running 3.0.26-4.

David


-- 
To UNSUBSCRIBE, email to debian-qa-packages-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/2034756.mvKtccUpCJ@stargate



Bug#766068: robocode: fails to start because of obsolete Java environment detection

2014-10-20 Thread Markus Koschany
Package: robocode
Version: 1.6.2+dfsg-4
Severity: serious


Robocode fails to start when OpenJDK 7 or a newer version is
installed on the system. Since OpenJDK7 is the default Java runtime
environment for Jessie and OpenJDK6 is going to be removed, this issue
is release critical.

The error message is:

E: Cannot find JRE, exiting..

This is caused by an obsolete detection of Java runtime environments
in the robocode wrapper script.

I intend to adopt Robocode for the Java team and will prepare a fix
for this issue soonish.

Markus


-- 
To UNSUBSCRIBE, email to debian-qa-packages-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/20141020162138.19954.39532.reportbug@conan



mksh_50d-1~bpo70+2_i386.changes ACCEPTED into wheezy-backports

2014-10-20 Thread Debian FTP Masters


Accepted:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA384

Format: 1.8
Date: Sun, 19 Oct 2014 22:11:48 +0200
Source: mksh
Binary: mksh pdksh
Architecture: source all i386 amd64
Version: 50d-1~bpo70+2
Distribution: wheezy-backports
Urgency: high
Maintainer: Debian QA Group 
Changed-By: Thorsten Glaser 
Description: 
 mksh   - MirBSD Korn Shell
 pdksh  - transitional dummy package to migrate from pdksh to mksh
Changes: 
 mksh (50d-1~bpo70+2) wheezy-backports; urgency=high
 .
   * QA upload.
   * Emergency upload: fix severe regression (LP#1381965)
Checksums-Sha1: 
 16616fb26632497a6c3c72d8ce29b31288afc802 2342 mksh_50d-1~bpo70+2.dsc
 1f37b4f49585d87038525bc602e2d7530027e477 85958 mksh_50d-1~bpo70+2.debian.tar.gz
 fd7ecc4cc925657e424a539289aa88b980d42b4f 2704 pdksh_50d-1~bpo70+2_all.deb
 ba766f9deff0aace4e4d670be88ee733fbfde57f 522194 mksh_50d-1~bpo70+2_i386.deb
 321c899018e84e04e20d4e908e9b85f1762e0736 541126 mksh_50d-1~bpo70+2_amd64.deb
Checksums-Sha256: 
 bd0773737f86ed35f4c6d5d105677bab16a89464c20bf0a8dc7fb42534b60dd0 2342 
mksh_50d-1~bpo70+2.dsc
 db4a88d333aca835ed8003df346006f2ebad00c865a0ad036c08392947354e13 85958 
mksh_50d-1~bpo70+2.debian.tar.gz
 1468cf4bcf9d3b8b7802722aa849973406d23c0d72abf69952b33e802613670e 2704 
pdksh_50d-1~bpo70+2_all.deb
 6f6afa9a8be25308ca099d0784f442a3046049f52b1d42bd87f7710b427fa398 522194 
mksh_50d-1~bpo70+2_i386.deb
 5a044be3794221457fcf30e342ada746a9e761b5de6c5fea135b957c6ede52cb 541126 
mksh_50d-1~bpo70+2_amd64.deb
Files: 
 efc21373d3e5f00d4308b20eec98df94 2342 shells optional mksh_50d-1~bpo70+2.dsc
 8ff0333045e2f57b294158cdd9500622 85958 shells optional 
mksh_50d-1~bpo70+2.debian.tar.gz
 530e0e870b5ce6ccacb5f4c8cb637e5b 2704 oldlibs extra pdksh_50d-1~bpo70+2_all.deb
 797d428b24d7bc00f70589d6523f5631 522194 shells optional 
mksh_50d-1~bpo70+2_i386.deb
 011362b1108191486560bffc26bb1a48 541126 shells optional 
mksh_50d-1~bpo70+2_amd64.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.14 (MirBSD)
Comment: ☃ ЦΤℱ—8 ☕☂☄
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=1Ebp
-END PGP SIGNATURE-


Thank you for your contribution to Debian.


-- 
To UNSUBSCRIBE, email to debian-qa-packages-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/e1xfxxr-0005ae...@franck.debian.org



mksh_50d-2_all.changes ACCEPTED into unstable

2014-10-20 Thread Debian FTP Masters


Accepted:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA384

Format: 1.8
Date: Sun, 19 Oct 2014 19:57:24 +0200
Source: mksh
Binary: mksh pdksh
Architecture: source all
Version: 50d-2
Distribution: unstable
Urgency: high
Maintainer: Debian QA Group 
Changed-By: Thorsten Glaser 
Description:
 mksh   - MirBSD Korn Shell
 pdksh  - transitional dummy package to migrate from pdksh to mksh
Changes:
 mksh (50d-2) unstable; urgency=high
 .
   * QA upload.
   * Apply patch from LP#1381965
Checksums-Sha1:
 4cc009b94cab7dbc69b0ffba312d831a86ea1bf4 2329 mksh_50d-2.dsc
 586bb74ccc5b8c1cf65840947e474659ea2227d6 72716 mksh_50d-2.debian.tar.xz
 a32c6d750897de96b9eae80460bce903140329ac 2890 pdksh_50d-2_all.deb
Checksums-Sha256:
 f785b9624ed11f86c8bd91d2b851dde4e103bbc4db0ef1816da0176746e50b9d 2329 
mksh_50d-2.dsc
 373e5f3739f9326b49cb4f93f8d0085b5cb381a6ee4647b864f915cee7771ecc 72716 
mksh_50d-2.debian.tar.xz
 49205becf7389ec378dc2dbdbd8d95364178e27d643b04fc7d9ac6354f9213e5 2890 
pdksh_50d-2_all.deb
Files:
 f5f8b2c2d7e0e0cefac436a53d86cd51 2329 shells optional mksh_50d-2.dsc
 674a1bbb2dde0ee9578400e5db4d16f2 72716 shells optional mksh_50d-2.debian.tar.xz
 c9c715d7c5db0e4160355145576e8ae1 2890 oldlibs extra pdksh_50d-2_all.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.14 (MirBSD)
Comment: ☃ ЦΤℱ—8 ☕☂☄

iQIcBAEBCQAGBQJURBq9AAoJEHa1NLLpkAfgNbEQALuE8UMAXuegEczscwL+KuhY
53EhzE0rRryBlaUY4QGyMifxj3w6YRMR0DRIxaak48j2RdVO/zJ9ulQBgpdz2GGz
+QQxzm+zkckgNDEVkzTmp9gssyJPPgIyfR7Ol5GGcQlba0rb1ZtT5bi1pJmb3/ef
Ty+wD2Zxj7Eyni8MVayMylKtsQlpe4bcr1YFWW0r9qo+fp7rp60J+wkIDTLK6h2o
fbKZJyveaUi0M+/dmK37ssVaETBK+/58uZJIjCnalkp5+v1YfoTX2yWlIT50+/r1
+MoYIfyw9N9F3MJWLJ08kYXPvbPk/IG5FdImiJqAfY+MevxXxXj6LHdmQH6lISQ5
eX6Lea/vimB+dL83kEocTYsj3k79oMEB7EkQPGPRxqROhPlrJ/GqWtGJqBYG9eTo
FOLohrXTXXJHvXrndIL1qOAIPY9VwwU5gwBtX8CQI872qrcxKi3OQ9DOoGySbYl1
tfcNo+bQ18aGGfynMTRMRsmnW8w2arQcaRfZ9C2KKwd+QSgLeSMkEWWsE/lupf2e
PPbV2ujb0RIunYZW5/096KjdH5e5YvYuMgeY/vwCBLWmDVLuIlHEJYOmqaf3d37H
nvZDMU/38r4OSm+QNdJ+31vu4WB2ix+RgbDupH6/Y/d+bar5SFIbrpDW3dPgItvA
oDxm3tJ+gmr0jjzVbmKW
=Suq6
-END PGP SIGNATURE-


Thank you for your contribution to Debian.


-- 
To UNSUBSCRIBE, email to debian-qa-packages-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/e1xfxxy-0005cm...@franck.debian.org