sleepd_2.08_source.changes ACCEPTED into unstable
Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Tue, 21 Oct 2014 06:49:01 +0200 Source: sleepd Binary: sleepd Architecture: source Version: 2.08 Distribution: unstable Urgency: medium Maintainer: Debian QA Group Changed-By: Andrew Shadura Description: sleepd - puts an inactive or low battery laptop to sleep Changes: sleepd (2.08) unstable; urgency=medium . * Fix battery percentage calculation. Checksums-Sha1: d5ca12caf018ccf80c9bc02a3e4d50a560fda107 1517 sleepd_2.08.dsc e58ae80b5ef0b2317b947e67f535ebc97e8f42bf 32219 sleepd_2.08.tar.gz Checksums-Sha256: 2a93011d99f6988a96758462ac5984c1381c8a8e99c469b950b720d5498ab81f 1517 sleepd_2.08.dsc d0b16c05b86920cc16879fc3dd16e0e65b802030d52a2b0d46cec37d064af2cf 32219 sleepd_2.08.tar.gz Files: 10a511c836f609a2c6c59d5e61864f42 1517 admin optional sleepd_2.08.dsc 2e304c269afb1b830e88092e83379acb 32219 admin optional sleepd_2.08.tar.gz -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.15 (GNU/Linux) iQIcBAEBCAAGBQJUReY8AAoJEG6k0jEaLSaNwB8P/RqVWC0WHE9NRkPJKkmPfssi DzYwM5WsJsTxg+m7/LMNd8bv5GlUuH/OUFyiCLZ6ASso+o9H4mTWxZqubQZVE4lP XUHEKoRbU5lLOfv7Q05SKLSa6WQ9MZh3RXeaoj9ML2ZnhLqDpPn+5/yldGq3RHp5 K9h+9qkijkL3ou88xlr+OL5HbFkfz16nwrWablpm3E95OVvJgURDnifLBZBxnTOh v1dbQr9tdx98UWymG1Fs7pDuZKkuhci9Ub60J7T5cQsr8bCl1wG2Z3k4um9ttFmR IFp1T1PgHJNpcTLL3Kiv3slcpnayrNtZUYCk67He1aTO0vRsvS76wiCrWNIrEof6 O0AdTABMjEnZvYkh3MXI3cmRiU5fQHbDsG2wnI6eF0E54sdul/g/80VXUFvlGDoe RWwDcxI14kqRDowrS3VD2DR5rqvyREFp3mbuavKQBAdijgFPvtRmmFeTOC+N3NJM YIpidkoAfQ3J+SuhA7YTGmyVhzIbBMIyHEoz0XRKUgrL0pOV2zzfG8diV6uR1n3f NrXCdRIkhldzSILFTFD4WIG0NCnX+IY+8AyTCfHdDkd55UQl4xMsY1uFMwxehklX eZbm1d+8+nXIKVA3KRE7+FjcZyvMS94p2kOk3FtH/hQAco59/AjBLt4eyJcOCskJ U1kPt7pIdLbZcuC0nzhM =nr2s -END PGP SIGNATURE- Thank you for your contribution to Debian. -- To UNSUBSCRIBE, email to debian-qa-packages-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org Archive: https://lists.debian.org/e1xgrc1-00077r...@franck.debian.org
Processing of sleepd_2.08_source.changes
sleepd_2.08_source.changes uploaded successfully to localhost along with the files: sleepd_2.08.dsc sleepd_2.08.tar.gz Greetings, Your Debian queue daemon (running on host franck.debian.org) -- To UNSUBSCRIBE, email to debian-qa-packages-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org Archive: https://lists.debian.org/e1xgrqg-0005cd...@franck.debian.org
opendict_0.6.5-3_amd64.changes ACCEPTED into unstable
Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Tue, 21 Oct 2014 13:27:11 +1300 Source: opendict Binary: opendict Architecture: source all Version: 0.6.5-3 Distribution: unstable Urgency: low Maintainer: Debian QA Group Changed-By: Olly Betts Description: opendict - computer dictionary for several dictionary formats Changes: opendict (0.6.5-3) unstable; urgency=low . * QA upload. . * "Standards-Version: 3.9.6" - no changes required. * debian/patches/wxpy3.0-compat.patch: - Fix deprecation warning. - Fix assertion upon opening preferences dialog. - Hard require wxPython 3.0 for simplicity (jessie no longer has 2.8). Checksums-Sha1: 71048859cc0e404b20b360c5ea0d5a09fb35f77e 1723 opendict_0.6.5-3.dsc fb5d26bcd8c99c19cc8de5fd093ae7ac57f2a418 7552 opendict_0.6.5-3.debian.tar.xz 4947a4531d4a8ef8f850a361430ed54a2d708637 116102 opendict_0.6.5-3_all.deb Checksums-Sha256: 899f7d7c4ce4c0ec775d53a77cda38b3d62f639d1717b0adadc91e6b74ae8813 1723 opendict_0.6.5-3.dsc 6314f30a67f093003d63bf95e4ba7a96db1e067886b4ae2e097b71a400bb6c1d 7552 opendict_0.6.5-3.debian.tar.xz be7f12ab2cbace7a0249bf7180e0964fee80b377c356a1b3986ddac1bb02d270 116102 opendict_0.6.5-3_all.deb Files: b29046e702b2176586def93f7108eef3 1723 text optional opendict_0.6.5-3.dsc 096156403f416605587708c35f75458f 7552 text optional opendict_0.6.5-3.debian.tar.xz 886563851ae0814d8660f020f9f590c6 116102 text optional opendict_0.6.5-3_all.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1 iQIcBAEBAgAGBQJURaztAAoJEBgUewc7rSsHHGIP/1defrZpvNBUzIQD/p5/1dFS C9Ywf/LxefpGoHh8L2LrmBTaoSk+H2mS3tHUctLn1OJ7qxrFmFA1BW7cMhnttDC3 waYVUG9vUNTPeguoaf+b/q4cZXmfuze1Aob6Tv077bm02uhR4m/CzTXQWu8uTJEj VTyG3oGlRHfmQrwCB4sGnOqtSV06k+UdJb1JZojw23yRf/Qpf2VxR0Be0wpQlybU O9BeSfFbITXp8wXvua7ZXw8PEgxENkrdUx1F9Uhi4DxV/y1mPxHL6rpm4AZWeTnZ Xq2wwFzJNMdc/N0jeMhUKQeLLmkXNTiMIvWWcRQirVDzkvo+Xvujax58spKiTpgp rb7fWkvNQ1C9ZH6nRpLrHoS6/MMKUl7VT7bWGw5NbetoYgNfTvOlB3o73RqOO+fV CNj/zuJ/TXgeB61BQ8D8CBPRIQ6XQbd+DWeTcCS9Nkv86k5aEA2QKhbZ458sOEig n92PDV2vX2/8YhEAd7c3vMxpO4toHfVm8hY9ETPimBWG+hRtAXSfV0G8cFAuLaTG SyiCDddon0+9T4l5IE0+KbskWi3ESOpEkB9PsEq5dJt7RgTnMN7NHBt80BH3M6PQ Gs1l0DIGRIL/Ay2rzL5n6VJTEKsM4WmviStyEPVx+OxrkRjy11fbvGhoZ4zzZ55A BlcVM3lfdCpHeLBApE/Z =M3Zn -END PGP SIGNATURE- Thank you for your contribution to Debian. -- To UNSUBSCRIBE, email to debian-qa-packages-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org Archive: https://lists.debian.org/e1xgnsp-00016h...@franck.debian.org
Processing of opendict_0.6.5-3_amd64.changes
opendict_0.6.5-3_amd64.changes uploaded successfully to localhost along with the files: opendict_0.6.5-3.dsc opendict_0.6.5-3.debian.tar.xz opendict_0.6.5-3_all.deb Greetings, Your Debian queue daemon (running on host franck.debian.org) -- To UNSUBSCRIBE, email to debian-qa-packages-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org Archive: https://lists.debian.org/e1xgneb-00085u...@franck.debian.org
Bug#616473: marked as done (Support for IPv6 is possible)
Your message dated Mon, 20 Oct 2014 21:30:11 + with message-id and subject line Bug#616473: fixed in tcpspy 1.7d-9 has caused the Debian Bug report #616473, regarding Support for IPv6 is possible to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 616473: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=616473 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems --- Begin Message --- Package: tcpspy Version: 1.7d-4 Severity: wishlist This message is meant to give a preview of a possibility to enhance the capabilities of tcspy with IPv6 support. Presently I am beginning the hard testing of my patch, after having implemented all needed changes. As a small indication, here is an anonymised excerpt from my system log (outgoing slogin via IPv6 folded back with slogin using IPv4): Mar 4 19:19:29 birger tcpspy[23397]: tcpspy started, monitoring connections Mar 4 19:22:32 birger tcpspy[23397]: connect: user mats, \ local 2001:470:dead:beef::123:35082, remote 2001:470:dead:beef::39:ssh Mar 4 19:24:32 birger tcpspy[23397]: connect: user root, \ local 192.168.0.123:ssh, remote 192.168.0.39:9847 Mar 4 19:26:11 birger tcpspy[23397]: disconnect: user root, \ local 192.168.0.123:ssh, remote 192.168.0.39:9847 Mar 4 19:26:44 birger tcpspy[23397]: disconnect: user mats, \ local 2001:470:dead:beef::123:35082, remote 2001:470:dead:beef::39:ssh Best regards, Mats Erik Andersson, DM --- End Message --- --- Begin Message --- Source: tcpspy Source-Version: 1.7d-9 We believe that the bug you reported is fixed in the latest version of tcpspy, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 616...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Joao Eriberto Mota Filho (supplier of updated tcpspy package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@ftp-master.debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Thu, 16 Oct 2014 17:07:26 -0300 Source: tcpspy Binary: tcpspy Architecture: source amd64 Version: 1.7d-9 Distribution: unstable Urgency: medium Maintainer: Debian QA Group Changed-By: Joao Eriberto Mota Filho Description: tcpspy - Incoming and Outgoing TCP/IP connections logger Closes: 616355 616473 617424 Changes: tcpspy (1.7d-9) unstable; urgency=medium . * QA upload. * Upload to unstable. * Fixed a FTBFS in some architectures. Thanks a lot to Luis Valdes . * debian/control: updated the long description. * debian/copyright: - Migrated to 1.0 format. - Updated the upstream and packaging data. * debian/manpages: created to install all manpages. * debian/patches/: - Added the 'add_support_to_ipv6' patch, written by Mats Erik Andersson and reviewed by Joao Eriberto Mota Filho. This patch implements an previous patch from the same author too. Part of the patch was directly applied to debian/tcpspy.rules.5. Thanks a lot to Mats. (Closes: #616355, #616473) - Added the 'add_security' patch. Thanks again to Mats Erik Andersson . (Closes: #617424) - Updated the 'manpage' patch. * debian/tcpspy.8: removed because the upstream has a manpage too. * debian/tcpspy.init: - Added the 'Description' field to header. - Added a call to LSB init functions. - Added a test to check the '/etc/tcpspy.rules' file presence. - added the 'status' option. Checksums-Sha1: 08df890eae4b292739554917c730bacc02a2c883 1646 tcpspy_1.7d-9.dsc 2faed868482b07de2a41ab7469219b64e7ab978f 12072 tcpspy_1.7d-9.debian.tar.xz 878eefd97658a6748fd2a78fd397682fbb7b8066 31362 tcpspy_1.7d-9_amd64.deb Checksums-Sha256: 81d91ceceea6e7e88a7f60071335d9eaef33f403ae91729bc008f9f34c91bef5 1646 tcpspy_1.7d-9.dsc af66de7855250d6d15351d0ac18c11fe1976a70bcbb535d80ccd768ab120a077 12072 tcpspy_1.7d-9.debian.tar.xz 54390783d2423de5b3d478917c219c20b6fb4d46f9b6a7d621771a122423d2f9 31362 tcpspy_1.7d-9_amd64.deb Files: b41bd31202bc395227bf2e0c9dde2749 1646 net optional tcpspy_1.7d-9.dsc dcda6c5773086e9749c19d6385280354 12072 net optional tcpspy_1.7d-9.debian.tar.xz 647ee93ca620f2a39c9522d4e85026ec 31362 net optional tcpspy_1.7d-9_amd64.deb -BEGIN PGP SIGNATURE- Version:
Bug#617424: marked as done (Consider improving enclosure of daemon.)
Your message dated Mon, 20 Oct 2014 21:30:11 + with message-id and subject line Bug#617424: fixed in tcpspy 1.7d-9 has caused the Debian Bug report #617424, regarding Consider improving enclosure of daemon. to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 617424: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=617424 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems --- Begin Message --- Package: tcpspy Version: 1.7d-4 Severity: wishlist Tags: patch Tcpspy is clearly intended to be a long living daemon. As such it is reacting on an alarmingly large number of signals. One could also argue that it would benefit slightly from a stricter handling of file descriptors, more in line with security measures for other daemons. I contribute one mode of implementing these changes. Best regards, Mats Erik Andersson, DM Description: Improve security in daemonised execution. Ignore signals irrelevant to a long living daemon which was crafted with orderly shutdown. . Replace standard file descriptors with a tie to "/dev/null". . Yield controlling terminal properly by seting session ID. Author: Mats Erik Andersson Forwarded: no Last-Update: 2011-03-08 --- tcpspy-1.7d.debian/tcpspy.c 2002-01-25 02:01:02.0 +0100 +++ tcpspy-1.7d/tcpspy.c 2011-03-08 20:56:37.0 +0100 @@ -53,7 +53,10 @@ #include #include #include +#include /* umask() */ +#include /* open /dev/null */ #include +#include /* _PATH_DEVNULL */ #include "log.h" #include "rcsid.h" @@ -607,7 +610,16 @@ if (debug == 0) { pid_t p; + int nullfd; + /* Hinder early disturbance generated by terminal. */ + signal (SIGHUP, SIG_IGN); + signal (SIGINT, SIG_IGN); + signal (SIGQUIT, SIG_IGN); + signal (SIGTSTP, SIG_IGN); + signal (SIGUSR1, SIG_IGN); + signal (SIGUSR2, SIG_IGN); + /* 1st fork */ p = fork(); if (p < 0) { @@ -617,6 +629,13 @@ } else if (p != 0) exit (0); + /* Give up controlling terminal */ + if (setsid () < 0) { + fprintf (stderr, "tcpspy: setsid: %s\n", + strerror (errno)); + exit (EXIT_FAILURE); + } + /* 2nd fork */ p = fork(); if (p < 0) { @@ -630,11 +649,22 @@ } ioctl (STDIN_FILENO, TIOCNOTTY, NULL); - close (STDIN_FILENO); - close (STDOUT_FILENO); - close (STDERR_FILENO); + + nullfd = open (_PATH_DEVNULL, O_RDWR, 0); + if (nullfd < 0) { + fprintf (stderr, "tcpspy: cannot open %s\n", + _PATH_DEVNULL); + exit (EXIT_FAILURE); + } + + dup2 (nullfd, STDIN_FILENO); + dup2 (nullfd, STDOUT_FILENO); + dup2 (nullfd, STDERR_FILENO); + close (nullfd); + setpgid (0, 0); chdir ("/"); + umask (0); } else fprintf (stderr, "tcpspy 1.7d started (debug)\n"); signature.asc Description: Digital signature --- End Message --- --- Begin Message --- Source: tcpspy Source-Version: 1.7d-9 We believe that the bug you reported is fixed in the latest version of tcpspy, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 617...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Joao Eriberto Mota Filho (supplier of updated tcpspy package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@ftp-master.debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Thu, 16 Oct 2014 17:07:26 -0300 Source: tcpspy Binary: tcpspy Architecture: source amd64 Version: 1.7d-9 Distribution: unstable Urgency: medium Maintainer: Debian QA Group Changed-By: Joao Eriberto Mota Filho Description: tcpspy - Incoming and Outgoing TCP/IP connections logger Closes: 616355 616473 617424 Changes: tcpspy (1.7d-9) unstable; urgency=medium . * QA upload. * Upload to unstable. * Fixed a FTBFS in some architectures. Thanks a lot to Luis Valdes . * debian/control: updated the long description. * debian/copyright: - Migrated to 1.0 format. - Updated the upstream and packaging data. * debian/manpages: created to install all manpages. * debian/patches/: - Added the 'add_support_to_ipv6' patch, written by Mats Erik Andersson and reviewed by Joao Eriberto Mota Filho. This patch implements an previous patch from the same author too. Part of the patch was directly applied to debian/tcpspy.rules.5. Th
Bug#616355: marked as done (Segmentation fault with simple rules.)
Your message dated Mon, 20 Oct 2014 21:30:11 + with message-id and subject line Bug#616355: fixed in tcpspy 1.7d-9 has caused the Debian Bug report #616355, regarding Segmentation fault with simple rules. to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 616355: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=616355 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems --- Begin Message --- Package: tcpspy Version: 1.7d-4 Severity: important Tags: patch It is very simply to generate a segmentation fault with this software: tcpspy -d -e 'raddr 192.168.0.0/255.255.255.0' and then a telnet call! The cause is a stack underrun, a pop command on an empty stack causes the address exception. The underlying problem is that a simple (singleton) rule still causes a bytecode BC_OR onto the stack, forcing the evaluation engine to continue where is really should finalize execution. The best remedy seems to be the push of an initial FALSE onto the emptt stack. That can never hurt any evaluation. Do not be fooled by the correct evaluation of tcpspy -d -e 'raddr 192.168.0.1 or raddr 10.1.2.3.4' since then the binary relation BC_OR is indeed correct. My patch also suggests a slight alteration to matching with non-trivial netmasks: raddr 192.168.0.123/255.255.255.192 is now able to catch traffic, without the need for manual calculating the reduction of '192.168.0.123' modulo '255.255.255.192'. It is an unneccesary pain to to this by hand. Computers should do that for us. Best regards, Mats Erik Andersson, DM Description: Recover from stack underflow fault. When applied with a single rule like tcpspy -e 'raddr 10.1.2.3' an incorrect bytecode BC_OR is still put on the stack. This causes the rule traversal to pop an empty stack, thus causing a segmentation fault. The good remedy is initially to push a FALSE onto the empty stack, serving as a guard against a later evaluation. Composite rules tcpspy -e 'raddr 10.1.2.3 and laddr 10.1.2.33' are never causing this segfault. . In addition, to simplify for the user, the netmask is applied to both addresses, the observed address and the stored address. This avoids false negatives due to miscalculation by the administrator. Author: Mats Erik Andersson Forwarded: no Last-Update: 2011-03-03 diff -Naur tcpspy-1.7d.debian/rule.c tcpspy-1.7d/rule.c --- tcpspy-1.7d.debian/rule.c 2002-01-25 02:00:50.0 +0100 +++ tcpspy-1.7d/rule.c 2011-03-03 18:35:44.0 +0100 @@ -293,6 +293,8 @@ static size_t stack_size = 0, stack_ptr = 0; stack_ptr = 0; + PUSH(0); /* Put a single FALSE onto the stack. This protects + * against a segfault caused by simple rules. */ for (ip = 0; ip < code_length; ) { c = NEXTCODE; @@ -360,7 +362,7 @@ SHORTCIRCUIT; -PUSH (((mladdr & mask) == addr) ? 1 : 0); +PUSH (((mladdr & mask) == (addr & mask)) ? 1 : 0); } break; case BC_RADDR: @@ -375,7 +377,7 @@ SHORTCIRCUIT; -PUSH (((mraddr & mask) == addr) ? 1 : 0); +PUSH (((mraddr & mask) == (addr & mask)) ? 1 : 0); } break; signature.asc Description: Digital signature --- End Message --- --- Begin Message --- Source: tcpspy Source-Version: 1.7d-9 We believe that the bug you reported is fixed in the latest version of tcpspy, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 616...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Joao Eriberto Mota Filho (supplier of updated tcpspy package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@ftp-master.debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Thu, 16 Oct 2014 17:07:26 -0300 Source: tcpspy Binary: tcpspy Architecture: source amd64 Version: 1.7d-9 Distribution: unstable Urgency: medium Maintainer: Debian QA Group Changed-By: Joao Eriberto Mota Filho Description: tcpspy - Incoming and Outgoing TCP/IP connections logger Closes: 616355 616473 617424 Changes: tcpspy (1.7d-9) unstable; urgency=medium . * QA upload. * Upload to unstable. * Fixed a FTBFS in some architectures. Thanks a lot to Luis Valdes . * debian/control: updated the long description. * debian/copyright: - Migrated to 1.0 format.
tcpspy_1.7d-9_amd64.changes ACCEPTED into unstable
Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Thu, 16 Oct 2014 17:07:26 -0300 Source: tcpspy Binary: tcpspy Architecture: source amd64 Version: 1.7d-9 Distribution: unstable Urgency: medium Maintainer: Debian QA Group Changed-By: Joao Eriberto Mota Filho Description: tcpspy - Incoming and Outgoing TCP/IP connections logger Closes: 616355 616473 617424 Changes: tcpspy (1.7d-9) unstable; urgency=medium . * QA upload. * Upload to unstable. * Fixed a FTBFS in some architectures. Thanks a lot to Luis Valdes . * debian/control: updated the long description. * debian/copyright: - Migrated to 1.0 format. - Updated the upstream and packaging data. * debian/manpages: created to install all manpages. * debian/patches/: - Added the 'add_support_to_ipv6' patch, written by Mats Erik Andersson and reviewed by Joao Eriberto Mota Filho. This patch implements an previous patch from the same author too. Part of the patch was directly applied to debian/tcpspy.rules.5. Thanks a lot to Mats. (Closes: #616355, #616473) - Added the 'add_security' patch. Thanks again to Mats Erik Andersson . (Closes: #617424) - Updated the 'manpage' patch. * debian/tcpspy.8: removed because the upstream has a manpage too. * debian/tcpspy.init: - Added the 'Description' field to header. - Added a call to LSB init functions. - Added a test to check the '/etc/tcpspy.rules' file presence. - added the 'status' option. Checksums-Sha1: 08df890eae4b292739554917c730bacc02a2c883 1646 tcpspy_1.7d-9.dsc 2faed868482b07de2a41ab7469219b64e7ab978f 12072 tcpspy_1.7d-9.debian.tar.xz 878eefd97658a6748fd2a78fd397682fbb7b8066 31362 tcpspy_1.7d-9_amd64.deb Checksums-Sha256: 81d91ceceea6e7e88a7f60071335d9eaef33f403ae91729bc008f9f34c91bef5 1646 tcpspy_1.7d-9.dsc af66de7855250d6d15351d0ac18c11fe1976a70bcbb535d80ccd768ab120a077 12072 tcpspy_1.7d-9.debian.tar.xz 54390783d2423de5b3d478917c219c20b6fb4d46f9b6a7d621771a122423d2f9 31362 tcpspy_1.7d-9_amd64.deb Files: b41bd31202bc395227bf2e0c9dde2749 1646 net optional tcpspy_1.7d-9.dsc dcda6c5773086e9749c19d6385280354 12072 net optional tcpspy_1.7d-9.debian.tar.xz 647ee93ca620f2a39c9522d4e85026ec 31362 net optional tcpspy_1.7d-9_amd64.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1 iQIcBAEBAgAGBQJURWUdAAoJEN5juccE6+nvo0QQAKWCs/NzaczR9er6c4ptrAet I0e1ivdJoqdYmNI5ghQER+MOH70i+EKnq8iF8p9XaMtvH43FKP9gbNeZBVA6F3fJ gLr7p2WYKgnX0i6Ahidlq3blBqqDy9ff+lp1suMc3tZfUe8Da8kBn2wu4ZjQvZOT Kj9fOP73fyS69/Xd0vlcYUw4f8zzvzqMU4q+7kkE4dFDQBfH3kra1BCDP8PqIkfp 9b0iVYNAAnijV4T5swskiMzyN/flKAsiRRKB14HPqyoVKS/lAL0/JbS6caAK0szI 1BSzE40Euj9BQGVZv6exDAZSYCd96rBBvXLLUC1wI7Dcg9kJsnnGIgYJ7EFJOWzb lyK5+dmeEuZpcxLWqggsrwBoOjkXCOyfZaObdPrmfX+b9DOwSAX4xDgnr+JPRWAG ig1jAEvEeNpgGcj0tbwIlGCpTmHGh1eYfTSr7Yk85TNUUAxR7dSNNBaGWxsY+0wg 55Podeo3Q9ZOPVjy7RP7fOIqw9B2OHF5hiivMU47UnQrbiOyKpdx5pOzvDBoik14 tZIkIirzI0VLuyaBkitf7JxrTYrw0MSmTh4nOjdpDLGUZDXuxs8PK3NjITVXqjbq tl2hMi+5wT3XnxgR+A+TrYqNoW9MdWzZHtS3/7iunhsbkMK5UT/8fK0qXiWBB59F vKKWYRCU5IbqsW7Ip+G4 =IpOQ -END PGP SIGNATURE- Thank you for your contribution to Debian. -- To UNSUBSCRIBE, email to debian-qa-packages-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org Archive: https://lists.debian.org/e1xgkwp-0003np...@franck.debian.org
Bug#748195: marked as done (python-socksipy: Exceptions take only one parameter, don't give 2!)
Your message dated Mon, 20 Oct 2014 20:34:36 + with message-id <544571dc.1030...@nirgal.com> and subject line Re: python-socksipy: Exceptions take only one parameter, don't give 2! has caused the Debian Bug report #748195, regarding python-socksipy: Exceptions take only one parameter, don't give 2! to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 748195: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=748195 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems --- Begin Message --- Package: python-socksipy Version: 1.0-1 Severity: minor Tags: patch Dear Maintainer, When a connection can't be established an exception is raised. This is good. But exception __init__ take only one argument, and there are some places in the code where 2 are given, resulting in TypeError exception being raised, insteed of Socks5Error or simmilar.This is quite unfriendly, and obviously not what was intended by the author. Traceback (most recent call last): (...) File "/usr/lib/python2.7/dist-packages/socks.py", line 369, in connect self.__negotiatesocks5(destpair[0],destpair[1]) File "/usr/lib/python2.7/dist-packages/socks.py", line 236, in __negotiatesocks5 raise Socks5Error(ord(resp[1]),_generalerrors[ord(resp[1])]) TypeError: __init__() takes exactly 2 arguments (3 given) Attached is a patch. After patching, the proper exception is raised: Traceback (most recent call last): (...) File "/usr/lib/python2.7/dist-packages/socks.py", line 369, in connect self.__negotiatesocks5(destpair[0],destpair[1]) File "/usr/lib/python2.7/dist-packages/socks.py", line 236, in __negotiatesocks5 raise Socks5Error((ord(resp[1]),_generalerrors[ord(resp[1])])) socks.Socks5Error: (4, 'bad proxy type') Thank you for maintaining that package :) -- System Information: Debian Release: 7.5 APT prefers stable APT policy: (500, 'stable') Architecture: amd64 (x86_64) Kernel: Linux 3.2.0-4-amd64 (SMP w/1 CPU core) Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Versions of packages python-socksipy depends on: ii python 2.7.3-4+deb7u1 ii python-central 0.6.17 python-socksipy recommends no packages. python-socksipy suggests no packages. -- no debconf information --- /usr/lib/python2.7/dist-packages/socks.py.orig 2006-10-25 22:19:26.0 +0200 +++ /usr/lib/python2.7/dist-packages/socks.py 2014-05-15 10:44:49.0 +0200 @@ -196,7 +196,7 @@ if authstat[1] != "\x00": # Authentication failed self.close() -raise Socks5AuthError,((3,_socks5autherrors[3])) +raise Socks5AuthError((3,_socks5autherrors[3])) # Authentication succeeded else: # Reaching here is always bad @@ -233,9 +233,9 @@ # Connection failed self.close() if ord(resp[1])<=8: -raise Socks5Error(ord(resp[1]),_generalerrors[ord(resp[1])]) +raise Socks5Error((ord(resp[1]),_generalerrors[ord(resp[1])])) else: -raise Socks5Error(9,_generalerrors[9]) +raise Socks5Error((9,_generalerrors[9])) # Get the bound address/port elif resp[3] == "\x01": boundaddr = self.__recvall(4) --- End Message --- --- Begin Message --- Version: 1.02-1 This bug has been fixed upstream, and in sid. Thank you :) signature.asc Description: OpenPGP digital signature --- End Message ---
Processing of tcpspy_1.7d-9_amd64.changes
tcpspy_1.7d-9_amd64.changes uploaded successfully to localhost along with the files: tcpspy_1.7d-9.dsc tcpspy_1.7d-9.debian.tar.xz tcpspy_1.7d-9_amd64.deb Greetings, Your Debian queue daemon (running on host franck.debian.org) -- To UNSUBSCRIBE, email to debian-qa-packages-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org Archive: https://lists.debian.org/e1xgj0m-0006iu...@franck.debian.org
Bug#598102: please test the new scanbuttond in experimental
tags 598102 + moreinfo thanks Hello, scanbd is due to replace scanbuttond. If you can, please verify the problems you reported by updating to the scanbuttond migration package in experimental and report back if you still experience this issue. Thank you. Regards Rolf Leggewie -- To UNSUBSCRIBE, email to debian-qa-packages-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org Archive: https://lists.debian.org/54453cae.7040...@rolf.leggewie.biz
Bug#677584: scanbuttond is migrating to scanbd
Hello, support for the ScanSnap S1500 for sane is marked as "complete". scanbuttond is currently migrating to scanbd in Debian experimental. scanbd uses sane for the backend and thus scanbd should now support the S1500. Otherwise, patches would need to go to libsane, anyhow. I am sure the migration package is still rough, so testing and bug reports are very welcome. Please let me know if support for the S1500 is now complete in scanbd. Regards Rolf -- To UNSUBSCRIBE, email to debian-qa-packages-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org Archive: https://lists.debian.org/544539b6.4030...@rolf.leggewie.biz
Bug#731617: marked as done (Please switch from avahi to avahi-daemon in initscript LSB dependencies)
Your message dated Tue, 21 Oct 2014 01:27:10 +0900 with message-id <544537de.6080...@rolf.leggewie.biz> and subject line no longer an issue in scanbd has caused the Debian Bug report #731617, regarding Please switch from avahi to avahi-daemon in initscript LSB dependencies to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 731617: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=731617 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems --- Begin Message --- Package: avahi-daemon Version: 0.6.31-2 Severity: normal Hi, avahi-daemon package is shipping both an avahi-daemon.service and an LSB initscript avahi-daemon. This will make systemd prefere the native service. The problem is that the LSB initscript is providing the "avahi" service. This means that the other initscripts (that don't have a native systemd service counterpart) will have a dependency against "avahi" that will be translated to avahi.service which of course is not existing. I see two solutions here. Either add Alias=avahi.service to the avahi-daemon service file or add "avahi-daemon" to the list of Provides of the LSB initscript and then make all other LSB initscript depend against this new name. I'm not sure which one is the prefered way. Cheers Laurent Bigonville -- System Information: Debian Release: jessie/sid APT prefers unstable APT policy: (500, 'unstable'), (1, 'experimental') Architecture: amd64 (x86_64) Foreign Architectures: i386 Kernel: Linux 3.11-1-amd64 (SMP w/8 CPU cores) Locale: LANG=fr_BE.utf8, LC_CTYPE=fr_BE.utf8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Versions of packages avahi-daemon depends on: ii adduser3.113+nmu3 ii bind9-host [host] 1:9.9.3.dfsg.P2-4 ii dbus 1.6.18-1 ii host 1:9.9.3.dfsg.P2-4 ii libavahi-common3 0.6.31-2 ii libavahi-core7 0.6.31-2 ii libc6 2.17-95 ii libcap21:2.22-1.2 ii libdaemon0 0.14-2 ii libdbus-1-31.6.18-1 ii libexpat1 2.1.0-4 ii lsb-base 4.1+Debian12 Versions of packages avahi-daemon recommends: ii libnss-mdns 0.10-3.2 Versions of packages avahi-daemon suggests: ii avahi-autoipd 0.6.31-2 -- no debconf information --- End Message --- --- Begin Message --- fixed 731617 1.4.0-1x3 thanks Hello, thank you for your report. This does not affect the package after migrating to scanbd which is in experimental. Testing of and reporting bugs against said package is very welcome. Regards Rolf--- End Message ---
Processed: no longer an issue in scanbd
Processing commands for cont...@bugs.debian.org: > fixed 731617 1.4.0-1x3 Bug #731617 [scanbuttond] Please switch from avahi to avahi-daemon in initscript LSB dependencies Marked as fixed in versions scanbd/1.4.0-1x3. > thanks Stopping processing here. Please contact me if you need assistance. -- 731617: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=731617 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-qa-packages-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org Archive: https://lists.debian.org/handler.s.c.141382244719844.transcr...@bugs.debian.org
ALERTE : Le Maroc plus sûr que les États-Unis ?
Se désinscrire de la liste: http://link.email.wib.me/u/443/159bf02e855352fdba889a7d12fbc7a2c1117f11875b2e4b Avenue Abdelmoumen, Rue Calavon n 4, Casablanca, 2, Maroc
Bug#766068: RFS: robocode 1.6.2+dfsg2-1 [ITA] [RC]
On Mon, Oct 20, 2014 at 11:58:06PM +0200, Markus Koschany wrote: > Hi all, > > I have recently adopted Robocode, a Java programming game, and I think > [...] Hi Markus, I'll take care of it. Cheers, -- Miguel Landaeta, nomadium at debian.org secure email with PGP 0x6E608B637D8967E9 available at http://miguel.cc/key. "Faith means not wanting to know what is true." -- Nietzsche signature.asc Description: Digital signature
Processed: reopening 646247
Processing commands for cont...@bugs.debian.org: > # typo in bug number in changelog, sorry for the noise > reopen 646247 Bug #646247 {Done: Tristan Seligmann } [libinklevel5] [libinklevel5] requires deprecated usblp devices for USB printers ("Could not access '/dev/usb/lp0' or '/dev/usblp0'.") 'reopen' may be inappropriate when a bug has been closed with a version; all fixed versions will be cleared, and you may need to re-add them. Bug reopened No longer marked as fixed in versions pythondialog/3.2.0-1. > thanks Stopping processing here. Please contact me if you need assistance. -- 646247: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=646247 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-qa-packages-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org Archive: https://lists.debian.org/handler.s.c.14138077815272.transcr...@bugs.debian.org
Bug#646247: marked as done ([libinklevel5] requires deprecated usblp devices for USB printers ("Could not access '/dev/usb/lp0' or '/dev/usblp0'."))
Your message dated Mon, 20 Oct 2014 12:00:12 + with message-id and subject line Bug#646247: fixed in pythondialog 3.2.0-1 has caused the Debian Bug report #646247, regarding [libinklevel5] requires deprecated usblp devices for USB printers ("Could not access '/dev/usb/lp0' or '/dev/usblp0'.") to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 646247: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=646247 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems --- Begin Message --- Package: libinklevel5 Version: 0.8.0-1.1+b1 Severity: serious libinklevel requires /dev/usb/lp? or /dev/usblp? for USB printers. Otherwise, it returns DEV_USB_LP_INACCESSIBLE: case DEV_USB_LP_INACCESSIBLE: printf("Could not access '/dev/usb/lp%d' or '/dev/usblp%d'.\n", portnumber, portnumber); break; get_device_id() contains: if (port == USB) { sprintf(device_file1, "/dev/usb/lp%d", portnumber); sprintf(device_file2, "/dev/usblp%d", portnumber); fd = open(device_file1, O_RDONLY); if (fd == -1) { fd = open(device_file2, O_RDONLY); } if (fd == -1) { return DEV_USB_LP_INACCESSIBLE; } } Therefore, polling ink levels on USB printers fails if the usblp LKM is not loaded: $ ink -p usb Could not access '/dev/usb/lp0' or '/dev/usblp0'. Could not get ink level. chealer@vinci:~$ Both ink and Qink fail with USB printers. qink just complains "Printer error No printers detected on this system". Launching it as root won't help. However, printing works... usblp used to be loaded when a USB printer was plugged in. usblp is now blacklisted by cups, since CUPS switched from usblp to libusb: Drop usb-backend-both-usblp-and-libusb.dpatch. It's causing crashes, and upstream does not want it either. Instead, add a blacklist file debian/local/blacklist-cups-usblp.patch and install it into /etc/modprobe.d/; that way, we don't require kernels to disable usblp, and allow other spoolers than cups to work. http://packages.debian.org/changelogs/pool/main/c/cups/current/changelog#version1.4.6-8 # cat /etc/modprobe.d/blacklist-cups-usblp.conf # cups talks to the raw USB devices, so we need to blacklist usblp to avoid # grabbing them blacklist usblp root@vinci:/etc# A workaround is to purge cups, or to manually load usblp. This means that ink and Qink won't just work for the vast majority of printers. --- System information. --- Architecture: i386 Kernel: Linux 3.0.0-2-amd64 Debian Release: wheezy/sid 990 testing security.debian.org 990 testing ftp.ca.debian.org 500 unstable ftp.ca.debian.org 1 experimental ftp.ca.debian.org --- Package information. --- Depends (Version) | Installed -+-=== libc6 (>= 2.3) | 2.13-21 libieee1284-3 | 0.2.11-10 Package's Recommends field is empty. Package's Suggests field is empty. --- End Message --- --- Begin Message --- Source: pythondialog Source-Version: 3.2.0-1 We believe that the bug you reported is fixed in the latest version of pythondialog, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 646...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Tristan Seligmann (supplier of updated pythondialog package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@ftp-master.debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Sun, 19 Oct 2014 12:46:15 +0200 Source: pythondialog Binary: python3-dialog Architecture: source all Version: 3.2.0-1 Distribution: unstable Urgency: low Maintainer: Debian Python Modules Team Changed-By: Tristan Seligmann Description: python3-dialog - Python module for making simple terminal-based user interfaces Closes: 608408 615432 646247 673962 Changes: pythondialog (3.2.0-1) unstable; urgency=low . [ Florent Rougon ] * New upstream release. . * Add Build-Depends on python3-docutils, python3-sphinx (>= 1.0.7+dfsg-1~) and python3-pygments because this release brings a new Sphinx-based documentation. . * add-glossary-label: new patch to add a "glossary" label right before the Glossary (maybe upstream bug, but upstream-installed Sphinx didn't
Bug#766068: RFS: robocode 1.6.2+dfsg2-1 [ITA] [RC]
Hi all, I have recently adopted Robocode, a Java programming game, and I think it fits best into the Java team. It is currently affected by RC bug #766068 that prevents users from starting the game. This is a rather old version. Unfortunately it's too late now to package the latest release since it is based on Maven and requires a couple of additional dependencies which have not been packaged yet. Nevertheless I would be glad if someone sponsored this package for me. http://mentors.debian.net/debian/pool/main/r/robocode/robocode_1.6.2+dfsg2-1.dsc http://anonscm.debian.org/cgit/pkg-java/robocode.git Changelog: * Acknowledge NMU by Simon Paillard. Unfortunately the changes were overridden by the last revision. * Add myself to Uploaders and move the package under the umbrella of the Java team. (Closes: #590774) * Repack robocode and remove sourceless Jacobe.jar file. * Depend on default-jre | java6-runtime | java7-runtime instead of obsolete Java6 runtime environments alone. (Closes: #760954) * Fix obsolete detection of Java6 runtime in robocode wrapper script, so that the game can be executed again. (Closes: #766068) * Declare compliance with Debian Policy 3.9.6. * Use compat level 9 and require debhelper >= 9. * Update Vcs-fields to canonical address and move the package to pkg-java Git repository. * wrap-and-sort -sa. * Remove build-dependency on quilt since source format 3.0 uses quilt by default. * Recommend default-jdk instead of specific JDK versions. * Suggest Eclipse IDE. * Rename README.Debian-source to README.source * Add robocode.menu file. (Closes: #738018) * Add keywords to desktop file. * Add build-arch and build-indep targets to debian/rules. Regards, Markus signature.asc Description: OpenPGP digital signature
Bug#764992: I am also hitting this problem...
It looks like:- https://bugzilla.redhat.com/show_bug.cgi?id=1078057 I am hitting it on a UEFI disk /dev/sda1, which is mounted as /boot/efi The RedHat bug says this is a regression introduced in dosfstools-3.0.26. It seems to work with dosfstools-3.0.25. I am running 3.0.26-4. David -- To UNSUBSCRIBE, email to debian-qa-packages-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org Archive: https://lists.debian.org/2034756.mvKtccUpCJ@stargate
Bug#766068: robocode: fails to start because of obsolete Java environment detection
Package: robocode Version: 1.6.2+dfsg-4 Severity: serious Robocode fails to start when OpenJDK 7 or a newer version is installed on the system. Since OpenJDK7 is the default Java runtime environment for Jessie and OpenJDK6 is going to be removed, this issue is release critical. The error message is: E: Cannot find JRE, exiting.. This is caused by an obsolete detection of Java runtime environments in the robocode wrapper script. I intend to adopt Robocode for the Java team and will prepare a fix for this issue soonish. Markus -- To UNSUBSCRIBE, email to debian-qa-packages-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org Archive: https://lists.debian.org/20141020162138.19954.39532.reportbug@conan
mksh_50d-1~bpo70+2_i386.changes ACCEPTED into wheezy-backports
Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA384 Format: 1.8 Date: Sun, 19 Oct 2014 22:11:48 +0200 Source: mksh Binary: mksh pdksh Architecture: source all i386 amd64 Version: 50d-1~bpo70+2 Distribution: wheezy-backports Urgency: high Maintainer: Debian QA Group Changed-By: Thorsten Glaser Description: mksh - MirBSD Korn Shell pdksh - transitional dummy package to migrate from pdksh to mksh Changes: mksh (50d-1~bpo70+2) wheezy-backports; urgency=high . * QA upload. * Emergency upload: fix severe regression (LP#1381965) Checksums-Sha1: 16616fb26632497a6c3c72d8ce29b31288afc802 2342 mksh_50d-1~bpo70+2.dsc 1f37b4f49585d87038525bc602e2d7530027e477 85958 mksh_50d-1~bpo70+2.debian.tar.gz fd7ecc4cc925657e424a539289aa88b980d42b4f 2704 pdksh_50d-1~bpo70+2_all.deb ba766f9deff0aace4e4d670be88ee733fbfde57f 522194 mksh_50d-1~bpo70+2_i386.deb 321c899018e84e04e20d4e908e9b85f1762e0736 541126 mksh_50d-1~bpo70+2_amd64.deb Checksums-Sha256: bd0773737f86ed35f4c6d5d105677bab16a89464c20bf0a8dc7fb42534b60dd0 2342 mksh_50d-1~bpo70+2.dsc db4a88d333aca835ed8003df346006f2ebad00c865a0ad036c08392947354e13 85958 mksh_50d-1~bpo70+2.debian.tar.gz 1468cf4bcf9d3b8b7802722aa849973406d23c0d72abf69952b33e802613670e 2704 pdksh_50d-1~bpo70+2_all.deb 6f6afa9a8be25308ca099d0784f442a3046049f52b1d42bd87f7710b427fa398 522194 mksh_50d-1~bpo70+2_i386.deb 5a044be3794221457fcf30e342ada746a9e761b5de6c5fea135b957c6ede52cb 541126 mksh_50d-1~bpo70+2_amd64.deb Files: efc21373d3e5f00d4308b20eec98df94 2342 shells optional mksh_50d-1~bpo70+2.dsc 8ff0333045e2f57b294158cdd9500622 85958 shells optional mksh_50d-1~bpo70+2.debian.tar.gz 530e0e870b5ce6ccacb5f4c8cb637e5b 2704 oldlibs extra pdksh_50d-1~bpo70+2_all.deb 797d428b24d7bc00f70589d6523f5631 522194 shells optional mksh_50d-1~bpo70+2_i386.deb 011362b1108191486560bffc26bb1a48 541126 shells optional mksh_50d-1~bpo70+2_amd64.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.14 (MirBSD) Comment: ☃ ЦΤℱ—8 ☕☂☄ iQIcBAEBCQAGBQJURB+AAAoJEHa1NLLpkAfgJHQP/RiCYpe213CJWmJf62BhaP1Z ZVI+kvISsJ+g6qNuPBnihPSCGIjBPjLkObueQ6bXNVrbQNPh75mq3KGO8ulz+6JG tCV20J2yb4WOr+AykDgg7vim1NAvzWkp9w+Ac+zdr+7H8/CXtIXfKkA6jzxmEWdw eemL8rHdAMnvWeyh3RG0OpC2kVVKzBW8LyRBIdkOJKGpGPnplE+m+0aG1nwAnHD5 4TeeQ+vLdDP8bzYJvTGwHW0NWgTYJWaJnCnl5ETwlac/1DYwyupIc/G4ODoZtA+J ykAW5pdtcUvPGzzz0hZlbJC3aAQHAh48qED8jnXF0vgZTjEgpG/uzdY3X4YS8v3F 37es/fvbOCAPdWdexY/qd0oDo5nygfabBxionJVdeWcvOSlqbAYTY8ZFbMd6uHeh uOk6RfWWEcc4vZ/9VKhX04aiaCeT57vRrg1a5MyRzPTreXWSrQJ5bXig4Xskk8E9 wVEdP+1ZyUCkB+yPkqC45UPv8kIvnhqIT+vnoVX8oYKE9xlhv8oWcTzQghhxv05M 4KbHRiK520YjJzhqXh3sk2TpqT8IYVIovsh/1JWUiVUjqO+MAwFDstPBYxu3X0K3 D7n6szyBv7raGMVsUueldCrrj1GaclXX48lFUOZNKpf9SdhxYv+7iyJmbPL9491S Piuw9+nA0tnGMJdNyZpl =1Ebp -END PGP SIGNATURE- Thank you for your contribution to Debian. -- To UNSUBSCRIBE, email to debian-qa-packages-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org Archive: https://lists.debian.org/e1xfxxr-0005ae...@franck.debian.org
mksh_50d-2_all.changes ACCEPTED into unstable
Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA384 Format: 1.8 Date: Sun, 19 Oct 2014 19:57:24 +0200 Source: mksh Binary: mksh pdksh Architecture: source all Version: 50d-2 Distribution: unstable Urgency: high Maintainer: Debian QA Group Changed-By: Thorsten Glaser Description: mksh - MirBSD Korn Shell pdksh - transitional dummy package to migrate from pdksh to mksh Changes: mksh (50d-2) unstable; urgency=high . * QA upload. * Apply patch from LP#1381965 Checksums-Sha1: 4cc009b94cab7dbc69b0ffba312d831a86ea1bf4 2329 mksh_50d-2.dsc 586bb74ccc5b8c1cf65840947e474659ea2227d6 72716 mksh_50d-2.debian.tar.xz a32c6d750897de96b9eae80460bce903140329ac 2890 pdksh_50d-2_all.deb Checksums-Sha256: f785b9624ed11f86c8bd91d2b851dde4e103bbc4db0ef1816da0176746e50b9d 2329 mksh_50d-2.dsc 373e5f3739f9326b49cb4f93f8d0085b5cb381a6ee4647b864f915cee7771ecc 72716 mksh_50d-2.debian.tar.xz 49205becf7389ec378dc2dbdbd8d95364178e27d643b04fc7d9ac6354f9213e5 2890 pdksh_50d-2_all.deb Files: f5f8b2c2d7e0e0cefac436a53d86cd51 2329 shells optional mksh_50d-2.dsc 674a1bbb2dde0ee9578400e5db4d16f2 72716 shells optional mksh_50d-2.debian.tar.xz c9c715d7c5db0e4160355145576e8ae1 2890 oldlibs extra pdksh_50d-2_all.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.14 (MirBSD) Comment: ☃ ЦΤℱ—8 ☕☂☄ iQIcBAEBCQAGBQJURBq9AAoJEHa1NLLpkAfgNbEQALuE8UMAXuegEczscwL+KuhY 53EhzE0rRryBlaUY4QGyMifxj3w6YRMR0DRIxaak48j2RdVO/zJ9ulQBgpdz2GGz +QQxzm+zkckgNDEVkzTmp9gssyJPPgIyfR7Ol5GGcQlba0rb1ZtT5bi1pJmb3/ef Ty+wD2Zxj7Eyni8MVayMylKtsQlpe4bcr1YFWW0r9qo+fp7rp60J+wkIDTLK6h2o fbKZJyveaUi0M+/dmK37ssVaETBK+/58uZJIjCnalkp5+v1YfoTX2yWlIT50+/r1 +MoYIfyw9N9F3MJWLJ08kYXPvbPk/IG5FdImiJqAfY+MevxXxXj6LHdmQH6lISQ5 eX6Lea/vimB+dL83kEocTYsj3k79oMEB7EkQPGPRxqROhPlrJ/GqWtGJqBYG9eTo FOLohrXTXXJHvXrndIL1qOAIPY9VwwU5gwBtX8CQI872qrcxKi3OQ9DOoGySbYl1 tfcNo+bQ18aGGfynMTRMRsmnW8w2arQcaRfZ9C2KKwd+QSgLeSMkEWWsE/lupf2e PPbV2ujb0RIunYZW5/096KjdH5e5YvYuMgeY/vwCBLWmDVLuIlHEJYOmqaf3d37H nvZDMU/38r4OSm+QNdJ+31vu4WB2ix+RgbDupH6/Y/d+bar5SFIbrpDW3dPgItvA oDxm3tJ+gmr0jjzVbmKW =Suq6 -END PGP SIGNATURE- Thank you for your contribution to Debian. -- To UNSUBSCRIBE, email to debian-qa-packages-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org Archive: https://lists.debian.org/e1xfxxy-0005cm...@franck.debian.org