Hi Eriberto,
in [1] you wrote that you will contact mpage upstream regarding the
copyright situation.
Did you ever receive a reply?
Thanks
Adrian
[1] https://lists.debian.org/debian-legal/2015/10/msg00057.html
--
"Is there not promise of rain?" Ling Tan asked suddenly out
of
Control tags 827300 +patch
On Fri, Jun 03, 2016 at 01:01:13AM +0200, Dominik George wrote:
> Hi,
Hi Dominik,
> I have started to update this package to the new 0.9.9 upstream version in
> collab-maint.
what is the status of this work?
Currently Guacamole is not in testing, and therefore on co
Package: 9base
Severity: important
Version: 1:6-7
Tags: patch
User: debian-h...@lists.debian.org
Usertags: hurd
X-Debbugs-CC: debian-h...@lists.debian.org
The package fails to build on hurd-i386 because of incorrect values
supplied to fopen() and missing (__GNU__)-defines.
Failing build log:
http
Processing commands for cont...@bugs.debian.org:
> tags 827300 +patch
Bug #827300 [src:guacamole-server] guacamole-server: FTBFS:
guac_handlers.c:398:13: error: channel_change_pty_size is deprecated
Added tag(s) patch.
> thanks
Stopping processing here.
Please contact me if you need assistance.
sam/_libc.h has:
OREAD = 0,
OWRITE = 1,
ORDWR = 2,
OCEXEC = 4,
but it looks like nothing #includes that file, so perhaps that
doesn't have to be patched. Have you tested sam on the Hurd?
If these flags are sent in the Topen and Tcreate requests of the
9P protocol
Source: psutils
Version: 1.17.dfsg-3
Tags: patch
User: helm...@debian.org
Usertags: rebootstrap
psutils fails to cross build from source, because it uses the build
architecture compiler. Even though cdbs passes a suitable CC environment
variable, the upstream build system chooses to override that.
vlock_2.2.2-7_source.changes uploaded successfully to localhost
along with the files:
vlock_2.2.2-7.dsc
vlock_2.2.2-7.debian.tar.xz
Greetings,
Your Debian queue daemon (running on host franck.debian.org)
Your message dated Sun, 18 Sep 2016 12:53:01 +
with message-id
and subject line Bug#837331: fixed in vlock 2.2.2-7
has caused the Debian Bug report #837331,
regarding vlock: fails to install, remove, and install again
to be marked as done.
This means that you claim that the problem has been d
Your message dated Sun, 18 Sep 2016 12:53:00 +
with message-id
and subject line Bug#793901: fixed in vlock 2.2.2-7
has caused the Debian Bug report #793901,
regarding vlock FTCBFS: uses wrong compiler
to be marked as done.
This means that you claim that the problem has been dealt with.
If thi
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Sun, 18 Sep 2016 14:24:05 +0200
Source: vlock
Binary: vlock
Architecture: source
Version: 2.2.2-7
Distribution: unstable
Urgency: medium
Maintainer: Debian QA Group
Changed-By: Helmut Grohne
Description:
vlock -
partimage_0.6.9-1_source.changes uploaded successfully to localhost
along with the files:
partimage_0.6.9-1.dsc
partimage_0.6.9.orig.tar.bz2
partimage_0.6.9-1.debian.tar.xz
Greetings,
Your Debian queue daemon (running on host franck.debian.org)
Hi Adrian,
I think that I forgot this issue. I will try contact the upstream.
Thanks for your poke.
Regards,
Eriberto
2016-09-18 5:23 GMT-03:00 Adrian Bunk :
> Hi Eriberto,
>
> in [1] you wrote that you will contact mpage upstream regarding the
> copyright situation.
>
> Did you ever receive
ruby-mime_0.4.3-3~bpo8+1_amd64.changes uploaded successfully to localhost
along with the files:
ruby-mime_0.4.3-3~bpo8+1.dsc
ruby-mime_0.4.3-3~bpo8+1.debian.tar.xz
ruby-mime_0.4.3-3~bpo8+1_all.deb
Greetings,
Your Debian queue daemon (running on host franck.debian.org)
ruby-spider_0.5.0-2~bpo8+1_amd64.changes uploaded successfully to localhost
along with the files:
ruby-spider_0.5.0-2~bpo8+1.dsc
ruby-spider_0.5.0-2~bpo8+1.debian.tar.xz
ruby-spider_0.5.0-2~bpo8+1_all.deb
Greetings,
Your Debian queue daemon (running on host franck.debian.org)
ruby-mini-exiftool_2.7.6-2~bpo8+1_amd64.changes uploaded successfully to
localhost
along with the files:
ruby-mini-exiftool_2.7.6-2~bpo8+1.dsc
ruby-mini-exiftool_2.7.6-2~bpo8+1.debian.tar.xz
ruby-mini-exiftool_2.7.6-2~bpo8+1_all.deb
Greetings,
Your Debian queue daemon (running on h
Hi,
I am a Debian community member.
In my last revision over the mpage packaged in Debian[1], I detected
that the licensing used[2] does not say explicitely about rights to
modify the source code. It can break the liberty to make changes in
source code. This issue was debated here[3] and generate
/partimage_0.6.9-1_source.changes is already present on target host:
partimage_0.6.9-1.debian.tar.xz
Either you already uploaded it, or someone else came first.
Job partimage_0.6.9-1_source.changes removed.
Greetings,
Your Debian queue daemon (running on host franck.debian.org)
isdnutils_3.25+dfsg1-7_source.changes uploaded successfully to localhost
along with the files:
isdnutils_3.25+dfsg1-7.dsc
isdnutils_3.25+dfsg1-7.debian.tar.xz
Greetings,
Your Debian queue daemon (running on host franck.debian.org)
metacity-themes_1.0.12_amd64.changes uploaded successfully to localhost
along with the files:
metacity-themes_1.0.12.dsc
metacity-themes_1.0.12.tar.gz
metacity-themes_1.0.12_all.deb
Greetings,
Your Debian queue daemon (running on host franck.debian.org)
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Sun, 18 Sep 2016 15:42:19 +0200
Source: isdnutils
Binary: isdnutils-base isdnutils-xtools ipppd isdnlog isdnlog-data
isdnutils-doc isdnvbox isdnvboxclient isdnvboxserver capiutils pppdcapiplugin
Architecture: source
Ve
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Sun, 18 Sep 2016 17:23:57 +0200
Source: metacity-themes
Binary: metacity-themes
Architecture: source all
Version: 1.0.12
Distribution: unstable
Urgency: medium
Maintainer: Debian QA Group
Changed-By: gregor herrmann
D
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Sun, 18 Sep 2016 17:43:25 +1000
Source: partimage
Binary: partimage-server partimage
Architecture: source
Version: 0.6.9-1
Distribution: unstable
Urgency: medium
Maintainer: Debian QA Group
Changed-By: Andrew Worsley
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Sun, 18 Sep 2016 10:35:49 -0300
Source: ruby-mime
Binary: ruby-mime
Architecture: source all
Version: 0.4.3-3~bpo8+1
Distribution: jessie-backports
Urgency: medium
Maintainer: Debian QA Group
Changed-By: Allan Dixon Jr.
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Sun, 18 Sep 2016 10:49:06 -0300
Source: ruby-spider
Binary: ruby-spider
Architecture: source all
Version: 0.5.0-2~bpo8+1
Distribution: jessie-backports
Urgency: medium
Maintainer: Debian QA Group
Changed-By: Allan Dixon
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Sun, 18 Sep 2016 10:41:35 -0300
Source: ruby-mini-exiftool
Binary: ruby-mini-exiftool
Architecture: source all
Version: 2.7.6-2~bpo8+1
Distribution: jessie-backports
Urgency: medium
Maintainer: Debian QA Group
Changed-By
I missed that one, can't say I understand it's purpose in the source
tree if it's not referenced. I'm not familiar with sam or 9P, I've
only used 9base to run the werc web framework on lighttpd.
> 2016-09-18 11:54 GMT+00:00 Kalle Olavi Niemitalo :
>> sam/_libc.h has:
>>
>> OREAD = 0,
>>
docbook-to-man_2.0.0-35_amd64.changes uploaded successfully to localhost
along with the files:
docbook-to-man_2.0.0-35.dsc
docbook-to-man_2.0.0-35.debian.tar.xz
docbook-to-man-dbgsym_2.0.0-35_amd64.deb
docbook-to-man_2.0.0-35_amd64.deb
Greetings,
Your Debian queue daemon (running
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Sat, 17 Sep 2016 21:03:42 -0400
Source: docbook-to-man
Binary: docbook-to-man
Architecture: source amd64
Version: 1:2.0.0-35
Distribution: unstable
Urgency: medium
Maintainer: Debian QA Group
Changed-By: Neil Roeth
De
Source: unadf
Version: 0.7.11a-3
Severity: important
Tags: security patch
Hi,
Tuomas Räsänen discovered the following vulnerabilities for unadf.
CVE-2016-1243[0]: stack buffer overflow caused by blindly trusting on pathname
lengths of archived files.
CVE-2016-1244[1]: execution of unsanitized i
Processing commands for cont...@bugs.debian.org:
> # as per discussion in security-team make it RC
> severity 838248 grave
Bug #838248 [src:unadf] unadf: CVE-2016-1243 and CVE-2016-1244
Severity set to 'grave' from 'important'
> thanks
Stopping processing here.
Please contact me if you need assis
Processing commands for cont...@bugs.debian.org:
> tags 838248 + upstream
Bug #838248 [src:unadf] unadf: CVE-2016-1243 and CVE-2016-1244
Added tag(s) upstream.
> thanks
Stopping processing here.
Please contact me if you need assistance.
--
838248: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug
31 matches
Mail list logo