Bug#646555: [Pkg-geany-team] Bug#646555: geany-plugin-spellcheck: Spellcheck missing dependency

2011-10-26 Thread Agustin Martin
retitle 646555 libenchant1c2a: should depend on at least one dictionary.
tag 646555 +pending
thanks

On Tue, Oct 25, 2011 at 01:24:39PM +0800, Chow Loong Jin wrote:
> reassign 646555 enchant
> kthxbye
> 
> Hi Alex,
> 
> Thanks for spotting this bug. Seeing as geany-plugin-spellcheck depends on
> libenchant, and libenchant is meant to be an abstraction layer for several 
> spell
> checker backends, the dependency should go there instead, so I'm reassigning
> this bug to enchant instead.

Hi both, 

I'd put the dependency on (myspell|aspell|ispell|hunspell)-dictionary.
Committed that change to enchant collab-maint git repo.

http://anonscm.debian.org/gitweb/?p=collab-maint/enchant.git;a=commit;h=df7f2c6e709abfca052024ef7f9a4d2974e62991

Note that enchant is orphaned. I will not upload inmediately, but would like
to first prepare a new QA upload with some fixes in manpages. This change
will go with it.

Thanks for your help,

Regards,

-- 
Agustin



-- 
To UNSUBSCRIBE, email to debian-qa-packages-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20111026104746.ga3...@agmartin.aq.upm.es



Processed: Re: Bug#646555: [Pkg-geany-team] Bug#646555: geany-plugin-spellcheck: Spellcheck missing dependency

2011-10-26 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> retitle 646555 libenchant1c2a: should depend on at least one dictionary.
Bug #646555 [libenchant1c2a] geany-plugin-spellcheck: Spellcheck missing 
dependency
Changed Bug title to 'libenchant1c2a: should depend on at least one 
dictionary.' from 'geany-plugin-spellcheck: Spellcheck missing dependency'
> tag 646555 +pending
Bug #646555 [libenchant1c2a] libenchant1c2a: should depend on at least one 
dictionary.
Added tag(s) pending.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
646555: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=646555
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


-- 
To UNSUBSCRIBE, email to debian-qa-packages-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/handler.s.c.131962608127104.transcr...@bugs.debian.org



ca-certificates

2011-10-26 Thread Emilio Lazo Zaia

Hello

I did post a message into bug report number 537382 which was opened on 
July 2009. I'm writing directly Debian QA Group because a new version of 
ca-certificates was issued and the script which needs to be modified 
remains the same as previous version, i.e. the bug persists.


Those report consists on the script which generates /etc/ssl/certs 
symbolic links structure (update-ca-certificates).


As you know, /etc/ssl/certs/ca-certificates.crt is a bundle of all 
certificates in one single file; this file must be skipped searching for 
hashes of all certificates when "*.0" symlinks are created. Using the 
script in its current state, first certificate appended into 
ca-certificates.crt will match as the hash of ca-certificates.crt and 
symbolic link will be created from the hash of that file 
(brasil.gov.br.pem because is alphabetically the first) to 
ca-certificates.crt leaving brasil.gov.br.pem without a symlink with its 
hash.


I did supply a patch that may be used after some test by Debian.

Thanks!
Best regards!


--
To UNSUBSCRIBE, email to debian-qa-packages-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/4ea82401.5050...@gmail.com



Bug#537382: marked as done (WARNING: Skipping duplicate certificate)

2011-10-26 Thread Debian Bug Tracking System
Your message dated Wed, 26 Oct 2011 18:32:15 +
with message-id 
and subject line Bug#537382: fixed in ca-certificates 20111025
has caused the Debian Bug report #537382,
regarding WARNING: Skipping duplicate certificate
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
537382: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=537382
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: ca-certificates
Version: 20090709
Severity: minor

Hi!

Probably inoffensive, but while installing ca-certificates on a clean system:

Setting up ca-certificates (20090709) ...
Updating certificates in /etc/ssl/certs... WARNING: Skipping duplicate 
certificate brasil.gov.br.pem

Thank you!

Best regards,
Nelson

-- System Information:
Debian Release: squeeze/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: i386 (i686)

Kernel: Linux 2.6.30.1.naoliv1 (SMP w/2 CPU cores; PREEMPT)
Locale: LANG=pt_BR.UTF-8, LC_CTYPE=pt_BR.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages ca-certificates depends on:
ii  debconf [debconf-2.0] 1.5.27 Debian configuration management sy
ii  openssl   0.9.8k-3   Secure Socket Layer (SSL) binary a

ca-certificates recommends no packages.

ca-certificates suggests no packages.

-- debconf information excluded


--- End Message ---
--- Begin Message ---
Source: ca-certificates
Source-Version: 20111025

We believe that the bug you reported is fixed in the latest version of
ca-certificates, which is due to be installed in the Debian FTP archive:

ca-certificates_20111025.dsc
  to main/c/ca-certificates/ca-certificates_20111025.dsc
ca-certificates_20111025.tar.gz
  to main/c/ca-certificates/ca-certificates_20111025.tar.gz
ca-certificates_20111025_all.deb
  to main/c/ca-certificates/ca-certificates_20111025_all.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 537...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Michael Shuler  (supplier of updated ca-certificates 
package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.8
Date: Tue, 25 Oct 2011 09:12:10 -0500
Source: ca-certificates
Binary: ca-certificates
Architecture: source all
Version: 20111025
Distribution: unstable
Urgency: low
Maintainer: Michael Shuler 
Changed-By: Michael Shuler 
Description: 
 ca-certificates - Common CA certificates
Closes: 537382 588219 619587 630232 643667
Changes: 
 ca-certificates (20111025) unstable; urgency=low
 .
   [ Michael Shuler ]
   * Add 3.0 (native) source format
   * Add Vcs-Git/Browser fields
   * Add myself as new Maintainer with Uploaders  Closes: #588219
   * Update mozilla/certdata.txt to latest (NSS branch version 1.64.2.13)
 Certificates added (+) and removed (-):
 + "AffirmTrust Commercial"
 + "AffirmTrust Networking"
 + "AffirmTrust Premium"
 + "AffirmTrust Premium ECC"
 + "A-Trust-nQual-03"
 + "Bogus Global Trustee"
 + "Bogus GMail"
 + "Bogus Google"
 + "Bogus kuix.de"
 + "Bogus live.com"
 + "Bogus Mozilla Addons"
 + "Bogus Skype"
 + "Bogus Yahoo 1"
 + "Bogus Yahoo 2"
 + "Bogus Yahoo 3"
 + "Certinomis - Autorité Racine"
 + "Certum Trusted Network CA"
 + "Explicitly Distrust DigiNotar Cyber CA"
 + "Explicitly Distrust DigiNotar Cyber CA 2nd"
 + "Explicitly Distrust DigiNotar Root CA"
 + "Explicitly Distrust DigiNotar Services 1024 CA"
 + "Explicitly Distrusted DigiNotar PKIoverheid"
 + "Explicitly Distrusted DigiNotar PKIoverheid G2"
 + "Go Daddy Root Certificate Authority - G2"
 + "Root CA Generalitat Valenciana"
 + "Starfield Root Certificate Authority - G2"
 + "Starfield Services Root Certificate Authority - G2"
 + "TWCA Root Certification Authority"
 - "AOL Time Warner Root Certification Authority 1"
 - "AOL Time Warner Root Certification Authority 2"
 - "DigiNotar Root CA"
 - "Entrust.net Global Secure Personal CA"
 - "Entrust.net Global Secure Server CA"
 - "Entrust.net Secure Personal CA"
 - "IPS Chained CAs root"
 - "IPS CLASE1 root"
 - "IPS CLASE3 root"
 - "IPS CLASEA1 root"
 - "IPS CLASEA3 root"
 

Bug#619587: marked as done (FW: ca-certificate: blacklist invalid certs)

2011-10-26 Thread Debian Bug Tracking System
Your message dated Wed, 26 Oct 2011 18:32:15 +
with message-id 
and subject line Bug#619587: fixed in ca-certificates 20111025
has caused the Debian Bug report #619587,
regarding FW: ca-certificate: blacklist invalid certs
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
619587: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=619587
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---

Package: ca-certificate
Version: 20090814+nmu2

From: giffgi...@hotmail.com
To: t...@security.debian.org
Subject: ca-certificate: blacklist invalid certs
Date: Thu, 24 Mar 2011 13:02:03 +








Package: ca-certificate
Version: 20090814+nmu2

Hello!
This is in response to DSA 2200-1 
http://lists.debian.org/debian-security-announce/2011/msg00068.html
The issue got fixed for iceweasel but to my understanding this still leaves 
other browsers, libraries and tools that use TLS/SSL vulnerable. Therefore the 
fraudulent certificates need to be blacklisted in ca-certificate as well.

Thank you.
  --- End Message ---
--- Begin Message ---
Source: ca-certificates
Source-Version: 20111025

We believe that the bug you reported is fixed in the latest version of
ca-certificates, which is due to be installed in the Debian FTP archive:

ca-certificates_20111025.dsc
  to main/c/ca-certificates/ca-certificates_20111025.dsc
ca-certificates_20111025.tar.gz
  to main/c/ca-certificates/ca-certificates_20111025.tar.gz
ca-certificates_20111025_all.deb
  to main/c/ca-certificates/ca-certificates_20111025_all.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 619...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Michael Shuler  (supplier of updated ca-certificates 
package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.8
Date: Tue, 25 Oct 2011 09:12:10 -0500
Source: ca-certificates
Binary: ca-certificates
Architecture: source all
Version: 20111025
Distribution: unstable
Urgency: low
Maintainer: Michael Shuler 
Changed-By: Michael Shuler 
Description: 
 ca-certificates - Common CA certificates
Closes: 537382 588219 619587 630232 643667
Changes: 
 ca-certificates (20111025) unstable; urgency=low
 .
   [ Michael Shuler ]
   * Add 3.0 (native) source format
   * Add Vcs-Git/Browser fields
   * Add myself as new Maintainer with Uploaders  Closes: #588219
   * Update mozilla/certdata.txt to latest (NSS branch version 1.64.2.13)
 Certificates added (+) and removed (-):
 + "AffirmTrust Commercial"
 + "AffirmTrust Networking"
 + "AffirmTrust Premium"
 + "AffirmTrust Premium ECC"
 + "A-Trust-nQual-03"
 + "Bogus Global Trustee"
 + "Bogus GMail"
 + "Bogus Google"
 + "Bogus kuix.de"
 + "Bogus live.com"
 + "Bogus Mozilla Addons"
 + "Bogus Skype"
 + "Bogus Yahoo 1"
 + "Bogus Yahoo 2"
 + "Bogus Yahoo 3"
 + "Certinomis - Autorité Racine"
 + "Certum Trusted Network CA"
 + "Explicitly Distrust DigiNotar Cyber CA"
 + "Explicitly Distrust DigiNotar Cyber CA 2nd"
 + "Explicitly Distrust DigiNotar Root CA"
 + "Explicitly Distrust DigiNotar Services 1024 CA"
 + "Explicitly Distrusted DigiNotar PKIoverheid"
 + "Explicitly Distrusted DigiNotar PKIoverheid G2"
 + "Go Daddy Root Certificate Authority - G2"
 + "Root CA Generalitat Valenciana"
 + "Starfield Root Certificate Authority - G2"
 + "Starfield Services Root Certificate Authority - G2"
 + "TWCA Root Certification Authority"
 - "AOL Time Warner Root Certification Authority 1"
 - "AOL Time Warner Root Certification Authority 2"
 - "DigiNotar Root CA"
 - "Entrust.net Global Secure Personal CA"
 - "Entrust.net Global Secure Server CA"
 - "Entrust.net Secure Personal CA"
 - "IPS Chained CAs root"
 - "IPS CLASE1 root"
 - "IPS CLASE3 root"
 - "IPS CLASEA1 root"
 - "IPS CLASEA3 root"
 - "IPS Timestamping root"
 - "Thawte Personal Freemail CA"
 - "Thawte Time Stamping CA"
   * "Bogus *" CAs above address Comodo MITM 03/11  Closes: #619587
   * Update CAcert-Class 3-Subroot-certificate  Closes: #630232
 .
   [ Steve Langasek ]
   * sbin/update-ca-certificates: move the ca-certifica

Bug#630232: marked as done (New signatures for CAcert-Class 3-Subroot-certificate)

2011-10-26 Thread Debian Bug Tracking System
Your message dated Wed, 26 Oct 2011 18:32:15 +
with message-id 
and subject line Bug#630232: fixed in ca-certificates 20111025
has caused the Debian Bug report #630232,
regarding New signatures for CAcert-Class 3-Subroot-certificate
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
630232: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=630232
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: ca-certificates
Version: 20110421: all
Severity: important
Tags: security

CAcert has re-signed its Class 3-certificate with a new SHA256
signature. The formerly used MD5 signature is not seen as fully secure
any more by Mozilla (see: https://wiki.mozilla.org/CA:MD5and1024). Users
of Mozilla products like Firefox, and Thunderbird may experience errors
when these programs try to verify such certificates - others may follow.
Hence all users of CAcert's Class 3-certificates have to download and
install the newly signed certificates from CAcert's website.

The procedure in short:
1. Download the new Class 3 PKI Key from
http://www.cacert.org/index.php?id=3
2. SHA1-fingerprint must be:
AD:7C:3F:64:FC:44:39:FE:F4:E9:0B:E8:F4:7C:6C:FA:8A:AD:FD:CE
3. Make it of use in the ca-certificates package

I've added the tag that this bug is a security vulnerability. Well, not
exactly in the package itself, and the file itself also not. But if not
updated users experience errors and may find a security issue has
occured when it has not, or will experience a security vulnerability
because they have called a bad site with a hacked MD5 signature. So I
consider this as a security issue of priority low. Nevertheless I would
definitely want this bugfix to be included in all supported Debian
versions from stable (oldstable if supported) to experimental.

In case of further questions please don't hesitate to contact me.

Best regards,
Alexander Bahlo, CAcert.


--- End Message ---
--- Begin Message ---
Source: ca-certificates
Source-Version: 20111025

We believe that the bug you reported is fixed in the latest version of
ca-certificates, which is due to be installed in the Debian FTP archive:

ca-certificates_20111025.dsc
  to main/c/ca-certificates/ca-certificates_20111025.dsc
ca-certificates_20111025.tar.gz
  to main/c/ca-certificates/ca-certificates_20111025.tar.gz
ca-certificates_20111025_all.deb
  to main/c/ca-certificates/ca-certificates_20111025_all.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 630...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Michael Shuler  (supplier of updated ca-certificates 
package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.8
Date: Tue, 25 Oct 2011 09:12:10 -0500
Source: ca-certificates
Binary: ca-certificates
Architecture: source all
Version: 20111025
Distribution: unstable
Urgency: low
Maintainer: Michael Shuler 
Changed-By: Michael Shuler 
Description: 
 ca-certificates - Common CA certificates
Closes: 537382 588219 619587 630232 643667
Changes: 
 ca-certificates (20111025) unstable; urgency=low
 .
   [ Michael Shuler ]
   * Add 3.0 (native) source format
   * Add Vcs-Git/Browser fields
   * Add myself as new Maintainer with Uploaders  Closes: #588219
   * Update mozilla/certdata.txt to latest (NSS branch version 1.64.2.13)
 Certificates added (+) and removed (-):
 + "AffirmTrust Commercial"
 + "AffirmTrust Networking"
 + "AffirmTrust Premium"
 + "AffirmTrust Premium ECC"
 + "A-Trust-nQual-03"
 + "Bogus Global Trustee"
 + "Bogus GMail"
 + "Bogus Google"
 + "Bogus kuix.de"
 + "Bogus live.com"
 + "Bogus Mozilla Addons"
 + "Bogus Skype"
 + "Bogus Yahoo 1"
 + "Bogus Yahoo 2"
 + "Bogus Yahoo 3"
 + "Certinomis - Autorité Racine"
 + "Certum Trusted Network CA"
 + "Explicitly Distrust DigiNotar Cyber CA"
 + "Explicitly Distrust DigiNotar Cyber CA 2nd"
 + "Explicitly Distrust DigiNotar Root CA"
 + "Explicitly Distrust DigiNotar Services 1024 CA"
 + "Explicitly Distrusted DigiNotar PKIoverheid"
 + "Explicitly Distrusted DigiNotar PKIoverheid G2"
 + "Go Daddy Root Certificate Authority - G2"
 + "Root CA Generalitat Valenciana"
 + "Starfield Root Certificate 

Bug#643667: marked as done (Broken symlinks on upgrade due to plain c_rehash call)

2011-10-26 Thread Debian Bug Tracking System
Your message dated Wed, 26 Oct 2011 18:32:15 +
with message-id 
and subject line Bug#643667: fixed in ca-certificates 20111025
has caused the Debian Bug report #643667,
regarding Broken symlinks on upgrade due to plain c_rehash call
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
643667: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=643667
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: ca-certificates
Version: 20110502+nmu1
Severity: serious
Tags: patch
User: ubuntu-de...@lists.ubuntu.com
Usertags: origin-ubuntu oneiric ubuntu-patch

Hi

 See also:
 https://bugs.launchpad.net/ubuntu/oneiric/+source/ca-certificates/+bug/854927

 ca-certificates.postinst runs:
# Call c_rehash when upgrading from older versions to that we
# have both the old and new style of symlink
if [ ! -z "$2" ]; then
  if dpkg --compare-versions "$2" le 20090814+nmu3; then
c_rehash
  fi
fi

 but a plain c_rehash call is wrong because at this point there might be
 a /etc/ssl/certs/ca-certificates.crt file with all certificates that
 c_rehash picks up and links to.  Instead, this file should be removed,
 then c_rehash should be called after clearing all other symlinks, then
 ca-certificates.crt should be regenerated.  update-ca-certificates
 --fresh is meant to do that, but didn't move
 /etc/ssl/certs/ca-certificates.crt away.

 The attached patch moves /etc/ssl/certs/ca-certificates.crt away
 (credit to Steve Langasek for fixing this), and removes the c_rehash
 upgrade snippet in favor.

 NB: The patch needs to be updated with this bug number and the uploaded
 version (see XXXs in patch).

Cheers,
-- 
Loïc Minier
diff -Nru ca-certificates-20110502+nmu1/debian/changelog 
ca-certificates-20110502+nmu2/debian/changelog
--- ca-certificates-20110502+nmu1/debian/changelog  2011-08-31 
04:02:49.0 +0200
+++ ca-certificates-20110502+nmu2/debian/changelog  2011-09-28 
15:45:59.0 +0200
@@ -1,3 +1,18 @@
+ca-certificates (20110502+nmu2) UNRELEASED; urgency=low
+
+  [ Steve Langasek ]
+  * sbin/update-ca-certificates: move the ca-certificates.crt bundle out of
+the way before calling c_rehash, so that symlinks don't accidentally get
+pointed here, breaking openssl certificate verification.  LP: #854927.
+
+  [ Loïc Minier ]
+  * Drop bogus c_rehash on upgrades, which caused issue when
+ca-certificates.crt was still in place; instead, call
+update-ca-certificates --fresh on upgrades to this version, and
+the usual update-ca-certificates otherwise; closes: #XXX.
+
+ -- Loïc Minier   Wed, 28 Sep 2011 15:44:05 +0200
+
 ca-certificates (20110502+nmu1) unstable; urgency=high
 
   * Non-maintainer upload by the Security Team.
diff -Nru ca-certificates-20110502+nmu1/debian/postinst 
ca-certificates-20110502+nmu2/debian/postinst
--- ca-certificates-20110502+nmu1/debian/postinst   2011-04-21 
19:37:20.0 +0200
+++ ca-certificates-20110502+nmu2/debian/postinst   2011-09-28 
15:42:28.0 +0200
@@ -137,13 +137,12 @@
-e 's/^[[:space:]]*1[[:space:]]*/!/' \
>> /etc/ca-certificates.conf
fi
-   update-ca-certificates
-   # Call c_rehash when upgrading from older versions to that we
-   # have both the old and new style of symlink
-   if [ ! -z "$2" ]; then
- if dpkg --compare-versions "$2" le 20090814+nmu3; then
-   c_rehash
- fi
+   # fix bogus symlink to ca-certificates.crt on upgrades; see
+   # Debian #XXX; drop after wheezy
+   if dpkg --compare-versions "$2" lt-nl 20110502+nmu2+XXX; then
+   update-ca-certificates --fresh
+   else
+   update-ca-certificates
fi
 ;;
 
diff -Nru ca-certificates-20110502+nmu1/sbin/update-ca-certificates 
ca-certificates-20110502+nmu2/sbin/update-ca-certificates
--- ca-certificates-20110502+nmu1/sbin/update-ca-certificates   2009-07-08 
23:23:12.0 +0200
+++ ca-certificates-20110502+nmu2/sbin/update-ca-certificates   2011-09-28 
15:43:57.0 +0200
@@ -127,8 +127,7 @@
   done
 fi
 
-chmod 0644 "$TEMPBUNDLE"
-mv -f "$TEMPBUNDLE" "$CERTBUNDLE"
+rm -f "$CERTBUNDLE"
 
 ADDED_CNT=$(wc -l < "$ADDED")
 REMOVED_CNT=$(wc -l < "$REMOVED")
@@ -144,6 +143,9 @@
   fi
 fi
 
+chmod 0644 "$TEMPBUNDLE"
+mv -f "$TEMPBUNDLE" "$CERTBUNDLE"
+
 echo "$ADDED_CNT added, $REMOVED_CNT removed; done."
 
 HOOKSDIR=/etc/ca-certificates/update.d
--- End Message ---
--- Begin Message ---
Source: ca-certificates
Source-Version: 20111025

We believe that the bug you 

Bug#646555: [Pkg-geany-team] Bug#646555: geany-plugin-spellcheck: Spellcheck missing dependency

2011-10-26 Thread Chow Loong Jin
On 26/10/2011 18:47, Agustin Martin wrote:
> I'd put the dependency on (myspell|aspell|ispell|hunspell)-dictionary.
> Committed that change to enchant collab-maint git repo.
> 
> http://anonscm.debian.org/gitweb/?p=collab-maint/enchant.git;a=commit;h=df7f2c6e709abfca052024ef7f9a4d2974e62991

Thanks for the fix.

> Note that enchant is orphaned. I will not upload inmediately, but would like
> to first prepare a new QA upload with some fixes in manpages. This change
> will go with it.

Regarding that, it looks like Bastien ROUCARIES wants to adopt the package, as
mentioned on the O: bug[1]. It might be a good idea to check with him before
uploading.

Otherwise, if nobody else steps up to adopt this package, I can look into
adopting it myself, seeing as I'm maintainer of geany-plugins which uses it.

[1] http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=580680#45

-- 
Kind regards,
Loong Jin



signature.asc
Description: OpenPGP digital signature


Processing of keysafe_0.4.0.2-4_amd64.changes

2011-10-26 Thread Debian FTP Masters
keysafe_0.4.0.2-4_amd64.changes uploaded successfully to localhost
along with the files:
  keysafe_0.4.0.2-4.dsc
  keysafe_0.4.0.2-4.debian.tar.gz
  keysafe_0.4.0.2-4_amd64.deb

Greetings,

Your Debian queue daemon (running on host franck.debian.org)


-- 
To UNSUBSCRIBE, email to debian-qa-packages-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/e1rjbih-0002er...@franck.debian.org



keysafe_0.4.0.2-4_amd64.changes ACCEPTED into unstable

2011-10-26 Thread Debian FTP Masters



Accepted:
keysafe_0.4.0.2-4.debian.tar.gz
  to main/k/keysafe/keysafe_0.4.0.2-4.debian.tar.gz
keysafe_0.4.0.2-4.dsc
  to main/k/keysafe/keysafe_0.4.0.2-4.dsc
keysafe_0.4.0.2-4_amd64.deb
  to main/k/keysafe/keysafe_0.4.0.2-4_amd64.deb


Override entries for your package:
keysafe_0.4.0.2-4.dsc - source gnome
keysafe_0.4.0.2-4_amd64.deb - optional gnome

Announcing to debian-devel-chan...@lists.debian.org


Thank you for your contribution to Debian.


-- 
To UNSUBSCRIBE, email to debian-qa-packages-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/e1rjbmd-0002pb...@franck.debian.org