Bug#652207: marked as done (init.d status support)

2013-12-21 Thread Debian Bug Tracking System
Your message dated Sat, 21 Dec 2013 12:18:32 +
with message-id 
and subject line Bug#652207: fixed in chrony 1.29-1
has caused the Debian Bug report #652207,
regarding init.d status support
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
652207: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=652207
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: chrony
Version: 1.24-3.1
Severity: wishlist
Tags: patch

Here is a patch to add support for the "status" action to the init.d
script of chrony.
diff -u chrony-1.24/debian/changelog chrony-1.24/debian/changelog
--- chrony-1.24/debian/changelog
+++ chrony-1.24/debian/changelog
@@ -1,3 +1,9 @@
+chrony (1.24-3.2) UNRELEASED; urgency=low
+
+  * Added support for "status" action to init.d script
+
+ -- Peter Eisentraut   Wed, 14 Dec 2011 19:33:35 +0200
+
 chrony (1.24-3.1) unstable; urgency=low
 
   * Non-maintainer upload.
diff -u chrony-1.24/debian/control chrony-1.24/debian/control
--- chrony-1.24/debian/control
+++ chrony-1.24/debian/control
@@ -7,7 +7,7 @@
 
 Package: chrony
 Architecture: any
-Depends: ${misc:Depends}, ${shlibs:Depends}, ucf, timelimit, dpkg (>=1.15.4) | install-info
+Depends: ${misc:Depends}, ${shlibs:Depends}, ucf, timelimit, dpkg (>=1.15.4) | install-info, lsb-base
 Recommends: udev (>= 0.124-1)
 Conflicts: ntp, ntp-simple, ntp-refclock, time-daemon
 Provides: time-daemon
diff -u chrony-1.24/debian/init.d chrony-1.24/debian/init.d
--- chrony-1.24/debian/init.d
+++ chrony-1.24/debian/init.d
@@ -25,6 +25,8 @@
 
 test -f $DAEMON || exit 0
 
+. /lib/lsb/init-functions
+
 putonline ()
 { # Do we have a default route?  If so put chronyd online.
 if timelimit -q -s9 -t5 -- netstat -rn 2>/dev/null | grep UG | cut -f 1 -d ' ' | grep -q '0\.0\.0\.0' 
@@ -89,8 +91,11 @@
 			;;
 	esac
 	;;
+status)
+	status_of_proc "$DAEMON" "$NAME" && exit 0 || exit $?
+	;;
 *)
-	echo "Usage: /etc/init.d/chrony {start|stop|restart|force-reload}"
+	echo "Usage: /etc/init.d/chrony {start|stop|restart|force-reload|status}"
 	exit 1
 	;;
 esac
--- End Message ---
--- Begin Message ---
Source: chrony
Source-Version: 1.29-1

We believe that the bug you reported is fixed in the latest version of
chrony, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 652...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Joachim Wiedorn  (supplier of updated chrony package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.8
Date: Fri, 20 Dec 2013 23:35:25 +0100
Source: chrony
Binary: chrony
Architecture: source amd64
Version: 1.29-1
Distribution: unstable
Urgency: medium
Maintainer: Joachim Wiedorn 
Changed-By: Joachim Wiedorn 
Description: 
 chrony - Set the computer clock from time servers on the Net
Closes: 637514 646732 652207 705768 719132 719203
Changes: 
 chrony (1.29-1) unstable; urgency=medium
 .
   * New upstream release with some bugfixes:
 - Closes: #719132: new upstream version, fixes security bugs.
 - Closes: #719203: Fixing vulnerabilities:
 CVE-2012-4502 - Buffer overflow,
 CVE-2012-4503 - Uninitialized data.
 .
   * debian/control:
 - Set myself as new maintainer. Closes: #705768
 - Bump to Standards-Version 3.9.5.
 - Move to debhelper >= 9 and compat level 9.
 - Update package descriptions.
 - Add Vcs fields to new git repository.
 - Add dependency to lsb-base (for init script).
 - Add build dependency to libtomcrypt-dev.
   * Move to source format 3.0 (quilt).
   * Add the following patch files:  (Closes: #637514)
 - 01_fix-small-typo-in-manpages
 - 03_recreate-always-getdate-c
 - 04_do-not-look-for-ncurses(Closes: #646732)
 - 05_disable-installation-of-license
   * debian/rules:
 - Move to dh-based rules file.
 - Enable parallel builds.
 .
   * Add debian/watch file.
   * Full update of debian/copyright file.
   * Add debian/doc-base file.
   * Full update of debian/README.Debian file.
   * Update debian/postinst, debian/postrm, debian/prerm.
   * Remove obsolete debian/preinst. Reduce mailing within postinst.
   * Do not use old md5sum file anymore for ucf in postinst scri

Bug#719132: marked as done (chrony: New version, fixes security bugs)

2013-12-21 Thread Debian Bug Tracking System
Your message dated Sat, 21 Dec 2013 12:18:32 +
with message-id 
and subject line Bug#719132: fixed in chrony 1.29-1
has caused the Debian Bug report #719132,
regarding chrony: New version, fixes security bugs
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
719132: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=719132
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: chrony
Version: 1.26-4
Severity: important

8 Aug 2013 : chrony-1.29 released

It fixes the following security vulnerabilities:

Fix crash when processing crafted commands (CVE-2012-4502)
(possible with IP addresses allowed by cmdallow and localhost)
Don't send uninitialized data in SUBNETS_ACCESSED and CLIENT_ACCESSES
replies (CVE-2012-4503) (not used by chronyc)

and includes other changes:

Drop support for SUBNETS_ACCESSED and CLIENT_ACCESSES commands

CVE-2012-4502: Buffer overflow when processing crafted command packets

When the length of the REQ_SUBNETS_ACCESSED, REQ_CLIENT_ACCESSES command
requests and the RPY_SUBNETS_ACCESSED, RPY_CLIENT_ACCESSES, 
RPY_CLIENT_ACCESSES_BY_INDEX, RPY_MANUAL_LIST command replies is calculated, 
the number of items stored in the packet is not validated. A crafted command 
request/reply can be used to crash the server/client. Only clients allowed 
by cmdallow (by default only localhost) can crash the server. With chrony 
versions 1.25 and 1.26 this bug has a smaller security impact as the server 
requires the clients to be authenticated in order to process the subnet and 
client accesses commands. In 1.27 and 1.28, however, the invalid calculated 
length is included also in the authentication check which may cause another 
crash. CVE-2012-4503: Uninitialized data in command replies The 
RPY_SUBNETS_ACCESSED and RPY_CLIENT_ACCESSES command replies can contain 
uninitalized data from stack when the client logging is disabled or a bad 
subnet is requested. These commands were never used by chronyc and they 
require the client to be authenticated since version 1.25.


-- System Information:
Debian Release: jessie/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 2.6.38-2-amd64 (SMP w/1 CPU core)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages chrony depends on:
ii  dpkg  1.16.10
ii  install-info  5.1.dfsg.1-3
ii  libc6 2.17-1
ii  libedit2  2.11-20080614-5
ii  net-tools 1.60-24.2
ii  timelimit 1.8-1
ii  ucf   3.0025+nmu3

Versions of packages chrony recommends:
ii  udev  175-7.2

chrony suggests no packages.

-- no debconf information
--- End Message ---
--- Begin Message ---
Source: chrony
Source-Version: 1.29-1

We believe that the bug you reported is fixed in the latest version of
chrony, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 719...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Joachim Wiedorn  (supplier of updated chrony package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.8
Date: Fri, 20 Dec 2013 23:35:25 +0100
Source: chrony
Binary: chrony
Architecture: source amd64
Version: 1.29-1
Distribution: unstable
Urgency: medium
Maintainer: Joachim Wiedorn 
Changed-By: Joachim Wiedorn 
Description: 
 chrony - Set the computer clock from time servers on the Net
Closes: 637514 646732 652207 705768 719132 719203
Changes: 
 chrony (1.29-1) unstable; urgency=medium
 .
   * New upstream release with some bugfixes:
 - Closes: #719132: new upstream version, fixes security bugs.
 - Closes: #719203: Fixing vulnerabilities:
 CVE-2012-4502 - Buffer overflow,
 CVE-2012-4503 - Uninitialized data.
 .
   * debian/control:
 - Set myself as new maintainer. Closes: #705768
 - Bump to Standards-Version 3.9.5.
 - Move to debhelper >= 9 and compat level 9.
 - Update package descriptions.
 - Add Vcs fields to new git repository.
 - Add dependency to lsb-base (for init script).
 - Add build dependency to libtomcrypt-dev.
   * Move to source format 3.0 (quilt).

Bug#637514: marked as done (Please use a patch system)

2013-12-21 Thread Debian Bug Tracking System
Your message dated Sat, 21 Dec 2013 12:18:31 +
with message-id 
and subject line Bug#637514: fixed in chrony 1.29-1
has caused the Debian Bug report #637514,
regarding Please use a patch system
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
637514: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=637514
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: chrony
Version: 1.24-3
Severity: wishlist

I was looking to make some modifications to my copy of chrony while I was
waiting for your promised upload at
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=628919#40
then I found out chrony does not use any patch system, which makes changes
quite ugly :( 

I have seen the packaging could use some revamp and love also, if you do not
have a lot of time for chrony I would happy to adopt it.

Ana

-- System Information:
Debian Release: wheezy/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'testing')
Architecture: amd64 (x86_64)

Kernel: Linux 3.0.0-rc6-amd64 (SMP w/2 CPU cores)
Locale: LANG=en_IE.UTF-8, LC_CTYPE=en_IE.UTF-8 (charmap=UTF-8) (ignored: LC_ALL 
set to en_IE.UTF-8)
Shell: /bin/sh linked to /bin/dash


--- End Message ---
--- Begin Message ---
Source: chrony
Source-Version: 1.29-1

We believe that the bug you reported is fixed in the latest version of
chrony, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 637...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Joachim Wiedorn  (supplier of updated chrony package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.8
Date: Fri, 20 Dec 2013 23:35:25 +0100
Source: chrony
Binary: chrony
Architecture: source amd64
Version: 1.29-1
Distribution: unstable
Urgency: medium
Maintainer: Joachim Wiedorn 
Changed-By: Joachim Wiedorn 
Description: 
 chrony - Set the computer clock from time servers on the Net
Closes: 637514 646732 652207 705768 719132 719203
Changes: 
 chrony (1.29-1) unstable; urgency=medium
 .
   * New upstream release with some bugfixes:
 - Closes: #719132: new upstream version, fixes security bugs.
 - Closes: #719203: Fixing vulnerabilities:
 CVE-2012-4502 - Buffer overflow,
 CVE-2012-4503 - Uninitialized data.
 .
   * debian/control:
 - Set myself as new maintainer. Closes: #705768
 - Bump to Standards-Version 3.9.5.
 - Move to debhelper >= 9 and compat level 9.
 - Update package descriptions.
 - Add Vcs fields to new git repository.
 - Add dependency to lsb-base (for init script).
 - Add build dependency to libtomcrypt-dev.
   * Move to source format 3.0 (quilt).
   * Add the following patch files:  (Closes: #637514)
 - 01_fix-small-typo-in-manpages
 - 03_recreate-always-getdate-c
 - 04_do-not-look-for-ncurses(Closes: #646732)
 - 05_disable-installation-of-license
   * debian/rules:
 - Move to dh-based rules file.
 - Enable parallel builds.
 .
   * Add debian/watch file.
   * Full update of debian/copyright file.
   * Add debian/doc-base file.
   * Full update of debian/README.Debian file.
   * Update debian/postinst, debian/postrm, debian/prerm.
   * Remove obsolete debian/preinst. Reduce mailing within postinst.
   * Do not use old md5sum file anymore for ucf in postinst script.
   * Add status action in init script (debian/init). Closes: #652207
   * Add debian/install file for installing example of chrony.conf.
   * Reduce debian/dirs file for use with debhelper 9.
Checksums-Sha1: 
 165a0e22dac426a70bff0eb9cf0474644ead46c6 1894 chrony_1.29-1.dsc
 442fb7d62a6f23bf1057864a3dbdfa55e1b6eb35 392880 chrony_1.29.orig.tar.gz
 edd3f283be83e4c0f521a347a837f7653d752f44 19008 chrony_1.29-1.debian.tar.gz
 54e0cbd50c62573a3438d6a536243e95e5fa2226 239766 chrony_1.29-1_amd64.deb
Checksums-Sha256: 
 0bd9873663eb18b52bc044d1d3ad06472b6494a9f0b98319348ea2f9882068de 1894 
chrony_1.29-1.dsc
 c685f072ba0663ab026a7f56870ab2c246bd97ca4629dd2e1899617bd16ad39b 392880 
chrony_1.29.orig.tar.gz
 64214a323a1e352149498f182e705d68023e0ffba49286328b52fa658737701e 19008 
chrony_1.29-1.debian.tar.gz
 2ba47824e635d615d34c429f9f2359d9ae902772082f348dfc0ce77cd142095b 239766 
ch

Bug#719203: marked as done (chrony: CVE-2012-4502 and CVE-2012-4503)

2013-12-21 Thread Debian Bug Tracking System
Your message dated Sat, 21 Dec 2013 12:18:32 +
with message-id 
and subject line Bug#719203: fixed in chrony 1.29-1
has caused the Debian Bug report #719203,
regarding chrony: CVE-2012-4502 and CVE-2012-4503
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
719203: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=719203
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: chrony
Severity: important

Hi,

the following vulnerabilities were published for chrony.

CVE-2012-4502[0]:
Buffer overflow when processing crafted command packets

CVE-2012-4503[1]:
Uninitialized data in command replies

Upstream commits fixing these issues are at [2] and [3]. See also [4].

If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

For further information see:

[0] http://security-tracker.debian.org/tracker/CVE-2012-4502
[1] http://security-tracker.debian.org/tracker/CVE-2012-4503
[2] 
http://git.tuxfamily.org/chrony/chrony.git/?p=chrony/chrony.git;a=commitdiff;h=7712455d9aa33d0db0945effaa07e900b85987b1
[3] 
http://git.tuxfamily.org/chrony/chrony.git/?p=chrony/chrony.git;a=commitdiff;h=c6fdeeb6bb0b17dc28c19ae492c4a1c498e54ea3
[4] http://permalink.gmane.org/gmane.comp.time.chrony.announce/15

Regards,
Salvatore
--- End Message ---
--- Begin Message ---
Source: chrony
Source-Version: 1.29-1

We believe that the bug you reported is fixed in the latest version of
chrony, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 719...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Joachim Wiedorn  (supplier of updated chrony package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.8
Date: Fri, 20 Dec 2013 23:35:25 +0100
Source: chrony
Binary: chrony
Architecture: source amd64
Version: 1.29-1
Distribution: unstable
Urgency: medium
Maintainer: Joachim Wiedorn 
Changed-By: Joachim Wiedorn 
Description: 
 chrony - Set the computer clock from time servers on the Net
Closes: 637514 646732 652207 705768 719132 719203
Changes: 
 chrony (1.29-1) unstable; urgency=medium
 .
   * New upstream release with some bugfixes:
 - Closes: #719132: new upstream version, fixes security bugs.
 - Closes: #719203: Fixing vulnerabilities:
 CVE-2012-4502 - Buffer overflow,
 CVE-2012-4503 - Uninitialized data.
 .
   * debian/control:
 - Set myself as new maintainer. Closes: #705768
 - Bump to Standards-Version 3.9.5.
 - Move to debhelper >= 9 and compat level 9.
 - Update package descriptions.
 - Add Vcs fields to new git repository.
 - Add dependency to lsb-base (for init script).
 - Add build dependency to libtomcrypt-dev.
   * Move to source format 3.0 (quilt).
   * Add the following patch files:  (Closes: #637514)
 - 01_fix-small-typo-in-manpages
 - 03_recreate-always-getdate-c
 - 04_do-not-look-for-ncurses(Closes: #646732)
 - 05_disable-installation-of-license
   * debian/rules:
 - Move to dh-based rules file.
 - Enable parallel builds.
 .
   * Add debian/watch file.
   * Full update of debian/copyright file.
   * Add debian/doc-base file.
   * Full update of debian/README.Debian file.
   * Update debian/postinst, debian/postrm, debian/prerm.
   * Remove obsolete debian/preinst. Reduce mailing within postinst.
   * Do not use old md5sum file anymore for ucf in postinst script.
   * Add status action in init script (debian/init). Closes: #652207
   * Add debian/install file for installing example of chrony.conf.
   * Reduce debian/dirs file for use with debhelper 9.
Checksums-Sha1: 
 165a0e22dac426a70bff0eb9cf0474644ead46c6 1894 chrony_1.29-1.dsc
 442fb7d62a6f23bf1057864a3dbdfa55e1b6eb35 392880 chrony_1.29.orig.tar.gz
 edd3f283be83e4c0f521a347a837f7653d752f44 19008 chrony_1.29-1.debian.tar.gz
 54e0cbd50c62573a3438d6a536243e95e5fa2226 239766 chrony_1.29-1_amd64.deb
Checksums-Sha256: 
 0bd9873663eb18b52bc044d1d3ad06472b6494a9f0b98319348ea2f9882068de 1894 
chrony_1.29-1.dsc
 c685f072ba0663ab026a7f56870ab2c246bd97ca4629dd2e1899617bd16ad39b 392880 
chrony_1.29.orig.tar.gz
 64214a323a1e352149498f18

Processed: Re: tvtime: Fails to install + segfault

2013-12-21 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> reassign 732207 tvtime
Bug #732207 [libc6] getenv returns bad pointer on amd64
Bug reassigned from package 'libc6' to 'tvtime'.
No longer marked as found in versions tvtime/1.0.2-12.
Ignoring request to alter fixed versions of bug #732207 to the same values 
previously set
> retitle 732207 tvtime: tvtime-configure segfaults on 64-bit systems
Bug #732207 [tvtime] getenv returns bad pointer on amd64
Changed Bug title to 'tvtime: tvtime-configure segfaults on 64-bit systems' 
from 'getenv returns bad pointer on amd64'
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
732207: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=732207
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-qa-packages-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/handler.s.c.138763854818955.transcr...@bugs.debian.org



Bug#732077: libnss-ldap: Fails to install via chroot

2013-12-21 Thread Arthur de Jong
On Fri, 2013-12-13 at 17:36 +0100, Olivier Sallou wrote:
> I face an issue when installing libnss-ldap in a chroot environment
> 
> Error message is:
> 
> [597853.361845] DEBUG: Setting up libnss-ldap:amd64 (264-2.5) ...
> [598058.244944] DEBUG: locale: Cannot set LC_CTYPE to default locale: No such 
> file or directory
> [598058.34198] DEBUG: locale: Cannot set LC_MESSAGES to default locale: No 
> such file or directory
> [598058.418989] DEBUG: locale: Cannot set LC_ALL to default locale: No such 
> file or directory
> [598219.187021] DEBUG: invoke-rc.d: unknown initscript, /etc/init.d/nscd not 
> found.
> 
> It fails because invoke-rc.d does not find /etc/init.d/nscd.

Can you reproduce this with version 265-3? Amongst other things it
includes a number of fixes related to the restarting of nscd if it is
installed and this should be one of them.

Thanks,

-- 
-- arthur - adej...@debian.org - http://people.debian.org/~adejong --


signature.asc
Description: This is a digitally signed message part


Processed: limit source to nitpic, tagging 730935

2013-12-21 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> #nitpic (0.1-15) unstable; urgency=medium
> #
> #  * Build-depend on libiberty-dev (Closes: #730935).
> #
> limit source nitpic
Limiting to bugs with field 'source' containing at least one of 'nitpic'
Limit currently set to 'source':'nitpic'

> tags 730935 + pending
Bug #730935 [src:nitpic] nitpic: FTBFS: b-d on libiberty-dev instead of 
binutils-dev
Added tag(s) pending.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
730935: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=730935
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-qa-packages-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/handler.s.c.138767209019677.transcr...@bugs.debian.org



Processing of nitpic_0.1-15_amd64.changes

2013-12-21 Thread Debian FTP Masters
nitpic_0.1-15_amd64.changes uploaded successfully to localhost
along with the files:
  nitpic_0.1-15.dsc
  nitpic_0.1-15.diff.gz
  nitpic_0.1-15_amd64.deb

Greetings,

Your Debian queue daemon (running on host franck.debian.org)


-- 
To UNSUBSCRIBE, email to debian-qa-packages-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/e1vuxhr-g5...@franck.debian.org



Bug#730935: marked as done (nitpic: FTBFS: b-d on libiberty-dev instead of binutils-dev)

2013-12-21 Thread Debian Bug Tracking System
Your message dated Sun, 22 Dec 2013 01:03:43 +
with message-id 
and subject line Bug#730935: fixed in nitpic 0.1-15
has caused the Debian Bug report #730935,
regarding nitpic: FTBFS: b-d on libiberty-dev instead of binutils-dev
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
730935: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=730935
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: nitpic
Version: 0.1-14
Severity: serious
Tags: jessie sid
User: debian...@lists.debian.org
Usertags: qa-ftbfs-20131128 qa-ftbfs
Justification: FTBFS on amd64

Hi,

During a rebuild of all packages in sid, your package failed to build on
amd64.

Due to the switch of libiberty to his own package (libiberty|libiberty-dev).

Relevant part (hopefully):
> c++ -o nitpic -g -O2 -fno-strict-aliasing  main.o ic.o info.o instr.o 
> pu_lib.o reg.o sim.o util.o 16c84.o -lXaw  -lXmu -lXt -lSM -lICE -lXext -lX11 
> -lXt -lSM -lICE -lXext -lX11   -Wl,-Bstatic -lbfd -lopcodes -Wl,-Bdynamic -lz 
> -liberty -lm -lc -ldl   
> /usr/bin/ld: cannot find -liberty
> collect2: error: ld returned 1 exit status

The full build log is available from:
   http://aws-logs.debian.net/ftbfs-logs/2013/11/28/nitpic_0.1-14_unstable.log

A list of current common problems and possible solutions is available at
http://wiki.debian.org/qa.debian.org/FTBFS . You're welcome to contribute!

About the archive rebuild: The rebuild was done on EC2 VM instances from
Amazon Web Services, using a clean, minimal and up-to-date chroot. Every
failed build was retried once to eliminate random failures.
--- End Message ---
--- Begin Message ---
Source: nitpic
Source-Version: 0.1-15

We believe that the bug you reported is fixed in the latest version of
nitpic, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 730...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
David Prévot  (supplier of updated nitpic package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Sat, 21 Dec 2013 20:25:18 -0400
Source: nitpic
Binary: nitpic
Architecture: source amd64
Version: 0.1-15
Distribution: unstable
Urgency: medium
Maintainer: Debian QA Group 
Changed-By: David Prévot 
Description: 
 nitpic - simulator for the Microchip PIC16C84 microcontroller
Closes: 730935
Changes: 
 nitpic (0.1-15) unstable; urgency=medium
 .
   * QA upload.
   * Build-depend on libiberty-dev (Closes: #730935).
   * Keep nitpic executable
Checksums-Sha1: 
 36b0039f597784505a4c76e5a45a417dda113046 1341 nitpic_0.1-15.dsc
 54d68bc68f6102730fadd80aaff3be0596f0f499 10918 nitpic_0.1-15.diff.gz
 949dfddea0655e50d01b5bfc72b9e4ce7fcda512 338514 nitpic_0.1-15_amd64.deb
Checksums-Sha256: 
 c074bf950f7b65b81686b7634fe99d04c325f795dcf357bcb67fac4a35524f2e 1341 
nitpic_0.1-15.dsc
 cc1d200344e29de1b87690acfb35669ea63845b6f1ff9b5497d38acf11c99250 10918 
nitpic_0.1-15.diff.gz
 d362a0f1879ceb9d0d45ff37e0217edfa5cf8aa4c496b099eee5754e9ee89923 338514 
nitpic_0.1-15_amd64.deb
Files: 
 947783b02823dc933c524f368338b1fc 1341 electronics extra nitpic_0.1-15.dsc
 c237b123b15414de68da5cf67f918ccb 10918 electronics extra nitpic_0.1-15.diff.gz
 a03e76dbe15faf4dc3954049c3ffbbb7 338514 electronics extra 
nitpic_0.1-15_amd64.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.15 (GNU/Linux)

iQEcBAEBCAAGBQJStjZMAAoJEAWMHPlE9r08uj4H+QG0+o35FsQCbi+AmtFBIQZJ
GEB68Abp0QAnWl0pAtNTzttdhGtAw2s/e9QffDeRIZjCQHtCUZjwVXpqkuOz1FCV
u5GFawxVuH+MWdMlCmHMMFlPxh6J1Xgg8FfOhVtooYEbQ+P+Ci92yJ/TiPrGi3tT
nWrr5bbzWwYWCrjQjsh3Bsf9B0SigRjVibvrr3IWIO2A60Vah1KWui62uPHv3eZH
z1Igr2S85av1Dcvr0KlDLHZxpOvpwHOhw6JRIrXcpOLUvgYno8PxM6uRAphFh9BP
06g4BeXZGkJKOwcoTl0XooRg9zPDsrBRDRV8svxa29P05HGwwYSkVixYVnqzhU4=
=Ot1q
-END PGP SIGNATURE End Message ---


nitpic_0.1-15_amd64.changes ACCEPTED into unstable

2013-12-21 Thread Debian FTP Masters


Accepted:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Sat, 21 Dec 2013 20:25:18 -0400
Source: nitpic
Binary: nitpic
Architecture: source amd64
Version: 0.1-15
Distribution: unstable
Urgency: medium
Maintainer: Debian QA Group 
Changed-By: David Prévot 
Description: 
 nitpic - simulator for the Microchip PIC16C84 microcontroller
Closes: 730935
Changes: 
 nitpic (0.1-15) unstable; urgency=medium
 .
   * QA upload.
   * Build-depend on libiberty-dev (Closes: #730935).
   * Keep nitpic executable
Checksums-Sha1: 
 36b0039f597784505a4c76e5a45a417dda113046 1341 nitpic_0.1-15.dsc
 54d68bc68f6102730fadd80aaff3be0596f0f499 10918 nitpic_0.1-15.diff.gz
 949dfddea0655e50d01b5bfc72b9e4ce7fcda512 338514 nitpic_0.1-15_amd64.deb
Checksums-Sha256: 
 c074bf950f7b65b81686b7634fe99d04c325f795dcf357bcb67fac4a35524f2e 1341 
nitpic_0.1-15.dsc
 cc1d200344e29de1b87690acfb35669ea63845b6f1ff9b5497d38acf11c99250 10918 
nitpic_0.1-15.diff.gz
 d362a0f1879ceb9d0d45ff37e0217edfa5cf8aa4c496b099eee5754e9ee89923 338514 
nitpic_0.1-15_amd64.deb
Files: 
 947783b02823dc933c524f368338b1fc 1341 electronics extra nitpic_0.1-15.dsc
 c237b123b15414de68da5cf67f918ccb 10918 electronics extra nitpic_0.1-15.diff.gz
 a03e76dbe15faf4dc3954049c3ffbbb7 338514 electronics extra 
nitpic_0.1-15_amd64.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.15 (GNU/Linux)

iQEcBAEBCAAGBQJStjZMAAoJEAWMHPlE9r08uj4H+QG0+o35FsQCbi+AmtFBIQZJ
GEB68Abp0QAnWl0pAtNTzttdhGtAw2s/e9QffDeRIZjCQHtCUZjwVXpqkuOz1FCV
u5GFawxVuH+MWdMlCmHMMFlPxh6J1Xgg8FfOhVtooYEbQ+P+Ci92yJ/TiPrGi3tT
nWrr5bbzWwYWCrjQjsh3Bsf9B0SigRjVibvrr3IWIO2A60Vah1KWui62uPHv3eZH
z1Igr2S85av1Dcvr0KlDLHZxpOvpwHOhw6JRIrXcpOLUvgYno8PxM6uRAphFh9BP
06g4BeXZGkJKOwcoTl0XooRg9zPDsrBRDRV8svxa29P05HGwwYSkVixYVnqzhU4=
=Ot1q
-END PGP SIGNATURE-


Thank you for your contribution to Debian.


-- 
To UNSUBSCRIBE, email to debian-qa-packages-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/e1vuxsi-0002sp...@franck.debian.org



Processing of aqualung_0.9~beta11-2_amd64.changes

2013-12-21 Thread Debian FTP Masters
aqualung_0.9~beta11-2_amd64.changes uploaded successfully to localhost
along with the files:
  aqualung_0.9~beta11-2.dsc
  aqualung_0.9~beta11-2.debian.tar.gz
  aqualung_0.9~beta11-2_amd64.deb

Greetings,

Your Debian queue daemon (running on host franck.debian.org)


-- 
To UNSUBSCRIBE, email to debian-qa-packages-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/e1vuztd-0002gm...@franck.debian.org



aqualung_0.9~beta11-2_amd64.changes ACCEPTED into unstable

2013-12-21 Thread Debian FTP Masters


Accepted:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Sat, 21 Dec 2013 22:03:21 -0400
Source: aqualung
Binary: aqualung
Architecture: source amd64
Version: 0.9~beta11-2
Distribution: unstable
Urgency: medium
Maintainer: Debian QA Group 
Changed-By: David Prévot 
Description: 
 aqualung   - gapless Gtk-based audio player
Closes: 730959
Changes: 
 aqualung (0.9~beta11-2) unstable; urgency=medium
 .
   * QA upload
   * Set Maintainer to Debian QA Group  (cf. #673944)
   * Explicitly add the -lm flag to 004_missing-library.dpatch, Closes: #730959
   * Convert to format 3.0 (quilt) and get rid of dpatch build-dependency
   * Make the build target depend on build-arch and build-indep
Checksums-Sha1: 
 4a58da8880a8dcd614ff3eed1b8913a866f55c03 2035 aqualung_0.9~beta11-2.dsc
 c9b3e6e959320adb58e19b3989b3ce082653cc60 216222 
aqualung_0.9~beta11-2.debian.tar.gz
 98678d1e6f62046f4563c5db16716c026ee74d30 800842 aqualung_0.9~beta11-2_amd64.deb
Checksums-Sha256: 
 09f625b7f283ff922293134460409047a33b775d96cc855af54da8cbced51425 2035 
aqualung_0.9~beta11-2.dsc
 40fa9a5816a94f48485dce914c4e6891d878b393c2e924a077b7c7849e7dc92a 216222 
aqualung_0.9~beta11-2.debian.tar.gz
 7e01cf5a2ae36903ac3b2f030839a27cae3e737bec1cf4b34fd824e77952e23f 800842 
aqualung_0.9~beta11-2_amd64.deb
Files: 
 1242b9c9e8c4ff5da409b02da02581cc 2035 sound extra aqualung_0.9~beta11-2.dsc
 656b5efd9b9a5a5e465e5c18ecf1c004 216222 sound extra 
aqualung_0.9~beta11-2.debian.tar.gz
 944259558f445378055db571b27d716f 800842 sound extra 
aqualung_0.9~beta11-2_amd64.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.15 (GNU/Linux)

iQEcBAEBCAAGBQJStlSUAAoJEAWMHPlE9r08kx4H/RTUl6+uszXOG5RR91Lxr3rW
WsgSzLRoIeojUopNoiq8NeWLfEDNho4B6Nuh2Qhu2tc4Fi0VAf/wdpe5knYpgFR3
PYzzBwmYYGU0w8EBeGnqmuG5nWdC7gDDGLc08FCaFyjwezCuCmO7KzA+D/4QjnwG
RuVES0810W99CNSmt4IeCofCw/2PNP4T/9mt/ZvcD8rC+Qpv7owhXMnSjqVF0fFa
tFK7SZjMua02e+ufoU3ozS4QbwVRvvKXeRp/6+KmolLi1ms0eN0zOe8lOVvorzOL
JzHir/aw83gM2PJfT8Nkj9gp4chWKrrzJ0ganV8Feyeld9ZAz22NDYT6X/dMFc0=
=0cJu
-END PGP SIGNATURE-


Thank you for your contribution to Debian.


-- 
To UNSUBSCRIBE, email to debian-qa-packages-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/e1vuzz6-0004eu...@franck.debian.org