Bug#910343: Please restore sodomized-sheep.cow
I also noticed that at least sodomized-sheep.cow had been removed in the latest update, breaking a login script on my system. Please restore the previous cows. Thanks!
Processing of mason_1.0.0-13_source.changes
mason_1.0.0-13_source.changes uploaded successfully to localhost along with the files: mason_1.0.0-13.dsc mason_1.0.0-13.debian.tar.xz Greetings, Your Debian queue daemon (running on host usper.debian.org)
mason_1.0.0-13_source.changes ACCEPTED into unstable
Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Wed, 10 Oct 2018 14:52:45 +0200 Source: mason Binary: mason Architecture: source Version: 1.0.0-13 Distribution: unstable Urgency: medium Maintainer: Debian QA Group Changed-By: Mattia Rizzolo Description: mason - Interactively creates a Linux packet filtering firewall Changes: mason (1.0.0-13) unstable; urgency=medium . * QA upload. * Turn the patches into a quilt patch, and set source format to 3.0 (quilt). * Orphan the package. See: #910668 * Bump debhelper compat level to 11. * Rewrite d/rules using the dh sequencer. * Bump Standards-Version to 4.2.1: + Change Priority from extra (deprecated) to optional. + Set Rules-Requires-Root:binary-targets (the Makefile wants to chown to root, which would fail otherwise). Checksums-Sha1: 55be0f857cb3d8766c69c40c50fff555b198da32 1803 mason_1.0.0-13.dsc 1bdc7ef1ab94c038a59ebb2db77a374d7a81467d 23956 mason_1.0.0-13.debian.tar.xz Checksums-Sha256: a9fa096a9d0e516df106edb736355aac840a5385cc22e4586e932f7527387091 1803 mason_1.0.0-13.dsc ce67df8545368a8b2912d424adad548bddd397d5a311adc87b16b4b9d688a57a 23956 mason_1.0.0-13.debian.tar.xz Files: 69582b8ff3ce75e5753798ba40a2e69f 1803 net optional mason_1.0.0-13.dsc 2b174d72fa1499af39cf5147b5cdcea7 23956 net optional mason_1.0.0-13.debian.tar.xz -BEGIN PGP SIGNATURE- iQJGBAEBCgAwFiEEi3hoeGwz5cZMTQpICBa54Yx2K60FAlu99xQSHG1hdHRpYUBk ZWJpYW4ub3JnAAoJEAgWueGMdiuti4QP/0KtKjMee/AdYisJxlyP7vkaMYc980ZF vSEGfq5CfZrbJQxDDYfsEySx675uHGUNVXllpEJcxOU7zqYOnHHAW8DzpHt7qih6 oJKz6SKk7RgWokFm0Ax/SEreX9pHeNL7p5IphbRW2QT/ERd1xLXHXOWtMxP6esqv Av0F22+4UG7D8pYCZBYVw1F5gBtUShCxqqx4PPW0Y5rtQxS9/Ab8YvZqzD/fxKzU qdreybZeOJy47JynhXjtyl9TBqlsb2IZiDGGRf8vTE5Zx2X8LdMBLpdFyMTtCpRw XBK4K//LEzVt/mMrQswoY1df0m84iJi2kupmiMcavVgsUoSYRuS1I/KDuegZaaGV D/XGK4ic78Rt/8JhNoKLoXhhJgUc1H5CeivJ5ftEJzfgCBKrDh0oYLehioS1Li/a 9Rvt4cfMzjmx6qZYi3NSE2fLEfyvFJvy2w3OUYroxX1zQwYJ/p/SCMGS5XFipaxA zuAkW28g8H0P+Nd+szxWlKOtfOEIhZPwmQ+wi+X1o3kcDL8XpPJgpwioF2US3DXM K3HaNYcUmAyE3IQBHNT4JMVn5uT6zcQWY+c9T7uvzoI9fqyAhjOwAX7J8Xf0fB3o yDljianz6BTsp7NWSSYguTQTjFPcmK8TTU7/H74wiOArCurxsasCH8P+znV/WaTz /JGrHfmCKqrK =4jUx -END PGP SIGNATURE- Thank you for your contribution to Debian.
Bug#910739: fwsnort: All rules fail to import
Package: fwsnort Version: 1.6.5-4 Severity: normal I can't get any rules to import. Here's what happens with update-rules followed by an attempt to import. root@njh:/etc/fwsnort# /usr/sbin/fwsnort --update-rules [+] Downloading latest rules into /etc/fwsnort/snort_rules/--2018-10-10 10:25:27-- http://rules.emergingthreats.net/open/snort-2.9.0/emerging-all.rules Resolving rules.emergingthreats.net (rules.emergingthreats.net)... 96.43.137.99, 204.12.217.19 Connecting to rules.emergingthreats.net (rules.emergingthreats.net)|96.43.137.99|:80... connected. HTTP request sent, awaiting response... 200 OK Length: 13880047 (13M) Saving to: ‘emerging-all.rules’ emerging-all.rules 100%[===>] 13.24M 3.43MB/sin 12s 2018-10-10 10:25:40 (1.06 MB/s) - ‘emerging-all.rules’ saved [13880047/13880047] [+] Finished. root@njh:/etc/fwsnort# /usr/sbin/fwsnort [+] Testing /sbin/iptables for supported capabilities... =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= Snort Rules File Success Fail Total [+] emerging-all.rules0 17510 17510 = 0 17510 17510 [+] No rules parsed. [+] Logfile: /var/log/fwsnort/fwsnort.log [-] No Snort rules could be translated, exiting root@njh:/etc/fwsnort# -- System Information: Debian Release: 9.5 APT prefers stable APT policy: (500, 'stable') Architecture: arm64 (aarch64) Kernel: Linux 4.15.11-mainline-rev1 (SMP w/4 CPU cores) Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) (ignored: LC_ALL set to en_US.UTF-8), LANGUAGE=en_US.UTF-8 (charmap=UTF-8) (ignored: LC_ALL set to en_US.UTF-8) Shell: /bin/sh linked to /bin/dash Init: systemd (via /run/systemd/system) Versions of packages fwsnort depends on: ii debconf [debconf-2.0] 1.5.61 ii iptables1.6.0+snapshot20161117-6 ii libiptables-parse-perl 1.6-1 ii libnet-rawip-perl 0.25-2+b2 ii libnetaddr-ip-perl 4.079+dfsg-1+b1 ii perl5.24.1-3+deb9u4 Versions of packages fwsnort recommends: ii snort-rules-default 2.9.7.0-5 fwsnort suggests no packages. -- debconf information: fwsnort/download: false
Bug#910779: New upstream release (0.7.0)
Source: virglrenderer Version: 0.6.0-2 Severity: wishlist Hi, Could you please package the new upstream release that is out since september 2018? Thanks, Laurent Bigonville -- System Information: Debian Release: buster/sid APT prefers unstable-debug APT policy: (500, 'unstable-debug'), (500, 'unstable'), (1, 'experimental-debug'), (1, 'experimental') Architecture: amd64 (x86_64) Foreign Architectures: i386 Kernel: Linux 4.19.0-rc7+ (SMP w/8 CPU cores) Locale: LANG=fr_BE.UTF-8, LC_CTYPE=fr_BE.UTF-8 (charmap=UTF-8), LANGUAGE=fr_BE.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /usr/bin/dash Init: systemd (via /run/systemd/system) LSM: SELinux: enabled - Mode: Permissive - Policy name: refpolicy