Processing of json-c_0.13.1+dfsg-8_source.changes
json-c_0.13.1+dfsg-8_source.changes uploaded successfully to localhost along with the files: json-c_0.13.1+dfsg-8.dsc json-c_0.13.1+dfsg-8.debian.tar.xz json-c_0.13.1+dfsg-8_source.buildinfo Greetings, Your Debian queue daemon (running on host usper.debian.org)
Bug#960326: marked as done (json-c: CVE-2020-12762)
Your message dated Tue, 16 Jun 2020 08:33:37 + with message-id and subject line Bug#960326: fixed in json-c 0.13.1+dfsg-8 has caused the Debian Bug report #960326, regarding json-c: CVE-2020-12762 to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 960326: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=960326 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems --- Begin Message --- Source: json-c Version: 0.13.1+dfsg-7 Severity: important Tags: security upstream Forwarded: https://github.com/json-c/json-c/pull/592 Hi, The following vulnerability was published for json-c. CVE-2020-12762[0]: | json-c through 0.14 has an integer overflow and out-of-bounds write | via a large JSON file, as demonstrated by printbuf_memappend. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2020-12762 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12762 [1] https://github.com/json-c/json-c/pull/592 Please adjust the affected versions in the BTS as needed. Regards, Salvatore --- End Message --- --- Begin Message --- Source: json-c Source-Version: 0.13.1+dfsg-8 Done: Gianfranco Costamagna We believe that the bug you reported is fixed in the latest version of json-c, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 960...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Gianfranco Costamagna (supplier of updated json-c package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@ftp-master.debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Tue, 16 Jun 2020 09:45:32 +0200 Source: json-c Binary: libjson-c4 libjson-c-dev libjson-c-doc libjson-c4-udeb Architecture: source Version: 0.13.1+dfsg-8 Distribution: unstable Urgency: medium Maintainer: Debian QA Group Changed-By: Gianfranco Costamagna Description: libjson-c-dev - JSON manipulation library - development files libjson-c-doc - JSON manipulation library - documentation files libjson-c4 - JSON manipulation library - shared library libjson-c4-udeb - JSON manipulation library - shared library (udeb) (udeb) Closes: 960326 Changes: json-c (0.13.1+dfsg-8) unstable; urgency=medium . [ Leonidas S. Barbosa ] * SECURITY UPDATE: Integer overflows - debian/patches/CVE-2020-12762-*.patch: fix a series of integer overflows adding checks in linkhash.c, printbuf.c, test4.c test4.expected. - CVE-2020-12762 . [ Gianfranco Costamagna ] * QA upload * Import Ubuntu patch (Closes: #960326) Checksums-Sha1: 1cce30d4212b8e1185b44cf8d30d6aeda037e0d7 2072 json-c_0.13.1+dfsg-8.dsc bd1698ca95d41cef49875140c3ecb1ddf485876c 9980 json-c_0.13.1+dfsg-8.debian.tar.xz deaa02f9c23b75c3965eaa3cb5ff540175c7bf58 7347 json-c_0.13.1+dfsg-8_source.buildinfo Checksums-Sha256: 003cb09d1dc78e3b54f04245ff1ece878253b9c07234a8fa1dfc3c9857affeac 2072 json-c_0.13.1+dfsg-8.dsc f3b53b1a1f9f22558d86ace861937cfad077507fafefdcb528ac5a8f8a829530 9980 json-c_0.13.1+dfsg-8.debian.tar.xz 18d4c7deda5faf7ab7910f09b90f9fce4db1058d44ab8fc67b6da9d2691750a2 7347 json-c_0.13.1+dfsg-8_source.buildinfo Files: 3e6765ccebe115b177311faafac52196 2072 libs optional json-c_0.13.1+dfsg-8.dsc adec1a144234e57c59e66106dcb896ba 9980 libs optional json-c_0.13.1+dfsg-8.debian.tar.xz bc3d83fc4b87d18523ea21967ddbfaf8 7347 libs optional json-c_0.13.1+dfsg-8_source.buildinfo -BEGIN PGP SIGNATURE- iQIzBAEBCAAdFiEEkpeKbhleSSGCX3/w808JdE6fXdkFAl7oegAACgkQ808JdE6f Xdm8ug/9H97ISB9483O4xxK3pWXD+rZGlcSoyOjDp/weDMDgfbCAYg8G9rPKMKpp ZSklhK3vdCzYRCzCbqcOMkpwsD8AcGKvS+p62Cr2XibwtKQFIkb3SHi97ytvMi33 qNg10oPAmH4hHEWZXYf2kIwioZSqK8AE5v66BOdHCQMp4XIco99z5wndIydqREcM 7dmZs49fFbq5e+uo6JLd+0skQ7X54GG3UKHFJWHAHQbXoYu5n7uPmra8E6JPCMHn 8jEWBJUp8IoC1dy0VbQTuYAR57rA/89sCF2CGXVOiicIdSD3JLEEe8+otaE1+beM cOdG2ADuUDQY/tFwQgEv/7dKm7IqTePN7n83tDKJKfDYLlnvXyiEh5miqpULzlyx PvQQJUyUX0FUXBoSrpXrW+JyzaiZqg53lRwq1XACTiXEYC/Xwzs8afP32znMhvk2 PtJN0tw+TMjv7F3+0YHbpoNnurXVN8mUr1Cni7mR2lc7RlzlL4niyKZN0c5LEeaI cljegzBNdJk61gSQ0HqV1CNCGN1wb2UYBDR0SdN1Sfah1cBFsAwxZ3HdaIwM2fWr VvS3UxM7krQad3zFkwQctD7Gq1oKiCLHtTJ10P75BTDJmqAOn3Yr
json-c_0.13.1+dfsg-8_source.changes ACCEPTED into unstable
Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Tue, 16 Jun 2020 09:45:32 +0200 Source: json-c Binary: libjson-c4 libjson-c-dev libjson-c-doc libjson-c4-udeb Architecture: source Version: 0.13.1+dfsg-8 Distribution: unstable Urgency: medium Maintainer: Debian QA Group Changed-By: Gianfranco Costamagna Description: libjson-c-dev - JSON manipulation library - development files libjson-c-doc - JSON manipulation library - documentation files libjson-c4 - JSON manipulation library - shared library libjson-c4-udeb - JSON manipulation library - shared library (udeb) (udeb) Closes: 960326 Changes: json-c (0.13.1+dfsg-8) unstable; urgency=medium . [ Leonidas S. Barbosa ] * SECURITY UPDATE: Integer overflows - debian/patches/CVE-2020-12762-*.patch: fix a series of integer overflows adding checks in linkhash.c, printbuf.c, test4.c test4.expected. - CVE-2020-12762 . [ Gianfranco Costamagna ] * QA upload * Import Ubuntu patch (Closes: #960326) Checksums-Sha1: 1cce30d4212b8e1185b44cf8d30d6aeda037e0d7 2072 json-c_0.13.1+dfsg-8.dsc bd1698ca95d41cef49875140c3ecb1ddf485876c 9980 json-c_0.13.1+dfsg-8.debian.tar.xz deaa02f9c23b75c3965eaa3cb5ff540175c7bf58 7347 json-c_0.13.1+dfsg-8_source.buildinfo Checksums-Sha256: 003cb09d1dc78e3b54f04245ff1ece878253b9c07234a8fa1dfc3c9857affeac 2072 json-c_0.13.1+dfsg-8.dsc f3b53b1a1f9f22558d86ace861937cfad077507fafefdcb528ac5a8f8a829530 9980 json-c_0.13.1+dfsg-8.debian.tar.xz 18d4c7deda5faf7ab7910f09b90f9fce4db1058d44ab8fc67b6da9d2691750a2 7347 json-c_0.13.1+dfsg-8_source.buildinfo Files: 3e6765ccebe115b177311faafac52196 2072 libs optional json-c_0.13.1+dfsg-8.dsc adec1a144234e57c59e66106dcb896ba 9980 libs optional json-c_0.13.1+dfsg-8.debian.tar.xz bc3d83fc4b87d18523ea21967ddbfaf8 7347 libs optional json-c_0.13.1+dfsg-8_source.buildinfo -BEGIN PGP SIGNATURE- iQIzBAEBCAAdFiEEkpeKbhleSSGCX3/w808JdE6fXdkFAl7oegAACgkQ808JdE6f Xdm8ug/9H97ISB9483O4xxK3pWXD+rZGlcSoyOjDp/weDMDgfbCAYg8G9rPKMKpp ZSklhK3vdCzYRCzCbqcOMkpwsD8AcGKvS+p62Cr2XibwtKQFIkb3SHi97ytvMi33 qNg10oPAmH4hHEWZXYf2kIwioZSqK8AE5v66BOdHCQMp4XIco99z5wndIydqREcM 7dmZs49fFbq5e+uo6JLd+0skQ7X54GG3UKHFJWHAHQbXoYu5n7uPmra8E6JPCMHn 8jEWBJUp8IoC1dy0VbQTuYAR57rA/89sCF2CGXVOiicIdSD3JLEEe8+otaE1+beM cOdG2ADuUDQY/tFwQgEv/7dKm7IqTePN7n83tDKJKfDYLlnvXyiEh5miqpULzlyx PvQQJUyUX0FUXBoSrpXrW+JyzaiZqg53lRwq1XACTiXEYC/Xwzs8afP32znMhvk2 PtJN0tw+TMjv7F3+0YHbpoNnurXVN8mUr1Cni7mR2lc7RlzlL4niyKZN0c5LEeaI cljegzBNdJk61gSQ0HqV1CNCGN1wb2UYBDR0SdN1Sfah1cBFsAwxZ3HdaIwM2fWr VvS3UxM7krQad3zFkwQctD7Gq1oKiCLHtTJ10P75BTDJmqAOn3YrvNgxEQE/hgS1 CFs46t+Ndz+Dow4h3/pKrapdi2deOVMO7O/rJMJm9/bMo12aGwI= =t6cc -END PGP SIGNATURE- Thank you for your contribution to Debian.
Bug#962946: mdadm: --name not valid in grow mode
Package: mdadm Version: 4.1-1 Severity: normal Dear Maintainer, The mdadm manpage lists --name under "For create, build, or grow". But mdadm disagrees: # mdadm --grow /dev/md127 --name raid1 mdadm: :option --name not valid in grow mode -- Package-specific info: --- mdadm.conf CREATE owner=root group=disk mode=0660 auto=yes HOMEHOST MAILADDR root --- /etc/default/mdadm AUTOCHECK=true START_DAEMON=true DAEMON_OPTIONS="--syslog" VERBOSE=false --- /proc/mdstat: Personalities : [raid6] [raid5] [raid4] [linear] [multipath] [raid0] [raid1] [raid10] unused devices: --- /proc/partitions: major minor #blocks name 80 1953514584 sda 81 262144 sda1 82 1782579200 sda2 83 170672199 sda3 8 16 117220824 sdb 8 17 102400 sdb1 8 18 117117383 sdb2 8 32 488386584 sdc 8 48 2930266582 sdd 8 49 1007 sdd1 8 50 262143 sdd2 8 51 2930002944 sdd3 8 64 58595475456 sde 8 65 58595474415 sde1 2530 838860800 dm-0 2531 536870912 dm-1 2532 262144 dm-2 2533 57756610560 dm-3 2534 57756610560 dm-4 2535 536870912 dm-5 2536 536854528 dm-6 2537 838844416 dm-7 2538 25165824 dm-8 25391048576 dm-9 253 10 209715200 dm-10 253 11 25165824 dm-11 253 12 57756610560 dm-12 253 13 209715200 dm-13 --- LVM physical volumes: PV VG Fmt Attr PSize PFree /dev/sda2 vg_cerebro lvm2 a-- 1.66t <450.50g /dev/sde1 vg_cerebro lvm2 a-- 54.57t 0 --- mount output sysfs on /sys type sysfs (rw,nosuid,nodev,noexec,relatime) proc on /proc type proc (rw,nosuid,nodev,noexec,relatime) udev on /dev type devtmpfs (rw,nosuid,relatime,size=8143448k,nr_inodes=2035862,mode=755) devpts on /dev/pts type devpts (rw,nosuid,noexec,relatime,gid=5,mode=620,ptmxmode=000) tmpfs on /run type tmpfs (rw,nosuid,noexec,relatime,size=1633596k,mode=755) /dev/mapper/cryptroot on / type btrfs (rw,noatime,nossd,space_cache,subvolid=257,subvol=/rootfs) securityfs on /sys/kernel/security type securityfs (rw,nosuid,nodev,noexec,relatime) tmpfs on /dev/shm type tmpfs (rw,nosuid,nodev) tmpfs on /run/lock type tmpfs (rw,nosuid,nodev,noexec,relatime,size=5120k) tmpfs on /sys/fs/cgroup type tmpfs (ro,nosuid,nodev,noexec,mode=755) cgroup2 on /sys/fs/cgroup/unified type cgroup2 (rw,nosuid,nodev,noexec,relatime,nsdelegate) cgroup on /sys/fs/cgroup/systemd type cgroup (rw,nosuid,nodev,noexec,relatime,xattr,name=systemd) pstore on /sys/fs/pstore type pstore (rw,nosuid,nodev,noexec,relatime) efivarfs on /sys/firmware/efi/efivars type efivarfs (rw,relatime) none on /sys/fs/bpf type bpf (rw,nosuid,nodev,noexec,relatime,mode=700) cgroup on /sys/fs/cgroup/freezer type cgroup (rw,nosuid,nodev,noexec,relatime,freezer) cgroup on /sys/fs/cgroup/devices type cgroup (rw,nosuid,nodev,noexec,relatime,devices) cgroup on /sys/fs/cgroup/cpuset type cgroup (rw,nosuid,nodev,noexec,relatime,cpuset) cgroup on /sys/fs/cgroup/hugetlb type cgroup (rw,nosuid,nodev,noexec,relatime,hugetlb) cgroup on /sys/fs/cgroup/cpu,cpuacct type cgroup (rw,nosuid,nodev,noexec,relatime,cpu,cpuacct) cgroup on /sys/fs/cgroup/net_cls,net_prio type cgroup (rw,nosuid,nodev,noexec,relatime,net_cls,net_prio) cgroup on /sys/fs/cgroup/pids type cgroup (rw,nosuid,nodev,noexec,relatime,pids) cgroup on /sys/fs/cgroup/rdma type cgroup (rw,nosuid,nodev,noexec,relatime,rdma) cgroup on /sys/fs/cgroup/perf_event type cgroup (rw,nosuid,nodev,noexec,relatime,perf_event) cgroup on /sys/fs/cgroup/memory type cgroup (rw,nosuid,nodev,noexec,relatime,memory) cgroup on /sys/fs/cgroup/blkio type cgroup (rw,nosuid,nodev,noexec,relatime,blkio) debugfs on /sys/kernel/debug type debugfs (rw,relatime) hugetlbfs on /dev/hugepages type hugetlbfs (rw,relatime,pagesize=2M) sunrpc on /run/rpc_pipefs type rpc_pipefs (rw,relatime) systemd-1 on /proc/sys/fs/binfmt_misc type autofs (rw,relatime,fd=44,pgrp=1,timeout=0,minproto=5,maxproto=5,direct,pipe_ino=21807) mqueue on /dev/mqueue type mqueue (rw,relatime) nfsd on /proc/fs/nfsd type nfsd (rw,relatime) binfmt_misc on /proc/sys/fs/binfmt_misc type binfmt_misc (rw,relatime) /dev/mapper/cryptroot on /cryptroot type btrfs (rw,noatime,nossd,space_cache,subvolid=5,subvol=/) /dev/mapper/vg_cerebro-boot on /boot type ext4 (rw,noatime) /dev/sda1 on /boot/efi type vfat (rw,relatime,fmask=0022,dmask=0022,codepage=437,iocharset=iso8859-1,shortname=mixed,errors=remount-ro) fusectl on /sys/fs/fuse/connections type fusectl (rw,relatime) configfs on /sys/kernel/config type configfs (rw,relatime) /dev/mapper/cryptlocalvol on /cryptlocalvol type btrfs (rw,relatime,nossd,discard,space_cache,subvolid=5,subvol=/) /dev/mapper/cryptlocalvol on /localvol type btrfs (rw,relatime,nossd,discard,space_cache,subvolid=257,subvol=/rootfs) tracefs on /sys/kernel/debug/tracing type tracefs (rw,relatime) /etc/auto.
Processing of meanwhile_1.0.2-10_source.changes
meanwhile_1.0.2-10_source.changes uploaded successfully to localhost along with the files: meanwhile_1.0.2-10.dsc meanwhile_1.0.2-10.debian.tar.xz meanwhile_1.0.2-10_amd64.buildinfo Greetings, Your Debian queue daemon (running on host usper.debian.org)
meanwhile_1.0.2-10_source.changes ACCEPTED into unstable
Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Tue, 16 Jun 2020 11:57:40 -0400 Source: meanwhile Architecture: source Version: 1.0.2-10 Distribution: unstable Urgency: medium Maintainer: Debian QA Group Changed-By: Boyuan Yang Changes: meanwhile (1.0.2-10) unstable; urgency=medium . * QA upload. * debian/control: + Update Vcs-* fields to use git packaging repo under Salsa Debian Group. + Bump debhelper compat to v13. + Bump Standards-Version to 4.5.0. + Use new homepage on GitHub. * debian/watch: Monitor releases on GitHub. Checksums-Sha1: ed3b6effebbf912a744d12188efdcd69f25c2634 1946 meanwhile_1.0.2-10.dsc dd5dc623ea6862bfbd463491623851381602b3ad 9284 meanwhile_1.0.2-10.debian.tar.xz 170281f6ffd094f60240ae3914e73f83c57efa08 7151 meanwhile_1.0.2-10_amd64.buildinfo Checksums-Sha256: 3a1ee3bd1e1bbba1bd260e7d0a5fa309109b6dea8fcbfbe671f0bcba43a976b0 1946 meanwhile_1.0.2-10.dsc 22a42f93cc037ee478e61995098b0710778f8ab81185e5193e8addeef4b1c680 9284 meanwhile_1.0.2-10.debian.tar.xz 8231fc4a708fbaee70c47457040bdc391f3e97a1fc28cd66c62f196e02355da2 7151 meanwhile_1.0.2-10_amd64.buildinfo Files: f0719954b13f34a3a0184bc73e9b08cd 1946 net optional meanwhile_1.0.2-10.dsc 63add9704e4ec5c3f970c45f7c8e7ad2 9284 net optional meanwhile_1.0.2-10.debian.tar.xz ef6d60cf63ff489167ea8588d2971d00 7151 net optional meanwhile_1.0.2-10_amd64.buildinfo -BEGIN PGP SIGNATURE- iQIzBAEBCgAdFiEEfncpR22H1vEdkazLwpPntGGCWs4FAl7o7L0ACgkQwpPntGGC Ws5gYg//W8RyBMP3DZ4b4ChtTXY+MvQBkLJj+vWTnIz1STokqs+Q13idn46tF08a Im+RtZfnytj/lYdbzEIejOVVJP8NvIPBEIzcDHEQ+TZ+umAIUwYYSPZfV3Jlc+w8 MS/xOMWH1SIk3i++Ft/s6OquJip5FBMNLvJkO3YNBi1ruYk/yB9DROLF58/KdUl8 SzF0gBjCeW0RAs+kiZAbLoL3BxGkk4BCgg12XhmDi65JtwCAW+/EysR/u8yVFcTa ezIw2OfVA4jzLt7cjt8yxc0ORAaeT/LRmRkgkv/1Zris8anf0xo4zQwpALicMf3R yAxSjM/7ysVONWP/xpFUSJDZVu8huBPvl9JprMJekAwpOgCW2ae3p+KL6u1dbzvv 02xgv3kKlYDIGg4nDlYDKIH2Hpr2aMJ3PXB/gn7ZF4qw7Fr0OKsZISXSaodh0CTv jCT5Zhlc5BUTPM3HRVdWYsq6bkQvQInl1cUC6Tk3notMl41+w2TMrAq0niG9iPR/ Gx2Yc6KbY9Fyc2ry5YczUYC7jdQXohSvOpNy3CQc55xsyehSuna9/R2UL6nbh2zA e0lrxtTk3WTDcHk+zxFNsLQu46maPl7DbNxciw3IFsH1m5mmwYJLchOY4wRbLYHm powHTFpfAu3lFwH6wFMCL/Cv2dMPKVc6aDC4B41UNATccupfg84= =WEtY -END PGP SIGNATURE- Thank you for your contribution to Debian.
Processing of safelease_1.0-3_source.changes
safelease_1.0-3_source.changes uploaded successfully to localhost along with the files: safelease_1.0-3.dsc safelease_1.0-3.debian.tar.xz safelease_1.0-3_amd64.buildinfo Greetings, Your Debian queue daemon (running on host usper.debian.org)
safelease_1.0-3_source.changes ACCEPTED into unstable
Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Sat, 13 Jun 2020 22:17:06 + Source: safelease Architecture: source Version: 1.0-3 Distribution: unstable Urgency: medium Maintainer: Debian QA Group Changed-By: Francisco Vilmar Cardoso Ruviaro Changes: safelease (1.0-3) unstable; urgency=medium . * QA upload. * Using new DH level format. Consequently: - debian/compat: removed. - debian/control: changed from 'debhelper' to 'debhelper-compat' in Build-Depends field and bumped level to 13. * debian/control: - Added 'Rules-Requires-Root: no' to source stanza. - Added VCS fields to use Salsa. - Added Homepage field. - Bumped Standards Version to 4.5.0. - Changed the priority from extra to optional. - Removed 'dh-autoreconf, autotools-dev' from Build-Depends field. - Reorganized file content. * debian/copyright: - Updated links to use HTTPS protocol. - Updated packaging copyright. * debian/rules: - Added DEB_BUILD_MAINT_OPTIONS variable to improve GCC hardening. - Removed '--with autotools-dev,autoreconf'. * debian/salsa-ci.yml: - Added to provide CI tests for Salsa. * debian/watch: added. Checksums-Sha1: 7815edabc0248e115f066f788f3fd9b4d9d53e22 1853 safelease_1.0-3.dsc b01bc5221d94d82a84d1b07504ae25f230d78231 2344 safelease_1.0-3.debian.tar.xz 1a1805ab405644d44ddf204e37cd1d636f7b38eb 5734 safelease_1.0-3_amd64.buildinfo Checksums-Sha256: 4361d131efb3127bcd3106c43cf614e44c351142a316d448e55908cf545a384a 1853 safelease_1.0-3.dsc 08b2ebde47ca9e900ad93e3dd882bb7f77b3d2e496471c68a9cd4e1b4253d417 2344 safelease_1.0-3.debian.tar.xz f592c15ea6ad8c17302c331d459b4ab8cc1d4d31693fe09e51144240f0a42867 5734 safelease_1.0-3_amd64.buildinfo Files: f43bb594564a5bfa1789cca37de268bc 1853 misc optional safelease_1.0-3.dsc 87287bf13af7afbe197d0922d4a272da 2344 misc optional safelease_1.0-3.debian.tar.xz e0cb2c47363c41de6f08245623ce7f1c 5734 misc optional safelease_1.0-3_amd64.buildinfo -BEGIN PGP SIGNATURE- iQIzBAEBCgAdFiEEBdtqg34QX0sdAsVfu6n6rcz7RwcFAl7pQnIACgkQu6n6rcz7 RwfH0g//Yoho7Tc0/4mJ9nVpz75A1pu7LrgjQ8vRXiJEDTvTDQD5anE5nnnys0GU k/vMPY1PrySzXZkVuf0s8HHckPVutWGGdiY9jWY1y+HFJ+/MCudWl6jZ54REQdA5 sBzv932+9qNvRwJ8pp6JVsY4erbTKyUyUmxN7acAVuYoa/vVBVulxjauDo3gT5Y5 O0rG8JAu3aIDLhg3bA/uF07+oIITAM4Nh5FH7ylXNxKVizwDvDSrXNHk6DgvwwED wXuEt11R6xxhle04AA+Eyn7mweLKuJd1gOyhlp5aeK5beaJGL6KbRMIFOlaVS3jt iVuVis2VjeZHSK1mtsZNjULd1O6+XMhjEuWoaGgNJb5dYvXDe1BcxJ/e5uUTjkYG 66vkVvITpSQMNPE+y5AIeopmm4UqWJwfc+OmsyWLmLXKD7oiyvYWhXPUDpkgm2SZ YrOy1ZKaRL7wiGk0LkQxDimUp4HSrXv6dXfkE7/F8N0JAZ4ptFvUTvcn+sVm2faa RW9XC6CQM7d6G3z7Azclgzk+RX5ixiL6iFx11ZRVRSSskqjMSZ/dOfrpIzKLr7uI N16JMaC1uwtVdEY2X+A6jdWnd3c7uTKHzTeou+gCVb3HxYF+1sL7BltSloeOZ6ju zr8hZx+DeZ9RaDvqLS8Hm2nMfA1SyPvA5cPbQDRE1xeD+GLU9w8= =ePFk -END PGP SIGNATURE- Thank you for your contribution to Debian.