Processed: tagging 737951
Processing commands for cont...@bugs.debian.org: > tags 737951 - moreinfo Bug #737951 [mdadm] mdadm: udev rules files ignores raid=noautodetect kernel parameter Removed tag(s) moreinfo. > thanks Stopping processing here. Please contact me if you need assistance. -- 737951: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=737951 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems
Processing of m2vrequantiser_1.1-5_source.changes
m2vrequantiser_1.1-5_source.changes uploaded successfully to localhost along with the files: m2vrequantiser_1.1-5.dsc m2vrequantiser_1.1-5.debian.tar.xz m2vrequantiser_1.1-5_source.buildinfo Greetings, Your Debian queue daemon (running on host usper.debian.org)
m2vrequantiser_1.1-5_source.changes ACCEPTED into unstable
Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Thu, 11 Jun 2020 11:03:56 -0300 Source: m2vrequantiser Architecture: source Version: 1.1-5 Distribution: unstable Urgency: medium Maintainer: Debian QA Group Changed-By: Fabio Augusto De Muzio Tobich Changes: m2vrequantiser (1.1-5) unstable; urgency=medium . * QA upload. * debian/control: added 'Rules-Requires-Root: no' to source stanza. * debian/copyright: updated packaging years. * debian/patches/: updated patches headers. * debian/rules: - Added DEB_BUILD_MAINT_OPTIONS variable to improve GCC hardening. - Removed unnecessary dh argument. * debian/tests/control: created to perform trivial CI test. * debian/upstream/metadata: created. * debian/watch: - Bumped version to 4. - Improved search regex. Checksums-Sha1: 54f6b48cf0658d46c6f5df8f9162bf9cb3dc8d80 1903 m2vrequantiser_1.1-5.dsc fb06f21650e49802d3a3a83586cc96bb26741aac 4948 m2vrequantiser_1.1-5.debian.tar.xz 1b321cee8e87d9ff93a52f3d51a3605113f044bd 5804 m2vrequantiser_1.1-5_source.buildinfo Checksums-Sha256: ea2312443bb9cff8ef86a4fe3cc7bd7d0bf3691833a4041cb622df707cdd2559 1903 m2vrequantiser_1.1-5.dsc ef67b57442b3c2f21bb195885390497707e2abc5a54491f595f3fe8b6ff18a53 4948 m2vrequantiser_1.1-5.debian.tar.xz d37ad78f68ffe8d620a5f0ecce08e7620115912e4f0bae5abcf50e7a81c2872c 5804 m2vrequantiser_1.1-5_source.buildinfo Files: 223a9713d810f1c78138a165c87c751e 1903 video optional m2vrequantiser_1.1-5.dsc 80baa07d53cb4456397839eb71f8e1ab 4948 video optional m2vrequantiser_1.1-5.debian.tar.xz 01af8a006d3b0ba5d0c319c831a6b7e2 5804 video optional m2vrequantiser_1.1-5_source.buildinfo -BEGIN PGP SIGNATURE- iQIzBAEBCAAdFiEEst7mYDbECCn80PEM/A2xu81GC94FAl8IV68ACgkQ/A2xu81G C953uw//WqeiWFvMYL7BWiyE671rdK94CWxl+P8xMo1+LzvgEoo3mzR1TCdqSW4F 4QpLnxm8enuyhVVWB511FJ6XTkMZto3BOaVr2HaVnMu0dRReIkNhAL5DLTtp29Sc Bm3s185xmZLVcgZpWWycPTIOO30hvKyei72K5QVsKKOtglHYtHMuKHDTTZIE81l2 aYIQF31Qd1f3cTpG7BYfsDD64fwwWnb0Jr41ahnLK5vCW6HTdt7GBv+0LUC+pxZN OZmmVBp4wKjnUYjV6H+GGKaDsGfy8F1A4FTrjbz10RX8ZtshqVuTqV/WJPlvqeqq Csmdb6CquuF3A3Yx5svIxVfJXiYwo6yvhc3je0jmfqqoO8kMOBsEpEzWQDW55Sco gwW8L+lx5GcTiW/nH/f5J1cLPbsJ69NKgNmS2l7aObo6Ulu7zx0c8aUuaiQxZn7x nqVt5XNEeXzgkNNM+EYgLgO1gr1FhYt468I3tniPpZVyCNlbDhCFzmNNqFtthv2J kGvMAN57uWtt3eLutVnd5h+XWHGckkj+FmZVmuDe3tdQrN0qcUiHiJwx9XhXe/sX WimhniM9fQ8LFET8ArLToPuxou5ES7KhIopppn8fprlfHrgL3KiO++nX4W9k9qNs 8XCbIiceSN8dEcceQ6KvhGwXlN/MuHRPIAyeVhQcBS7uoFu5bZc= =CvFk -END PGP SIGNATURE- Thank you for your contribution to Debian.
Bug#949393: marked as done (storebackup: CVE-2020-7040: denial of service and symlink attack vector via fixed lockfile path /tmp/storeBackup.lock)
Your message dated Fri, 10 Jul 2020 15:02:09 + with message-id and subject line Bug#949393: fixed in storebackup 3.2.1-2~deb10u1 has caused the Debian Bug report #949393, regarding storebackup: CVE-2020-7040: denial of service and symlink attack vector via fixed lockfile path /tmp/storeBackup.lock to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 949393: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=949393 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems --- Begin Message --- Source: storebackup Version: 3.2.1-1 Severity: grave Tags: security upstream Hi, The following vulnerability was published for storebackup. CVE-2020-7040[0]: |storeBackup: denial of service and symlink attack vector via fixed |lockfile path /tmp/storeBackup.lock The RC severity per se is a bit exagerated for the issue, but given the package is orphaned we should be careful on including the package in bullseye. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2020-7040 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7040 [1] https://www.openwall.com/lists/oss-security/2020/01/20/3 [2] https://bugzilla.suse.com/show_bug.cgi?id=1156767 Regards, Salvatore --- End Message --- --- Begin Message --- Source: storebackup Source-Version: 3.2.1-2~deb10u1 Done: Adrian Bunk We believe that the bug you reported is fixed in the latest version of storebackup, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 949...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Adrian Bunk (supplier of updated storebackup package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@ftp-master.debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Thu, 09 Jul 2020 14:59:51 +0300 Source: storebackup Architecture: source Version: 3.2.1-2~deb10u1 Distribution: buster Urgency: medium Maintainer: Debian QA Group Changed-By: Adrian Bunk Closes: 949393 Changes: storebackup (3.2.1-2~deb10u1) buster; urgency=medium . * QA upload. * Rebuild for buster. . storebackup (3.2.1-2) unstable; urgency=medium . * QA upload. * Set maintainer to Debian QA Group. (see #856299) * Add patch to change the way the lockfile is opened in the Perl code. (Fixes: CVE-2020-7040) (Closes: #949393) Checksums-Sha1: df336890c1d9d6e90c58fc9a39ba2a682956bbdc 1916 storebackup_3.2.1-2~deb10u1.dsc faf60740a718a2ad339978e01b015bc9ca350659 8920 storebackup_3.2.1-2~deb10u1.debian.tar.xz Checksums-Sha256: a156fbed669820fd705074b8730cbf1090eb4d21c05a6976b460296eec9462e6 1916 storebackup_3.2.1-2~deb10u1.dsc 45691f54126d53aca02338453a761c2dfbe22c21bf642c6e217f74ff530af339 8920 storebackup_3.2.1-2~deb10u1.debian.tar.xz Files: afdc74a765f782581dbf156880abea0e 1916 utils optional storebackup_3.2.1-2~deb10u1.dsc 7c5a6d4b803350bca130dc898eea4571 8920 utils optional storebackup_3.2.1-2~deb10u1.debian.tar.xz -BEGIN PGP SIGNATURE- iQIzBAEBCgAdFiEEOvp1f6xuoR0v9F3wiNJCh6LYmLEFAl8HCj0ACgkQiNJCh6LY mLF29A//air5pKkMUsXQ7+Sc6qErPc/5i8fNTxZbJkYFFcOid103+xBt6gaSw/4j cSQqJqlgN1gdgKHzbSwpBckp4F/5z5e2ejiEh2Jdk7pg2kpUR9tZHz41kaAlBOBq SvXL9JowEzN1y1R4LftN3QAD8+xb9Fyht6JLRvz6rFY5m7QLaqyM6vB2WvqP2pO2 EsVp2wuw+IUveTNxTvRk6FjwwAGobDFZmMGbWTLQS3OzxG8cFwqUh10WvGXsppC0 DebrEvUwyQs/60KvwKFjIT4nJRyQHVTqAB2vtq1F0ofS16Icq9pjVOxGO2meTGZH y5351dbLf9jKxknB3qNDoGxURy8SC4pIMTKZQsLiWZq87vvoM/Q577X9CvF3jgaI gKcCC/lVbgRVVRw/CWbkoOxkJnBH/h9a0pS+JkVDR9vHKHPIG5Atu4CV71CiD+Mr gogjwZnVubMgNdE/sYinydLUjUR9OtIXU3xsjCXNyJbmWiJ6am46BcOB0R1ZUMiW ZmvvLkKOYjIhsMBCSNkQLmMmxGbp3b46Kh2oANCVFo2loOvhh/H2vbxifF45pFPD 5fkonOJJfGfWO4e8Ig5vlao2AKZAsQMiQdUULLrKY6hBhsaPPN3DW3fucKCrGjPS 6zhmkbRT/DnkBcMVS4TYid9X4vm0hgaeQU+waA5rowbwhDjhg64= =gB2y -END PGP SIGNATURE End Message ---
Bug#949393: marked as done (storebackup: CVE-2020-7040: denial of service and symlink attack vector via fixed lockfile path /tmp/storeBackup.lock)
Your message dated Fri, 10 Jul 2020 15:02:32 + with message-id and subject line Bug#949393: fixed in storebackup 3.2.1-2~deb9u1 has caused the Debian Bug report #949393, regarding storebackup: CVE-2020-7040: denial of service and symlink attack vector via fixed lockfile path /tmp/storeBackup.lock to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 949393: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=949393 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems --- Begin Message --- Source: storebackup Version: 3.2.1-1 Severity: grave Tags: security upstream Hi, The following vulnerability was published for storebackup. CVE-2020-7040[0]: |storeBackup: denial of service and symlink attack vector via fixed |lockfile path /tmp/storeBackup.lock The RC severity per se is a bit exagerated for the issue, but given the package is orphaned we should be careful on including the package in bullseye. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2020-7040 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7040 [1] https://www.openwall.com/lists/oss-security/2020/01/20/3 [2] https://bugzilla.suse.com/show_bug.cgi?id=1156767 Regards, Salvatore --- End Message --- --- Begin Message --- Source: storebackup Source-Version: 3.2.1-2~deb9u1 Done: Adrian Bunk We believe that the bug you reported is fixed in the latest version of storebackup, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 949...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Adrian Bunk (supplier of updated storebackup package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@ftp-master.debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Thu, 09 Jul 2020 14:54:23 +0300 Source: storebackup Binary: storebackup Architecture: source Version: 3.2.1-2~deb9u1 Distribution: stretch Urgency: medium Maintainer: Debian QA Group Changed-By: Adrian Bunk Description: storebackup - fancy compressing managing checksumming deduplicating hard-linkin Closes: 949393 Changes: storebackup (3.2.1-2~deb9u1) stretch; urgency=medium . * QA upload. * Rebuild for stretch. . storebackup (3.2.1-2) unstable; urgency=medium . * QA upload. * Set maintainer to Debian QA Group. (see #856299) * Add patch to change the way the lockfile is opened in the Perl code. (Fixes: CVE-2020-7040) (Closes: #949393) Checksums-Sha1: dae8a3ec72893cb4de688e0063276c8dda51cfb3 1912 storebackup_3.2.1-2~deb9u1.dsc f2ec33d5ef6d5ff57d3591e3c6f425dd23ce8ec9 8924 storebackup_3.2.1-2~deb9u1.debian.tar.xz Checksums-Sha256: bd959ebab6f454fcd9ee0ea8d9dbe71f6fadcadee700334456c13f8bc6b2d5b5 1912 storebackup_3.2.1-2~deb9u1.dsc c9a98527d0c1fbb2cdc95c39df297420ae00a3b10670ab83032bb86475260f9c 8924 storebackup_3.2.1-2~deb9u1.debian.tar.xz Files: 068a7551d3a2bccfd0b9933b4349c476 1912 utils optional storebackup_3.2.1-2~deb9u1.dsc 4c1d579c6f40f320c8e48e40f21cca81 8924 utils optional storebackup_3.2.1-2~deb9u1.debian.tar.xz -BEGIN PGP SIGNATURE- iQIzBAEBCgAdFiEEOvp1f6xuoR0v9F3wiNJCh6LYmLEFAl8HBlgACgkQiNJCh6LY mLHjbw//Z0OwqqXWC+YtAsOQj+sTCRZkbPx7BMo8jKytO83T25MKSy0J/5kTnDDa 2wyUxKiLZyTIkhkZugcqTnDeuDG/MLBL2JtoSJuWIfLHZi4mfgTkUegVfVBuauXR nAGnWokOPJY4NcaLaxgRGuRcWvFQEXJ4+erXzv5xuTAfVBfGUuCQntO1FIacrYp7 MVSwKny/J3hy7oskGLHpINZSGgsZZ5lI7cEPNaXnvKYdDnU9i4/8h0DY0gLAy3Jn /OXm6v4p9BipcfCwPDlmwhsoVQiO3QGRsBx1dar5LancsagxxC57tsVbnCftyOdl 7wAO7YV3OIukurYWHazT84OHgtrrfsjquGxFwLit2R2vk009OS3G5qlwCXhgwhDi RDoo50P/0sOC0kAxbonWQyo91hTaWCDEwwZ7mE5b+uUkYoiDxSKi7LC9pO+UCb39 ew/vPdNNIe/bNJ5DK/0QBXfFBC8M2uEc3PPjsOR8ATyUixk9BM7DRTBeRMeUW9uh SI7FYBntkIt0wYA6UBOZsL6Tnk1DZO2MvPWaIVsuTluaQ36JkMDjEv25h9rQI1Kh Dr5/z5dPE6hsRSl01dJdH0oQ9OXuEW/S8gMiB4M+aN7qPt44uS0mHjpDnwF7osN5 BPZiCcKmo7MIscYk41jPAgmWJBAOvxo8BB1pGWMpv4f0p3esapY= =l9/x -END PGP SIGNATURE End Message ---
storebackup_3.2.1-2~deb10u1_source.changes ACCEPTED into proposed-updates->stable-new, proposed-updates
Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Thu, 09 Jul 2020 14:59:51 +0300 Source: storebackup Architecture: source Version: 3.2.1-2~deb10u1 Distribution: buster Urgency: medium Maintainer: Debian QA Group Changed-By: Adrian Bunk Closes: 949393 Changes: storebackup (3.2.1-2~deb10u1) buster; urgency=medium . * QA upload. * Rebuild for buster. . storebackup (3.2.1-2) unstable; urgency=medium . * QA upload. * Set maintainer to Debian QA Group. (see #856299) * Add patch to change the way the lockfile is opened in the Perl code. (Fixes: CVE-2020-7040) (Closes: #949393) Checksums-Sha1: df336890c1d9d6e90c58fc9a39ba2a682956bbdc 1916 storebackup_3.2.1-2~deb10u1.dsc faf60740a718a2ad339978e01b015bc9ca350659 8920 storebackup_3.2.1-2~deb10u1.debian.tar.xz Checksums-Sha256: a156fbed669820fd705074b8730cbf1090eb4d21c05a6976b460296eec9462e6 1916 storebackup_3.2.1-2~deb10u1.dsc 45691f54126d53aca02338453a761c2dfbe22c21bf642c6e217f74ff530af339 8920 storebackup_3.2.1-2~deb10u1.debian.tar.xz Files: afdc74a765f782581dbf156880abea0e 1916 utils optional storebackup_3.2.1-2~deb10u1.dsc 7c5a6d4b803350bca130dc898eea4571 8920 utils optional storebackup_3.2.1-2~deb10u1.debian.tar.xz -BEGIN PGP SIGNATURE- iQIzBAEBCgAdFiEEOvp1f6xuoR0v9F3wiNJCh6LYmLEFAl8HCj0ACgkQiNJCh6LY mLF29A//air5pKkMUsXQ7+Sc6qErPc/5i8fNTxZbJkYFFcOid103+xBt6gaSw/4j cSQqJqlgN1gdgKHzbSwpBckp4F/5z5e2ejiEh2Jdk7pg2kpUR9tZHz41kaAlBOBq SvXL9JowEzN1y1R4LftN3QAD8+xb9Fyht6JLRvz6rFY5m7QLaqyM6vB2WvqP2pO2 EsVp2wuw+IUveTNxTvRk6FjwwAGobDFZmMGbWTLQS3OzxG8cFwqUh10WvGXsppC0 DebrEvUwyQs/60KvwKFjIT4nJRyQHVTqAB2vtq1F0ofS16Icq9pjVOxGO2meTGZH y5351dbLf9jKxknB3qNDoGxURy8SC4pIMTKZQsLiWZq87vvoM/Q577X9CvF3jgaI gKcCC/lVbgRVVRw/CWbkoOxkJnBH/h9a0pS+JkVDR9vHKHPIG5Atu4CV71CiD+Mr gogjwZnVubMgNdE/sYinydLUjUR9OtIXU3xsjCXNyJbmWiJ6am46BcOB0R1ZUMiW ZmvvLkKOYjIhsMBCSNkQLmMmxGbp3b46Kh2oANCVFo2loOvhh/H2vbxifF45pFPD 5fkonOJJfGfWO4e8Ig5vlao2AKZAsQMiQdUULLrKY6hBhsaPPN3DW3fucKCrGjPS 6zhmkbRT/DnkBcMVS4TYid9X4vm0hgaeQU+waA5rowbwhDjhg64= =gB2y -END PGP SIGNATURE- Thank you for your contribution to Debian.
storebackup_3.2.1-2~deb9u1_source.changes ACCEPTED into oldstable-proposed-updates->oldstable-new, oldstable-proposed-updates
Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Thu, 09 Jul 2020 14:54:23 +0300 Source: storebackup Binary: storebackup Architecture: source Version: 3.2.1-2~deb9u1 Distribution: stretch Urgency: medium Maintainer: Debian QA Group Changed-By: Adrian Bunk Description: storebackup - fancy compressing managing checksumming deduplicating hard-linkin Closes: 949393 Changes: storebackup (3.2.1-2~deb9u1) stretch; urgency=medium . * QA upload. * Rebuild for stretch. . storebackup (3.2.1-2) unstable; urgency=medium . * QA upload. * Set maintainer to Debian QA Group. (see #856299) * Add patch to change the way the lockfile is opened in the Perl code. (Fixes: CVE-2020-7040) (Closes: #949393) Checksums-Sha1: dae8a3ec72893cb4de688e0063276c8dda51cfb3 1912 storebackup_3.2.1-2~deb9u1.dsc f2ec33d5ef6d5ff57d3591e3c6f425dd23ce8ec9 8924 storebackup_3.2.1-2~deb9u1.debian.tar.xz Checksums-Sha256: bd959ebab6f454fcd9ee0ea8d9dbe71f6fadcadee700334456c13f8bc6b2d5b5 1912 storebackup_3.2.1-2~deb9u1.dsc c9a98527d0c1fbb2cdc95c39df297420ae00a3b10670ab83032bb86475260f9c 8924 storebackup_3.2.1-2~deb9u1.debian.tar.xz Files: 068a7551d3a2bccfd0b9933b4349c476 1912 utils optional storebackup_3.2.1-2~deb9u1.dsc 4c1d579c6f40f320c8e48e40f21cca81 8924 utils optional storebackup_3.2.1-2~deb9u1.debian.tar.xz -BEGIN PGP SIGNATURE- iQIzBAEBCgAdFiEEOvp1f6xuoR0v9F3wiNJCh6LYmLEFAl8HBlgACgkQiNJCh6LY mLHjbw//Z0OwqqXWC+YtAsOQj+sTCRZkbPx7BMo8jKytO83T25MKSy0J/5kTnDDa 2wyUxKiLZyTIkhkZugcqTnDeuDG/MLBL2JtoSJuWIfLHZi4mfgTkUegVfVBuauXR nAGnWokOPJY4NcaLaxgRGuRcWvFQEXJ4+erXzv5xuTAfVBfGUuCQntO1FIacrYp7 MVSwKny/J3hy7oskGLHpINZSGgsZZ5lI7cEPNaXnvKYdDnU9i4/8h0DY0gLAy3Jn /OXm6v4p9BipcfCwPDlmwhsoVQiO3QGRsBx1dar5LancsagxxC57tsVbnCftyOdl 7wAO7YV3OIukurYWHazT84OHgtrrfsjquGxFwLit2R2vk009OS3G5qlwCXhgwhDi RDoo50P/0sOC0kAxbonWQyo91hTaWCDEwwZ7mE5b+uUkYoiDxSKi7LC9pO+UCb39 ew/vPdNNIe/bNJ5DK/0QBXfFBC8M2uEc3PPjsOR8ATyUixk9BM7DRTBeRMeUW9uh SI7FYBntkIt0wYA6UBOZsL6Tnk1DZO2MvPWaIVsuTluaQ36JkMDjEv25h9rQI1Kh Dr5/z5dPE6hsRSl01dJdH0oQ9OXuEW/S8gMiB4M+aN7qPt44uS0mHjpDnwF7osN5 BPZiCcKmo7MIscYk41jPAgmWJBAOvxo8BB1pGWMpv4f0p3esapY= =l9/x -END PGP SIGNATURE- Thank you for your contribution to Debian.
Processing of ruli_0.36-1_source.changes
ruli_0.36-1_source.changes uploaded successfully to localhost along with the files: ruli_0.36-1.dsc ruli_0.36.orig.tar.gz ruli_0.36-1.debian.tar.xz ruli_0.36-1_amd64.buildinfo Greetings, Your Debian queue daemon (running on host usper.debian.org)
Bug#956983: marked as done (aewm: ftbfs with GCC-10)
Your message dated Fri, 10 Jul 2020 19:33:24 + with message-id and subject line Bug#956983: fixed in aewm 1.3.12-6 has caused the Debian Bug report #956983, regarding aewm: ftbfs with GCC-10 to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 956983: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=956983 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems --- Begin Message --- Package: src:aewm Version: 1.3.12-5 Severity: normal Tags: sid bullseye User: debian-...@lists.debian.org Usertags: ftbfs-gcc-10 Please keep this issue open in the bug tracker for the package it was filed for. If a fix in another package is required, please file a bug for the other package (or clone), and add a block in this package. Please keep the issue open until the package can be built in a follow-up test rebuild. The package fails to build in a test rebuild on at least amd64 with gcc-10/g++-10, but succeeds to build with gcc-9/g++-9. The severity of this report will be raised before the bullseye release, so nothing has to be done for the buster release. The full build log can be found at: http://people.debian.org/~doko/logs/gcc10-20200225/aewm_1.3.12-5_unstable_gcc10.log The last lines of the build log are at the end of this report. To build with GCC 10, either set CC=gcc-10 CXX=g++-10 explicitly, or install the gcc, g++, gfortran, ... packages from experimental. apt-get -t=experimental install g++ Common build failures are new warnings resulting in build failures with -Werror turned on, or new/dropped symbols in Debian symbols files. For other C/C++ related build failures see the porting guide at http://gcc.gnu.org/gcc-10/porting_to.html [...] from /usr/include/gtk-2.0/gtk/gtkdialog.h:35, from /usr/include/gtk-2.0/gtk/gtkaboutdialog.h:32, from /usr/include/gtk-2.0/gtk/gtk.h:33, from aepanel.c:14: /usr/include/gtk-2.0/gtk/gtktypeutils.h:236:1: warning: ‘GTypeDebugFlags’ is deprecated [-Wdeprecated-declarations] 236 | voidgtk_type_init (GTypeDebugFlagsdebug_flags); | ^~~~ In file included from /usr/include/glib-2.0/gobject/gobject.h:24, from /usr/include/glib-2.0/gobject/gbinding.h:29, from /usr/include/glib-2.0/glib-object.h:23, from /usr/include/glib-2.0/gio/gioenums.h:28, from /usr/include/glib-2.0/gio/giotypes.h:28, from /usr/include/glib-2.0/gio/gio.h:26, from /usr/include/gtk-2.0/gdk/gdkapplaunchcontext.h:30, from /usr/include/gtk-2.0/gdk/gdk.h:32, from /usr/include/gtk-2.0/gdk/gdkprivate.h:30, from /usr/include/gtk-2.0/gdk/gdkx.h:30, from aepanel.c:13: /usr/include/glib-2.0/gobject/gtype.h:679:1: note: declared here 679 | { | ^ In file included from /usr/include/gtk-2.0/gtk/gtktoolitem.h:31, from /usr/include/gtk-2.0/gtk/gtktoolbutton.h:30, from /usr/include/gtk-2.0/gtk/gtkmenutoolbutton.h:30, from /usr/include/gtk-2.0/gtk/gtk.h:126, from aemenu.c:9: /usr/include/gtk-2.0/gtk/gtktooltips.h:73:3: warning: ‘GTimeVal’ is deprecated: Use 'GDateTime' instead [-Wdeprecated-declarations] 73 | GTimeVal last_popdown; | ^~~~ In file included from /usr/include/glib-2.0/glib/galloca.h:32, from /usr/include/glib-2.0/glib.h:30, from /usr/include/glib-2.0/gobject/gbinding.h:28, from /usr/include/glib-2.0/glib-object.h:23, from /usr/include/glib-2.0/gio/gioenums.h:28, from /usr/include/glib-2.0/gio/giotypes.h:28, from /usr/include/glib-2.0/gio/gio.h:26, from /usr/include/gtk-2.0/gdk/gdkapplaunchcontext.h:30, from /usr/include/gtk-2.0/gdk/gdk.h:32, from /usr/include/gtk-2.0/gtk/gtk.h:32, from aemenu.c:9: /usr/include/glib-2.0/glib/gtypes.h:551:8: note: declared here 551 | struct _GTimeVal |^ In file included from /usr/include/gtk-2.0/gtk/gtktoolitem.h:31, from /usr/include/gtk-2.0/gtk/gtktoolbutton.h:30, from /usr/include/gtk-2.0/gtk/gtkmenutoolbutton.h:30, from /usr/include/gtk-2.0/gtk/gtk.h:126, from aepanel.c:14: /usr/include/gtk-2.0/gtk/gtktooltips.h:73:3: warning: ‘GTimeVal’ is deprecated: Use 'GDateTime' instead [-Wdeprecated-declarations] 73 | GTimeVal last_popdown; | ^~~~ In file included from /u
Processing of aewm_1.3.12-6_source.changes
aewm_1.3.12-6_source.changes uploaded successfully to localhost along with the files: aewm_1.3.12-6.dsc aewm_1.3.12-6.debian.tar.xz aewm_1.3.12-6_amd64.buildinfo Greetings, Your Debian queue daemon (running on host usper.debian.org)
aewm_1.3.12-6_source.changes ACCEPTED into unstable
Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Fri, 10 Jul 2020 19:58:05 +0100 Source: aewm Architecture: source Version: 1.3.12-6 Distribution: unstable Urgency: medium Maintainer: Debian QA Group Changed-By: Sudip Mukherjee Closes: 956983 Changes: aewm (1.3.12-6) unstable; urgency=medium . * QA upload. * Fix ftbfs with GCC-10. (Closes: #956983) * Update compat level to 13. Checksums-Sha1: 06b826c55b76e749ceb7c3d47dbb6a7d1f81e68e 1926 aewm_1.3.12-6.dsc a146c97c70e01b83ca588992301faa4e68c1f95a 7856 aewm_1.3.12-6.debian.tar.xz 22652fcd91d8a4c81b6a0318bb8acbf8f8c9e9a4 10749 aewm_1.3.12-6_amd64.buildinfo Checksums-Sha256: b1f8f779c56e3390e04bae6564f03a7ca8fcced12f8968144d9a682bd4c96435 1926 aewm_1.3.12-6.dsc 6dba06f299c3cc70e179aebafd95d4f578e6a64f433bb35f52fdb3974198e616 7856 aewm_1.3.12-6.debian.tar.xz ffe803479dbe26e39f5c44c8bc6c6ecaa564da3ada43d7519f2630051305e4d9 10749 aewm_1.3.12-6_amd64.buildinfo Files: 8db1b11abb903a0cf9865f57e769ead8 1926 x11 optional aewm_1.3.12-6.dsc 37179d0ea000a1066a367a96360901f5 7856 x11 optional aewm_1.3.12-6.debian.tar.xz c0d91397e1acfda2d074e498fc96549b 10749 x11 optional aewm_1.3.12-6_amd64.buildinfo -BEGIN PGP SIGNATURE- iQIzBAEBCgAdFiEEuDQJkCg9jZvBlJrHR5mjUUbRKzUFAl8IvUQACgkQR5mjUUbR KzXLOA//VZcBlbxYaJ0kRdb2j/hgHEeTWUjN1Nv2vCUzMo3brpm7t6kndTskHns3 qE/0YWCbfqth930ssWitLlZt7kHUgdJRqbYqQgaOQvp/uSpV5uBE9LqxK1y3GaKq 5JUknPaly6vYeutw/ULRHXG1UO4ZqSY3WelvSNeidzhtPn/BWVp1FuJJOlL3Gfmq NxBLXSlInAFcO17glBuLRkvPxc+yu3xs5VH/TZjM/zbvRfJhIhFxKI+vvh4BfI8+ AmXvezXitgM2cw/pxCBVTfo5ra26joK6NgMdtrslcBRi5sRz2+T5xvle0gWuxE0u iMHHMSFp8vYa7GQxk3yh/ydmeg5GvgmuWZsY9wEEZm/zg98jna5cbfFIQHkYrB2A ydP2+QiTAxdy6MPwL0I2uhfg7f2IzQzyJ+ttiWPFvzXWG6v1cvrUanWtC7y8k9dh OOmVYaJpOSRv1SjskWi31XNJYK7mYJKXthomNdOEji5QD4pBkvUvbMd1jCYYUbio sWbpfPBgF51xBnboHC+mxmYdJQHVGx99kV7WZFq49YFcDm/BzwN0gCfak9tAUHKr hOBOdH9l6g5bzFZtB4gN49ToIogOT9nfs0kg1C4HU4fJ6Ucvm+X2XRP8aYVTbhzA ZJx6dZ8wNotPcZLZ4YEqZ4e1jCP43z3vj1ueba0Mib/4kxKqdr8= =Iv+o -END PGP SIGNATURE- Thank you for your contribution to Debian.
ruli_0.36-1_source.changes ACCEPTED into unstable
Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Fri, 10 Jul 2020 15:01:10 -0400 Source: ruli Architecture: source Version: 0.36-1 Distribution: unstable Urgency: medium Maintainer: Debian QA Group Changed-By: Boyuan Yang Changes: ruli (0.36-1) unstable; urgency=medium . * QA upload. * New upstream release. * debian/rules: Use dh sequencer. * debian/watch: Update and use version 4. * debian/: Apply "wrap-and-sort -abst". * debian/source/format: Use "3.0 (quilt)". Checksums-Sha1: 95217b8dec554a76ab021642a130ca2504bd5143 1920 ruli_0.36-1.dsc c16714a4bd9dbb89985850267ed04ffce9f16d85 128290 ruli_0.36.orig.tar.gz c973f335b67de0da200fbedf5ce550d729c15760 3968 ruli_0.36-1.debian.tar.xz b549b9779fe512d760547c63d957df1a94e2eeab 6460 ruli_0.36-1_amd64.buildinfo Checksums-Sha256: a8a56fbf5ef8e92e0e59d1610d8cf211b05fbda40f2c7caaf26ab57d811226b5 1920 ruli_0.36-1.dsc 11d32def5b514748fbd9ea8c88049ae99e1bb358efc74eb91a4d268a3999dbfa 128290 ruli_0.36.orig.tar.gz 15521acc08b11560f19f5b80425346f60e689dc5561f9a6e746d851b10c22b5c 3968 ruli_0.36-1.debian.tar.xz c4d93c94d652bd4d561596df5fcb0215b816f2dac6e3f96b62c43fb8fa4c7938 6460 ruli_0.36-1_amd64.buildinfo Files: 3a7373226c786169fdffd997cd03d9f9 1920 libs optional ruli_0.36-1.dsc e73fbfdeadddb68a703a70cea5271468 128290 libs optional ruli_0.36.orig.tar.gz 0dc65fb0e22ee1432b3c52215c74e147 3968 libs optional ruli_0.36-1.debian.tar.xz 71c69cbd343c54809a3b0cfd0c73448b 6460 libs optional ruli_0.36-1_amd64.buildinfo -BEGIN PGP SIGNATURE- iQIzBAEBCgAdFiEEfncpR22H1vEdkazLwpPntGGCWs4FAl8Iu2UACgkQwpPntGGC Ws6XKRAAsb41tssd4O/+ro42+BNDM+dI4wsQ5OVJTrrXw8MNgeGzsFreMFKXxEu8 r0SIlzyV0ZG6nrabxHYt3fqv8zRH+fPCRbQ2I/uVbbh47mil1qsvQsbuSw/bA0Tb Ji0CozO9yN/Ee2TQ4S1vMsczvd0mITH0TEKXQH+3P0nDoePdf3qZzUAZc0lVzd/9 JPqZ+A5Ju4BG63gQoFIE4UTTPwp8x4j7Qe8zTC+2469pO8XSDdTOifr4akHxakLw oTn19/6gehkIwXzLkhO457S4gMtPylw7E/2SI5Ue2jPC0nvSvAQ6Yz9oIVz2zTvi yJtOSCH6xwn+oQzwIjuCqvhUVFJZK7OIXF1ioZKEpZJzbdlyJmD3QJIWV9QMgbul MynEo11kPuSBDK5nT44zjjXG53EdOye0wwOQapKrAB381XXsHOfmLK3O68GmxmCm s9IMNdS/YwxxP9r7c5cVJo04bBZYSJtI7Z7NLENuPmuahXILy1NcE2A+nZcw/QsY 2Fwe9q1+GkV3ic9KI9kk3nBuGOMGCXDlE/yML+OZADjSLbAHPFYsLf00j92xQCei hVzVlTecg8NzkXQ3b4EBAsGu5TK79nyo/TUyPGq+fJw52DbHLEA3S5bzacD8cf1+ nSm/KxPgIdfbZlls4esm8vxoY6fH8CFd5i7eaZhg88i5SScksaE= =xYy7 -END PGP SIGNATURE- Thank you for your contribution to Debian.
Bug#957106: marked as done (cpu: ftbfs with GCC-10)
Your message dated Fri, 10 Jul 2020 20:49:30 + with message-id and subject line Bug#957106: fixed in cpu 1.4.3-13 has caused the Debian Bug report #957106, regarding cpu: ftbfs with GCC-10 to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 957106: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=957106 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems --- Begin Message --- Package: src:cpu Version: 1.4.3-12 Severity: normal Tags: sid bullseye User: debian-...@lists.debian.org Usertags: ftbfs-gcc-10 Please keep this issue open in the bug tracker for the package it was filed for. If a fix in another package is required, please file a bug for the other package (or clone), and add a block in this package. Please keep the issue open until the package can be built in a follow-up test rebuild. The package fails to build in a test rebuild on at least amd64 with gcc-10/g++-10, but succeeds to build with gcc-9/g++-9. The severity of this report will be raised before the bullseye release, so nothing has to be done for the buster release. The full build log can be found at: http://people.debian.org/~doko/logs/gcc10-20200225/cpu_1.4.3-12_unstable_gcc10.log The last lines of the build log are at the end of this report. To build with GCC 10, either set CC=gcc-10 CXX=g++-10 explicitly, or install the gcc, g++, gfortran, ... packages from experimental. apt-get -t=experimental install g++ Common build failures are new warnings resulting in build failures with -Werror turned on, or new/dropped symbols in Debian symbols files. For other C/C++ related build failures see the porting guide at http://gcc.gnu.org/gcc-10/porting_to.html [...] libtool: link: gcc -shared -fPIC -DPIC .libs/bitvector.o .libs/getopt.o .libs/getopt1.o .libs/xmem.o .libs/helper.o .libs/cgetpwent.o .libs/parseconfig.o .libs/dll.o .libs/base64.o .libs/md5.o .libs/sha1.o .libs/hash.o .libs/fileaction.o .libs/parser.o -lldap -llber -lcrack -lcrypt -ldl -g -O2 -fstack-protector-strong -Wl,-z -Wl,relro -Wl,-z -Wl,now -Wl,-soname -Wl,libcputil.so.0 -o .libs/libcputil.so.0.0.0 libtool: link: (cd ".libs" && rm -f "libcputil.so.0" && ln -s "libcputil.so.0.0.0" "libcputil.so.0") libtool: link: (cd ".libs" && rm -f "libcputil.so" && ln -s "libcputil.so.0.0.0" "libcputil.so") libtool: link: ar cr .libs/libcputil.a bitvector.o getopt.o getopt1.o xmem.o helper.o cgetpwent.o parseconfig.o dll.o base64.o md5.o sha1.o hash.o fileaction.o parser.o libtool: link: ranlib .libs/libcputil.a libtool: link: ( cd ".libs" && rm -f "libcputil.la" && ln -s "../libcputil.la" "libcputil.la" ) make[4]: Leaving directory '/<>/src/util' make[3]: Leaving directory '/<>/src/util' Making all in main make[3]: Entering directory '/<>/src/main' Making all in . make[4]: Entering directory '/<>/src/main' gcc -DHAVE_CONFIG_H -I. -I../../src/include -Wdate-time -D_FORTIFY_SOURCE=2 -DCONFIGFILE=\"/etc/cpu/cpu.conf\" -g -O2 -fdebug-prefix-map=/<>=. -fstack-protector-strong -Wformat -Werror=format-security -DLDAP_DEPRECATED -w -c -o cpu.o cpu.c /bin/bash ../../libtool --tag=CC --mode=link gcc -DCONFIGFILE=\"/etc/cpu/cpu.conf\" -g -O2 -fdebug-prefix-map=/<>=. -fstack-protector-strong -Wformat -Werror=format-security -DLDAP_DEPRECATED -w -Wl,-z,relro -Wl,-z,now -o cpu cpu.o ../../src/util/libcputil.la -lldap -llber -lcrack -lcrypt -ldl libtool: link: gcc -DCONFIGFILE=\"/etc/cpu/cpu.conf\" -g -O2 -fdebug-prefix-map=/<>=. -fstack-protector-strong -Wformat -Werror=format-security -DLDAP_DEPRECATED -w -Wl,-z -Wl,relro -Wl,-z -Wl,now -o .libs/cpu cpu.o ../../src/util/.libs/libcputil.so -lldap -llber -lcrack -lcrypt -ldl make[4]: Leaving directory '/<>/src/main' make[3]: Leaving directory '/<>/src/main' Making all in plugins make[3]: Entering directory '/<>/src/plugins' Making all in . make[4]: Entering directory '/<>/src/plugins' make[4]: Nothing to be done for 'all-am'. make[4]: Leaving directory '/<>/src/plugins' Making all in ldap make[4]: Entering directory '/<>/src/plugins/ldap' Making all in . make[5]: Entering directory '/<>/src/plugins/ldap' /bin/bash ../../../libtool --tag=CC --mode=compile gcc -DHAVE_CONFIG_H -I. -I../../../src/include -Wdate-time -D_FORTIFY_SOURCE=2 -g -O2 -fdebug-prefix-map=/<>=. -fstack-protector-strong -Wformat -Werror=format-security -DLDAP_DEPRECATED -w -c -o ldap_errors.lo ldap_errors.c /bin/bash ../../../libtool --tag=CC --mode=compile gcc -DHAVE_CONFIG_H -I. -I../../../src/include -Wdate-time -D_FORTIFY_SOURCE=2 -g -O2 -fdebug-prefix-map=/<>=. -fstack-protector-strong -Wformat -Werror=format-security -DLDAP_
Processing of cpu_1.4.3-13_source.changes
cpu_1.4.3-13_source.changes uploaded successfully to localhost along with the files: cpu_1.4.3-13.dsc cpu_1.4.3-13.debian.tar.xz cpu_1.4.3-13_amd64.buildinfo Greetings, Your Debian queue daemon (running on host usper.debian.org)
cpu_1.4.3-13_source.changes ACCEPTED into unstable
Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Fri, 10 Jul 2020 21:12:27 +0100 Source: cpu Architecture: source Version: 1.4.3-13 Distribution: unstable Urgency: medium Maintainer: Debian QA Group Changed-By: Sudip Mukherjee Closes: 957106 Changes: cpu (1.4.3-13) unstable; urgency=medium . * QA upload. . [ Ondřej Nový ] * d/changelog: Remove trailing whitespaces * d/control: Remove trailing whitespaces * d/watch: Use https protocol . [ Debian Janitor ] * Trim trailing whitespace. * Bump debhelper from old 9 to 12. * Set upstream metadata fields: Archive, Bug-Submit. * Drop unnecessary dependency on dh-autoconf. * Drop unnecessary dh arguments: --parallel . [ Sudip Mukherjee ] * Fix ftbfs with GCC-10. (Closes: #957106) * Update Standards-Version to 4.5.0 * Update compat level to 13. Checksums-Sha1: 81510431af7d4386f711fcc0d05acb16c8193149 1803 cpu_1.4.3-13.dsc 2c2aa32493abc9339aa11f117103ad7387bc006e 29520 cpu_1.4.3-13.debian.tar.xz 598f04a7434e3e04350ee2be35968a0b41fa40e4 5991 cpu_1.4.3-13_amd64.buildinfo Checksums-Sha256: e8b8dcc5c38c53cf5b21a8072635683b67f9e1b652536563fccead0328e577c5 1803 cpu_1.4.3-13.dsc 3ee197ae84d6bf84417043689293a9ae31b2dc5d104451789a1bfd31e3843070 29520 cpu_1.4.3-13.debian.tar.xz 8962487fdeb936aafe6499bccc58a4de80c0ef451132d548ee3da133f831f1f6 5991 cpu_1.4.3-13_amd64.buildinfo Files: b778babde173401244266db629d12c95 1803 admin optional cpu_1.4.3-13.dsc 8ce5784612a486d77b9109618411812b 29520 admin optional cpu_1.4.3-13.debian.tar.xz 64dc4ff227e72e5979dc6f8a754af6d8 5991 admin optional cpu_1.4.3-13_amd64.buildinfo -BEGIN PGP SIGNATURE- iQIzBAEBCgAdFiEEuDQJkCg9jZvBlJrHR5mjUUbRKzUFAl8Iz20ACgkQR5mjUUbR KzU6Kw/+IGmtyZ6jr+qZBDPajK86KhcsxUrmsoriSIcG5AMyPerSCB5I1w3wxl9p 5mEcnzumq6NRiFVYGKJd17CAQPyKpIqRYEBHKdnQNdjqIZIsDOFMzJRxMOMye88g CJPluK3ss3wmAA2pP1pqo6DfLoy5vs2LCuPR5vvJocBCWUNEnN+84kq7uhub44WI 3Egts6r4FaTSrekCjOlDrk3qbC2zOdcl4ATxTxdYS71AIVqjhzMww46vjNTW3fxU 6HJXHVqpAIVoxlhxzJK/KTN5mz+WamaB+ZjSbUfTiak2aLoIPgkdwj6R9S7rmCSq UXHZcHrU7e2ZePoCWRrL5YlsPmUl8QxmeenBrSBZ/8Kvo8y2Pv9yGpL2GC40HiaC 4RAAZ0oS/k/TuElvVt39Ao/B9LGD4CDss8I2y9TjF9TTpySe0tAxYKGdAWPNAj6D gs8xHgizwlW2sHBFIGc2Hh7EsxpWNOlsB1QIQvI3P4QLJaErCw631HP1jcnxQM1k KBO1Nluz1Vt/5HzaXwIir3IW2iEFQtRcE513IgOEQhw+T2NcJTUa3BasNa8t2swT nIbVoLMqDI4RVvtNXoP2HIT8hzojQEZJknGzOxOEuCfn/W8DUCZDfiGDS/obygrz oc8NwYW3sbJxAoqWWyiKIm7w3uM6EnysBo5ZcgOzapl25af2s7w= =qiH5 -END PGP SIGNATURE- Thank you for your contribution to Debian.
Processing of sgml-spell-checker_0.0.20040919-5_source.changes
sgml-spell-checker_0.0.20040919-5_source.changes uploaded successfully to localhost along with the files: sgml-spell-checker_0.0.20040919-5.dsc sgml-spell-checker_0.0.20040919-5.debian.tar.xz sgml-spell-checker_0.0.20040919-5_source.buildinfo Greetings, Your Debian queue daemon (running on host usper.debian.org)
sgml-spell-checker_0.0.20040919-5_source.changes REJECTED
sgml-spell-checker_0.0.20040919-5.dsc: Invalid size hash for sgml-spell-checker_0.0.20040919.orig.tar.gz: According to the control file the size hash should be 27431, but sgml-spell-checker_0.0.20040919.orig.tar.gz has 27339. If you did not include sgml-spell-checker_0.0.20040919.orig.tar.gz in your upload, a different version might already be known to the archive software. === Please feel free to respond to this email if you don't understand why your files were rejected, or if you upload new files which address our concerns.
Processing of sgml-spell-checker_0.0.20040919-5_source.changes
sgml-spell-checker_0.0.20040919-5_source.changes uploaded successfully to localhost along with the files: sgml-spell-checker_0.0.20040919-5.dsc sgml-spell-checker_0.0.20040919-5.debian.tar.xz sgml-spell-checker_0.0.20040919-5_source.buildinfo Greetings, Your Debian queue daemon (running on host usper.debian.org)
sgml-spell-checker_0.0.20040919-5_source.changes ACCEPTED into unstable
Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Fri, 12 Jun 2020 17:55:46 -0300 Source: sgml-spell-checker Architecture: source Version: 0.0.20040919-5 Distribution: unstable Urgency: medium Maintainer: Debian QA Group Changed-By: Jair Reis Changes: sgml-spell-checker (0.0.20040919-5) unstable; urgency=medium . * QA upload. * debian/control: added the Vcs-* fields and URLs of the salsa.debian.org. * debian/salsa-ci.yml: added to provide CI tests for Salsa. Checksums-Sha1: ccf9bb19b1a6c05bbe606633519bdffa2c54808d 2058 sgml-spell-checker_0.0.20040919-5.dsc fd6fcc1e5381709ca605a915bc7824181b083ff7 2960 sgml-spell-checker_0.0.20040919-5.debian.tar.xz 423a9a70526ddeca8516d4a2acbf209334855633 5145 sgml-spell-checker_0.0.20040919-5_source.buildinfo Checksums-Sha256: 37d1dc499dc383a4bf675de4cbde4a80c03531df697a648a9478b1e53c11db74 2058 sgml-spell-checker_0.0.20040919-5.dsc 864d93550492e875f1aabdd1a12de4a616122736e79b7cbcd23fd69b93c7079e 2960 sgml-spell-checker_0.0.20040919-5.debian.tar.xz d0a626685911d3beaffede4505041a8156380f58b08af62abd428610bfd0d7b8 5145 sgml-spell-checker_0.0.20040919-5_source.buildinfo Files: 69b766d8d9256f155b6e5c6d311d912b 2058 text optional sgml-spell-checker_0.0.20040919-5.dsc 19a847eee99dd9a873fa9fbff8740788 2960 text optional sgml-spell-checker_0.0.20040919-5.debian.tar.xz 9908a3772d2b3868a8044494137bbe76 5145 text optional sgml-spell-checker_0.0.20040919-5_source.buildinfo -BEGIN PGP SIGNATURE- iQIzBAEBCgAdFiEEHTjuPGJPlVzh+jyFWjA1kfjNsIsFAl8JKMwACgkQWjA1kfjN sIt8Og/+NqCD86kbO4XAjtlLpG8S+HlGkqcw+tszyxMhgJT9CmjSd4h8yjqgQPHD JyENHyInADoC9dg5EM3I6UFXU0G8MLU3jKxZ72QzPIFBXFiyiYD0o8abfBethNQV T3nxI/bHQ5CazKgizdRbNjFhJt27m+Le1TffEUg3ckGxM2F04zgtJeTuWJvHVK5I cwc+eyg/oim4/v1Y2zPukgeW2/P5zrSnwugZ/0GnBfXqIKhNzhwRP+REbODzoXDD ykuFVtdRlT2bS4ligtPX0jWWaBI1+M74n0dtuWXNd3sw44t8Zx0pPb6lFbV2QYgP +xRB3hRbtrmN3Xa2H4CqYLYbqTnglg7vqZbZucvQfu4uZyJGclOWxsLjtHm4WNdy 5fBZ1aSdHVtfwCyiWRjJcofEnMVxTsLzmX5Xv879sw1nzpx4ucmSIzC2dIVeFVA2 qNyWvAN8h2cRgh+r7R00mR8sCWug8FG3jOGgUyv44atNIkuYVegg0M6d96gwHPst IvcJjJDId8h/bRvNASVLkuQQAuhzWaldFEvqVoTVl1PUHzWr2/ZtX+gGEKXbubVU DTc3xfjTIL1PGzCGZfH0EnH/J/VCyJHwyql5r50sSY9wlrmR3lUt0NdKVQqORB7n SUtnI7qVLO+9oNGqX/Oz8qSxuN5SE4ZCU1IuqWOz202U2yxHbeQ= =lZtk -END PGP SIGNATURE- Thank you for your contribution to Debian.