Processing of eancheck_1.0-3_source.changes
eancheck_1.0-3_source.changes uploaded successfully to localhost along with the files: eancheck_1.0-3.dsc eancheck_1.0-3.debian.tar.xz eancheck_1.0-3_amd64.buildinfo Greetings, Your Debian queue daemon (running on host usper.debian.org)
Processing of dvbackup_0.0.4-10_source.changes
dvbackup_0.0.4-10_source.changes uploaded successfully to localhost along with the files: dvbackup_0.0.4-10.dsc dvbackup_0.0.4-10.debian.tar.xz dvbackup_0.0.4-10_amd64.buildinfo Greetings, Your Debian queue daemon (running on host usper.debian.org)
eancheck_1.0-3_source.changes REJECTED
eancheck_1.0-3.dsc: Invalid size hash for eancheck_1.0.orig.tar.gz: According to the control file the size hash should be 2696, but eancheck_1.0.orig.tar.gz has 2777. If you did not include eancheck_1.0.orig.tar.gz in your upload, a different version might already be known to the archive software. === Please feel free to respond to this email if you don't understand why your files were rejected, or if you upload new files which address our concerns.
dvbackup_0.0.4-10_source.changes REJECTED
dvbackup_0.0.4-10.dsc: Invalid size hash for dvbackup_0.0.4.orig.tar.gz: According to the control file the size hash should be 113356, but dvbackup_0.0.4.orig.tar.gz has 115303. If you did not include dvbackup_0.0.4.orig.tar.gz in your upload, a different version might already be known to the archive software. === Please feel free to respond to this email if you don't understand why your files were rejected, or if you upload new files which address our concerns.
Processing of open-invaders_0.3-8_source.changes
open-invaders_0.3-8_source.changes uploaded successfully to localhost along with the files: open-invaders_0.3-8.dsc open-invaders_0.3-8.debian.tar.xz open-invaders_0.3-8_source.buildinfo Greetings, Your Debian queue daemon (running on host usper.debian.org)
Bug#1011963: marked as done (open-invaders FTBFS on riscv64)
Your message dated Sat, 28 May 2022 11:20:49 + with message-id and subject line Bug#1011963: fixed in open-invaders 0.3-8 has caused the Debian Bug report #1011963, regarding open-invaders FTBFS on riscv64 to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 1011963: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1011963 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems --- Begin Message --- Package: open-invaders Version: 0.3-7 Severity: serious Tags: ftbfs patch Justification: fails to build from source X-Debbugs-Cc: ab.bea...@gmail.com Dear Maintainer, open-invaders has a ftbfs issue on riscv64. Full buildd log here: https://buildd.debian.org/status/fetch.php?pkg=open-invaders&arch=riscv64&ver=0.3-7&stamp=1651106683&raw=0 At compile time it tries to detect the architecture to determine datatype sizes, and it is missing the check for riscv64, so it defaults to an incorrect value. I am including a patch which fixes the problem. Please consider applying it in the next upload. Thank you. -- System Information: Debian Release: bookworm/sid APT prefers unstable APT policy: (500, 'unstable') Architecture: riscv64 Kernel: Linux 5.18.0-starfive-5.18 (SMP w/2 CPU threads) Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), LANGUAGE not set Shell: /bin/sh linked to /usr/bin/dash Init: systemd (via /run/systemd/system) Versions of packages open-invaders depends on: ii libaldmb1 1:0.9.3-6 ii liballegro4.4 2:4.4.3.1-2 ii libc6 2.33-7 ii libdumb11:0.9.3-6 ii libgcc-s1 12.1.0-2 ii libstdc++6 12.1.0-2 ii open-invaders-data 0.3-7 open-invaders recommends no packages. open-invaders suggests no packages. -- no debconf information From: Alan Beadle Date: Fri 27 May 2022 09:36:54 PM EDT Subject: Fix ftbfs on riscv Fix failing compile-time detection of dataype size --- open-invaders-0.3.orig/headers/pmask.h +++ open-invaders-0.3/headers/pmask.h @@ -37,7 +37,7 @@ confusing. //don't worry about setting it incorrectly //you'll get a compile error if you do, not a run-time error #if defined(__alpha__) || defined(__ia64__) || (defined(__x86_64__) && defined(__LP64__)) || defined(__s390x__) || (defined(__sparc__) && defined(__arch64__)) \ - || defined(__powerpc64__) || defined(__aarch64__) || (defined(__mips64) && defined(__LP64__)) + || defined(__powerpc64__) || defined(__aarch64__) || (defined(__mips64) && defined(__LP64__)) || (defined(__riscv) && defined(__LP64__)) #define MASK_WORD_BITBITS 6 #else #define MASK_WORD_BITBITS 5 --- End Message --- --- Begin Message --- Source: open-invaders Source-Version: 0.3-8 Done: Adam Borowski We believe that the bug you reported is fixed in the latest version of open-invaders, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 1011...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Adam Borowski (supplier of updated open-invaders package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@ftp-master.debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Sat, 28 May 2022 11:55:46 +0200 Source: open-invaders Architecture: source Version: 0.3-8 Distribution: unstable Urgency: medium Maintainer: Debian QA Group Changed-By: Adam Borowski Closes: 989063 1011963 Changes: open-invaders (0.3-8) unstable; urgency=medium . * QA upload. * Drop 404-compliant git URLs to Salsa. * Fix FTBFS on new platforms in a future-proof way, closes: #1011963 * Mark -data as MA:foreign. * Fix an occassional crash during gameplay, closes: #989063 [John G] Checksums-Sha1: f3db3226a1047ed9366264dfaff587706cd52b56 1938 open-invaders_0.3-8.dsc 2b33e750caf896f6a5dff1888365760ea0d2f7d4 7360 open-invaders_0.3-8.debian.tar.xz 009932d8916e668cf470cb5672af8374fac7b450 6702 open-invaders_0.3-8_source.buildinfo Checksums-Sha256: 54354c6bd2cc0daab1cb1ad2d003fe4dd00cd4f6e6fc3403c323349895283ac3 1938 open-invaders_0.3-8.dsc 0b8d68b2edb14e5f9a9a11abf414ce0ec382ffac666c5736c0db1285cf5fe519 7360 open-invaders_0.3-8.debian.tar.xz dd29660e5ca5e5ab9009dafe9a7052f4150e190e1ae1a7eedb2deee9e6ec88bd 6702 open-invaders_0.3-8_source.buildinfo Files: 7ed78f6d10d4004354
Bug#989063: marked as done (open-invaders: Sometimes segfaults during gameplay due to array overrun)
Your message dated Sat, 28 May 2022 11:20:49 + with message-id and subject line Bug#989063: fixed in open-invaders 0.3-8 has caused the Debian Bug report #989063, regarding open-invaders: Sometimes segfaults during gameplay due to array overrun to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 989063: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989063 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems --- Begin Message --- Package: open-invaders Version: 0.3-4.3+b1 Severity: normal Tags: patch Dear Debian QA Team, The program occasionally segfaults during gameplay. A core dump shows that the problem is caused by the collision detection routine writing out of bounds on an array. Specifically, collision_detection() in collision.cc cycles through an array explosionbits[] of 500 particles, but does not check for wraparound every time it increments the current_particle counter. The attached patch fixes the bug by moving the wraparound check to immediately after the increment. Thanks for considering, John G. -- System Information: Debian Release: 10.9 APT prefers stable-updates APT policy: (500, 'stable-updates'), (500, 'stable-debug'), (500, 'stable') Architecture: amd64 (x86_64) Kernel: Linux 4.19.0-16-amd64 (SMP w/2 CPU cores) Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8), LANGUAGE=en_GB.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /usr/bin/dash Init: systemd (via /run/systemd/system) LSM: AppArmor: enabled Versions of packages open-invaders depends on: ii libaldmb1 1:0.9.3-6+b3 ii liballegro4.4 2:4.4.2-13 ii libc6 2.28-10 ii libdumb11:0.9.3-6+b3 ii libgcc1 1:8.3.0-6 ii libstdc++6 8.3.0-6 ii open-invaders-data 0.3-4.3 open-invaders recommends no packages. open-invaders suggests no packages. -- no debconf information fix-particle-array-bug.patch Description: Binary data --- End Message --- --- Begin Message --- Source: open-invaders Source-Version: 0.3-8 Done: Adam Borowski We believe that the bug you reported is fixed in the latest version of open-invaders, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 989...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Adam Borowski (supplier of updated open-invaders package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@ftp-master.debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Sat, 28 May 2022 11:55:46 +0200 Source: open-invaders Architecture: source Version: 0.3-8 Distribution: unstable Urgency: medium Maintainer: Debian QA Group Changed-By: Adam Borowski Closes: 989063 1011963 Changes: open-invaders (0.3-8) unstable; urgency=medium . * QA upload. * Drop 404-compliant git URLs to Salsa. * Fix FTBFS on new platforms in a future-proof way, closes: #1011963 * Mark -data as MA:foreign. * Fix an occassional crash during gameplay, closes: #989063 [John G] Checksums-Sha1: f3db3226a1047ed9366264dfaff587706cd52b56 1938 open-invaders_0.3-8.dsc 2b33e750caf896f6a5dff1888365760ea0d2f7d4 7360 open-invaders_0.3-8.debian.tar.xz 009932d8916e668cf470cb5672af8374fac7b450 6702 open-invaders_0.3-8_source.buildinfo Checksums-Sha256: 54354c6bd2cc0daab1cb1ad2d003fe4dd00cd4f6e6fc3403c323349895283ac3 1938 open-invaders_0.3-8.dsc 0b8d68b2edb14e5f9a9a11abf414ce0ec382ffac666c5736c0db1285cf5fe519 7360 open-invaders_0.3-8.debian.tar.xz dd29660e5ca5e5ab9009dafe9a7052f4150e190e1ae1a7eedb2deee9e6ec88bd 6702 open-invaders_0.3-8_source.buildinfo Files: 7ed78f6d10d4004354164a6ba81b5ac8 1938 games optional open-invaders_0.3-8.dsc 721e802c86637979405aca7b908bfe0c 7360 games optional open-invaders_0.3-8.debian.tar.xz 26191b3e8a78a91de7459b17f952aa39 6702 games optional open-invaders_0.3-8_source.buildinfo -BEGIN PGP SIGNATURE- iQIzBAEBCgAdFiEEkjZVexcMh/iCHArDweDZLphvfH4FAmKR/9EACgkQweDZLphv fH74ShAAoP/7czD2tHZW5iLAEiR3uYl9hzUmZvVl/Uy3dKnbtiFf2XHoaLzEb15P ujcuJhqL0J5QF5mPqcTdtc2ont34qdRvnmAkwbOBVnh6VRWA2ECV/KBGLLT7Mxtr Y+BBeeDPsEoc/X3fS2BeaSmhzKE+K5iP/xfcTXMif5kPjpC9gefFoWMiCh35CODw oEptmd30JThIQpX4kSw27Mv9atX5qI13ECJz8AvxNRjpAoY90erwBOYF8bLOQiH/ qOcZ0Zrw3AbueTckkzyA13aGOTQteGjjeyqE60SPKQUjvEszQnBVYnQXvkTkzy2J 3AD
open-invaders_0.3-8_source.changes ACCEPTED into unstable
Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Sat, 28 May 2022 11:55:46 +0200 Source: open-invaders Architecture: source Version: 0.3-8 Distribution: unstable Urgency: medium Maintainer: Debian QA Group Changed-By: Adam Borowski Closes: 989063 1011963 Changes: open-invaders (0.3-8) unstable; urgency=medium . * QA upload. * Drop 404-compliant git URLs to Salsa. * Fix FTBFS on new platforms in a future-proof way, closes: #1011963 * Mark -data as MA:foreign. * Fix an occassional crash during gameplay, closes: #989063 [John G] Checksums-Sha1: f3db3226a1047ed9366264dfaff587706cd52b56 1938 open-invaders_0.3-8.dsc 2b33e750caf896f6a5dff1888365760ea0d2f7d4 7360 open-invaders_0.3-8.debian.tar.xz 009932d8916e668cf470cb5672af8374fac7b450 6702 open-invaders_0.3-8_source.buildinfo Checksums-Sha256: 54354c6bd2cc0daab1cb1ad2d003fe4dd00cd4f6e6fc3403c323349895283ac3 1938 open-invaders_0.3-8.dsc 0b8d68b2edb14e5f9a9a11abf414ce0ec382ffac666c5736c0db1285cf5fe519 7360 open-invaders_0.3-8.debian.tar.xz dd29660e5ca5e5ab9009dafe9a7052f4150e190e1ae1a7eedb2deee9e6ec88bd 6702 open-invaders_0.3-8_source.buildinfo Files: 7ed78f6d10d4004354164a6ba81b5ac8 1938 games optional open-invaders_0.3-8.dsc 721e802c86637979405aca7b908bfe0c 7360 games optional open-invaders_0.3-8.debian.tar.xz 26191b3e8a78a91de7459b17f952aa39 6702 games optional open-invaders_0.3-8_source.buildinfo -BEGIN PGP SIGNATURE- iQIzBAEBCgAdFiEEkjZVexcMh/iCHArDweDZLphvfH4FAmKR/9EACgkQweDZLphv fH74ShAAoP/7czD2tHZW5iLAEiR3uYl9hzUmZvVl/Uy3dKnbtiFf2XHoaLzEb15P ujcuJhqL0J5QF5mPqcTdtc2ont34qdRvnmAkwbOBVnh6VRWA2ECV/KBGLLT7Mxtr Y+BBeeDPsEoc/X3fS2BeaSmhzKE+K5iP/xfcTXMif5kPjpC9gefFoWMiCh35CODw oEptmd30JThIQpX4kSw27Mv9atX5qI13ECJz8AvxNRjpAoY90erwBOYF8bLOQiH/ qOcZ0Zrw3AbueTckkzyA13aGOTQteGjjeyqE60SPKQUjvEszQnBVYnQXvkTkzy2J 3ADQmLd+wElkCVgwgY8nPd/4frrK7SWBQMqLHIG/7k4TZpx7FYcbyPZqml182URX i5EvsMGk8N2DfRM4W56+pA3LH8l+3gB1iS2/2fbp8Rpsnlr2q9ZnMIXbvFbWd3gY JhBTmbKX5TEnd8g2/+4kG15bK6tUjc1ZgH4A2loxvpcw9+FUZK+LeCAjESY6Mo6v y4hpqucY9bmSai032x/urWT6TabjjKUV9lxptCVCWkZHsjPQvhM33rugrSHp+Ptd Lb/vl/+L/fchQcB6A4y/Nj53JNNZSGWRtJSFGnGo/5geBnYnmUtbt5Y6nhXrvW8t q6QzKpB7GkOI+5CKQnMK4y9lDK3nRNy7atjnW0AwsGczPw8cn+c= =oJKt -END PGP SIGNATURE- Thank you for your contribution to Debian.
Horse riding lesson
Hello, To Whom It May Concern: I want to enroll three members of my family for horse riding training in your establishment. Below is their schedule list for your consideration: 1] Number of persons- 3 Adults male (Age 23,21 and 19) 2] Duration of the enrollment- 4 Weeks,5 times weekly,making a total of 20 days at 3 hours daily. 3] Ridding Experience - Beginners 4] Priority - 5] Number Of Rooms: 1 Tripple room or 3 single rooms 6] Starting Date: 21st,September,2022 7] Ending Date: 21st,October,2022 Please if you can offer us the services, Kindly send the total cost for the whole duration inclusive of city tax if any for our deliberation. I await your response as soon as possible.. Regards, John McCarthy. 40 Beechwood Road, Sanderstead, South Croydon CR2 0AA London, United Kingdom. Tel: +44 7448 389727 (Whatsup Only)
Bug#1011728: marked as done (pidgin-librvp: FTBFS: rm: cannot remove '/<>/debian/pidgin-librvp/usr/lib/purple-2/librvp.la': No such file or directory)
Your message dated Sat, 28 May 2022 15:03:56 + with message-id and subject line Bug#1011728: fixed in pidgin-librvp 0.9.7cvs-3 has caused the Debian Bug report #1011728, regarding pidgin-librvp: FTBFS: rm: cannot remove '/<>/debian/pidgin-librvp/usr/lib/purple-2/librvp.la': No such file or directory to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 1011728: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1011728 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems --- Begin Message --- Source: pidgin-librvp Version: 0.9.7cvs-2 Severity: serious Justification: FTBFS Tags: bookworm sid ftbfs User: lu...@debian.org Usertags: ftbfs-20220525 ftbfs-bookworm Hi, During a rebuild of all packages in sid, your package failed to build on amd64. Relevant part (hopefully): > make[3]: Entering directory '/<>' > if echo "-pthread -I/usr/include/pidgin -I/usr/include/gtk-2.0 > -I/usr/lib/x86_64-linux-gnu/gtk-2.0/include -I/usr/include/pango-1.0 > -I/usr/include/atk-1.0 -I/usr/include/gdk-pixbuf-2.0 > -I/usr/include/x86_64-linux-gnu -I/usr/include/pango-1.0 > -I/usr/include/harfbuzz -I/usr/include/pango-1.0 -I/usr/include/libmount > -I/usr/include/blkid -I/usr/include/fribidi -I/usr/include/cairo > -I/usr/include/pixman-1 -I/usr/include/harfbuzz -I/usr/include/uuid > -I/usr/include/freetype2 -I/usr/include/libpng16 -I/usr/include/libpurple > -I/usr/include/glib-2.0 -I/usr/lib/x86_64-linux-gnu/glib-2.0/include" | > /bin/grep -q GAIM_IS_GAIM;\ > then\ > mkdir -p > "/<>/debian/pidgin-librvp/usr/share/pixmaps/pidgin/status/default";\ > /usr/bin/install -c -m 0644 rvp.png > "/<>/debian/pidgin-librvp/usr/share/pixmaps/pidgin/status/default/rvp.png";\ > mkdir -p > "/<>/debian/pidgin-librvp/usr/share/pixmaps/pidgin/smileys/rvp";\ > for p in smileys/*.png smileys/theme; do f=f=`echo $p | sed -e > 's|^.*/||'`;\ > /usr/bin/install -c -m 0644 $p > "/<>/debian/pidgin-librvp/usr/share/pixmaps/pidgin/smileys/rvp/$f";\ > done;\ > else\ > for p in 16 22 32 48;\ > do \ > mkdir -p > "/<>/debian/pidgin-librvp/usr/share/pixmaps/pidgin/protocols/$p";\ > /usr/bin/convert rvp.png -resize ${p}x${p} > "/<>/debian/pidgin-librvp/usr/share/pixmaps/pidgin/protocols/$p/rvp.png";\ > done; \ > /usr/bin/install -c -m 0644 rvp.png > "/<>/debian/pidgin-librvp/usr/share/pixmaps/pidgin/emotes/default/rvp.png";\ > mkdir -p > "/<>/debian/pidgin-librvp/usr/share/pixmaps/pidgin/emotes/rvp";\ > for p in smileys/*.png smileys/theme; do f=f=`echo $p | sed -e > 's|^.*/||'`;\ > /usr/bin/install -c -m 0644 $p > "/<>/debian/pidgin-librvp/usr/share/pixmaps/pidgin/emotes/rvp/$f";\ > done;\ > fi > /usr/bin/install: cannot create regular file > '/<>/debian/pidgin-librvp/usr/share/pixmaps/pidgin/emotes/default/rvp.png': > No such file or directory > make[3]: Leaving directory '/<>' > make[2]: Leaving directory '/<>' > make[1]: Leaving directory '/<>' >debian/rules execute_after_dh_auto_install > make[1]: Entering directory '/<>' > rm -v /<>/debian/pidgin-librvp/usr/lib/purple-2/librvp.la > rm: cannot remove > '/<>/debian/pidgin-librvp/usr/lib/purple-2/librvp.la': No such > file or directory > make[1]: *** [debian/rules:21: execute_after_dh_auto_install] Error 1 The full build log is available from: http://qa-logs.debian.net/2022/05/25/pidgin-librvp_0.9.7cvs-2_unstable.log All bugs filed during this archive rebuild are listed at: https://bugs.debian.org/cgi-bin/pkgreport.cgi?tag=ftbfs-20220525;users=lu...@debian.org or: https://udd.debian.org/bugs/?release=na&merged=ign&fnewerval=7&flastmodval=7&fusertag=only&fusertagtag=ftbfs-20220525&fusertaguser=lu...@debian.org&allbugs=1&cseverity=1&ctags=1&caffected=1#results A list of current common problems and possible solutions is available at http://wiki.debian.org/qa.debian.org/FTBFS . You're welcome to contribute! If you reassign this bug to another package, please marking it as 'affects'-ing this package. See https://www.debian.org/Bugs/server-control#affects If you fail to reproduce this, please provide a build log and diff it with mine so that we can identify if something relevant changed in the meantime. --- End Message --- --- Begin Message --- Source: pidgin-librvp Source-Version: 0.9.7cvs-3 Done: Boyuan Yang We believe that the bug you reported is fixed in the latest version of pidgin-librvp, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting t
Processing of pidgin-librvp_0.9.7cvs-3_source.changes
pidgin-librvp_0.9.7cvs-3_source.changes uploaded successfully to localhost along with the files: pidgin-librvp_0.9.7cvs-3.dsc pidgin-librvp_0.9.7cvs.orig.tar.gz pidgin-librvp_0.9.7cvs-3.debian.tar.xz pidgin-librvp_0.9.7cvs-3_amd64.buildinfo Greetings, Your Debian queue daemon (running on host usper.debian.org)
pidgin-librvp_0.9.7cvs-3_source.changes ACCEPTED into unstable
Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Sat, 28 May 2022 10:35:49 -0400 Source: pidgin-librvp Architecture: source Version: 0.9.7cvs-3 Distribution: unstable Urgency: medium Maintainer: Debian QA Group Changed-By: Boyuan Yang Closes: 1011728 Changes: pidgin-librvp (0.9.7cvs-3) unstable; urgency=medium . * QA upload. * debian/rules: Update to incorporate multiarch library path. (Closes: #1011728) * debian/control: Bump Standards-Version to 4.6.1. Checksums-Sha1: c3b8f75be9f4e2f8f5c6e0d7f7781585e4b1a2cd 1937 pidgin-librvp_0.9.7cvs-3.dsc b465e40345bfe2956eb296ef555ef5d95164e757 478193 pidgin-librvp_0.9.7cvs.orig.tar.gz 3a4016bdc7e3bf9c74edfb321e571d6fe5682f73 5508 pidgin-librvp_0.9.7cvs-3.debian.tar.xz 0fe3ffefb991544d344edb727d62cb1312522ac0 14138 pidgin-librvp_0.9.7cvs-3_amd64.buildinfo Checksums-Sha256: 9fbd5db44668d6061b24ad780f6be11f6c39decf3ff4bee513212007f60abb09 1937 pidgin-librvp_0.9.7cvs-3.dsc 6a55472a51c96b1ea63024e9aedf2a489d974a7a1d15b18d4a4733ede21794fc 478193 pidgin-librvp_0.9.7cvs.orig.tar.gz 9e810d314e6c8a0724f16511759f142b8f1b3f7cf9b0adfd2d7a03db1da475f9 5508 pidgin-librvp_0.9.7cvs-3.debian.tar.xz c7977fcf3bf86b61aa2f71531e8a7776fa3f33193e81027722a794d3b5b7d617 14138 pidgin-librvp_0.9.7cvs-3_amd64.buildinfo Files: c46a4357a66d19d925e6a9fc041c50e4 1937 net optional pidgin-librvp_0.9.7cvs-3.dsc d49ee28a69356f17c7355427c50e9ce2 478193 net optional pidgin-librvp_0.9.7cvs.orig.tar.gz b37382e52a6cac5bcb81c3b82f711370 5508 net optional pidgin-librvp_0.9.7cvs-3.debian.tar.xz efe37fb7fdd1e2475f07c42b2b43bb41 14138 net optional pidgin-librvp_0.9.7cvs-3_amd64.buildinfo -BEGIN PGP SIGNATURE- iQIzBAEBCgAdFiEEfncpR22H1vEdkazLwpPntGGCWs4FAmKSM/8ACgkQwpPntGGC Ws4ulBAAr3hVYMUviGUmDqvcOg2GjT9MaxvQha0JHuuP43CaunUsGJeP04mmVwHS SdARKU1EBzQI9wqtpAErZthahCRvaKQNFfHlYJ8s7KWXnXirDg2KpSfcOSHk0Kib Tvm+wGdFlDLuA/6M8duazuzmAE//P1oTDfHZ6b/g3KLSQWf76k9w1iTRmG23DyCH umDaIB5z3Fvv669P+NULioJpj4DqYDzXB/9dMR1JD712VP2mEGVk9BBIddoLuxSq 0hAQIkLWapAFyYD2homV9g+nX6FcXsUnWCqZ5b56Lu4flC5tNgeDawk8zbUgoZXL GAvnwZaOOWozYAqxVq2PsBh/tnxXfP5RmArMEVWQ1CuqoNtcXIdgpnlj6brs7hTA A5swKBjW6Aj2gdtTdhHS0h7vsIQkX2XXzVdsNfM+ZpBPt0lqIdghcg0GhOHTWquW KTKc7osUCvx0FmmCzcgTeHs6N/n4OaKvJHK7dCxPH6REVOFIrgkYmfhx/GhDHLH7 fpRl39m7O/vD/xKl1XzndN7wHIzDMUhrpNvpnHFihiTtayrbu1MGT5JezqFEjzTR Gp3e95YKYaXVwp9F9r1DWfkuB7cHGl1ab/WihnN+8S4Xv+CoxNRvmysCzIpXWdvK UrAHQSTi/adg1g2RKPlV5iQZ/bj/+tj/bd9bYrbF2kp+GV20uLk= =U7r5 -END PGP SIGNATURE- Thank you for your contribution to Debian.
Bug#993957: (no subject)
Control: tags 993957 moreinfo lkcl wrote... > schroot 1.6.10 (04 May 2014) fails with a continuous attempt to read > a non-existent subdirectory, /run/systemd/userdb, when operating a > type "directory" schroot. > > a type "plain" does not have this same issue. > > creating the missing subdirectory manually "allows" the schroot to "proceed" > without errors. As asked earlier, please provide more details about your setup, also the schroot.conf snippet. Since I couldn't reproduce your issue here, but based on the few information avaiable I might have done things slightly different. From reading the Ubuntu bug (also #763896) I assume this was fixed upstream, we'll include that commit in the next uploads. Christoph signature.asc Description: PGP signature
Processed: Re: Bug#993957: (no subject)
Processing control commands: > tags 993957 moreinfo Bug #993957 [schroot] schroot: fails with non-existent subdirectory Added tag(s) moreinfo. -- 993957: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=993957 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems
Bug#992430: schroot: user password does not match
Conrol: tags 992430 moreinfo Sergey Vlasov wrote... > When doing schroot into a buster chroot environment, sudo > commands fail due to password not matching the current user password. > There is no such problem for bullseye chroot environment. > > To reproduce: > > 0. make sure your current user belongs to sudo group > > 1. create buster chroot environment: > > $ sudo debootstrap buster /schroot-bug/buster > > 2. create schroot configuration file: > > $ cat << EOF | sudo tee /etc/schroot/chroot.d/buster > [buster] > type=directory > directory=/schroot-bug/buster > users=$USER > profile=desktop > personality=linux > preserve-environment=false > EOF Unless I misunderstood, also install sudo in the chroot. > 3. enter chroot: > > $ schroot -c buster > > 4. test sudo with your current password: > > $ sudo true (...) The following changes made the check pass: 1. On the *host*, change "yescrypt" to "sha512" in /etc/pam.d/common-password 2. Change the password of that user (feel free to re-use the old one, but we need the right hash). 3. Reboot (possibly not needed if you do the right things). Can you confirm? Then this is stuff for README.Debian but otherwise little schroot can do. Regards, Christoph signature.asc Description: PGP signature
Bug#857018: schroot: Setup script not running, --session-name not working
Control: tags 857018 moreinfo Mike Hommey wrote... > I installed a new machine some time ago, and setup schroot for the first > time on it... Hi, it's been a while, and I failed to reproduce your report. Can you please check whether the problems still exist on your side? Quite frankly, this feels like a broken installation (missing executable bits or some weird noexec mount) Regards, Christoph signature.asc Description: PGP signature
Processed: Re: Bug#857018: schroot: Setup script not running, --session-name not working
Processing control commands: > tags 857018 moreinfo Bug #857018 [schroot] schroot: Setup script not running, --session-name not working Added tag(s) moreinfo. -- 857018: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=857018 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems
Processing of libcaca_0.99.beta19-3_source.changes
libcaca_0.99.beta19-3_source.changes uploaded successfully to localhost along with the files: libcaca_0.99.beta19-3.dsc libcaca_0.99.beta19-3.debian.tar.xz libcaca_0.99.beta19-3_source.buildinfo Greetings, Your Debian queue daemon (running on host usper.debian.org)
libcaca_0.99.beta19-3_source.changes ACCEPTED into unstable
Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Sat, 28 May 2022 17:41:16 +0200 Source: libcaca Architecture: source Version: 0.99.beta19-3 Distribution: unstable Urgency: medium Maintainer: Debian QA Group Changed-By: Fabio Fantoni Closes: 987278 Changes: libcaca (0.99.beta19-3) unstable; urgency=medium . * QA upload. * Change Vcs-* fields for git repo on salsa. * Add upstream metadata * Add debian/watch * Add debian/gbp.conf * Merge from ubuntu: - SECURITY UPDATE: Heap buffer overflow debian/patches/CVE-2021-30498-and-30499.patch: fix buffer overflows in TGA and troff exports in caca/codec/export.c. (Closes: #987278) CVE-2021-30498 CVE-2021-30499 Checksums-Sha1: 2fdfabd62d0ad9293047757dcf982de3eb764178 2187 libcaca_0.99.beta19-3.dsc 76b1c5006c6f101717f971add4d51e6c16d0fb38 16424 libcaca_0.99.beta19-3.debian.tar.xz e3e7298f3ce900751e6776b22c7cad17ea1fc236 11644 libcaca_0.99.beta19-3_source.buildinfo Checksums-Sha256: 52c77188c78ce657f0ccf660e0b90fe12ad1ff9c8b32af079a5cd16afcbf10ef 2187 libcaca_0.99.beta19-3.dsc f2c1e6012afa8263d47d7d81d98fbbc5cd02e1663b4a1bafca38a976f526f2e7 16424 libcaca_0.99.beta19-3.debian.tar.xz f6bfd31200b3b4f704e45861c191321069cf1290bdd766e14db8ab04f83c0ff7 11644 libcaca_0.99.beta19-3_source.buildinfo Files: 90ae1c4e9183967078d30727add2a81c 2187 libs optional libcaca_0.99.beta19-3.dsc 8e88f9bdce06b092d1d7ff04d82e255c 16424 libs optional libcaca_0.99.beta19-3.debian.tar.xz 04ae43826fb9d0a676d4da016a650894 11644 libs optional libcaca_0.99.beta19-3_source.buildinfo -BEGIN PGP SIGNATURE- iQIzBAEBCgAdFiEEkjZVexcMh/iCHArDweDZLphvfH4FAmKSfu4ACgkQweDZLphv fH77VxAA59/OKvv0bPAe6H57nTT4WS7ZqESIzHBuRawpcKIFPEm5WthVpzL2j1l0 YaqyXKDsL0Nh+1eGW47yd6x6MvOBFzQ5bKgA0523/3s8LdfNgqbobLF1JFNf2esP kAa3TIUSs8c2+cZBMM1LuJr3oEgKhszpNlFAkGyakBcLHLEhEDwNI2FBKyDPFL+O K1HlS5nhr02IwoFEW5NSgNvgkgY9DsZbk8lqvSO5HRe2ym50+k5/rdsfb4zEtGs8 2gspshelmmdVtvVZrVmavgd9g+eZZv0wnrmWTKUPXCOS+akzPRig3evI5/uM4vZc MHjh920Bvw2acbhzNXfj7kZJ1DGb2yT/p5G5gMhatC5ASkrpk/bqdenqprzb2zFC UNPmKWqUFDDR+hgGHZnJD1XvS6LsplUgZLJjXb+jlfL1GdqP3lJ/L16YRPbOnGEi 19BqfAziBZ5h8YioypPU3y6xGAM7BLG6AOAfuYLl+Vq8h6Pv32GLsQ7IFc4A3LSO LgVKq76XihxJY8C603DZAo9IW7vH+b8AmJCho4mb8j7UbpPF9R6hCxtqcle//FKA ykRWfNUA/3K5pDX3Bnb/KX5kco12rha2j/QF6B+gpIzg7t6U9QaI3lDa/ri4zmKW /oLkTmxQsHORxd8ys6ZHJIOqLPwZICaW2gjdlp0kUX75tVPfSwg= =SgNs -END PGP SIGNATURE- Thank you for your contribution to Debian.
Bug#993957: (no subject)
i think i know what rhat might be. i flat-out refuse to let a mission critical piece of software developed by pottering run on systems that i manage, particularly after seeing the persistent generation of CVEs on mitre.org, and also in interactions with him where he just does not listen. (translation: i was not running systemd. sysvinit is still a supported option in debian, apt-get install sysvinit, and it is available via a grub boot menu option) l. On May 28, 2022 4:42:41 PM GMT+01:00, Christoph Biedl wrote: >Control: tags 993957 moreinfo > >lkcl wrote... > >> schroot 1.6.10 (04 May 2014) fails with a continuous attempt to read >> a non-existent subdirectory, /run/systemd/userdb, when operating a >> type "directory" schroot. >> >> a type "plain" does not have this same issue. >> >> creating the missing subdirectory manually "allows" the schroot to >"proceed" >> without errors. > >As asked earlier, please provide more details about your setup, also >the >schroot.conf snippet. Since I couldn't reproduce your issue here, but >based on the few information avaiable I might have done things slightly >different. > >From reading the Ubuntu bug (also #763896) I assume this was fixed >upstream, we'll include that commit in the next uploads. > >Christoph