Processing of eancheck_1.0-3_source.changes

2022-05-28 Thread Debian FTP Masters
eancheck_1.0-3_source.changes uploaded successfully to localhost
along with the files:
  eancheck_1.0-3.dsc
  eancheck_1.0-3.debian.tar.xz
  eancheck_1.0-3_amd64.buildinfo

Greetings,

Your Debian queue daemon (running on host usper.debian.org)



Processing of dvbackup_0.0.4-10_source.changes

2022-05-28 Thread Debian FTP Masters
dvbackup_0.0.4-10_source.changes uploaded successfully to localhost
along with the files:
  dvbackup_0.0.4-10.dsc
  dvbackup_0.0.4-10.debian.tar.xz
  dvbackup_0.0.4-10_amd64.buildinfo

Greetings,

Your Debian queue daemon (running on host usper.debian.org)



eancheck_1.0-3_source.changes REJECTED

2022-05-28 Thread Debian FTP Masters



eancheck_1.0-3.dsc: Invalid size hash for eancheck_1.0.orig.tar.gz:
According to the control file the size hash should be 2696,
but eancheck_1.0.orig.tar.gz has 2777.

If you did not include eancheck_1.0.orig.tar.gz in your upload, a different 
version
might already be known to the archive software.



===

Please feel free to respond to this email if you don't understand why
your files were rejected, or if you upload new files which address our
concerns.



dvbackup_0.0.4-10_source.changes REJECTED

2022-05-28 Thread Debian FTP Masters



dvbackup_0.0.4-10.dsc: Invalid size hash for dvbackup_0.0.4.orig.tar.gz:
According to the control file the size hash should be 113356,
but dvbackup_0.0.4.orig.tar.gz has 115303.

If you did not include dvbackup_0.0.4.orig.tar.gz in your upload, a different 
version
might already be known to the archive software.



===

Please feel free to respond to this email if you don't understand why
your files were rejected, or if you upload new files which address our
concerns.



Processing of open-invaders_0.3-8_source.changes

2022-05-28 Thread Debian FTP Masters
open-invaders_0.3-8_source.changes uploaded successfully to localhost
along with the files:
  open-invaders_0.3-8.dsc
  open-invaders_0.3-8.debian.tar.xz
  open-invaders_0.3-8_source.buildinfo

Greetings,

Your Debian queue daemon (running on host usper.debian.org)



Bug#1011963: marked as done (open-invaders FTBFS on riscv64)

2022-05-28 Thread Debian Bug Tracking System
Your message dated Sat, 28 May 2022 11:20:49 +
with message-id 
and subject line Bug#1011963: fixed in open-invaders 0.3-8
has caused the Debian Bug report #1011963,
regarding open-invaders FTBFS on riscv64
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1011963: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1011963
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: open-invaders
Version: 0.3-7
Severity: serious
Tags: ftbfs patch
Justification: fails to build from source
X-Debbugs-Cc: ab.bea...@gmail.com

Dear Maintainer,

open-invaders has a ftbfs issue on riscv64.

Full buildd log here:
https://buildd.debian.org/status/fetch.php?pkg=open-invaders&arch=riscv64&ver=0.3-7&stamp=1651106683&raw=0

At compile time it tries to detect the architecture to determine
datatype sizes, and it is missing the check for riscv64, so it
defaults to an incorrect value.

I am including a patch which fixes the problem.
Please consider applying it in the next upload. Thank you.

-- System Information:
Debian Release: bookworm/sid
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: riscv64

Kernel: Linux 5.18.0-starfive-5.18 (SMP w/2 CPU threads)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)

Versions of packages open-invaders depends on:
ii  libaldmb1   1:0.9.3-6
ii  liballegro4.4   2:4.4.3.1-2
ii  libc6   2.33-7
ii  libdumb11:0.9.3-6
ii  libgcc-s1   12.1.0-2
ii  libstdc++6  12.1.0-2
ii  open-invaders-data  0.3-7

open-invaders recommends no packages.

open-invaders suggests no packages.

-- no debconf information
From: Alan Beadle 
Date: Fri 27 May 2022 09:36:54 PM EDT
Subject: Fix ftbfs on riscv

 Fix failing compile-time detection of dataype size

--- open-invaders-0.3.orig/headers/pmask.h
+++ open-invaders-0.3/headers/pmask.h
@@ -37,7 +37,7 @@ confusing.
 //don't worry about setting it incorrectly
 //you'll get a compile error if you do, not a run-time error
 #if defined(__alpha__) || defined(__ia64__) || (defined(__x86_64__) && 
defined(__LP64__)) || defined(__s390x__) || (defined(__sparc__) && 
defined(__arch64__)) \
-  || defined(__powerpc64__) || defined(__aarch64__) || (defined(__mips64) 
&& defined(__LP64__))
+  || defined(__powerpc64__) || defined(__aarch64__) || (defined(__mips64) 
&& defined(__LP64__)) || (defined(__riscv) && defined(__LP64__))
#define MASK_WORD_BITBITS 6
 #else
#define MASK_WORD_BITBITS 5
--- End Message ---
--- Begin Message ---
Source: open-invaders
Source-Version: 0.3-8
Done: Adam Borowski 

We believe that the bug you reported is fixed in the latest version of
open-invaders, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1011...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Adam Borowski  (supplier of updated open-invaders package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Sat, 28 May 2022 11:55:46 +0200
Source: open-invaders
Architecture: source
Version: 0.3-8
Distribution: unstable
Urgency: medium
Maintainer: Debian QA Group 
Changed-By: Adam Borowski 
Closes: 989063 1011963
Changes:
 open-invaders (0.3-8) unstable; urgency=medium
 .
   * QA upload.
   * Drop 404-compliant git URLs to Salsa.
   * Fix FTBFS on new platforms in a future-proof way, closes: #1011963
   * Mark -data as MA:foreign.
   * Fix an occassional crash during gameplay, closes: #989063 [John G]
Checksums-Sha1:
 f3db3226a1047ed9366264dfaff587706cd52b56 1938 open-invaders_0.3-8.dsc
 2b33e750caf896f6a5dff1888365760ea0d2f7d4 7360 open-invaders_0.3-8.debian.tar.xz
 009932d8916e668cf470cb5672af8374fac7b450 6702 
open-invaders_0.3-8_source.buildinfo
Checksums-Sha256:
 54354c6bd2cc0daab1cb1ad2d003fe4dd00cd4f6e6fc3403c323349895283ac3 1938 
open-invaders_0.3-8.dsc
 0b8d68b2edb14e5f9a9a11abf414ce0ec382ffac666c5736c0db1285cf5fe519 7360 
open-invaders_0.3-8.debian.tar.xz
 dd29660e5ca5e5ab9009dafe9a7052f4150e190e1ae1a7eedb2deee9e6ec88bd 6702 
open-invaders_0.3-8_source.buildinfo
Files:
 7ed78f6d10d4004354

Bug#989063: marked as done (open-invaders: Sometimes segfaults during gameplay due to array overrun)

2022-05-28 Thread Debian Bug Tracking System
Your message dated Sat, 28 May 2022 11:20:49 +
with message-id 
and subject line Bug#989063: fixed in open-invaders 0.3-8
has caused the Debian Bug report #989063,
regarding open-invaders: Sometimes segfaults during gameplay due to array 
overrun
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
989063: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989063
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: open-invaders
Version: 0.3-4.3+b1
Severity: normal
Tags: patch

Dear Debian QA Team,

The program occasionally segfaults during gameplay. A core 
dump shows that the problem is caused by the collision 
detection routine writing out of bounds on an array.

Specifically, collision_detection() in collision.cc cycles 
through an array explosionbits[] of 500 particles, but does 
not check for wraparound every time it increments the 
current_particle counter. The attached patch fixes the bug 
by moving the wraparound check to immediately after the 
increment.

Thanks for considering,
John G.


-- System Information:
Debian Release: 10.9
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'stable-debug'), (500, 'stable')
Architecture: amd64 (x86_64)

Kernel: Linux 4.19.0-16-amd64 (SMP w/2 CPU cores)
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_GB.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages open-invaders depends on:
ii  libaldmb1   1:0.9.3-6+b3
ii  liballegro4.4   2:4.4.2-13
ii  libc6   2.28-10
ii  libdumb11:0.9.3-6+b3
ii  libgcc1 1:8.3.0-6
ii  libstdc++6  8.3.0-6
ii  open-invaders-data  0.3-4.3

open-invaders recommends no packages.

open-invaders suggests no packages.

-- no debconf information


fix-particle-array-bug.patch
Description: Binary data
--- End Message ---
--- Begin Message ---
Source: open-invaders
Source-Version: 0.3-8
Done: Adam Borowski 

We believe that the bug you reported is fixed in the latest version of
open-invaders, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 989...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Adam Borowski  (supplier of updated open-invaders package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Sat, 28 May 2022 11:55:46 +0200
Source: open-invaders
Architecture: source
Version: 0.3-8
Distribution: unstable
Urgency: medium
Maintainer: Debian QA Group 
Changed-By: Adam Borowski 
Closes: 989063 1011963
Changes:
 open-invaders (0.3-8) unstable; urgency=medium
 .
   * QA upload.
   * Drop 404-compliant git URLs to Salsa.
   * Fix FTBFS on new platforms in a future-proof way, closes: #1011963
   * Mark -data as MA:foreign.
   * Fix an occassional crash during gameplay, closes: #989063 [John G]
Checksums-Sha1:
 f3db3226a1047ed9366264dfaff587706cd52b56 1938 open-invaders_0.3-8.dsc
 2b33e750caf896f6a5dff1888365760ea0d2f7d4 7360 open-invaders_0.3-8.debian.tar.xz
 009932d8916e668cf470cb5672af8374fac7b450 6702 
open-invaders_0.3-8_source.buildinfo
Checksums-Sha256:
 54354c6bd2cc0daab1cb1ad2d003fe4dd00cd4f6e6fc3403c323349895283ac3 1938 
open-invaders_0.3-8.dsc
 0b8d68b2edb14e5f9a9a11abf414ce0ec382ffac666c5736c0db1285cf5fe519 7360 
open-invaders_0.3-8.debian.tar.xz
 dd29660e5ca5e5ab9009dafe9a7052f4150e190e1ae1a7eedb2deee9e6ec88bd 6702 
open-invaders_0.3-8_source.buildinfo
Files:
 7ed78f6d10d4004354164a6ba81b5ac8 1938 games optional open-invaders_0.3-8.dsc
 721e802c86637979405aca7b908bfe0c 7360 games optional 
open-invaders_0.3-8.debian.tar.xz
 26191b3e8a78a91de7459b17f952aa39 6702 games optional 
open-invaders_0.3-8_source.buildinfo

-BEGIN PGP SIGNATURE-

iQIzBAEBCgAdFiEEkjZVexcMh/iCHArDweDZLphvfH4FAmKR/9EACgkQweDZLphv
fH74ShAAoP/7czD2tHZW5iLAEiR3uYl9hzUmZvVl/Uy3dKnbtiFf2XHoaLzEb15P
ujcuJhqL0J5QF5mPqcTdtc2ont34qdRvnmAkwbOBVnh6VRWA2ECV/KBGLLT7Mxtr
Y+BBeeDPsEoc/X3fS2BeaSmhzKE+K5iP/xfcTXMif5kPjpC9gefFoWMiCh35CODw
oEptmd30JThIQpX4kSw27Mv9atX5qI13ECJz8AvxNRjpAoY90erwBOYF8bLOQiH/
qOcZ0Zrw3AbueTckkzyA13aGOTQteGjjeyqE60SPKQUjvEszQnBVYnQXvkTkzy2J
3AD

open-invaders_0.3-8_source.changes ACCEPTED into unstable

2022-05-28 Thread Debian FTP Masters



Accepted:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Sat, 28 May 2022 11:55:46 +0200
Source: open-invaders
Architecture: source
Version: 0.3-8
Distribution: unstable
Urgency: medium
Maintainer: Debian QA Group 
Changed-By: Adam Borowski 
Closes: 989063 1011963
Changes:
 open-invaders (0.3-8) unstable; urgency=medium
 .
   * QA upload.
   * Drop 404-compliant git URLs to Salsa.
   * Fix FTBFS on new platforms in a future-proof way, closes: #1011963
   * Mark -data as MA:foreign.
   * Fix an occassional crash during gameplay, closes: #989063 [John G]
Checksums-Sha1:
 f3db3226a1047ed9366264dfaff587706cd52b56 1938 open-invaders_0.3-8.dsc
 2b33e750caf896f6a5dff1888365760ea0d2f7d4 7360 open-invaders_0.3-8.debian.tar.xz
 009932d8916e668cf470cb5672af8374fac7b450 6702 
open-invaders_0.3-8_source.buildinfo
Checksums-Sha256:
 54354c6bd2cc0daab1cb1ad2d003fe4dd00cd4f6e6fc3403c323349895283ac3 1938 
open-invaders_0.3-8.dsc
 0b8d68b2edb14e5f9a9a11abf414ce0ec382ffac666c5736c0db1285cf5fe519 7360 
open-invaders_0.3-8.debian.tar.xz
 dd29660e5ca5e5ab9009dafe9a7052f4150e190e1ae1a7eedb2deee9e6ec88bd 6702 
open-invaders_0.3-8_source.buildinfo
Files:
 7ed78f6d10d4004354164a6ba81b5ac8 1938 games optional open-invaders_0.3-8.dsc
 721e802c86637979405aca7b908bfe0c 7360 games optional 
open-invaders_0.3-8.debian.tar.xz
 26191b3e8a78a91de7459b17f952aa39 6702 games optional 
open-invaders_0.3-8_source.buildinfo

-BEGIN PGP SIGNATURE-
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=oJKt
-END PGP SIGNATURE-


Thank you for your contribution to Debian.



Horse riding lesson

2022-05-28 Thread John McCarthy
Hello,

To Whom It May Concern:

I want to enroll three members of my family for horse riding training in your 
establishment.

Below is their schedule list for your consideration:

1] Number of persons- 3 Adults male (Age 23,21 and 19)
2] Duration of the enrollment- 4 Weeks,5 times weekly,making a total of 20 days 
at 3 hours daily.
3] Ridding Experience - Beginners
4] Priority - 
5] Number Of Rooms: 1 Tripple room or 3 single rooms
6] Starting Date: 21st,September,2022
7] Ending Date:   21st,October,2022

Please if you can offer us the services, Kindly send the total cost for the 
whole duration inclusive of city tax if any for our deliberation.

I await your response as soon as possible..

Regards,

John McCarthy.

40 Beechwood Road,
Sanderstead,
South Croydon CR2 0AA
London, United Kingdom.
Tel: +44 7448 389727 (Whatsup Only)



Bug#1011728: marked as done (pidgin-librvp: FTBFS: rm: cannot remove '/<>/debian/pidgin-librvp/usr/lib/purple-2/librvp.la': No such file or directory)

2022-05-28 Thread Debian Bug Tracking System
Your message dated Sat, 28 May 2022 15:03:56 +
with message-id 
and subject line Bug#1011728: fixed in pidgin-librvp 0.9.7cvs-3
has caused the Debian Bug report #1011728,
regarding pidgin-librvp: FTBFS: rm: cannot remove 
'/<>/debian/pidgin-librvp/usr/lib/purple-2/librvp.la': No such 
file or directory
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1011728: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1011728
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: pidgin-librvp
Version: 0.9.7cvs-2
Severity: serious
Justification: FTBFS
Tags: bookworm sid ftbfs
User: lu...@debian.org
Usertags: ftbfs-20220525 ftbfs-bookworm

Hi,

During a rebuild of all packages in sid, your package failed to build
on amd64.


Relevant part (hopefully):
> make[3]: Entering directory '/<>'
> if echo "-pthread -I/usr/include/pidgin -I/usr/include/gtk-2.0 
> -I/usr/lib/x86_64-linux-gnu/gtk-2.0/include -I/usr/include/pango-1.0 
> -I/usr/include/atk-1.0 -I/usr/include/gdk-pixbuf-2.0 
> -I/usr/include/x86_64-linux-gnu -I/usr/include/pango-1.0 
> -I/usr/include/harfbuzz -I/usr/include/pango-1.0 -I/usr/include/libmount 
> -I/usr/include/blkid -I/usr/include/fribidi -I/usr/include/cairo 
> -I/usr/include/pixman-1 -I/usr/include/harfbuzz -I/usr/include/uuid 
> -I/usr/include/freetype2 -I/usr/include/libpng16 -I/usr/include/libpurple 
> -I/usr/include/glib-2.0 -I/usr/lib/x86_64-linux-gnu/glib-2.0/include" | 
> /bin/grep -q GAIM_IS_GAIM;\
> then\
>   mkdir -p 
> "/<>/debian/pidgin-librvp/usr/share/pixmaps/pidgin/status/default";\
>   /usr/bin/install -c -m 0644 rvp.png 
> "/<>/debian/pidgin-librvp/usr/share/pixmaps/pidgin/status/default/rvp.png";\
>   mkdir -p 
> "/<>/debian/pidgin-librvp/usr/share/pixmaps/pidgin/smileys/rvp";\
>   for p in smileys/*.png smileys/theme; do f=f=`echo $p | sed -e 
> 's|^.*/||'`;\
>   /usr/bin/install -c -m 0644 $p 
> "/<>/debian/pidgin-librvp/usr/share/pixmaps/pidgin/smileys/rvp/$f";\
>   done;\
> else\
>   for p in 16 22 32 48;\
> do \
>   mkdir -p 
> "/<>/debian/pidgin-librvp/usr/share/pixmaps/pidgin/protocols/$p";\
>   /usr/bin/convert rvp.png -resize ${p}x${p} 
> "/<>/debian/pidgin-librvp/usr/share/pixmaps/pidgin/protocols/$p/rvp.png";\
>   done; \
>   /usr/bin/install -c -m 0644 rvp.png 
> "/<>/debian/pidgin-librvp/usr/share/pixmaps/pidgin/emotes/default/rvp.png";\
>   mkdir -p 
> "/<>/debian/pidgin-librvp/usr/share/pixmaps/pidgin/emotes/rvp";\
>   for p in smileys/*.png smileys/theme; do f=f=`echo $p | sed -e 
> 's|^.*/||'`;\
>   /usr/bin/install -c -m 0644 $p 
> "/<>/debian/pidgin-librvp/usr/share/pixmaps/pidgin/emotes/rvp/$f";\
>   done;\
> fi
> /usr/bin/install: cannot create regular file 
> '/<>/debian/pidgin-librvp/usr/share/pixmaps/pidgin/emotes/default/rvp.png':
>  No such file or directory
> make[3]: Leaving directory '/<>'
> make[2]: Leaving directory '/<>'
> make[1]: Leaving directory '/<>'
>debian/rules execute_after_dh_auto_install
> make[1]: Entering directory '/<>'
> rm -v /<>/debian/pidgin-librvp/usr/lib/purple-2/librvp.la
> rm: cannot remove 
> '/<>/debian/pidgin-librvp/usr/lib/purple-2/librvp.la': No such 
> file or directory
> make[1]: *** [debian/rules:21: execute_after_dh_auto_install] Error 1


The full build log is available from:
http://qa-logs.debian.net/2022/05/25/pidgin-librvp_0.9.7cvs-2_unstable.log

All bugs filed during this archive rebuild are listed at:
https://bugs.debian.org/cgi-bin/pkgreport.cgi?tag=ftbfs-20220525;users=lu...@debian.org
or:
https://udd.debian.org/bugs/?release=na&merged=ign&fnewerval=7&flastmodval=7&fusertag=only&fusertagtag=ftbfs-20220525&fusertaguser=lu...@debian.org&allbugs=1&cseverity=1&ctags=1&caffected=1#results

A list of current common problems and possible solutions is available at
http://wiki.debian.org/qa.debian.org/FTBFS . You're welcome to contribute!

If you reassign this bug to another package, please marking it as 'affects'-ing
this package. See https://www.debian.org/Bugs/server-control#affects

If you fail to reproduce this, please provide a build log and diff it with mine
so that we can identify if something relevant changed in the meantime.
--- End Message ---
--- Begin Message ---
Source: pidgin-librvp
Source-Version: 0.9.7cvs-3
Done: Boyuan Yang 

We believe that the bug you reported is fixed in the latest version of
pidgin-librvp, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting t

Processing of pidgin-librvp_0.9.7cvs-3_source.changes

2022-05-28 Thread Debian FTP Masters
pidgin-librvp_0.9.7cvs-3_source.changes uploaded successfully to localhost
along with the files:
  pidgin-librvp_0.9.7cvs-3.dsc
  pidgin-librvp_0.9.7cvs.orig.tar.gz
  pidgin-librvp_0.9.7cvs-3.debian.tar.xz
  pidgin-librvp_0.9.7cvs-3_amd64.buildinfo

Greetings,

Your Debian queue daemon (running on host usper.debian.org)



pidgin-librvp_0.9.7cvs-3_source.changes ACCEPTED into unstable

2022-05-28 Thread Debian FTP Masters



Accepted:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Sat, 28 May 2022 10:35:49 -0400
Source: pidgin-librvp
Architecture: source
Version: 0.9.7cvs-3
Distribution: unstable
Urgency: medium
Maintainer: Debian QA Group 
Changed-By: Boyuan Yang 
Closes: 1011728
Changes:
 pidgin-librvp (0.9.7cvs-3) unstable; urgency=medium
 .
   * QA upload.
   * debian/rules: Update to incorporate multiarch library path.
 (Closes: #1011728)
   * debian/control: Bump Standards-Version to 4.6.1.
Checksums-Sha1:
 c3b8f75be9f4e2f8f5c6e0d7f7781585e4b1a2cd 1937 pidgin-librvp_0.9.7cvs-3.dsc
 b465e40345bfe2956eb296ef555ef5d95164e757 478193 
pidgin-librvp_0.9.7cvs.orig.tar.gz
 3a4016bdc7e3bf9c74edfb321e571d6fe5682f73 5508 
pidgin-librvp_0.9.7cvs-3.debian.tar.xz
 0fe3ffefb991544d344edb727d62cb1312522ac0 14138 
pidgin-librvp_0.9.7cvs-3_amd64.buildinfo
Checksums-Sha256:
 9fbd5db44668d6061b24ad780f6be11f6c39decf3ff4bee513212007f60abb09 1937 
pidgin-librvp_0.9.7cvs-3.dsc
 6a55472a51c96b1ea63024e9aedf2a489d974a7a1d15b18d4a4733ede21794fc 478193 
pidgin-librvp_0.9.7cvs.orig.tar.gz
 9e810d314e6c8a0724f16511759f142b8f1b3f7cf9b0adfd2d7a03db1da475f9 5508 
pidgin-librvp_0.9.7cvs-3.debian.tar.xz
 c7977fcf3bf86b61aa2f71531e8a7776fa3f33193e81027722a794d3b5b7d617 14138 
pidgin-librvp_0.9.7cvs-3_amd64.buildinfo
Files:
 c46a4357a66d19d925e6a9fc041c50e4 1937 net optional pidgin-librvp_0.9.7cvs-3.dsc
 d49ee28a69356f17c7355427c50e9ce2 478193 net optional 
pidgin-librvp_0.9.7cvs.orig.tar.gz
 b37382e52a6cac5bcb81c3b82f711370 5508 net optional 
pidgin-librvp_0.9.7cvs-3.debian.tar.xz
 efe37fb7fdd1e2475f07c42b2b43bb41 14138 net optional 
pidgin-librvp_0.9.7cvs-3_amd64.buildinfo

-BEGIN PGP SIGNATURE-
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=U7r5
-END PGP SIGNATURE-


Thank you for your contribution to Debian.



Bug#993957: (no subject)

2022-05-28 Thread Christoph Biedl
Control: tags 993957 moreinfo

lkcl wrote...

> schroot 1.6.10 (04 May 2014) fails with a continuous attempt to read
> a non-existent subdirectory, /run/systemd/userdb, when operating a
> type "directory" schroot.
> 
> a type "plain" does not have this same issue.
> 
> creating the missing subdirectory manually "allows" the schroot to "proceed"
> without errors.

As asked earlier, please provide more details about your setup, also the
schroot.conf snippet. Since I couldn't reproduce your issue here, but
based on the few information avaiable I might have done things slightly
different.

From reading the Ubuntu bug (also #763896) I assume this was fixed
upstream, we'll include that commit in the next uploads.

Christoph


signature.asc
Description: PGP signature


Processed: Re: Bug#993957: (no subject)

2022-05-28 Thread Debian Bug Tracking System
Processing control commands:

> tags 993957 moreinfo
Bug #993957 [schroot] schroot: fails with non-existent subdirectory
Added tag(s) moreinfo.

-- 
993957: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=993957
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#992430: schroot: user password does not match

2022-05-28 Thread Christoph Biedl
Conrol: tags 992430 moreinfo

Sergey Vlasov wrote...

> When doing schroot into a buster chroot environment, sudo
> commands fail due to password not matching the current user password.
> There is no such problem for bullseye chroot environment.
> 
> To reproduce:
> 
> 0. make sure your current user belongs to sudo group
> 
> 1. create buster chroot environment:
> 
> $ sudo debootstrap buster /schroot-bug/buster
>
> 2. create schroot configuration file:
> 
> $ cat << EOF | sudo tee /etc/schroot/chroot.d/buster
> [buster]
> type=directory
> directory=/schroot-bug/buster
> users=$USER
> profile=desktop
> personality=linux
> preserve-environment=false
> EOF

Unless I misunderstood, also install sudo in the chroot.

> 3. enter chroot:
> 
> $ schroot -c buster
> 
> 4. test sudo with your current password:
> 
> $ sudo true
(...)

The following changes made the check pass:

1. On the *host*, change "yescrypt" to "sha512" in
   /etc/pam.d/common-password
2. Change the password of that user (feel free to re-use the old one,
   but we need the right hash).
3. Reboot (possibly not needed if you do the right things).

Can you confirm? Then this is stuff for README.Debian but otherwise
little schroot can do.

Regards,

Christoph


signature.asc
Description: PGP signature


Bug#857018: schroot: Setup script not running, --session-name not working

2022-05-28 Thread Christoph Biedl
Control: tags 857018 moreinfo

Mike Hommey wrote...

> I installed a new machine some time ago, and setup schroot for the first
> time on it...

Hi, it's been a while, and I failed to reproduce your report. Can you
please check whether the problems still exist on your side? Quite
frankly, this feels like a broken installation (missing executable bits
or some weird noexec mount)

Regards,

Christoph


signature.asc
Description: PGP signature


Processed: Re: Bug#857018: schroot: Setup script not running, --session-name not working

2022-05-28 Thread Debian Bug Tracking System
Processing control commands:

> tags 857018 moreinfo
Bug #857018 [schroot] schroot: Setup script not running, --session-name not 
working
Added tag(s) moreinfo.

-- 
857018: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=857018
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Processing of libcaca_0.99.beta19-3_source.changes

2022-05-28 Thread Debian FTP Masters
libcaca_0.99.beta19-3_source.changes uploaded successfully to localhost
along with the files:
  libcaca_0.99.beta19-3.dsc
  libcaca_0.99.beta19-3.debian.tar.xz
  libcaca_0.99.beta19-3_source.buildinfo

Greetings,

Your Debian queue daemon (running on host usper.debian.org)



libcaca_0.99.beta19-3_source.changes ACCEPTED into unstable

2022-05-28 Thread Debian FTP Masters



Accepted:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Sat, 28 May 2022 17:41:16 +0200
Source: libcaca
Architecture: source
Version: 0.99.beta19-3
Distribution: unstable
Urgency: medium
Maintainer: Debian QA Group 
Changed-By: Fabio Fantoni 
Closes: 987278
Changes:
 libcaca (0.99.beta19-3) unstable; urgency=medium
 .
   * QA upload.
   * Change Vcs-* fields for git repo on salsa.
   * Add upstream metadata
   * Add debian/watch
   * Add debian/gbp.conf
   * Merge from ubuntu:
 - SECURITY UPDATE: Heap buffer overflow
 debian/patches/CVE-2021-30498-and-30499.patch: fix buffer overflows
 in TGA and troff exports in caca/codec/export.c. (Closes: #987278)
 CVE-2021-30498 CVE-2021-30499
Checksums-Sha1:
 2fdfabd62d0ad9293047757dcf982de3eb764178 2187 libcaca_0.99.beta19-3.dsc
 76b1c5006c6f101717f971add4d51e6c16d0fb38 16424 
libcaca_0.99.beta19-3.debian.tar.xz
 e3e7298f3ce900751e6776b22c7cad17ea1fc236 11644 
libcaca_0.99.beta19-3_source.buildinfo
Checksums-Sha256:
 52c77188c78ce657f0ccf660e0b90fe12ad1ff9c8b32af079a5cd16afcbf10ef 2187 
libcaca_0.99.beta19-3.dsc
 f2c1e6012afa8263d47d7d81d98fbbc5cd02e1663b4a1bafca38a976f526f2e7 16424 
libcaca_0.99.beta19-3.debian.tar.xz
 f6bfd31200b3b4f704e45861c191321069cf1290bdd766e14db8ab04f83c0ff7 11644 
libcaca_0.99.beta19-3_source.buildinfo
Files:
 90ae1c4e9183967078d30727add2a81c 2187 libs optional libcaca_0.99.beta19-3.dsc
 8e88f9bdce06b092d1d7ff04d82e255c 16424 libs optional 
libcaca_0.99.beta19-3.debian.tar.xz
 04ae43826fb9d0a676d4da016a650894 11644 libs optional 
libcaca_0.99.beta19-3_source.buildinfo

-BEGIN PGP SIGNATURE-
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=SgNs
-END PGP SIGNATURE-


Thank you for your contribution to Debian.



Bug#993957: (no subject)

2022-05-28 Thread lkcl
i think i know what rhat might be. i flat-out refuse to let a mission critical 
piece of software developed by pottering run on systems that i manage, 
particularly after seeing the persistent generation of CVEs on mitre.org, and 
also in interactions with him where he just does not listen.

(translation: i was not running systemd.  sysvinit is still a supported option 
in debian, apt-get install sysvinit, and it is available via a grub boot menu 
option)

l.



On May 28, 2022 4:42:41 PM GMT+01:00, Christoph Biedl 
 wrote:
>Control: tags 993957 moreinfo
>
>lkcl wrote...
>
>> schroot 1.6.10 (04 May 2014) fails with a continuous attempt to read
>> a non-existent subdirectory, /run/systemd/userdb, when operating a
>> type "directory" schroot.
>> 
>> a type "plain" does not have this same issue.
>> 
>> creating the missing subdirectory manually "allows" the schroot to
>"proceed"
>> without errors.
>
>As asked earlier, please provide more details about your setup, also
>the
>schroot.conf snippet. Since I couldn't reproduce your issue here, but
>based on the few information avaiable I might have done things slightly
>different.
>
>From reading the Ubuntu bug (also #763896) I assume this was fixed
>upstream, we'll include that commit in the next uploads.
>
>Christoph