Bug#770369: I may have a solution for the bug 770369

2016-02-08 Thread Arnaud Ceyrolle
Hello, I think I might have found why Eterm is behaving like this and have also a solution. >From the source tarball listed in the page: https://packages.debian.org/jessie/eterm at the link in the right : eterm_0.9.6.orig.tar.gz

Bug#814180: piespy: (Build-)Depends on OpenJDK 7

2016-02-08 Thread Matthias Klose
Package: src:piespy Version: 0.4.0-3 Severity: serious User: debian-j...@lists.debian.org Usertags: openjdk-8-transition The package build-depends or depends one an openjdk-7-* package, which is scheduled for removal for stretch. Please do not depend on a specific openjdk version, but on one of t

Bug#814093: rfdump crashes when "Start scan" pressed

2016-02-08 Thread Szőgyényi Gábor
Package: rfdump Version: 1.6-3 Severity: normal Tags: upstream Dear Maintainer, rfdump crashes when click on "Reader"->"Start scan". Console ouput after the crash: - ** ERROR:rfid.c:1137:rfidSelect: assertion failed: (fd >= 0) Interrupt

opencryptoki_3.4.1+dfsg-1_source.changes ACCEPTED into unstable

2016-02-08 Thread Debian FTP Masters
Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Mon, 08 Feb 2016 05:00:09 + Source: opencryptoki Binary: opencryptoki libopencryptoki0 libopencryptoki-dev Architecture: source Version: 3.4.1+dfsg-1 Distribution: unstable Urgency: low Maintainer: Debian QA Group

Bug#814090: wicd-curses crashes when certain keys are pressed

2016-02-08 Thread Christian Heinrich
Package: wicd-curses Version: 1.7.3-3 Severity: normal Dear Maintainer, I installed wicd-curses today and had it run with the NetworkManager applet still enabled. I started wicd-curses and pressed "D" immediately. Sometimes I had to press one of the "Key Up" or "Key Down" keys, but normally just

Bug#689417: marked as done (opencryptoki: CVE-2012-4454 CVE-2012-4455)

2016-02-08 Thread Debian Bug Tracking System
Your message dated Mon, 08 Feb 2016 12:49:59 + with message-id and subject line Bug#689417: fixed in opencryptoki 3.4.1+dfsg-1 has caused the Debian Bug report #689417, regarding opencryptoki: CVE-2012-4454 CVE-2012-4455 to be marked as done. This means that you claim that the problem has bee

Processing of opencryptoki_3.4.1+dfsg-1_source.changes

2016-02-08 Thread Debian FTP Masters
opencryptoki_3.4.1+dfsg-1_source.changes uploaded successfully to localhost along with the files: opencryptoki_3.4.1+dfsg-1.dsc opencryptoki_3.4.1+dfsg.orig.tar.gz opencryptoki_3.4.1+dfsg-1.debian.tar.xz Greetings, Your Debian queue daemon (running on host franck.debian.org)