Re: First motif commits

2013-03-14 Thread Paul Gevers
On 03/14/13 07:29, Graham Inggs wrote: > After asking that question I tried to do more reading up symbols, but > I found the information very vague, especially about (optional) > symbols. Out of interest, why are there so many other (optional) > symbols? How did you determine they were optional?

Processed: [bts-link] source package emacs-jabber

2013-03-14 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > # > # bts-link upstream status pull for source package emacs-jabber > # see http://lists.debian.org/debian-devel-announce/2006/05/msg1.html > # > user bts-link-upstr...@lists.alioth.debian.org Setting user to bts-link-upstr...@lists.alioth.deb

[bts-link] source package emacs-jabber

2013-03-14 Thread bts-link-upstream
# # bts-link upstream status pull for source package emacs-jabber # see http://lists.debian.org/debian-devel-announce/2006/05/msg1.html # user bts-link-upstr...@lists.alioth.debian.org # remote status report for #569338 (http://bugs.debian.org/569338) # Bug title: emacs-jabber: TLS negotiatio

Processed: python-mpdclient: no upstream

2013-03-14 Thread Debian Bug Tracking System
Processing control commands: > block -1 by 703053 703054 Bug #703055 [python-mpdclient] python-mpdclient: no upstream 703055 was not blocked by any bugs. 703055 was not blocking any bugs. Added blocking bug(s) of 703055: 703053 and 703054 -- 703055: http://bugs.debian.org/cgi-bin/bugreport.cgi?b

Bug#703053: lastmp: switch from python-libmpdclient to python-mpd

2013-03-14 Thread Helmut Grohne
Package: lastmp Version: 1.0.6-4 Severity: wishlist Dear lastmp maintainer, The lastmp package is using the python-libmpdclient (mpdclient2) module. This library has been abandoned upstream[1] in favour of python-mpd. Would it be possible to switch this tool over to the other library? Helmut [1

Bug#703054: pygmy: switch from python-libmpdclient to python-mpd

2013-03-14 Thread Helmut Grohne
Package: pygmy Version: 0.48-4 Severity: wishlist Dear pygmy maintainer, The pygmy package is using the python-libmpdclient (mpdclient2) module. This library has been abandoned upstream[1] in favour of python-mpd. Would it be possible to switch this tool over to the other library? Helmut [1] ht

Processing of wvstreams_4.6.1-6_amd64.changes

2013-03-14 Thread Debian FTP Masters
wvstreams_4.6.1-6_amd64.changes uploaded successfully to localhost along with the files: wvstreams_4.6.1-6.dsc wvstreams_4.6.1-6.debian.tar.gz libwvstreams4.6-base_4.6.1-6_amd64.deb libwvstreams4.6-extras_4.6.1-6_amd64.deb libuniconf4.6_4.6.1-6_amd64.deb libwvstreams-dev_4.6.1-6_amd64.d

wvstreams_4.6.1-6_amd64.changes ACCEPTED into unstable

2013-03-14 Thread Debian FTP Masters
Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Thu, 14 Mar 2013 11:51:08 -0700 Source: wvstreams Binary: libwvstreams4.6-base libwvstreams4.6-extras libuniconf4.6 libwvstreams4.6-doc libwvstreams-dev uniconfd uniconf-tools Architecture: source amd64 all Version: 4.6.

Processing of hfsutils_3.2.6-12_amd64.changes

2013-03-14 Thread Debian FTP Masters
hfsutils_3.2.6-12_amd64.changes uploaded successfully to localhost along with the files: hfsutils_3.2.6-12.dsc hfsutils_3.2.6-12.debian.tar.gz hfsutils_3.2.6-12_amd64.deb hfsutils-tcltk_3.2.6-12_amd64.deb Greetings, Your Debian queue daemon (running on host franck.debian.org) --

hfsutils_3.2.6-12_amd64.changes ACCEPTED into unstable

2013-03-14 Thread Debian FTP Masters
Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Thu, 14 Mar 2013 12:44:10 -0700 Source: hfsutils Binary: hfsutils hfsutils-tcltk Architecture: source amd64 Version: 3.2.6-12 Distribution: unstable Urgency: low Maintainer: Debian QA Group Changed-By: Matthias Klose De

Bug#702710: smarty: Possible XSS bug in Smarty error messages.

2013-03-14 Thread Hideki Yamane
Hi Jan, On Mon, 11 Mar 2013 09:16:31 -0400 (EDT) Jan Lieskovsky wrote: > Just FYI the CVE identifier of CVE-2012-4437 has been previously > assigned to this issue: > http://www.openwall.com/lists/oss-security/2012/09/20/3 > http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4437 Thank y