Your message dated Sat, 01 Dec 2007 16:47:04 +0000
with message-id <[EMAIL PROTECTED]>
and subject line Bug#453577: fixed in dcfldd 1.3.4.1-2
has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere. Please contact me immediately.)
Debian bug tracking system administrator
(administrator, Debian Bugs database)
--- Begin Message ---
Source: dcfldd
Version: 1.3.4.1-1
Severity: minor
Usertags: dehs-no-upstream
Hello maintainer,
The debian/watch file of your package on the unstable distribution fails to
report upstream's version.
Uscan's message follows:
----
uscan.pl warning: In /tmp/dcfldd_watchsP62a4,
no matching hrefs for watch line
http://qa.debian.org/watch/sf.php?project=dcfldd dcfldd-([\d.]*).tar.gz
debian uupdate
----
Please note that this message is auto-generated by extracting the information
from the Debian External Health Status (a.k.a. DEHS) no_upstream page[1].
At the moment of running the package version found is the one indicated on the
report.
If you have already fixed this issue please ignore and close this report.
If you believe this message can be improved in any way don't hesitate to
contact me
by replying to [EMAIL PROTECTED] (where NNNNN is the number of this bug
report).
If you need help to fix this problem tag this bug with 'help'
so I pay special attention to it when submitting patches.
This can be done by running % bts tag NNNNN help (where NNNNN is the the number
of this bug report).
If you wish not to be notified in the future please contact me so I add you to
the ignore list.
[1] http://dehs.alioth.debian.org/no_upstream.html
Kind regards,
Raphael Geissert.
--- End Message ---
--- Begin Message ---
Source: dcfldd
Source-Version: 1.3.4.1-2
We believe that the bug you reported is fixed in the latest version of
dcfldd, which is due to be installed in the Debian FTP archive:
dcfldd_1.3.4.1-2.diff.gz
to pool/main/d/dcfldd/dcfldd_1.3.4.1-2.diff.gz
dcfldd_1.3.4.1-2.dsc
to pool/main/d/dcfldd/dcfldd_1.3.4.1-2.dsc
dcfldd_1.3.4.1-2_i386.deb
to pool/main/d/dcfldd/dcfldd_1.3.4.1-2_i386.deb
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Kenny Duffus <[EMAIL PROTECTED]> (supplier of updated dcfldd package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Format: 1.7
Date: Fri, 30 Nov 2007 11:32:37 +0000
Source: dcfldd
Binary: dcfldd
Architecture: source i386
Version: 1.3.4.1-2
Distribution: unstable
Urgency: low
Maintainer: Kenny Duffus <[EMAIL PROTECTED]>
Changed-By: Kenny Duffus <[EMAIL PROTECTED]>
Description:
dcfldd - enhanced version of dd for forensics and security
Closes: 453577
Changes:
dcfldd (1.3.4.1-2) unstable; urgency=low
.
* closes: #453577
* updated debian/watch to use built in uscan sf.net handling
Files:
350dac78200b5ecb130e69cbfb7c1b6e 561 admin optional dcfldd_1.3.4.1-2.dsc
2536f62cf22003183660a6ac614b0251 3811 admin optional dcfldd_1.3.4.1-2.diff.gz
930446e4aa5d4fdd137195392516ea90 36360 admin optional dcfldd_1.3.4.1-2_i386.deb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)
iD8DBQFHUY0jh9XhkOvHPWMRAhPMAKDBX8THE2HdNqoFkjkylMtNBLMoxwCfRq/n
qt0Oy4Gbnw4TJFutumoM0cw=
=fdLx
-----END PGP SIGNATURE-----
--- End Message ---