Your message dated Sun, 04 Sep 2016 22:58:07 +0000
with message-id <[email protected]>
and subject line Bug#834546: fixed in nmap 7.12-2
has caused the Debian Bug report #834546,
regarding nmap: debian patch supresses potential errors
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
834546: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=834546
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: nmap
Version: 7.12-1
Severity: normal

[X-Debbugs-Cc'd to #821913]

Dear Maintainer,

The debian patch 
debian/patches/0004-Ignore-errors-when-enumerating-interfaces.patch,
added to fix #821913, could mask legitimate failures: whenever
_intf_get_noalias() returns -1, whether that is due to the reason underlying
#821913 or due to a "legitimate" error condition, that would result in neither
an error message nor a warning message.

Given that upstream has fixed #821913 in r35782, I assume that's all
that's needed is to drop the debian patch in favour of the upstream
patch.

Cheers,

Daniel

--- End Message ---
--- Begin Message ---
Source: nmap
Source-Version: 7.12-2

We believe that the bug you reported is fixed in the latest version of
nmap, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Hilko Bengen <[email protected]> (supplier of updated nmap package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Sun, 04 Sep 2016 22:16:15 +0200
Source: nmap
Binary: nmap zenmap ndiff
Architecture: source
Version: 7.12-2
Distribution: unstable
Urgency: medium
Maintainer: Hilko Bengen <[email protected]>
Changed-By: Hilko Bengen <[email protected]>
Description:
 ndiff      - The Network Mapper - result compare utility
 nmap       - The Network Mapper
 zenmap     - The Network Mapper Front End
Closes: 834546
Changes:
 nmap (7.12-2) unstable; urgency=medium
 .
   * Update python-gobject dependency
   * Use upstream patch to fix #821913 (Closes: #834546)
Checksums-Sha1:
 f823e65fcb318805afde0172133b1d64fb28a46f 1980 nmap_7.12-2.dsc
 02083c8336e6772a392205220278e8e686da22bb 13884 nmap_7.12-2.debian.tar.xz
Checksums-Sha256:
 38c762b747ab515bf1efa80ed762663a2e32c942141f82cb9b791eced34b7fb4 1980 
nmap_7.12-2.dsc
 53bd406eba16a597dc0cb6ea7114d77c673aabc28172c6205fe2610fa59158f8 13884 
nmap_7.12-2.debian.tar.xz
Files:
 25c5f4ccf46bda9d68974db9fcd54cca 1980 net extra nmap_7.12-2.dsc
 8c7e07f0cdf569f390196c4ff814c4c3 13884 net extra nmap_7.12-2.debian.tar.xz

-----BEGIN PGP SIGNATURE-----
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=KIC7
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to