Your message dated Fri, 24 Oct 2014 04:24:02 +0000
with message-id <[email protected]>
and subject line closing RFS: libupnp/1:1.6.19+git20141001-1 Portable SDK for
UPnP Devices, version 1.6
has caused the Debian Bug report #764464,
regarding RFS: libupnp/1:1.6.19+git20141001-1 Portable SDK for UPnP Devices,
version 1.6
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)
--
764464: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=764464
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: sponsorship-requests
Severity: normal
Dear mentors,
I am looking for a sponsor for my package "libupnp"
Package name : libupnp
Version : 1:1.6.19+git20141001-1
Upstream Author : Marcelo Roberto Jimenez <[email protected]>
URL : http://pupnp.sourceforge.net
License : BSD
Section : net
It builds those binary packages:
libupnp-dev - Portable SDK for UPnP Devices (development files)
libupnp6 - Portable SDK for UPnP Devices, version 1.6 (shared libraries)
libupnp6-dbg - debugging symbols for libupnp6
libupnp6-dev - Portable SDK for UPnP Devices, version 1.6 (development files)
libupnp6-doc - Documentation for the Portable SDK for UPnP Devices, version 1.6
To access further information about this package, please visit the
following URL:
http://mentors.debian.net/package/libupnp
Alternatively, one can download the package with dget using this command:
dget -x
http://mentors.debian.net/debian/pool/main/libu/libupnp/libupnp_1.6.19+git20141001-1.dsc
Changes since the last upload:
* Ack both NMUs, thankyou for your care of this package.
* New upstream release (Closes: #740584, #670964). We take the git version
as the git log suggests some worthwhile security and reliability fixes.
* Build for IPv6 (note, UpnpInit() only enables IPv4 connections so
most existing libupnp users need not be aware of this).
* Change Priority to "optional" (Closes: #740582).
* Remove patch 0001-Security-fix-for-CERT-issue-VU-922681 now in upstream.
* Improve debian/rules hardening option usage stuff.
* Update Standards-Version to 3.9.6 (no changes required).
* Fix "memset(ctx, 0, sizeof(ctx)); /* In case it's sensitive */"
in our copy of Colin Plumb's md5.c (patch 01-debian-md5-licence.patch).
Regards,
Nick Leverton
--- End Message ---
--- Begin Message ---
Package libupnp has been removed from mentors.
--- End Message ---