-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Format: 1.7 Date: Mon, 9 Jun 2003 23:25:00 -0400 Source: libsafe Binary: libsafe Architecture: source i386 Version: 2.0-16-4 Distribution: unstable Urgency: low Maintainer: David Coe <[EMAIL PROTECTED]> Changed-By: David Coe <[EMAIL PROTECTED]> Description: libsafe - Protection against buffer overflow vulnerabilities Closes: 160059 175265 Changes: libsafe (2.0-16-4) unstable; urgency=low . * Thanks, Julien, for the NMU. Closes: #160059: broken on 64-bit platforms * Clarified the descriptions of logging in the documentation and man page. Closes: #175265: libsafe is not logging to /var/log/secure * Build and include the "white papers" from the upstream doc directory into /usr/share/doc/libsafe/. Because they're licensed unde the GPL, you're free to print them on colored paper as well. * Debian Standards update to policy 3.5.10: - Support the new "noopt" DEB_BUILD_OPTIONS option; also retain the earlier "debug" option, because the upstream MakeFile has a number of debug-specific flags; specify both "debug" and "noopt" if you want all the debug flags and no optimization. Files: 41309f304d9c4f3d9d85633832a3e073 578 libs optional libsafe_2.0-16-4.dsc 51b36f352819ce3270a2c0d9bc9f0293 15649 libs optional libsafe_2.0-16-4.diff.gz 1eaee5fe93e8b9ef0c5ba092c7285ccc 220224 libs optional libsafe_2.0-16-4_i386.deb
-----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux) iD8DBQE+5VBPsPfoxg/MJ8YRAueuAJ0Yj84ay7GpXACHOmE1Vf+eRjGwgQCePkBh X+iLT2EU4M/UVlNEmMV8Uik= =5EcT -----END PGP SIGNATURE----- Accepted: libsafe_2.0-16-4.diff.gz to pool/main/libs/libsafe/libsafe_2.0-16-4.diff.gz libsafe_2.0-16-4.dsc to pool/main/libs/libsafe/libsafe_2.0-16-4.dsc libsafe_2.0-16-4_i386.deb to pool/main/libs/libsafe/libsafe_2.0-16-4_i386.deb -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]