Package: sponsorship-requests
Severity: normal
Dear Mentors,
I am looking for a sponsor for my package libcouchbase
* Package name: libcouchbase
Version : 2.0.0~beta2-1
Upstream Author : Couchbase, Inc.
* URL : http://www.couchbase.com/develop/c/current
*
Anyone interested?
2012-10-11 17:39, Boris Pek wrote:
Package: sponsorship-requests
Severity: normal
X-Debbugs-Cc: debian...@lists.debian.org
Hi,
I am looking for a sponsor for the package zgv.
It builds one binary package:
zgv - SVGAlib graphics viewer
Direct link for download:
Processing commands for cont...@bugs.debian.org:
severity 692005 wishlist
Bug #692005 [sponsorship-requests] RFS: libcouchbase/2.0.0~beta2-1 -- Couchbase
protocol library [ITP]
Severity set to 'wishlist' from 'normal'
End of message, stopping processing here.
Please contact me if you need
Processing commands for cont...@bugs.debian.org:
block 691903 by 692005
Bug #691903 [wnpp] ITP: libcouchbase -- Couchbase protocol library
691903 was not blocked by any bugs.
691903 was not blocking any bugs.
Added blocking bug(s) of 691903: 692005
stop
Stopping processing here.
Please contact
Hi!
Mon, 29 Oct 2012 05:54:47 +
Bart Martens ba...@debian.org kirjoitti:
Hi Juhani,
You wrote on the RFS:
team upload (as in Debian Developer's Reference ch 5.11.7)
There I read:
http://www.debian.org/doc/manuals/developers-reference/pkgs.html#nmu-team-upload
If it conforms with
Package: sponsorship-requests
Severity: important
Dear mentors,
I am looking for a sponsor for my package mcrypt
Package name: mcrypt
Version : 2.6.8-1.3
URL : http://mcrypt.sourceforge.net/
License : GPL-3
Section : utils
It builds those binary
Processing commands for cont...@bugs.debian.org:
retitle 680546 RFS: cinnamon/1.6.2-1 [ITP]
Bug #680546 [sponsorship-requests] RFS: cinnamon/1.6.2+dfsg-1 [ITP]
Changed Bug title to 'RFS: cinnamon/1.6.2-1 [ITP]' from 'RFS:
cinnamon/1.6.2+dfsg-1 [ITP]'
stop
Stopping processing here.
Please
On Thu, Nov 1, 2012 at 3:09 PM, Jean-Michel Vourgère wrote:
mcrypt (2.6.8-1.3) unstable; urgency=medium
.
* Non-maintainer upload.
* CVE-2012-4527: stack-based buffer overflow by encryption / decryption of
overly long file names (Closes: #690924)
I've reviewed this and it looks
* CVE-2012-4527: stack-based buffer overflow by encryption / decryption of
overly long file names (Closes: #690924)
I've reviewed this and it looks mostly good. However, can you explain
why you chose ERRWIDTH=PATH_MAX+1024 vs. the redhat patch WIDTH=80?
I don't know exactly.
It
Your message dated Fri, 02 Nov 2012 04:20:31 +
with message-id e1tu8kb-0005gk...@quantz.debian.org
and subject line closing RFS: cinnamon/1.6.2-1 [ITP]
has caused the Debian Bug report #680546,
regarding RFS: cinnamon/1.6.2-1 [ITP]
to be marked as done.
This means that you claim that the
10 matches
Mail list logo