Processing of libvigraimpex_1.9.0+dfsg-8_mips.changes

2014-06-10 Thread Debian FTP Masters
libvigraimpex_1.9.0+dfsg-8_mips.changes uploaded successfully to localhost along with the files: libvigraimpex-dev_1.9.0+dfsg-8_mips.deb libvigraimpex4_1.9.0+dfsg-8_mips.deb python-vigra_1.9.0+dfsg-8_mips.deb libvigraimpex-doc_1.9.0+dfsg-8_all.deb python-vigra-doc_1.9.0+dfsg-8_all.deb

Bug#750418: marked as done (libvigraimpex: FTBFS on i386, kfreebsd-* and mips (test failures))

2014-06-10 Thread Debian Bug Tracking System
Your message dated Tue, 10 Jun 2014 09:23:49 + with message-id e1wuihv-000732...@franck.debian.org and subject line Bug#750418: fixed in libvigraimpex 1.9.0+dfsg-8 has caused the Debian Bug report #750418, regarding libvigraimpex: FTBFS on i386, kfreebsd-* and mips (test failures) to be marked

libvigraimpex_1.9.0+dfsg-8_mips.changes ACCEPTED into unstable

2014-06-10 Thread Debian FTP Masters
Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Fri, 06 Jun 2014 12:51:39 +0100 Source: libvigraimpex Binary: libvigraimpex-dev libvigraimpex4 libvigraimpex-doc python-vigra python-vigra-doc Architecture: source mips all Version: 1.9.0+dfsg-8 Distribution: unstable

We invite you to publish scientific articles

2014-06-10 Thread Science and Education Foundation, Bulgaria
We invite you to publish scientific articles in Peer-Reviewed Open Access Journals We are writing to kindly inform you that you can publish your scientific papers in the peer-reviewed open access journals that we publish: Journal of International Scientific Publications: Agriculture Food;

Bug#746828: marked as done (blackbox: ftbfs with GCC-4.9)

2014-06-10 Thread Debian Bug Tracking System
Your message dated Tue, 10 Jun 2014 13:03:41 + with message-id e1wulih-0004qu...@franck.debian.org and subject line Bug#746828: fixed in blackbox 0.70.1-21 has caused the Debian Bug report #746828, regarding blackbox: ftbfs with GCC-4.9 to be marked as done. This means that you claim that the

Processing of blackbox_0.70.1-21_amd64.changes

2014-06-10 Thread Debian FTP Masters
blackbox_0.70.1-21_amd64.changes uploaded successfully to localhost along with the files: blackbox_0.70.1-21_amd64.deb libbt-dev_0.70.1-21_amd64.deb libbt0_0.70.1-21_amd64.deb blackbox_0.70.1-21.dsc blackbox_0.70.1-21.debian.tar.xz Greetings, Your Debian queue daemon (running

blackbox_0.70.1-21_amd64.changes ACCEPTED into unstable

2014-06-10 Thread Debian FTP Masters
Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Tue, 10 Jun 2014 21:30:11 +0900 Source: blackbox Binary: blackbox libbt-dev libbt0 Architecture: source amd64 Version: 0.70.1-21 Distribution: unstable Urgency: medium Maintainer: Debian QA Group packa...@qa.debian.org

Bug#751146: blackbox: Fix ppc64el symbolset

2014-06-10 Thread Breno Leitao
Package: blackbox Version: 0.70.1-21 Severity: normal Tags: patch User: debian-powe...@lists.debian.org Usertags: ppc64el Dear Maintainer, The symbols file (blackbox-0.70.1/debian/libbt0.symbols) for ppc64el architecture is not correct, which cause blackbox to FTBFS as shown in:

Processed: Bug#751134: libc6: Segmentation fault rpcinfo rpc.mountd

2014-06-10 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: clone 751134 -1 Bug #751134 [libc6] libc6: Segmentation fault rpcinfo rpc.mountd Bug 751134 cloned as bug 751147 reassign -1 libtirpc1 Bug #751147 [libc6] libc6: Segmentation fault rpcinfo rpc.mountd Bug reassigned from package 'libc6' to

Bug#749319: duplicate items in manifest

2014-06-10 Thread Mike Isely
Hi, We've also encountered this problem, with kexec-tools. Root cause aopears to be that the original upstream tarball likely has duplicate entries and the behavior in tar for handling duplicate entries has changed bewteen squeeze and wheezy. Thus trying to recreate a tarball in one

Bug#751147: marked as done (libtirpc1: try to unlock a lock which hasn't been locked)

2014-06-10 Thread Debian Bug Tracking System
Your message dated Tue, 10 Jun 2014 19:33:58 + with message-id e1wurny-0004tv...@franck.debian.org and subject line Bug#751147: fixed in libtirpc 0.2.3-1 has caused the Debian Bug report #751147, regarding libtirpc1: try to unlock a lock which hasn't been locked to be marked as done. This

Processing of libtirpc_0.2.3-1_amd64.changes

2014-06-10 Thread Debian FTP Masters
libtirpc_0.2.3-1_amd64.changes uploaded successfully to localhost along with the files: libtirpc-dev_0.2.3-1_amd64.deb libtirpc1_0.2.3-1_amd64.deb libtirpc_0.2.3-1.dsc libtirpc_0.2.3.orig.tar.bz2 libtirpc_0.2.3-1.debian.tar.xz Greetings, Your Debian queue daemon (running on

Bug#750562: sendmail: CVE-2014-3956

2014-06-10 Thread Moritz Mühlenhoff
On Thu, Jun 05, 2014 at 12:08:34AM +0200, Andreas Beckmann wrote: Control: fixed -1 8.14.4-6 On 2014-06-04 15:44, Moritz Muehlenhoff wrote: Hi, please see http://www.openwall.com/lists/oss-security/2014/06/03/1 for details. That's a trivial patch that I already cherry-picked from

libtirpc_0.2.3-1_amd64.changes ACCEPTED into unstable

2014-06-10 Thread Debian FTP Masters
Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Tue, 10 Jun 2014 21:12:53 +0200 Source: libtirpc Binary: libtirpc-dev libtirpc1 Architecture: source amd64 Version: 0.2.3-1 Distribution: unstable Urgency: medium Maintainer: Debian QA Group packa...@qa.debian.org