[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#770224: marked as done (RFS: gnustep-base/1.22.1-4+deb7u1 -- GNUstep Base library [RC SECURITY] [wheezy])



Your message dated Fri, 21 Nov 2014 12:26:36 +0100
with message-id <546F216C.8060108@wollumbin.marsaxlokk.dhcp.io>
and subject line Re: Bug#770224: RFS: gnustep-base/1.22.1-4+deb7u1 -- GNUstep Base library [RC SECURITY] [wheezy]
has caused the Debian Bug report #770224,
regarding RFS: gnustep-base/1.22.1-4+deb7u1 -- GNUstep Base library [RC SECURITY] [wheezy]
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
770224: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=770224
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Package: sponsorship-requests
Severity: important

I am looking for a sponsor for my package "gnustep-base".
It builds these binary packages:

gnustep-base-common - GNUstep Base library - common files
gnustep-base-doc - Documentation for the GNUstep Base Library
gnustep-base-examples - Examples using the GNUstep Base Library
gnustep-base-runtime - GNUstep Base library - daemons and tools
libgnustep-base-dev - GNUstep Base header files and development libraries
libgnustep-base1.22 - GNUstep Base library
libgnustep-base1.22-dbg - GNUstep Base library - debugging symbols

To access further information about this package, please visit the
following URL:

http://mentors.debian.net/package/gnustep-base

Alternatively, one can download the package with dget using this
command:

dget -x http://mentors.debian.net/debian/pool/main/g/gnustep-base/gnustep-base_1.22.1-4+deb7u1.dsc

Changes (approved by the release team, see #770207):

  * debian/patches/CVE-2014-2980.patch: New; fixes user security hole in
    gdomap (Closes: #745470).
  * debian/patches/performSelector-forwarding.patch: New; fixes regression
    in -performSelector: with message forwarding (Closes: #753603).
  * debian/patches/series: Update.

--- End Message ---
--- Begin Message ---
Just uploaded.

Paul

Attachment: signature.asc
Description: OpenPGP digital signature


--- End Message ---

Reply to: