Your message dated Tue, 5 Apr 2016 17:19:52 +0000 (UTC) with message-id <1719941716.5402079.1459876792462.JavaMail.yahoo@mail.yahoo.com> and subject line Re: Bug#820123: RFS: dhcpcd5/6.10.1-1 [RC] -- DHCPv4, IPv6RA and DHCPv6 client with IPv4LL support has caused the Debian Bug report #820123, regarding RFS: dhcpcd5/6.10.1-1 [RC] -- DHCPv4, IPv6RA and DHCPv6 client with IPv4LL support to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner@bugs.debian.org immediately.) -- 820123: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=820123 Debian Bug Tracking System Contact owner@bugs.debian.org with problems
--- Begin Message ---
- To: submit@bugs.debian.org
- Subject: RFS: dhcpcd5/6.10.1-1 [RC] -- DHCPv4, IPv6RA and DHCPv6 client with IPv4LL support
- From: Junior Santos <j.s.junior@live.com>
- Date: Tue, 5 Apr 2016 14:05:44 -0300
- Message-id: <[🔎] BLU436-SMTP256A129BEC97964CE423801BF9E0@phx.gbl>
Package: sponsorship-requests Severity: important Dear mentors, I am looking for a sponsor for my package “dhcpcd5" * Package name : dhcpcd5 Version : 6.10.1-1 Upstream Author : Roy Marples <roy@marples.name> * URL : http://roy.marples.name/projects/dhcpcd * License : BSD-2 Section : net It builds those binary packages: dhcpcd5 - DHCPv4, IPv6RA and DHCPv6 client with IPv4LL support To access further information about this package, please visit the following URL: http://mentors.debian.net/package/dhcpcd5 Alternatively, one can download the package with dget using this command: dget -x http://mentors.debian.net/debian/pool/main/d/dhcpcd5/dhcpcd5_6.10.1-1.dsc More information about hello can be obtained from http://www.example.com. Changes since the last upload: * New upstream release (Closes: #813595) * Fix CVE-2016-1504 invalid read/crash via malformed dhcp responses by upstream (Closes: #810620) * Fix CVE-2016-1503 heap overflow via malformed dhcp responses in print_option (via dhcp_envoption1) due to incorrect option length values by upstream (Closes: #810621) * d/control: - Bump Standards-Version to 3.9.7 * Fix dhcpcd5 FTBFS on kfreebsd-amd64 and kfreebsd-i386 by upstream (Closes: #815338) * Fix Multiplication of IPv6 addresses by upstream (Closes: #791582) * d/rules: - Add hardening * d/patches: - fix-spelling-error for all older files - fix-spelling-error-in-manpage for manpage`s * d/dhcpcd5.lintian-overrides: - Add overrides for spelling error binary false positive * recommended revision in your dhcp by upstream (Closes: #799795) Regards, J.S.JúniorAttachment: signature.asc
Description: Message signed with OpenPGP using GPGMail
--- End Message ---
--- Begin Message ---
- To: Junior Santos <j.s.junior@live.com>, <820123-done@bugs.debian.org>
- Subject: Re: Bug#820123: RFS: dhcpcd5/6.10.1-1 [RC] -- DHCPv4, IPv6RA and DHCPv6 client with IPv4LL support
- From: Gianfranco Costamagna <costamagnagianfranco@yahoo.it>
- Date: Tue, 5 Apr 2016 17:19:52 +0000 (UTC)
- Message-id: <1719941716.5402079.1459876792462.JavaMail.yahoo@mail.yahoo.com>
- Reply-to: Gianfranco Costamagna <costamagnagianfranco@yahoo.it>
- In-reply-to: <[🔎] BLU436-SMTP256A129BEC97964CE423801BF9E0@phx.gbl>
- References: <[🔎] BLU436-SMTP256A129BEC97964CE423801BF9E0@phx.gbl>
Hi, sponsored, but please note for a future upload: "+dhcpcd5: spelling-error-in-binary sbin/dhcpcd5 addres address" this isn't usually worth an override. copyright needs to be updated to year 2016 please forward patches upstream. in this case the CVE fixes were part of the new release, so you should have put them as subsection * new upstream release. - fixes CVE-foo and CVE-bar not sure if the removal of stdint include (fix_ftbfs_kfreebsd.diff) was good or not, we will see I guess! cheers, Gianfranco Il Martedì 5 Aprile 2016 19:09, Junior Santos <j.s.junior@live.com> ha scritto: Package: sponsorship-requests Severity: important Dear mentors, I am looking for a sponsor for my package “dhcpcd5" * Package name : dhcpcd5 Version : 6.10.1-1 Upstream Author : Roy Marples <roy@marples.name> * URL : http://roy.marples.name/projects/dhcpcd * License : BSD-2 Section : net It builds those binary packages: dhcpcd5 - DHCPv4, IPv6RA and DHCPv6 client with IPv4LL support To access further information about this package, please visit the following URL: http://mentors.debian.net/package/dhcpcd5 Alternatively, one can download the package with dget using this command: dget -x http://mentors.debian.net/debian/pool/main/d/dhcpcd5/dhcpcd5_6.10.1-1.dsc More information about hello can be obtained from http://www.example.com. Changes since the last upload: * New upstream release (Closes: #813595) * Fix CVE-2016-1504 invalid read/crash via malformed dhcp responses by upstream (Closes: #810620) * Fix CVE-2016-1503 heap overflow via malformed dhcp responses in print_option (via dhcp_envoption1) due to incorrect option length values by upstream (Closes: #810621) * d/control: - Bump Standards-Version to 3.9.7 * Fix dhcpcd5 FTBFS on kfreebsd-amd64 and kfreebsd-i386 by upstream (Closes: #815338) * Fix Multiplication of IPv6 addresses by upstream (Closes: #791582) * d/rules: - Add hardening * d/patches: - fix-spelling-error for all older files - fix-spelling-error-in-manpage for manpage`s * d/dhcpcd5.lintian-overrides: - Add overrides for spelling error binary false positive * recommended revision in your dhcp by upstream (Closes: #799795) Regards, J.S.Júnior
--- End Message ---