[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#931942: marked as done (RFS: libonig/6.9.2-1)



Your message dated Sat, 13 Jul 2019 12:19:46 +0200
with message-id <20190713101946.GA20848@angband.pl>
and subject line Re: Bug#931942: RFS: libonig/6.9.2-1
has caused the Debian Bug report #931942,
regarding RFS: libonig/6.9.2-1
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
931942: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=931942
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Package: sponsorship-requests
Severity: normal

  Dear mentors,

  I am looking for a sponsor for my package "libonig"

   Package name    : libonig
   Version         : 6.9.2-1
   Upstream Author : K.Kosako <kkosako0@gmail.com>
   URL             : https://github.com/kkos/oniguruma
   License         : BSD-2-clause
   Section         : libs

  It builds those binary packages:

 libonig-dev - regular expressions library — development files
 libonig5    - regular expressions library

  To access further information about this package, please visit the
following URL:

  https://mentors.debian.net/package/libonig


  Alternatively, one can download the package with dget using this
command:

  dget -x https://mentors.debian.net/debian/pool/main/libo/libonig/libonig_6.9.2-1.dsc

or

  https://jff.email/cgit/libonig.git/?h=release%2Fdebian%2F6.9.2-1

  Changes since the last upload:

  * New upstream release:
    - Refresh symbols file.
    - Refresh debian/patches/0100-source_typos.patch.
  * Rewrite debain/watch.
  * New debian/patches/0105-CVE-2019-13224.patch and
      debian/patches/0110-CVE-2019-13225.patch (Closes: #931878):
    - Fixes CVE-2019-13224 A use-after-free in onig_new_deluxe() in regext.c.
    - Fixes CVE-2019-13225 A NULL Pointer Dereference in match_at()
       in regexec.c.
  * Declare compliance with Debian Policy 4.4.0 (No changes needed).
  * Migrate to debhelper 12:
    - Change debian/compat to 12.
    - Bump minimum debhelper version in debian/control to >= 12.
    - debian/rules: Remove obsolete dh_install --fail-missing.

The build with sbuild and pdebuild and the tests with Lintain and
Piuparts are ok:

+------------------------------------------------------------------------------+
| Summary                                                                      |
+------------------------------------------------------------------------------+

Build Architecture: amd64
Build Type: full
Build-Space: 29572
Build-Time: 28
Distribution: sid
Host Architecture: amd64
Install-Time: 35
Job: /data/entwicklung/linux/debian/libonig/libonig_6.9.2-1.dsc
Lintian: info
Machine Architecture: amd64
Package: libonig
Package-Time: 80
Piuparts: pass
Source-Version: 6.9.2-1
Space: 29572
Status: successful
Version: 6.9.2-1
--------------------------------------------------------------------------------
Finished at 2019-07-12T17:20:07Z
Build needed 00:01:20, 29572k disk space


  Regards,
   Jörg Frings-Fürst


-- 
New:
GPG Fingerprint: 63E0 075F C8D4 3ABB 35AB  30EE 09F8 9F3C 8CA1 D25D
GPG key (long) : 09F89F3C8CA1D25D
GPG Key        : 8CA1D25D
CAcert Key S/N : 0E:D4:56

Old pgp Key: BE581B6E (revoked since 2014-12-31).

Jörg Frings-Fürst
D-54470 Lieser


git:      https://jff.email/cgit/

Threema:  SYR8SJXB
Wire:     @joergfringsfuerst
Skype:    joergpenguin
Ring:     jff
Telegram: @joergfringsfuerst


My wish list: 
 - Please send me a picture from the nature at your home.

--- End Message ---
--- Begin Message ---
On Fri, Jul 12, 2019 at 07:25:56PM +0200, Jörg Frings-Fürst wrote:
>    Package name    : libonig
>    Version         : 6.9.2-1

>   * New upstream release:
>     - Refresh symbols file.
>     - Refresh debian/patches/0100-source_typos.patch.
>   * Rewrite debain/watch.
>   * New debian/patches/0105-CVE-2019-13224.patch and
>       debian/patches/0110-CVE-2019-13225.patch (Closes: #931878):
>     - Fixes CVE-2019-13224 A use-after-free in onig_new_deluxe() in regext.c.
>     - Fixes CVE-2019-13225 A NULL Pointer Dereference in match_at()
>        in regexec.c.
>   * Declare compliance with Debian Policy 4.4.0 (No changes needed).
>   * Migrate to debhelper 12:
>     - Change debian/compat to 12.
>     - Bump minimum debhelper version in debian/control to >= 12.
>     - debian/rules: Remove obsolete dh_install --fail-missing.

LGTM

-- 
⢀⣴⠾⠻⢶⣦⠀
⣾⠁⢠⠒⠀⣿⡁ According to recent spams, "all my email accounts are owned
⢿⡄⠘⠷⠚⠋  by a hacker".  So what's the problem?
⠈⠳⣄⠀⠀⠀⠀

--- End Message ---

Reply to: