Bug#950834: marked as done (ITP: ospd-openvas -- OSP server implementation to allow GVM to remotely control OpenVAS)
Your message dated Mon, 22 Jun 2020 11:00:12 +0000
with message-id <E1jnKBQ-000F2S-5s@fasolo.debian.org>
and subject line Bug#950834: fixed in ospd-openvas 1.0.0-1~exp1
has caused the Debian Bug report #950834,
regarding ITP: ospd-openvas -- OSP server implementation to allow GVM to remotely control OpenVAS
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)
--
950834: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=950834
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
- To: Debian Bug Tracking System <submit@bugs.debian.org>
- Subject: ITP: ospd-openvas -- OSP server implementation to allow GVM to remotely control OpenVAS
- From: Sophie Brun <sophie@offensive-security.com>
- Date: Fri, 07 Feb 2020 09:54:01 +0100
- Message-id: <158106564157.57075.8981171898278657606.reportbug@x250-sophie>
Package: wnpp
Severity: wishlist
Owner: Sophie Brun <sophie@offensive-security.com>
* Package name : ospd-openvas
Version : 1.0.0
Upstream Author : Greenbone Networks GmbH
* URL : https://github.com/greenbone/ospd-openvas
* License : GPL-2+
Programming Lang: Python3
Description : OSP server implementation to allow GVM to remotely control OpenVAS
This package contains an OSP server implementation to allow GVM to
remotely control OpenVAS.
It is a command line tool with parameters to start a daemon which keeps
waiting for instructions to update the feed of vulnerability tests and
to start a scan. The second part of the interface is the redis store
where the parameters about a scan task need to be placed and from where
the results can be retrieved, being the unique communication channel
between OSPD-OpenVAS and OpenVAS.
I plan to maintain this package within the pkg-security team with the
other openvas/ greenbone packages.
--- End Message ---
--- Begin Message ---
Source: ospd-openvas
Source-Version: 1.0.0-1~exp1
Done: =?utf-8?b?U1ogTGluICjmnpfkuIrmmbop?= <szlin@debian.org>
We believe that the bug you reported is fixed in the latest version of
ospd-openvas, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to 950834@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
SZ Lin (林上智) <szlin@debian.org> (supplier of updated ospd-openvas package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@ftp-master.debian.org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Mon, 27 Apr 2020 14:57:29 +0800
Source: ospd-openvas
Binary: ospd-openvas
Architecture: source all
Version: 1.0.0-1~exp1
Distribution: experimental
Urgency: medium
Maintainer: Debian Security Tools <team+pkg-security@tracker.debian.org>
Changed-By: SZ Lin (林上智) <szlin@debian.org>
Description:
ospd-openvas - OSP server implementation to allow GVM to remotely control an Ope
Closes: 950834
Changes:
ospd-openvas (1.0.0-1~exp1) experimental; urgency=medium
.
[ Sophie Brun ]
* Initial release (Closes: #950834)
.
[ SZ Lin (林上智) ]
* Add upstream metadata
* Add comments in elaborating the typo in license declaration
* d/control:
- Set Rules-Requires-Root: no
* d/rules:
- Remove trailing newline
Checksums-Sha1:
775fe724350477adb87e8b16122321f1e7be9070 2141 ospd-openvas_1.0.0-1~exp1.dsc
1a8d8de17a0c02e662be9c214ec070e736e60f6d 49725 ospd-openvas_1.0.0.orig.tar.gz
9a6a3526b50c861a2ef62b82b9ba57a717599ff3 3104 ospd-openvas_1.0.0-1~exp1.debian.tar.xz
c3bedafd362ab7b2fbdaa399dcbc41868e86f384 21880 ospd-openvas_1.0.0-1~exp1_all.deb
6fcc22d4cdab17b3d0b16a284b764641647e20a7 6480 ospd-openvas_1.0.0-1~exp1_amd64.buildinfo
Checksums-Sha256:
0b99d0579ca342791e8b46c780abd6a6562fde1dcd3913c938d2746457e2832b 2141 ospd-openvas_1.0.0-1~exp1.dsc
d2b5434e59ab980cfb1ca976208f5c058d4ea9b152fbc3e62a4dd6460e2041bf 49725 ospd-openvas_1.0.0.orig.tar.gz
9e9d3d3ddc29de08aa00827043d8e7434e7528a971b4f06e0895f00f2a47c1a3 3104 ospd-openvas_1.0.0-1~exp1.debian.tar.xz
09e3f8032e7228becd3d6c548c16aae074e188b9bb09b401a2482f3d52ac2913 21880 ospd-openvas_1.0.0-1~exp1_all.deb
b91d81a44b2ad4ba504f5f14f1ad70de14b05ef95da44b2f38195db639043b6d 6480 ospd-openvas_1.0.0-1~exp1_amd64.buildinfo
Files:
7d1487139da9e5b31cb7a5abd2f1acb5 2141 admin optional ospd-openvas_1.0.0-1~exp1.dsc
d3f150c5f643372efb1108b7efc061e5 49725 admin optional ospd-openvas_1.0.0.orig.tar.gz
2abfa6ec60b54d42069ff3859e792084 3104 admin optional ospd-openvas_1.0.0-1~exp1.debian.tar.xz
88f604ffc89ebed38a0720b7f5e3f438 21880 admin optional ospd-openvas_1.0.0-1~exp1_all.deb
05cd57f14b6ccda92cd328a74f5241e7 6480 admin optional ospd-openvas_1.0.0-1~exp1_amd64.buildinfo
-----BEGIN PGP SIGNATURE-----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=dC2K
-----END PGP SIGNATURE-----
--- End Message ---
Reply to: