[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#950215: marked as done (ITP: gvm-tools -- Remote control a Greenbone Vulnerability Manager)



Your message dated Thu, 06 Aug 2020 10:00:21 +0000
with message-id <E1k3chB-000AZn-F4@fasolo.debian.org>
and subject line Bug#950215: fixed in gvm-tools 2.0.0-1
has caused the Debian Bug report #950215,
regarding ITP: gvm-tools -- Remote control a Greenbone Vulnerability Manager
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
950215: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=950215
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Package: wnpp
Severity: wishlist
Owner: Sophie Brun <sophie@offensive-security.com>

* Package name    : gvm-tools
  Version         : 2.0.0
  Upstream Author : Greenbone Networks GmbH
* URL             : https://github.com/greenbone/gvm-tools
* License         : GPL-3+
  Programming Lang: Python
  Description     : Remote control a Greenbone Vulnerability Manager

The Greenbone Vulnerability Management Tools or gvm-tools in short are a
collection of tools that help with remote controlling a Greenbone Security
Manager (GSM) appliance and its underlying Greenbone Vulnerability Manager
(GVM). The tools essentially aid accessing the communication protocols GMP
(Greenbone Management Protocol) and OSP (Open Scanner Protocol).

This module is comprised of interactive and non-interactive clients. The
programming language Python is supported directly for interactive
scripting. But it is also possible to issue remote GMP/OSP commands
without programming in Python.

I plan to maintain this package within the pkg-security team with the
other openvas/ greenbone packages.

--- End Message ---
--- Begin Message ---
Source: gvm-tools
Source-Version: 2.0.0-1
Done: =?utf-8?q?Rapha=C3=ABl_Hertzog?= <raphael@offensive-security.com>

We believe that the bug you reported is fixed in the latest version of
gvm-tools, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 950215@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Raphaël Hertzog <raphael@offensive-security.com> (supplier of updated gvm-tools package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Fri, 31 Jul 2020 16:00:01 +0200
Source: gvm-tools
Binary: gvm-tools
Architecture: source all
Version: 2.0.0-1
Distribution: unstable
Urgency: medium
Maintainer: Debian Security Tools <team+pkg-security@tracker.debian.org>
Changed-By: Raphaël Hertzog <raphael@offensive-security.com>
Description:
 gvm-tools  - Remote control the Greenbone Vulnerability Manager
Closes: 950215
Changes:
 gvm-tools (2.0.0-1) unstable; urgency=medium
 .
   * Team upload
 .
   [ Sophie Brun ]
   * Initial release (Closes: 950215)
   * Fix the patch for the test with correct path to unix-socket
 .
   [ Samuel Henrique ]
   * Configure git-buildpackage for Debian
 .
   [ Raphaël Hertzog ]
   * Set upstream metadata fields: Bug-Database, Bug-Submit, Repository,
     Repository-Browse.
Checksums-Sha1:
 1bcf4c76a1c7dea5f858ddb782c54f602f142619 1768 gvm-tools_2.0.0-1.dsc
 015c9dff91bdd05486ecf8f536e42702c8804629 114592 gvm-tools_2.0.0.orig.tar.gz
 5b70252cbc30046a582d3263b151d412960a9868 3552 gvm-tools_2.0.0-1.debian.tar.xz
 b782a3a8a7b266a660b1d37bece6beb08649f9d9 58528 gvm-tools_2.0.0-1_all.deb
 d5e323975f46d9652e34263606c6030e4b989e29 9724 gvm-tools_2.0.0-1_amd64.buildinfo
Checksums-Sha256:
 b7e780f1e4a5857460ff71b8b1b91d8eea683ffab2b67a203c2db615b3397c8b 1768 gvm-tools_2.0.0-1.dsc
 5d5b8f78d35ef7daa9917c33ec5e8e538d8f0b095a462c6cf9c7c650c356abd0 114592 gvm-tools_2.0.0.orig.tar.gz
 04f4fb0667a3951345a6cfd8d95f8812d6827895c288e213eed04f27ed8016d7 3552 gvm-tools_2.0.0-1.debian.tar.xz
 b8245f1f5793da15bcc94d276436a1973c53c45aceb01683f112bde324b1b964 58528 gvm-tools_2.0.0-1_all.deb
 8e53efc1208f9b380708442730646778512dd79081c497fd114ec1678046b5f8 9724 gvm-tools_2.0.0-1_amd64.buildinfo
Files:
 7d122ccc76c9907435644d90e411b1f6 1768 net optional gvm-tools_2.0.0-1.dsc
 a06137533355cbbcc4b2b94bef1704c4 114592 net optional gvm-tools_2.0.0.orig.tar.gz
 d02b2f339225eaccd7a498a862ea250b 3552 net optional gvm-tools_2.0.0-1.debian.tar.xz
 eb6f003ca7394497f69a6800c7d8a164 58528 net optional gvm-tools_2.0.0-1_all.deb
 43c88445fc0c45bb4ca2e9efa5997d2f 9724 net optional gvm-tools_2.0.0-1_amd64.buildinfo

-----BEGIN PGP SIGNATURE-----
Comment: Signed by Raphael Hertzog

iQEzBAEBCgAdFiEE1823g1EQnhJ1LsbSA4gdq+vCmrkFAl8kJR0ACgkQA4gdq+vC
mrnhtwf9Gt9jA1k5cVdsIJ/VXk1P+5HFCWnz2ZAgty0OL4TNq2fzqycFOprmkSMl
nnjGHOdNw7bQAa+rE7hlT09xK4ZK2anhFwuEgzR0caCx3hE+SUUkMNicM8rr8tTK
cbeRFV8rhNeXR55YtW5PCUKf3rHk5GS7xk+x9iEXcOGHtzO2MLww9QwczyABhfdK
KVS1AMiD12aY1WoyphyfQJNHw1DAoTyDksFRYFCopLFCyO6lFE1RGmOraoYiO2fd
sxquo8pb+UFXhZZuyPms8+tLizc0tmQhdQy7jbeBZEYYLJ5IU9sc+e5ylaSwNWzH
pPdhfrrbN0L5yCfyzqjfq4X+BPbFeQ==
=NAuG
-----END PGP SIGNATURE-----

--- End Message ---

Reply to: