[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#766372: marked as done (RFS: gnustep-base/1.24.7-1 -- GNUstep Base library)



Your message dated Sun, 26 Oct 2014 16:23:56 +0000
with message-id <E1XiQbk-0002yr-A7@quantz.debian.org>
and subject line closing RFS: gnustep-base/1.24.7-1 -- GNUstep Base library
has caused the Debian Bug report #766372,
regarding RFS: gnustep-base/1.24.7-1 -- GNUstep Base library
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
766372: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=766372
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Package: sponsorship-requests
Severity: normal

Dear mentors,

I am looking for a sponsor for my package "gnustep-base".
It builds these binary packages:

gnustep-base-common - GNUstep Base library - common files
gnustep-base-doc - Documentation for the GNUstep Base Library
gnustep-base-examples - Examples using the GNUstep Base Library
gnustep-base-runtime - GNUstep Base library - daemons and tools
libgnustep-base-dev - GNUstep Base header files and development libraries
libgnustep-base1.24 - GNUstep Base library
libgnustep-base1.24-dbg - GNUstep Base library - debugging symbols

To access further information about this package, please visit the
following URL:

http://mentors.debian.net/package/gnustep-base

Alternatively, one can download the package with dget using this
command:

dget -x http://mentors.debian.net/debian/pool/main/g/gnustep-base/gnustep-base_1.24.7-1.dsc

Changes since the last upload:

  * New upstream bugfix release:
    - SSLv3 is disabled by default because of CVE-2014-3566.
  * debian/patches/testsuite-fixes.patch: Remove hunks applied upstream.
    Disable some tests that are doomed to fail.
  * debian/patches/info-direntry.patch:
  * debian/patches/manpage-fixes.patch: Remove hunks applied upstream.
  * debian/patches/NSString-buffer-overrun.patch:
  * debian/patches/ftbfs-mips64.patch:
  * debian/patches/hide-SYSTEM_CONFIG-vars.patch:
  * debian/patches/use-local-DTDs.patch:
  * debian/patches/CVE-2014-2980.patch:
  * debian/patches/kfreebsd-fake-main.patch:
  * debian/patches/avoid-nsl-linkage.patch:
  * debian/patches/gnutls28.patch:
  * debian/patches/alignment-check.patch:
  * debian/patches/avoid-tools-extra-linkage.patch:
  * debian/patches/maxsymlinks.diff: Delete; applied upstream.
  * debian/patches/pldes-manpage-rename.patch: Refresh.
  * debian/patches/autoreconf.patch: Delete; no longer needed.
  * debian/patches/fix-spelling-errors.patch: New.
  * debian/patches/series: Update.
  * debian/HTMLLinker.1:
  * debian/make_strings.1: Delete; added upstream.
  * debian/rules (configure-stamp): Dump config.log to stdout in case of
    configure error.
    (binary-arch): Install upstream manpages.
  * debian/control.m4 (Standards-Version): Bump to 3.9.6; no changes
    needed.
  * debian/control: Regenerate.
  * debian/gnustep-base-common.xmlcatalogs.in: Add new 1_0_4 DTD.
  * debian/gnustep-base-runtime.gdomap.in: Check for daemon existence,
    thanks Felipe Sateler (Closes: #764526).  Create /var/run/gdomap
    before the daemon starts.
  * debian/gdomap.default: Avoid chroot to /tmp, thanks Ansgar Burchardt
    (Closes: #741441).
  * debian/gnustep-base-runtime.NEWS: Rename as NEWS as it is not picked
    by apt-listchanges.
  * debian/watch: Check upstream signature.
  * debian/upstream/signing-key.pgp: Add upstream keyring.
  * debian/source/include-binaries: New file.
  * debian/copyright: Switch to format 1.0, update copyright years.

--- End Message ---
--- Begin Message ---
Package gnustep-base has been removed from mentors.

--- End Message ---

Reply to: