[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#1033017: marked as done (RFS: dmidecode/3.5-1 -- SMBIOS/DMI table decoder)



Your message dated Wed, 14 Jun 2023 12:14:18 +0200
with message-id <e8144066-3d29-53aa-dfa2-93787695a6f8@debian.org>
and subject line Re: RFS: dmidecode/3.5-1 -- SMBIOS/DMI table decoder
has caused the Debian Bug report #1033017,
regarding RFS: dmidecode/3.5-1 -- SMBIOS/DMI table decoder
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
1033017: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033017
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Package: sponsorship-requests
Severity: normal

Dear mentors,

I am looking for a sponsor for my package "dmidecode" for upload into
experimental:

   Package name     : dmidecode
   Version          : 3.5-1
   Upstream contact : dmidecode-devel@nongnu.org
   URL              : https://nongnu.org/dmidecode/
   License          : GPL-2+
   Vcs              : https://jff.email/cgit/dmidecode.git/
   Section          : utils

The source builds the following binary packages:

  dmidecode - SMBIOS/DMI table decoder
  dmidecode-udeb - SMBIOS/DMI table decoder (udeb)

To access further information about this package, please visit the
following URL:

  https://mentors.debian.net/package/dmidecode/

Alternatively, you can download the package with 'dget' using this
command:

 dget -x https://mentors.debian.net/debian/pool/main/d/dmidecode/dmidecode_3.5-1.dsc

or from 

 git https://jff.email/cgit/dmidecode.git/?h=release%2Fdebian%2F3.5-1


Changes since the last upload:

 dmidecode (3.5-1) unstable; urgency=medium
 .
   * New upstream release (Closes: #1032980).
   * Declare compliance with Debian Policy 4.6.2.0 (No changes needed).
   * debian/copyright:
     - Add year 2023 to myself.

CU
Jörg


-- 
New:
GPG Fingerprint: 63E0 075F C8D4 3ABB 35AB  30EE 09F8 9F3C 8CA1 D25D
GPG key (long) : 09F89F3C8CA1D25D
GPG Key        : 8CA1D25D
CAcert Key S/N : 0E:D4:56


Jörg Frings-Fürst
D-54470 Lieser


git:      https://jff.email/cgit/

Threema:  HU6U7Z6H
Wire:     @joergfringsfuerst
Skype:    jff-skype@jff.email
Ring:     jff
Telegram: @joergfringsfuerst
Matrix:   @joergff:matrix.snct-gmbh.de

My wish list: 
 - Please send me a picture from the nature at your home.

Attachment: signature.asc
Description: This is a digitally signed message part


--- End Message ---
--- Begin Message ---
On Thu, 18 May 2023 09:47:15 +0200 Bastian Germann <bage@debian.org> wrote:
Please address CVE-2023-30630 by backporting the patch(es) to 3.4.
New versions are not allowed at this point in freeze.

Please address the CVE via a stable update. I have uploaded to unstable.

--- End Message ---

Reply to: