Devuan logs - #252, boring messages


Message sent to [email protected], [email protected]:


X-Loop: [email protected]
Subject: bug#252: debsecan: Uses debian release names, and debian data
Reply-To: Boruch Baum <[email protected]>, [email protected]
Resent-From: Boruch Baum <[email protected]>
Resent-To: [email protected]
Resent-CC: [email protected]
Resent-Date: Wed, 24 Oct 2018 00:18:01 UTC
Resent-Message-ID: <[email protected]>
Resent-Sender: [email protected]
X-Devuan-PR-Message: report 252
X-Devuan-PR-Package: debsecan
X-Devuan-PR-Keywords: 
Received: via spool by [email protected] id=B.15403398022246
          (code B ref -1); Wed, 24 Oct 2018 00:18:01 UTC
Received: (at submit) by bugs.devuan.org; 24 Oct 2018 00:10:02 +0000
Delivered-To: [email protected]
Received: from tupac3.dyne.org [195.169.149.119]
	by fulcanelli with IMAP (fetchmail-6.3.26)
	for <debbugs@localhost> (single-drop); Wed, 24 Oct 2018 02:10:02 +0200 (CEST)
Received: from mout.gmx.net (mout.gmx.net [212.227.17.20])
	(using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits))
	(No client certificate requested)
	by vm6.ganeti.dyne.org (Postfix) with ESMTPS id 5B39AF60C6F
	for <[email protected]>; Wed, 24 Oct 2018 02:10:35 +0200 (CEST)
Received: from E15-2016.optimum.net ([108.6.168.221]) by mail.gmx.com
 (mrgmx101 [212.227.17.174]) with ESMTPSA (Nemesis) id
 0MdFwl-1fwkuk3fqV-00ITW3 for <[email protected]>; Wed, 24 Oct 2018
 02:09:58 +0200
Received: from E15-2016.optimum.net ([108.6.168.221]) by mail.gmx.com
 (mrgmx101 [212.227.17.174]) with ESMTPSA (Nemesis) id
 0MdFwl-1fwkuk3fqV-00ITW3 for <[email protected]>; Wed, 24 Oct 2018
 02:09:58 +0200
Date: Tue, 23 Oct 2018 20:09:54 -0400
From: Boruch Baum <[email protected]>
To: Devuan Bug Tracking System <[email protected]>
Message-ID: <[email protected]>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
User-Agent: NeoMutt/20180716
X-Provags-ID: V03:K1:yV8aHIBjl6bZ/k3LhStGldQKTeb9FXbR8aA9DG7+qYjwJ6qAyqw
 dXbvB54uW8YXbMgtzgrX+qqqYoD9+bH7K2bjeGqdVUpQUOwSB9yaS7nwPieTglNVYB72Ta3
 H0ox/J8Cy+MwQxlWsfkZuUae9Yh/J8+W02YSD8oflMF6JBNpfHmFOEgZBFGWXAxj1X3+Mwz
 MBKRjDChh9GcB4+UuM81A==
X-UI-Out-Filterresults: notjunk:1;V01:K0:oIRCc3dgobo=:mB1JtnYx/PC5rRkFuI03ff
 pfgbI4nbKF0Bp6jvANaI16sVwP0FaLXA8GvU1WcwYz0wzTEI7vKWiRusO6IdQX1nC5MsCFIdj
 Lt38kAiVd41IADAYkSM5BGdsTgo1BLGQQ2kdKW6c9alOwE8/swHikzo6eJevbrMVEb4UoDeIK
 XSeG2iOfOfexpfVvW+8oU0G/GuA/51UrurfeTF5BS82t32xYDS8jMASVO+QHJ3+C3LF8TDsqA
 pWod/mvUdfg98t+EdA4VDBT2rubsUDoWOiaSzpwdWTW0BYSmFSLWGL9JCVVKC0ICW+jslh8cj
 29HpACPEuxGZE6NbIOQLYX+FecDtDbt7QtUx9RmbPKkXbmGoTOOqaUNCRBpl9GN78jt4JEutz
 /YcNwm7g2GtFJt3IlMs1iT4LsN0b/CgSW0x7hquisSkpFFdRa41tJ21P4CKGG6E629SZCvrnk
 Dia7bnVMK5IiLe5fzp87Ru21JFAZgBPknAENZfPXpQuj1OkYP3BNKGQcK0CI7Hp1t1te9Bkju
 wFyoRycNgQ1nN80eGEg3Gt3LaXOOI/o845t9+6vaBJOGx2E6hnrd6UB0y7Lwg6jGtsAN7Foek
 2zAWk3NvKwvg2UNomBkOhYED8dLszzwJ7Y52RbA4HvKqAz8RCF/6Au3HiYfM6v4Az7tO1ZWIt
 tQdT8njVt9brXqe1wC4M7vLSgPmGR88dwvsvyf4B2KIb+zEPYVO+64GnKPPf3rHqMk+TtYCv3
 4DZcaood+LvGvfmvvIeo3o22v8iAo+1KNESQ2YXdWTOGL09RR0Uc1+xPbqLuEubv2GLck0iX0
 TAsJvCeyvvtZNr0eDOgAlWYwx1PdQ==
X-Spam-Status: No, score=-0.2 required=5.0 tests=FREEMAIL_FROM,
	RCVD_IN_DNSWL_LOW,RCVD_IN_SORBS_SPAM,SPF_PASS autolearn=disabled version=3.4.1
X-Spam-Checker-Version: SpamAssassin 3.4.1 (2015-04-28) on tupac3.dyne.org

Subject: debsecan: Uses debian release names and data
Package: debsecan
Version: 0.4.19
Severity: important

Dear Maintainer,

This package, created by and for the debian project, bases its operation
on a particular release (eg. wheezy, squeeze, buster, sid). The devuan
version should be using devuan release names, and should use devuan data
(eg. package versions, patch availability)

-- System Information:
Distributor ID:	Devuan
Description:	Devuan GNU/Linux 2.0.0 (ascii)
Release:	2.0.0
Codename:	ascii
Architecture: x86_64

Kernel: Linux 4.14.0-3-amd64 (SMP w/4 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), LANGUAGE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: sysvinit (via /sbin/init)

Versions of packages debsecan depends on:
ii  ca-certificates        20180409
ii  debconf [debconf-2.0]  1.5.69
ii  python                 2.7.15-3
ii  python-apt             1.7.0

Versions of packages debsecan recommends:
ii  cron                                       3.0pl1-130
ii  exim4                                      4.91-8
ii  exim4-daemon-light [mail-transport-agent]  4.91-8

debsecan suggests no packages.

-- 
hkp://keys.gnupg.net
CA45 09B5 5351 7C11 A9D1  7286 0036 9E45 1595 8BC0


Message sent:


X-Loop: [email protected]
From: [email protected] (Devuan bug Tracking System)
To: Boruch Baum <[email protected]>
Subject: bug#252: Acknowledgement (debsecan: Uses debian release names, and debian data)
Message-ID: <[email protected]>
In-Reply-To: <[email protected]>
References: <[email protected]>
Precedence: bulk
X-Devuan-PR-Message: ack 252
X-Devuan-PR-Package: debsecan
X-Devuan-PR-Keywords: 
Reply-To: [email protected]

Thank you for the problem report you have sent regarding Devuan.
This is an automatically generated reply, to let you know your message has
been received.  It is being forwarded to the developers mailing list for
their attention; they will reply in due course.

Your message has been sent to the package maintainer(s):
 [email protected]

If you wish to submit further information on your problem, please send
it to [email protected] (and *not* to
[email protected]).

Please do not reply to the address at the top of this message,
unless you wish to report a problem with the bug-tracking system.

Your message specified a Severity: in the pseudo-header, but
the severity value important was not recognised.
The default severity normal is being used instead.
The recognised values are: critical, grave, normal, minor, wishlist.

Devuan Bugs Owner
(administrator, Devuan bugs database)


Message sent to [email protected], [email protected]:


X-Loop: [email protected]
Subject: bug#252: debsecan: Uses debian release names, and debian data
Reply-To: Mark Hindley <[email protected]>, [email protected]
Resent-From: Mark Hindley <[email protected]>
Resent-To: [email protected]
Resent-CC: [email protected]
X-Loop: [email protected]
Resent-Date: Wed, 08 Feb 2023 15:38:01 +0000
Resent-Message-ID: <[email protected]>
Resent-Sender: [email protected]
X-Devuan-PR-Message: followup 252
X-Devuan-PR-Package: debsecan
X-Devuan-PR-Keywords: 
References: <[email protected]> <[email protected]>
Received: via spool by [email protected] id=B252.167587057314774
          (code B ref 252); Wed, 08 Feb 2023 15:38:01 +0000
Received: (at 252) by bugs.devuan.org; 8 Feb 2023 15:36:13 +0000
Delivered-To: [email protected]
Received: from email.devuan.org [2001:41d0:2:d06e::5c4:2612]
	by doc.devuan.org with IMAP (fetchmail-6.4.16)
	for <debbugs@localhost> (single-drop); Wed, 08 Feb 2023 15:36:13 +0000 (UTC)
Received: from email.devuan.org
	by email.devuan.org with LMTP
	id jzakD0DB42MNNAAAmSBk0A
	(envelope-from <[email protected]>)
	for <[email protected]>; Wed, 08 Feb 2023 15:35:28 +0000
Received: by email.devuan.org (Postfix, from userid 109)
	id 2BF16B14; Wed,  8 Feb 2023 15:35:28 +0000 (UTC)
X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on email.devuan.org
X-Spam-Level: 
X-Spam-Status: No, score=0.4 required=5.0 tests=RDNS_DYNAMIC,SPF_PASS
	autolearn=no autolearn_force=no version=3.4.6
Received-SPF: Pass (mailfrom) identity=mailfrom; client-ip=193.36.131.86; helo=mx.hindley.org.uk; [email protected]; receiver=<UNKNOWN> 
Received: from mx.hindley.org.uk (193-36-131-86.cfwn.uk [193.36.131.86])
	by email.devuan.org (Postfix) with ESMTPS id CFD5184
	for <[email protected]>; Wed,  8 Feb 2023 15:35:26 +0000 (UTC)
Received: from apollo.hindleynet ([192.168.1.3] helo=hindley.org.uk)
	by mx.hindley.org.uk with smtp (Exim 4.84_2)
	(envelope-from <[email protected]>)
	id 1pPmTl-0004OW-Fg; Wed, 08 Feb 2023 15:35:25 +0000
Received: (nullmailer pid 31783 invoked by uid 1000);
	Wed, 08 Feb 2023 15:35:25 -0000
Date: Wed, 8 Feb 2023 15:35:25 +0000
From: Mark Hindley <[email protected]>
To: Boruch Baum <[email protected]>, [email protected]
Message-ID: <[email protected]>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <[email protected]>

Control: severity -1 wishlist

Boruch,

On Tue, Oct 23, 2018 at 08:09:54PM -0400, Boruch Baum wrote:
> Subject: debsecan: Uses debian release names and data
> Package: debsecan
> Version: 0.4.19
> Severity: important
> 
> Dear Maintainer,
> 
> This package, created by and for the debian project, bases its operation
> on a particular release (eg. wheezy, squeeze, buster, sid). The devuan
> version should be using devuan release names, and should use devuan data
> (eg. package versions, patch availability)

Thanks for this. I have had a quick look at debsecan and it is very much tied to
https://security-tracker.debian.org/tracker/. Devuan doesn't provide an
equivalent service at the moment. Until we do, there is not much we can do. In
most cases, the Debian security information is still relevant to Devuan.

Mark

Message received at [email protected]:


Received: (at 252) by bugs.devuan.org; 8 Feb 2023 15:36:13 +0000
Return-Path: <[email protected]>
Delivered-To: [email protected]
Received: from email.devuan.org [2001:41d0:2:d06e::5c4:2612]
	by doc.devuan.org with IMAP (fetchmail-6.4.16)
	for <debbugs@localhost> (single-drop); Wed, 08 Feb 2023 15:36:13 +0000 (UTC)
Received: from email.devuan.org
	by email.devuan.org with LMTP
	id jzakD0DB42MNNAAAmSBk0A
	(envelope-from <[email protected]>)
	for <[email protected]>; Wed, 08 Feb 2023 15:35:28 +0000
Received: by email.devuan.org (Postfix, from userid 109)
	id 2BF16B14; Wed,  8 Feb 2023 15:35:28 +0000 (UTC)
X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on email.devuan.org
X-Spam-Level: 
X-Spam-Status: No, score=0.4 required=5.0 tests=RDNS_DYNAMIC,SPF_PASS
	autolearn=no autolearn_force=no version=3.4.6
Received-SPF: Pass (mailfrom) identity=mailfrom; client-ip=193.36.131.86; helo=mx.hindley.org.uk; [email protected]; receiver=<UNKNOWN> 
Received: from mx.hindley.org.uk (193-36-131-86.cfwn.uk [193.36.131.86])
	by email.devuan.org (Postfix) with ESMTPS id CFD5184
	for <[email protected]>; Wed,  8 Feb 2023 15:35:26 +0000 (UTC)
Received: from apollo.hindleynet ([192.168.1.3] helo=hindley.org.uk)
	by mx.hindley.org.uk with smtp (Exim 4.84_2)
	(envelope-from <[email protected]>)
	id 1pPmTl-0004OW-Fg; Wed, 08 Feb 2023 15:35:25 +0000
Received: (nullmailer pid 31783 invoked by uid 1000);
	Wed, 08 Feb 2023 15:35:25 -0000
Date: Wed, 8 Feb 2023 15:35:25 +0000
From: Mark Hindley <[email protected]>
To: Boruch Baum <[email protected]>, [email protected]
Subject: Re: bug#252: debsecan: Uses debian release names, and debian data
Message-ID: <[email protected]>
References: <[email protected]>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <[email protected]>
X-Debbugs-No-Ack: No Thanks

Control: severity -1 wishlist

Boruch,

On Tue, Oct 23, 2018 at 08:09:54PM -0400, Boruch Baum wrote:
> Subject: debsecan: Uses debian release names and data
> Package: debsecan
> Version: 0.4.19
> Severity: important
> 
> Dear Maintainer,
> 
> This package, created by and for the debian project, bases its operation
> on a particular release (eg. wheezy, squeeze, buster, sid). The devuan
> version should be using devuan release names, and should use devuan data
> (eg. package versions, patch availability)

Thanks for this. I have had a quick look at debsecan and it is very much tied to
https://security-tracker.debian.org/tracker/. Devuan doesn't provide an
equivalent service at the moment. Until we do, there is not much we can do. In
most cases, the Debian security information is still relevant to Devuan.

Mark

Devuan BTS -- Powered by Debian bug tracking system
Copyright (C) 1999 Darren O. Benham,
1997 nCipher Corporation Ltd, 1994-97 Ian Jackson.

Devuan Bugs Owner <[email protected]>.
Last modified: Thu, 30 Jan 2025 12:39:01 UTC