Devuan bug report logs - #252
debsecan: Uses debian release names, and debian data

Package: debsecan; Severity: wishlist; Reported by: Boruch Baum <[email protected]>; dated Wed, 24 Oct 2018 00:18:01 UTC; Maintainer for debsecan is (unknown).
Severity set to 'wishlist' from 'normal' Request was from Mark Hindley <[email protected]> to [email protected]. Full text available.

Message received at [email protected]:


Received: (at 252) by bugs.devuan.org; 8 Feb 2023 15:36:13 +0000
Return-Path: <[email protected]>
Delivered-To: [email protected]
Received: from email.devuan.org [2001:41d0:2:d06e::5c4:2612]
	by doc.devuan.org with IMAP (fetchmail-6.4.16)
	for <debbugs@localhost> (single-drop); Wed, 08 Feb 2023 15:36:13 +0000 (UTC)
Received: from email.devuan.org
	by email.devuan.org with LMTP
	id jzakD0DB42MNNAAAmSBk0A
	(envelope-from <[email protected]>)
	for <[email protected]>; Wed, 08 Feb 2023 15:35:28 +0000
Received: by email.devuan.org (Postfix, from userid 109)
	id 2BF16B14; Wed,  8 Feb 2023 15:35:28 +0000 (UTC)
X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on email.devuan.org
X-Spam-Level: 
X-Spam-Status: No, score=0.4 required=5.0 tests=RDNS_DYNAMIC,SPF_PASS
	autolearn=no autolearn_force=no version=3.4.6
Received-SPF: Pass (mailfrom) identity=mailfrom; client-ip=193.36.131.86; helo=mx.hindley.org.uk; [email protected]; receiver=<UNKNOWN> 
Received: from mx.hindley.org.uk (193-36-131-86.cfwn.uk [193.36.131.86])
	by email.devuan.org (Postfix) with ESMTPS id CFD5184
	for <[email protected]>; Wed,  8 Feb 2023 15:35:26 +0000 (UTC)
Received: from apollo.hindleynet ([192.168.1.3] helo=hindley.org.uk)
	by mx.hindley.org.uk with smtp (Exim 4.84_2)
	(envelope-from <[email protected]>)
	id 1pPmTl-0004OW-Fg; Wed, 08 Feb 2023 15:35:25 +0000
Received: (nullmailer pid 31783 invoked by uid 1000);
	Wed, 08 Feb 2023 15:35:25 -0000
Date: Wed, 8 Feb 2023 15:35:25 +0000
From: Mark Hindley <[email protected]>
To: Boruch Baum <[email protected]>, [email protected]
Subject: Re: bug#252: debsecan: Uses debian release names, and debian data
Message-ID: <[email protected]>
References: <[email protected]>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <[email protected]>
X-Debbugs-No-Ack: No Thanks

Control: severity -1 wishlist

Boruch,

On Tue, Oct 23, 2018 at 08:09:54PM -0400, Boruch Baum wrote:
> Subject: debsecan: Uses debian release names and data
> Package: debsecan
> Version: 0.4.19
> Severity: important
> 
> Dear Maintainer,
> 
> This package, created by and for the debian project, bases its operation
> on a particular release (eg. wheezy, squeeze, buster, sid). The devuan
> version should be using devuan release names, and should use devuan data
> (eg. package versions, patch availability)

Thanks for this. I have had a quick look at debsecan and it is very much tied to
https://security-tracker.debian.org/tracker/. Devuan doesn't provide an
equivalent service at the moment. Until we do, there is not much we can do. In
most cases, the Debian security information is still relevant to Devuan.

Mark

Information forwarded to [email protected], [email protected]:
bug#252; Package debsecan. Full text available.

Message received at [email protected]:


Received: (at submit) by bugs.devuan.org; 24 Oct 2018 00:10:02 +0000
Return-Path: <[email protected]>
Delivered-To: [email protected]
Received: from tupac3.dyne.org [195.169.149.119]
	by fulcanelli with IMAP (fetchmail-6.3.26)
	for <debbugs@localhost> (single-drop); Wed, 24 Oct 2018 02:10:02 +0200 (CEST)
Received: from mout.gmx.net (mout.gmx.net [212.227.17.20])
	(using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits))
	(No client certificate requested)
	by vm6.ganeti.dyne.org (Postfix) with ESMTPS id 5B39AF60C6F
	for <[email protected]>; Wed, 24 Oct 2018 02:10:35 +0200 (CEST)
Received: from E15-2016.optimum.net ([108.6.168.221]) by mail.gmx.com
 (mrgmx101 [212.227.17.174]) with ESMTPSA (Nemesis) id
 0MdFwl-1fwkuk3fqV-00ITW3 for <[email protected]>; Wed, 24 Oct 2018
 02:09:58 +0200
Received: from E15-2016.optimum.net ([108.6.168.221]) by mail.gmx.com
 (mrgmx101 [212.227.17.174]) with ESMTPSA (Nemesis) id
 0MdFwl-1fwkuk3fqV-00ITW3 for <[email protected]>; Wed, 24 Oct 2018
 02:09:58 +0200
Date: Tue, 23 Oct 2018 20:09:54 -0400
From: Boruch Baum <[email protected]>
To: Devuan Bug Tracking System <[email protected]>
Subject: debsecan: Uses debian release names, and debian data
Message-ID: <[email protected]>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
User-Agent: NeoMutt/20180716
X-Provags-ID: V03:K1:yV8aHIBjl6bZ/k3LhStGldQKTeb9FXbR8aA9DG7+qYjwJ6qAyqw
 dXbvB54uW8YXbMgtzgrX+qqqYoD9+bH7K2bjeGqdVUpQUOwSB9yaS7nwPieTglNVYB72Ta3
 H0ox/J8Cy+MwQxlWsfkZuUae9Yh/J8+W02YSD8oflMF6JBNpfHmFOEgZBFGWXAxj1X3+Mwz
 MBKRjDChh9GcB4+UuM81A==
X-UI-Out-Filterresults: notjunk:1;V01:K0:oIRCc3dgobo=:mB1JtnYx/PC5rRkFuI03ff
 pfgbI4nbKF0Bp6jvANaI16sVwP0FaLXA8GvU1WcwYz0wzTEI7vKWiRusO6IdQX1nC5MsCFIdj
 Lt38kAiVd41IADAYkSM5BGdsTgo1BLGQQ2kdKW6c9alOwE8/swHikzo6eJevbrMVEb4UoDeIK
 XSeG2iOfOfexpfVvW+8oU0G/GuA/51UrurfeTF5BS82t32xYDS8jMASVO+QHJ3+C3LF8TDsqA
 pWod/mvUdfg98t+EdA4VDBT2rubsUDoWOiaSzpwdWTW0BYSmFSLWGL9JCVVKC0ICW+jslh8cj
 29HpACPEuxGZE6NbIOQLYX+FecDtDbt7QtUx9RmbPKkXbmGoTOOqaUNCRBpl9GN78jt4JEutz
 /YcNwm7g2GtFJt3IlMs1iT4LsN0b/CgSW0x7hquisSkpFFdRa41tJ21P4CKGG6E629SZCvrnk
 Dia7bnVMK5IiLe5fzp87Ru21JFAZgBPknAENZfPXpQuj1OkYP3BNKGQcK0CI7Hp1t1te9Bkju
 wFyoRycNgQ1nN80eGEg3Gt3LaXOOI/o845t9+6vaBJOGx2E6hnrd6UB0y7Lwg6jGtsAN7Foek
 2zAWk3NvKwvg2UNomBkOhYED8dLszzwJ7Y52RbA4HvKqAz8RCF/6Au3HiYfM6v4Az7tO1ZWIt
 tQdT8njVt9brXqe1wC4M7vLSgPmGR88dwvsvyf4B2KIb+zEPYVO+64GnKPPf3rHqMk+TtYCv3
 4DZcaood+LvGvfmvvIeo3o22v8iAo+1KNESQ2YXdWTOGL09RR0Uc1+xPbqLuEubv2GLck0iX0
 TAsJvCeyvvtZNr0eDOgAlWYwx1PdQ==
X-Spam-Status: No, score=-0.2 required=5.0 tests=FREEMAIL_FROM,
	RCVD_IN_DNSWL_LOW,RCVD_IN_SORBS_SPAM,SPF_PASS autolearn=disabled version=3.4.1
X-Spam-Checker-Version: SpamAssassin 3.4.1 (2015-04-28) on tupac3.dyne.org

Subject: debsecan: Uses debian release names and data
Package: debsecan
Version: 0.4.19
Severity: important

Dear Maintainer,

This package, created by and for the debian project, bases its operation
on a particular release (eg. wheezy, squeeze, buster, sid). The devuan
version should be using devuan release names, and should use devuan data
(eg. package versions, patch availability)

-- System Information:
Distributor ID:	Devuan
Description:	Devuan GNU/Linux 2.0.0 (ascii)
Release:	2.0.0
Codename:	ascii
Architecture: x86_64

Kernel: Linux 4.14.0-3-amd64 (SMP w/4 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), LANGUAGE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: sysvinit (via /sbin/init)

Versions of packages debsecan depends on:
ii  ca-certificates        20180409
ii  debconf [debconf-2.0]  1.5.69
ii  python                 2.7.15-3
ii  python-apt             1.7.0

Versions of packages debsecan recommends:
ii  cron                                       3.0pl1-130
ii  exim4                                      4.91-8
ii  exim4-daemon-light [mail-transport-agent]  4.91-8

debsecan suggests no packages.

-- 
hkp://keys.gnupg.net
CA45 09B5 5351 7C11 A9D1  7286 0036 9E45 1595 8BC0


Acknowledgement sent to Boruch Baum <[email protected]>:
New bug report received and forwarded. Copy sent to [email protected].

Your message specified a Severity: in the pseudo-header, but the severity value important was not recognised. The default severity normal is being used instead. The recognised values are: critical, grave, normal, minor, wishlist.

Full text available.


Report forwarded to [email protected], [email protected]:
bug#252; Package debsecan. Full text available.

Devuan BTS -- Powered by Debian bug tracking system
Copyright (C) 1999 Darren O. Benham,
1997 nCipher Corporation Ltd, 1994-97 Ian Jackson.

Devuan Bugs Owner <[email protected]>.
Last modified: Wed, 29 Jan 2025 20:39:01 UTC