From unknown Fri Mar 29 02:32:42 2024 Received: (at submit) by bugs.devuan.org; 24 Oct 2018 00:10:02 +0000 Return-Path: Delivered-To: devuanbugs@dyne.org Received: from tupac3.dyne.org [195.169.149.119] by fulcanelli with IMAP (fetchmail-6.3.26) for (single-drop); Wed, 24 Oct 2018 02:10:02 +0200 (CEST) Received: from mout.gmx.net (mout.gmx.net [212.227.17.20]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by vm6.ganeti.dyne.org (Postfix) with ESMTPS id 5B39AF60C6F for ; Wed, 24 Oct 2018 02:10:35 +0200 (CEST) Received: from E15-2016.optimum.net ([108.6.168.221]) by mail.gmx.com (mrgmx101 [212.227.17.174]) with ESMTPSA (Nemesis) id 0MdFwl-1fwkuk3fqV-00ITW3 for ; Wed, 24 Oct 2018 02:09:58 +0200 Received: from E15-2016.optimum.net ([108.6.168.221]) by mail.gmx.com (mrgmx101 [212.227.17.174]) with ESMTPSA (Nemesis) id 0MdFwl-1fwkuk3fqV-00ITW3 for ; Wed, 24 Oct 2018 02:09:58 +0200 Date: Tue, 23 Oct 2018 20:09:54 -0400 From: Boruch Baum To: Devuan Bug Tracking System Subject: debsecan: Uses debian release names, and debian data Message-ID: <20181024000954.n2ukomcdx7nsa57s@E15-2016.optimum.net> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline User-Agent: NeoMutt/20180716 X-Provags-ID: V03:K1:yV8aHIBjl6bZ/k3LhStGldQKTeb9FXbR8aA9DG7+qYjwJ6qAyqw dXbvB54uW8YXbMgtzgrX+qqqYoD9+bH7K2bjeGqdVUpQUOwSB9yaS7nwPieTglNVYB72Ta3 H0ox/J8Cy+MwQxlWsfkZuUae9Yh/J8+W02YSD8oflMF6JBNpfHmFOEgZBFGWXAxj1X3+Mwz MBKRjDChh9GcB4+UuM81A== X-UI-Out-Filterresults: notjunk:1;V01:K0:oIRCc3dgobo=:mB1JtnYx/PC5rRkFuI03ff pfgbI4nbKF0Bp6jvANaI16sVwP0FaLXA8GvU1WcwYz0wzTEI7vKWiRusO6IdQX1nC5MsCFIdj Lt38kAiVd41IADAYkSM5BGdsTgo1BLGQQ2kdKW6c9alOwE8/swHikzo6eJevbrMVEb4UoDeIK XSeG2iOfOfexpfVvW+8oU0G/GuA/51UrurfeTF5BS82t32xYDS8jMASVO+QHJ3+C3LF8TDsqA pWod/mvUdfg98t+EdA4VDBT2rubsUDoWOiaSzpwdWTW0BYSmFSLWGL9JCVVKC0ICW+jslh8cj 29HpACPEuxGZE6NbIOQLYX+FecDtDbt7QtUx9RmbPKkXbmGoTOOqaUNCRBpl9GN78jt4JEutz /YcNwm7g2GtFJt3IlMs1iT4LsN0b/CgSW0x7hquisSkpFFdRa41tJ21P4CKGG6E629SZCvrnk Dia7bnVMK5IiLe5fzp87Ru21JFAZgBPknAENZfPXpQuj1OkYP3BNKGQcK0CI7Hp1t1te9Bkju wFyoRycNgQ1nN80eGEg3Gt3LaXOOI/o845t9+6vaBJOGx2E6hnrd6UB0y7Lwg6jGtsAN7Foek 2zAWk3NvKwvg2UNomBkOhYED8dLszzwJ7Y52RbA4HvKqAz8RCF/6Au3HiYfM6v4Az7tO1ZWIt tQdT8njVt9brXqe1wC4M7vLSgPmGR88dwvsvyf4B2KIb+zEPYVO+64GnKPPf3rHqMk+TtYCv3 4DZcaood+LvGvfmvvIeo3o22v8iAo+1KNESQ2YXdWTOGL09RR0Uc1+xPbqLuEubv2GLck0iX0 TAsJvCeyvvtZNr0eDOgAlWYwx1PdQ== X-Spam-Status: No, score=-0.2 required=5.0 tests=FREEMAIL_FROM, RCVD_IN_DNSWL_LOW,RCVD_IN_SORBS_SPAM,SPF_PASS autolearn=disabled version=3.4.1 X-Spam-Checker-Version: SpamAssassin 3.4.1 (2015-04-28) on tupac3.dyne.org Subject: debsecan: Uses debian release names and data Package: debsecan Version: 0.4.19 Severity: important Dear Maintainer, This package, created by and for the debian project, bases its operation on a particular release (eg. wheezy, squeeze, buster, sid). The devuan version should be using devuan release names, and should use devuan data (eg. package versions, patch availability) -- System Information: Distributor ID: Devuan Description: Devuan GNU/Linux 2.0.0 (ascii) Release: 2.0.0 Codename: ascii Architecture: x86_64 Kernel: Linux 4.14.0-3-amd64 (SMP w/4 CPU cores) Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), LANGUAGE=en_US.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Init: sysvinit (via /sbin/init) Versions of packages debsecan depends on: ii ca-certificates 20180409 ii debconf [debconf-2.0] 1.5.69 ii python 2.7.15-3 ii python-apt 1.7.0 Versions of packages debsecan recommends: ii cron 3.0pl1-130 ii exim4 4.91-8 ii exim4-daemon-light [mail-transport-agent] 4.91-8 debsecan suggests no packages. -- hkp://keys.gnupg.net CA45 09B5 5351 7C11 A9D1 7286 0036 9E45 1595 8BC0 From unknown Fri Mar 29 02:32:42 2024 Received: (at 252) by bugs.devuan.org; 8 Feb 2023 15:36:13 +0000 Return-Path: Delivered-To: bugs@devuan.org Received: from email.devuan.org [2001:41d0:2:d06e::5c4:2612] by doc.devuan.org with IMAP (fetchmail-6.4.16) for (single-drop); Wed, 08 Feb 2023 15:36:13 +0000 (UTC) Received: from email.devuan.org by email.devuan.org with LMTP id jzakD0DB42MNNAAAmSBk0A (envelope-from ) for ; Wed, 08 Feb 2023 15:35:28 +0000 Received: by email.devuan.org (Postfix, from userid 109) id 2BF16B14; Wed, 8 Feb 2023 15:35:28 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on email.devuan.org X-Spam-Level: X-Spam-Status: No, score=0.4 required=5.0 tests=RDNS_DYNAMIC,SPF_PASS autolearn=no autolearn_force=no version=3.4.6 Received-SPF: Pass (mailfrom) identity=mailfrom; client-ip=193.36.131.86; helo=mx.hindley.org.uk; envelope-from=mark@hindley.org.uk; receiver= Received: from mx.hindley.org.uk (193-36-131-86.cfwn.uk [193.36.131.86]) by email.devuan.org (Postfix) with ESMTPS id CFD5184 for <252@bugs.devuan.org>; Wed, 8 Feb 2023 15:35:26 +0000 (UTC) Received: from apollo.hindleynet ([192.168.1.3] helo=hindley.org.uk) by mx.hindley.org.uk with smtp (Exim 4.84_2) (envelope-from ) id 1pPmTl-0004OW-Fg; Wed, 08 Feb 2023 15:35:25 +0000 Received: (nullmailer pid 31783 invoked by uid 1000); Wed, 08 Feb 2023 15:35:25 -0000 Date: Wed, 8 Feb 2023 15:35:25 +0000 From: Mark Hindley To: Boruch Baum , 252@bugs.devuan.org Subject: Re: bug#252: debsecan: Uses debian release names, and debian data Message-ID: References: <20181024000954.n2ukomcdx7nsa57s@E15-2016.optimum.net> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20181024000954.n2ukomcdx7nsa57s@E15-2016.optimum.net> X-Debbugs-No-Ack: No Thanks Control: severity -1 wishlist Boruch, On Tue, Oct 23, 2018 at 08:09:54PM -0400, Boruch Baum wrote: > Subject: debsecan: Uses debian release names and data > Package: debsecan > Version: 0.4.19 > Severity: important > > Dear Maintainer, > > This package, created by and for the debian project, bases its operation > on a particular release (eg. wheezy, squeeze, buster, sid). The devuan > version should be using devuan release names, and should use devuan data > (eg. package versions, patch availability) Thanks for this. I have had a quick look at debsecan and it is very much tied to https://security-tracker.debian.org/tracker/. Devuan doesn't provide an equivalent service at the moment. Until we do, there is not much we can do. In most cases, the Debian security information is still relevant to Devuan. Mark