[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#910065: marked as done (stretch-pu: package libmail-deliverystatus-bounceparser-perl/1.542-1)



Your message dated Sat, 10 Nov 2018 10:42:56 +0000
with message-id <1541846576.3542.38.camel@adam-barratt.org.uk>
and subject line Closing bugs for updates included in 9.6
has caused the Debian Bug report #910065,
regarding stretch-pu: package libmail-deliverystatus-bounceparser-perl/1.542-1
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
910065: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=910065
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Package: release.debian.org
Severity: normal
Tags: stretch
User: release.debian.org@packages.debian.org
Usertags: pu

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Hello,

libmail-deliverystatus-bounceparser-perl contains some viruses in its tests
files (#864800). This update proposes to clean sources.

Since debdiff contains virus signatures, it can not be embedded here
(rejected by SMTP server). I put it on qa.debian.org server:
/home/yadd/libmail-deliverystatus-bounceparser-perl_1.542-1.debdiff

Cheers,
Xavier

- -- System Information:
Debian Release: buster/sid
  APT prefers testing
  APT policy: (600, 'testing'), (50, 'unstable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 4.14.0-3-amd64 (SMP w/2 CPU cores)
Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8), LANGUAGE= (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

-----BEGIN PGP SIGNATURE-----
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=Ysqg
-----END PGP SIGNATURE-----

--- End Message ---
--- Begin Message ---
Version: 9.6

Hi,

The update referenced by each of these bugs was included in this
morning's stretch point release.

Regards,

Adam

--- End Message ---

Reply to: