[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#1020413: marked as done (nmu: bind-dyndb-ldap_11.6-3)



Your message dated Sun, 5 Mar 2023 20:03:58 +0100
with message-id <faeba04c-823a-4366-57e8-9df00a7a7917@debian.org>
and subject line Re: Bug#1020413: nmu: bind-dyndb-ldap_11.6-3
has caused the Debian Bug report #1020413,
regarding nmu: bind-dyndb-ldap_11.6-3
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
1020413: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1020413
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Package: release.debian.org
Severity: normal
User: release.debian.org@packages.debian.org
Usertags: binnmu

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

nmu bind-dyndb-ldap_11.6-3 . ANY . bullseye . -m "rebuild for bind9_9.16.33-1~deb11u1"

Hi,

after the bind9_9.16.33-1~deb11u1 is release to bullseye-security, the
bind-dyndb-ldap plugin will require binNMU.

Thank you,
Ondrej

-----BEGIN PGP SIGNATURE-----
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=UWAs
-----END PGP SIGNATURE-----

--- End Message ---
--- Begin Message ---
Hi,

On Fri, 6 Jan 2023 14:25:25 +0100 Santiago Vila <sanvila@debian.org> wrote:
El 23/9/22 a las 10:21, Timo Aaltonen escribió:
> Paul Gevers kirjoitti 22.9.2022 klo 22.26:
>> So, Timo, is the package in bullseye broken with the security update and does it need a fix, or is it fine?
> > It needs a rebuild, [...]

I think it's really broken:

https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1027825

This NMU bug is now because of the FTBFS superseded by the RM bug 1030570.

Paul

Attachment: OpenPGP_signature
Description: OpenPGP digital signature


--- End Message ---

Reply to: