Your message dated Sun, 22 May 2005 15:51:20 -0400
with message-id <[EMAIL PROTECTED]>
and subject line Bug#309681: fixed in util-vserver 0.30.207-6
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--------------------------------------
Received: (at submit) by bugs.debian.org; 18 May 2005 19:43:08 +0000
>From [EMAIL PROTECTED] Wed May 18 12:43:08 2005
Return-path: <[EMAIL PROTECTED]>
Received: from 83-217-93-3.adsl.realdsl.be (deepspace) [83.217.93.3] 
        by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
        id 1DYURg-0001aj-00; Wed, 18 May 2005 12:43:08 -0700
Received: by deepspace (Postfix, from userid 1000)
        id DF1B811B158; Wed, 18 May 2005 21:42:52 +0200 (CEST)
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: Tom Laermans <[EMAIL PROTECTED]>
To: Debian Bug Tracking System <[EMAIL PROTECTED]>
Subject: util-vserver: Does not install on Sid
X-Mailer: reportbug 3.7.1
Date: Wed, 18 May 2005 21:42:52 +0200
Message-Id: <[EMAIL PROTECTED]>
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE 
        autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 

Package: util-vserver
Version: 0.30.204-1
Severity: grave
Justification: renders package unusable

util-vserver does not install on unstable due to dependency on beecrypt2
which seems to have been removed from the debian system (it exists on
woody and on sarge).

-- System Information:
Debian Release: 3.1
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: i386 (i686)
Kernel: Linux 2.6.10-deepspace-swsusp2
Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968)

Versions of packages util-vserver depends on:
ii  iproute                     20041019-3   Professional tools to control the 
ii  libc6                       2.3.2.ds1-21 GNU C Library: Shared libraries an
ii  libgcc1                     1:3.4.3-7    GCC support library
ii  libstdc++5                  1:3.3.5-8    The GNU Standard C++ Library v3
ii  net-tools                   1.60-10      The NET-3 networking toolkit

-- no debconf information

---------------------------------------
Received: (at 309681-close) by bugs.debian.org; 22 May 2005 19:53:01 +0000
>From [EMAIL PROTECTED] Sun May 22 12:53:01 2005
Return-path: <[EMAIL PROTECTED]>
Received: from newraff.debian.org [208.185.25.31] (mail)
        by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
        id 1DZwVR-0006LQ-00; Sun, 22 May 2005 12:53:01 -0700
Received: from katie by newraff.debian.org with local (Exim 3.35 1 (Debian))
        id 1DZwTo-0008R6-00; Sun, 22 May 2005 15:51:20 -0400
From: Ola Lundqvist <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
X-Katie: $Revision: 1.55 $
Subject: Bug#309681: fixed in util-vserver 0.30.207-6
Message-Id: <[EMAIL PROTECTED]>
Sender: Archive Administrator <[EMAIL PROTECTED]>
Date: Sun, 22 May 2005 15:51:20 -0400
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
        autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 
X-CrossAssassin-Score: 4

Source: util-vserver
Source-Version: 0.30.207-6

We believe that the bug you reported is fixed in the latest version of
util-vserver, which is due to be installed in the Debian FTP archive:

util-vserver_0.30.207-6.diff.gz
  to pool/main/u/util-vserver/util-vserver_0.30.207-6.diff.gz
util-vserver_0.30.207-6.dsc
  to pool/main/u/util-vserver/util-vserver_0.30.207-6.dsc
util-vserver_0.30.207-6_i386.deb
  to pool/main/u/util-vserver/util-vserver_0.30.207-6_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Ola Lundqvist <[EMAIL PROTECTED]> (supplier of updated util-vserver package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Sun, 22 May 2005 19:20:47 +0200
Source: util-vserver
Binary: util-vserver
Architecture: source i386
Version: 0.30.207-6
Distribution: unstable
Urgency: high
Maintainer: Ola Lundqvist <[EMAIL PROTECTED]>
Changed-By: Ola Lundqvist <[EMAIL PROTECTED]>
Description: 
 util-vserver - tools for Virtual private servers and context switching
Closes: 305216 308893 308998 309681
Changes: 
 util-vserver (0.30.207-6) unstable; urgency=high
 .
   * Use beecrypt6 instead of beecrypt2, closes: #309681.
   * Suggest kernel-patch-vserver instead of kernel-patch-ctx, closes: #308998.
   * Corrected documentation, closes: #308893.
   * Better upgrade that avoid errors, closes: #305216.
Files: 
 5f8e3c3c13ca061508b4fbff1dd8ed18 758 net optional util-vserver_0.30.207-6.dsc
 d380549d5160e81b160b352da0c9805d 172820 net optional 
util-vserver_0.30.207-6.diff.gz
 73e8074fa5a982b17f4fdfb9c2d3b656 412808 net optional 
util-vserver_0.30.207-6_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.5 (GNU/Linux)

iD8DBQFCkNvjGKGxzw/lPdkRApfJAKCbvqDwOUuLJS7h6tdw3/2mU5M5lQCffNIA
D0UkqPt4HW6ha8cubcqV/SU=
=R8gY
-----END PGP SIGNATURE-----


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to