Your message dated Thu, 26 Aug 2010 22:03:22 +0000
with message-id <e1ookxa-0001g7...@franck.debian.org>
and subject line Bug#594103: fixed in sks 1.1.1+dpkgv3-1
has caused the Debian Bug report #594103,
regarding sks: Upgrading breaks database
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
594103: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=594103
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: sks
Version: 1.1.1-2
Severity: grave
Justification: renders package unusable

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Hi,

Upgrading to this version of sks from the version in stable breaks the
database, because there is no automatic upgrade of the database to db4.7
environment.

Setting severity grave because this causes total denial of service unless
the user takes manual action, which should not be necessary.

At the very least, please document this in a Debian NEWS file and provide
instructions for upgrading the database, or better provide an automatic
upgrade path that does not involve the user who is upgrading the package.


- -- System Information:
Debian Release: squeeze/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'testing')
Architecture: amd64 (x86_64)

Kernel: Linux 2.6.32-5-amd64 (SMP w/2 CPU cores)
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)
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=uQaH
-----END PGP SIGNATURE-----



--- End Message ---
--- Begin Message ---
Source: sks
Source-Version: 1.1.1+dpkgv3-1

We believe that the bug you reported is fixed in the latest version of
sks, which is due to be installed in the Debian FTP archive:

sks_1.1.1+dpkgv3-1.debian.tar.gz
  to main/s/sks/sks_1.1.1+dpkgv3-1.debian.tar.gz
sks_1.1.1+dpkgv3-1.dsc
  to main/s/sks/sks_1.1.1+dpkgv3-1.dsc
sks_1.1.1+dpkgv3-1_amd64.deb
  to main/s/sks/sks_1.1.1+dpkgv3-1_amd64.deb
sks_1.1.1+dpkgv3.orig.tar.gz
  to main/s/sks/sks_1.1.1+dpkgv3.orig.tar.gz



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 594...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Christoph Martin <christoph.mar...@uni-mainz.de> (supplier of updated sks 
package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: RIPEMD160

Format: 1.8
Date: Wed, 25 Aug 2010 18:11:26 +0200
Source: sks
Binary: sks
Architecture: source amd64
Version: 1.1.1+dpkgv3-1
Distribution: unstable
Urgency: high
Maintainer: Christoph Martin <christoph.mar...@uni-mainz.de>
Changed-By: Christoph Martin <christoph.mar...@uni-mainz.de>
Description: 
 sks        - Synchronizing OpenPGP Key Server
Closes: 576057 593852 594103
Changes: 
 sks (1.1.1+dpkgv3-1) unstable; urgency=high
 .
   * include NEWS file to inform about db update (closes: #594103)
   * fix README.Debian to include a working download URL for a fresh
     keydump (closes: 593852)
   * 511_gcc4.4_prototypes: Don't redefine bzero(3), fixes FTBFS (Thanks to
     Daniel T Chen <crim...@ubuntu.com>)
   * convert to source format 3 with quilt patches (closes: #576057)
Checksums-Sha1: 
 348696b892119e0ab026643e716089ef47927d7a 1190 sks_1.1.1+dpkgv3-1.dsc
 9a64eb60a401c71b8e6ae94f6533f01b14e2886f 174331 sks_1.1.1+dpkgv3.orig.tar.gz
 b04f48c92b414afd89a9c06732fd1c5ce3c55003 15592 sks_1.1.1+dpkgv3-1.debian.tar.gz
 2b7dc27cf5a354df92ef6b7ed440467e9a443a3f 786250 sks_1.1.1+dpkgv3-1_amd64.deb
Checksums-Sha256: 
 aa487e07367e54a0a7602e1ffc753bea9273fdb17b63fba5c60c922ed3d35665 1190 
sks_1.1.1+dpkgv3-1.dsc
 d3252e345cce66d80aaec0be63c101a6a5907678988ece5285d415afc3427210 174331 
sks_1.1.1+dpkgv3.orig.tar.gz
 80dd0cc27ece82738fedded4b42c66b85a765ffa202abacfbfbaef008c0f28f0 15592 
sks_1.1.1+dpkgv3-1.debian.tar.gz
 9a8fbe921db7eef80daf48f46b6118821d614dc459094cce8349ea07c27483de 786250 
sks_1.1.1+dpkgv3-1_amd64.deb
Files: 
 04752404911e9712593642bfaf2bae49 1190 net optional sks_1.1.1+dpkgv3-1.dsc
 c44508bd38ad44e5e5b2bf1c26fb165b 174331 net optional 
sks_1.1.1+dpkgv3.orig.tar.gz
 65490dab1859679a02b08d2ddf2d2552 15592 net optional 
sks_1.1.1+dpkgv3-1.debian.tar.gz
 30d40c5a25edaff66ddf47dff32b155d 786250 net optional 
sks_1.1.1+dpkgv3-1_amd64.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iEYEAREDAAYFAkx24BQACgkQgeVih7XOVJeIpQCgmK7AbCoobFIcQk1E2uTeuKBy
BeIAnA7Q6kRjYy9Ysn72KzBO9kZBSA2D
=q3Vx
-----END PGP SIGNATURE-----



--- End Message ---

Reply via email to