Your message dated Mon, 05 Jun 2006 15:17:18 -0700
with message-id <[EMAIL PROTECTED]>
and subject line Bug#369923: fixed in cryptsetup 2:1.0.3-2
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--- Begin Message ---
Package: cryptsetup
Version: 2:1.0.3-1
Severity: serious
Justification: FHS violation

Hi,

FHS requires /sbin and /bin tools to work without /usr. I suggest moving
luksformat to /usr/sbin.

Regards,
  Bastian

-- System Information:
Debian Release: testing/unstable
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.16-treasure17
Locale: [EMAIL PROTECTED], [EMAIL PROTECTED] (charmap=ISO-8859-15)

Versions of packages cryptsetup depends on:
ii  dmsetup                      2:1.02.05-2 The Linux Kernel Device Mapper use
ii  libc6                        2.3.6-13    GNU C Library: Shared libraries
ii  libdevmapper1.02             2:1.02.05-2 The Linux Kernel Device Mapper use
ii  libgcrypt11                  1.2.2-1     LGPL Crypto library - runtime libr
ii  libgpg-error0                1.2-1       library for common error values an
ii  libpopt0                     1.7-5       lib for parsing cmdline parameters
ii  libuuid1                     1.39-1      universally unique id library

cryptsetup recommends no packages.

-- no debconf information


--- End Message ---
--- Begin Message ---
Source: cryptsetup
Source-Version: 2:1.0.3-2

We believe that the bug you reported is fixed in the latest version of
cryptsetup, which is due to be installed in the Debian FTP archive:

cryptsetup-udeb_1.0.3-2_amd64.udeb
  to pool/main/c/cryptsetup/cryptsetup-udeb_1.0.3-2_amd64.udeb
cryptsetup_1.0.3-2.diff.gz
  to pool/main/c/cryptsetup/cryptsetup_1.0.3-2.diff.gz
cryptsetup_1.0.3-2.dsc
  to pool/main/c/cryptsetup/cryptsetup_1.0.3-2.dsc
cryptsetup_1.0.3-2_amd64.deb
  to pool/main/c/cryptsetup/cryptsetup_1.0.3-2_amd64.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Jonas Meurer <[EMAIL PROTECTED]> (supplier of updated cryptsetup package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Mon,  5 Jun 2006 18:27:07 +0200
Source: cryptsetup
Binary: cryptsetup cryptsetup-udeb
Architecture: source amd64
Version: 2:1.0.3-2
Distribution: unstable
Urgency: low
Maintainer: Jonas Meurer <[EMAIL PROTECTED]>
Changed-By: Jonas Meurer <[EMAIL PROTECTED]>
Description: 
 cryptsetup - configures encrypted block devices
 cryptsetup-udeb - configures encrypted block devices (udeb)
Closes: 362564 369575 369878 369923
Changes: 
 cryptsetup (2:1.0.3-2) unstable; urgency=low
 .
   [ David Härdeman ]
   * Add patch by Arjan Oosting <[EMAIL PROTECTED]) for lvm-on-cryptroot
     in initramfs scripts (closes: #362564)
 .
   [ Jonas Meurer ]
   * install luksformat to /usr/sbin, as it depends on perl (closes: #369923)
   * use essiv cipher in luksformat, debian 2.6.16 kernels have essiv support
     compiled in (closes: #369878)
   * fix cryptsetup output, patch by David Härdeman <[EMAIL PROTECTED]>
     (closes: #369575)
   * add new check 'vol_id', which uses /lib/udev/vol_id from udev and supports
     checks for any known filesystem type. implement a new option checkargs in
     cryptdisks for that. suggest udev. closes one half of #370302. thanks to
     Markus Nass and Darvid Härdeman for the suggestion.
   * always check for a swap partition before running mkswap
   * updated README.Debian, Checksystem.Doc and crypttab.5.txt accordingly.
   * drop usage of strings from swap check, as it is in /usr/bin. thanks to
     Markus Nass.
Files: 
 bf3be8c238d101156cf48d44acae6fdf 813 admin optional cryptsetup_1.0.3-2.dsc
 08b4d3ebb44869e31e33b396e4883047 36986 admin optional 
cryptsetup_1.0.3-2.diff.gz
 41ca9bce2a6c48d69b3ae8bda54513a5 246856 admin optional 
cryptsetup_1.0.3-2_amd64.deb
 ca1ca25b9e7bfe74497a1df4339a95e1 181556 debian-installer optional 
cryptsetup-udeb_1.0.3-2_amd64.udeb
Package-Type: udeb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.3 (GNU/Linux)

iD8DBQFEhJHPd6lUs+JfIQIRAhvtAJ454B4K8lSsg1tIgqytltFu2WA/2ACfVUrA
5vKzeB78H4Jzwx3CrqnIF94=
=6MMz
-----END PGP SIGNATURE-----


--- End Message ---

Reply via email to