Your message dated Sun, 11 Sep 2022 14:34:02 +0200
with message-id
<CADk7b0OMupgF9=zgnuhoyf+nliv7jrgjrnvcebpcya-wvtl...@mail.gmail.com>
and subject line Fixed
has caused the Debian Bug report #944697,
regarding security.debian.org: please bring back MD5Sum, at least for
buster/updates
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)
--
944697: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=944697
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: ftp.debian.org
Severity: serious
Justification: breaks image generation tools
Hi,
I've mentioned this on #debian-ftp already, but filing a bug report in
addition to make sure it's not lost.
Assuming the FTP team is responsible for security's dak setup as well,
we'd like to get MD5Sum back in buster/updates.
python-apt relies on md5 fields internally, as documented in #944696,
and a current symptom is live-wrapper's tracebacking accordingly when
packages are available in security; this has been the case for the
intel-microcode package, for a few hours.
jessie/updates and stretch/updates seem fine (MD5Sum is present there).
I don't have an opinion regarding bulleyes/updates (MD5Sum is missing
there) at this point, but given at least some apt bindings don't support
missing MD5Sum, it would seem premature to remove it from there as well?
Cheers,
--
Cyril Brulebois -- Debian Consultant @ DEBAMAX -- https://debamax.com/
--- End Message ---
--- Begin Message ---
MD5 was restored for buster/updates
--- End Message ---