Your message dated Thu, 26 Jan 2023 11:06:25 +0000
with message-id <e1pl05j-008zlq...@fasolo.debian.org>
and subject line Bug#1029624: fixed in gvmd 22.4.2-1
has caused the Debian Bug report #1029624,
regarding gvmd-common fails to install
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)
--
1029624: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029624
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: gvmd-common
Version: 22.4.1-1
Severity: serious
https://piuparts.debian.org/sid/fail/gvmd-common_22.4.1-1.log
...
Setting up gvmd-common (22.4.1-1) ...
find: '/var/lib/gvm/gvmd': No such file or directory
dpkg: error processing package gvmd-common (--configure):
installed gvmd-common package post-installation script subprocess returned
error exit status 1
Processing triggers for libc-bin (2.36-8) ...
Errors were encountered while processing:
gvmd-common
E: Sub-process /usr/bin/dpkg returned an error code (1)
--- End Message ---
--- Begin Message ---
Source: gvmd
Source-Version: 22.4.2-1
Done: Sophie Brun <sop...@offensive-security.com>
We believe that the bug you reported is fixed in the latest version of
gvmd, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to 1029...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Sophie Brun <sop...@offensive-security.com> (supplier of updated gvmd package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Thu, 26 Jan 2023 11:24:58 +0100
Source: gvmd
Architecture: source
Version: 22.4.2-1
Distribution: unstable
Urgency: medium
Maintainer: Debian Security Tools <team+pkg-secur...@tracker.debian.org>
Changed-By: Sophie Brun <sop...@offensive-security.com>
Closes: 1029624
Changes:
gvmd (22.4.2-1) unstable; urgency=medium
.
* New upstream version 22.4.2
* Fix the postinst(s) (Closes: #1029624): put the command in the postinst of
the correct package
* Bump Standards-Version to 4.6.2 (no changes)
Checksums-Sha1:
c3b076b11babab35e5fe104ebdb24e4297c2416e 2211 gvmd_22.4.2-1.dsc
b443fa1486ec7e143dc15365e95048bac746ee10 1027009 gvmd_22.4.2.orig.tar.gz
6b9caceb94996c2a77767edfcc0c2111420b588b 25904 gvmd_22.4.2-1.debian.tar.xz
e149e92b6ff924e43670c3257b56830581299278 8941 gvmd_22.4.2-1_source.buildinfo
Checksums-Sha256:
4331551d2260c1ca62b8a091ad82add968cf4f12bac8b29f8d8da9ab831f0807 2211
gvmd_22.4.2-1.dsc
14c76641af72e48874a730c4792ad76199165bb0518f59742609590cd420719e 1027009
gvmd_22.4.2.orig.tar.gz
4319db780647c62cb186ef7daf41db1d0b7036f0c6059b37a6daed6ddb07737f 25904
gvmd_22.4.2-1.debian.tar.xz
2b2378a0d65ce859350800494d692523625454ab8e31e9f2c84486b0cc57b75c 8941
gvmd_22.4.2-1_source.buildinfo
Files:
e32074380f278b009a56270dcfe3c380 2211 admin optional gvmd_22.4.2-1.dsc
f7ac1630b5efb897a5253150789e0897 1027009 admin optional gvmd_22.4.2.orig.tar.gz
e23f0eb6aa3b035e8bcc75475889b386 25904 admin optional
gvmd_22.4.2-1.debian.tar.xz
644e1d4196d17d05f0abc132b57d6260 8941 admin optional
gvmd_22.4.2-1_source.buildinfo
-----BEGIN PGP SIGNATURE-----
Comment: Signed by Sophie Brun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=IFxX
-----END PGP SIGNATURE-----
--- End Message ---