On 2008-06-27 Mario 'BitKoenig' Holbe <[EMAIL PROTECTED]> wrote:
> On Fri, Jun 27, 2008 at 07:57:46PM +0200, Andreas Metzler wrote:
>> (currently shipped in package lynx-cur) the only thing to "fix" this
>> bug is to stop providing lynx-ssl.

> Yes.

>> Why should this bug be severity "serious"?

> Because the package claims things it cannot hold. It's just as formal as
> stopping to build against OpenSSL(wrapper). However, it's easy to fix,
> so this should not be a big issue at all.

Hello,
Sorry, looks like my question was to unspecific. We have got rather
clear guidelines what makes a bug serious:

http://www.debian.org/Bugs/Developer.en.html#severities
serious
   is a severe violation of Debian policy (roughly, it violates a must
   or required directive), or, in the package maintainer's or release
   manager's opinion, makes the package unsuitable for release.

http://release.debian.org/lenny/rc_policy.txt

Afaict this bug does not match either of them.

I care about this because stopping linkage against gnutls OpenSSL
compat layer really fixed a serious bug in the packages, and this fix
needs to propagate to testing. "Your" bug prevents this or is going to
delay the propagation for at least another week. So I would appreciate
if you could either back up the severity claim or downgrade the bug.

thanks for considering, cu andreas
-- 
`What a good friend you are to him, Dr. Maturin. His other friends are
so grateful to you.'
`I sew his ears on from time to time, sure'



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to