Your message dated Tue, 05 May 2015 11:07:20 +0000
with message-id <[email protected]>
and subject line Bug#769347: fixed in tripwire 2.4.2.2-5
has caused the Debian Bug report #769347,
regarding tripwire: statically linked against libc6 without a Built-Using: field
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
769347: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=769347
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: tripwire
Version: 2.4.2.2-4
Severity: serious
Tags: jessie-ignore

tripwire provides the following files which are statically linked
against libc6:
  /usr/sbin/siggen
  /usr/sbin/twprint
  /usr/sbin/tripwire
  /usr/sbin/twadmin

According to Debian Policy ยง7.8 such a package MUST list the glibc
source package (and possibly others) in the Built-Using: field.

Note: While this is a serious policy violation, it has been agreed with
the release team that this is not a blocker bug for the Jessie release.
That's why the jessie-ignore tag is added. This makes this bug non RC.

-- System Information:
Debian Release: jessie/sid
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 3.16.0-4-amd64 (SMP w/8 CPU cores)
Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

--- End Message ---
--- Begin Message ---
Source: tripwire
Source-Version: 2.4.2.2-5

We believe that the bug you reported is fixed in the latest version of
tripwire, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Alberto Gonzalez Iniesta <[email protected]> (supplier of updated tripwire 
package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Tue, 05 May 2015 12:00:27 +0200
Source: tripwire
Binary: tripwire
Architecture: source amd64
Version: 2.4.2.2-5
Distribution: unstable
Urgency: medium
Maintainer: Alberto Gonzalez Iniesta <[email protected]>
Changed-By: Alberto Gonzalez Iniesta <[email protected]>
Description:
 tripwire   - file and directory integrity checker
Closes: 769347
Changes:
 tripwire (2.4.2.2-5) unstable; urgency=medium
 .
   * debian/(control|rules): Add Build-Using field.
     (Closes: #769347)
Checksums-Sha1:
 edc21d21d816399ce81da3f927e370bc63999bb9 1741 tripwire_2.4.2.2-5.dsc
 29c79e5c67d062c759249450d920adbcd56e5b88 97340 tripwire_2.4.2.2-5.debian.tar.xz
 f68c59ae152f085567ed983cc5f96842f2918eb0 1404188 tripwire_2.4.2.2-5_amd64.deb
Checksums-Sha256:
 3fd4493186cd2505e7c4d25a129542dcd5eabd52e7e10815833173487d57a49e 1741 
tripwire_2.4.2.2-5.dsc
 ace1f07f640c2160532878094e179a5fc2727632d79360813805595db74f98b0 97340 
tripwire_2.4.2.2-5.debian.tar.xz
 63869cbe507ce6105aa8b1d6c272d4a60e2a1de48b12d4916ba4db2a22b75001 1404188 
tripwire_2.4.2.2-5_amd64.deb
Files:
 f2fe33e6fa15a5b505221512049c6606 1741 utils optional tripwire_2.4.2.2-5.dsc
 f5f6bb96a44cdcb556f18b58fff42f2e 97340 utils optional 
tripwire_2.4.2.2-5.debian.tar.xz
 8b8a04b863357b0d584476da8e19c583 1404188 utils optional 
tripwire_2.4.2.2-5_amd64.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQIcBAEBCAAGBQJVSJ+JAAoJEACbM3VrmqpVhA0P/A04cdu/MSyMD4X3autxbH3c
L/r2DVfe1T/nbvTJbAu2+t1OZk6Kx8xWZHr+VZzk6k6fTAtMP+xE8PQwzP0tCfyy
KstTYRmfTHVQuXKL7OUe1Zk9P2SeDUbClGLiBJPUM5A9J+eq5oC5/anVz5VmJ1HJ
oEcvuv4PDpFF4f1RFz0KHtOnsXY1f9DmFpQT/PgMnaSDK6J1XsbyyTHDhowgv+Mn
e0fuEp/U3N0X1hArsI2BRvXY8xc3im0fy+ZIxwm8Xl2khFJvKkMRffR44GF2MQW9
PhXI7mwiCe4WBz4P1nO9fC+JC/kzW5RLZZM0F/TpZwkAcJrXVOXwliehem0zi3no
+oXVMS9YaNPFpjINZJyRDT68cJXvb9If1e4MXHUm7GrG2QearQppK3364adb9GXd
upRSOyafLmKu/r61mAgoFNvqFRimOeUgGym6fCfco+KRLPPJy0xRuoHAcR/f0jV4
HA2+JhT6wSa0JMO7Atm0vRDqAIv9UZURfEquq/Ujc4+JiDtshyW1OzAs8wQazzTB
wraqrzG0tYky/RKhi5+rqKqlS4qdPPIPvtOqkl4U6ODblfo3hKFMyhTTdKrNTI3w
wnfsouOU3MrcAgLWPpHV6sFC4PjFAdk4SeVUujf3mgnBA6/5YpVW2k6Dw4xRK8e4
pdvjBKLF/1XyXCNMe2pb
=9f8m
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to