Your message dated Thu, 15 Jun 2023 17:11:18 +0000
with message-id <[email protected]>
and subject line Bug#1032740: fixed in ncurses 6.4+20230603-1
has caused the Debian Bug report #1032740,
regarding please drop transitional package libncursesw5-dev from src:ncurses
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
1032740: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1032740
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: libncursesw5-dev
Version: 6.4-2
Severity: normal
user: [email protected]
usertags: transitional

Please drop the transitional package libncursesw5-dev (from the source package 
ncurses) after the release of bookworm, it has been released with buster and 
bullseye already...


Description: transitional package for libncurses-dev
Package: libncursesw5-dev
Version: 6.1+20181013-2+deb10u2
Version: 6.2+20201114-2
Version: 6.4-2

Thanks for maintaining ncurses!


-- 
cheers,
        Holger

 ⢀⣴⠾⠻⢶⣦⠀
 ⣾⠁⢠⠒⠀⣿⡁  holger@(debian|reproducible-builds|layer-acht).org
 ⢿⡄⠘⠷⠚⠋⠀  OpenPGP: B8BF54137B09D35CF026FE9D 091AB856069AAA1C
 ⠈⠳⣄

The devel is in the details.

Attachment: signature.asc
Description: PGP signature


--- End Message ---
--- Begin Message ---
Source: ncurses
Source-Version: 6.4+20230603-1
Done: Sven Joachim <[email protected]>

We believe that the bug you reported is fixed in the latest version of
ncurses, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Sven Joachim <[email protected]> (supplier of updated ncurses package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Thu, 15 Jun 2023 18:34:20 +0200
Source: ncurses
Architecture: source
Version: 6.4+20230603-1
Distribution: experimental
Urgency: low
Maintainer: Craig Small <[email protected]>
Changed-By: Sven Joachim <[email protected]>
Closes: 622286 1028202 1029977 1032708 1032740 1032741 1034372 1034549
Changes:
 ncurses (6.4+20230603-1) experimental; urgency=low
 .
   * New upstream patchlevel.
     - Improve checks for malformed terminfo data (report/analysis by
       Jonathan Bar Or, Michael Pearse, Emanuele Cozzi (CVE-2023-29491,
       Closes: #1034372)).
     - Drop compatibility with obsolete versions of tack, e.g., pre-1.08
       (Closes: #1034549).
   * Drop cherry-picked patches, applied upstream.
   * Configure with "--disable-setuid-environ" instead of
     "--disable-root-environ" and drop patch debian-env-access.diff.
   * Refresh remaining Debian patches.
     - Drop the hunk for screen-base from 02-debian-backspace.diff.
       Upstream sets kbs in screen-base to xterm+kbs now, so this is
       handled via the "--with-xterm-kbs" configure option.
   * Configure with "--disable-root-access" to further restrict programs
     running with elevated privileges.
   * Update symbols files for the new symbols tiparm_s and tiscan_s,
     and the newly exported symbols _nc_safe_fopen and _nc_safe_open3.
   * Remove the ncurses{w,}5-config compatibility symlinks
     (Closes: #1029977).
   * Remove old upstream SHA1 signing key C52048C0C0748FEE from
     debian/upstream/signing-key.asc.
   * Export ARFLAGS = -crv in debian/rules to ensure deterministic static
     libraries (see #1029404).
   * Stop building the empty transitional packages libtinfo-dev
     and libncurses{,w}5-dev (Closes: #1032708, #1032740, #1032741).
   * Move the ncurses-base terminfo files to /usr/share/terminfo
     (Closes: #1028202, #622286).
     - Add a Breaks on cryptsetup-initramfs (<< 2:2.6.1) to ncurses-base
       (see #1028234).
   * Remove various Breaks/Replaces relationships with package versions
     predating buster.
   * Update years in debian/copyright.
Checksums-Sha1:
 445fe97aa6ea9308555b5f6b7f85f6a9e12144a3 4012 ncurses_6.4+20230603-1.dsc
 804970af9fc62bdd9a5f63a44137bb3942b86ab8 3644602 
ncurses_6.4+20230603.orig.tar.gz
 0b2bb01be060bf19dd27ab9a3239bc85345992e3 729 
ncurses_6.4+20230603.orig.tar.gz.asc
 8db779694d996a97893ee31dccce70edd54f6705 54228 
ncurses_6.4+20230603-1.debian.tar.xz
 79673dfe04f26b437a13b7cec34de9edbec188fe 6743 
ncurses_6.4+20230603-1_source.buildinfo
Checksums-Sha256:
 14f05be353be96a0e8ef177d8fb4054fc9d785950d84f151781a481fa3d532b0 4012 
ncurses_6.4+20230603-1.dsc
 f78c05a7729f0c4a2df26556f288c808f14a7d179d9eb69c99cf9092fb0514ca 3644602 
ncurses_6.4+20230603.orig.tar.gz
 76ff73b21766cf5b4ba84f8ea3b41a314c6dcb79573e97f64ed6da07e7f2375f 729 
ncurses_6.4+20230603.orig.tar.gz.asc
 7f39384fc626f06597363c218c6e5d19cb07eeda3100adcaa79ba2bfd7961916 54228 
ncurses_6.4+20230603-1.debian.tar.xz
 5a6337aba609b01804b8dbf4dd6c9ec4c86b561c847a58dc1dfe621461831315 6743 
ncurses_6.4+20230603-1_source.buildinfo
Files:
 25e06ea64ad265a7978e250044419ac7 4012 libs required ncurses_6.4+20230603-1.dsc
 bbdcd0037a373bf66daf0905977bf740 3644602 libs required 
ncurses_6.4+20230603.orig.tar.gz
 9eebaa8827c6c8a58973313b831349b7 729 libs required 
ncurses_6.4+20230603.orig.tar.gz.asc
 e77d96ae2052c0dbd92ea83f2b07c4cc 54228 libs required 
ncurses_6.4+20230603-1.debian.tar.xz
 7d2e514f5223bd4644b44077114ba235 6743 libs required 
ncurses_6.4+20230603-1_source.buildinfo

-----BEGIN PGP SIGNATURE-----

iQIzBAEBCgAdFiEEKF8heKgv5Jai5p4QOxBucY1rMawFAmSLPigACgkQOxBucY1r
Maz80hAAtFzvK4r3ZPKKu01tZuniKWmyhQ1E+gUfPjYfRgVJoef8cSCjJLuHwyUd
+PlE2+OIAXKjVecwJBqur68VGsdhhcqM+MEG3FQt1SlRGe5noEG4tmoy/ZrPBmBj
5stUmOwdvl0wBdUW4HPgEap9y6dDK4tsB9Xh56VkOdPE+HiQWK7zHYjSPYW9vWdo
bO13LmK0+h/9x+7H4wWNIfJAU+nQ1OUukHxHSifLWKPRR3CP0y6IzTVrGKF9zJb2
24v1GUYJe6evaEUr4LmWQ9Dn8uKNSEtYSLTLydB8qGF2/wGkgN26U0mu68TRCcWy
R+1eU/yi6aby695LKdkKugL28vsb730XLGE+gDhTUsjxF48NEYUCh4adaOmenvgX
1BHhIk8m4pRA/PInkKuYCVsePSGbSqeo9CpI/kS6MiYLisNLKGznQTIY3GgAVtz/
fta+CcuqXrvMeRUrfCkxdo+NRxCVbV6pwa7P09Z58gBvkJ97rBbiiLQsYPdBtS7M
UGEQiqd5spafFwJxouOidigBU4hcTQj4rMFUsQCYK3cuUE/BkDbA8sIAD13q10GS
8+iK3izVG9D+pvAcmXaH6j8NCNQvr33g30Tf6ZJjhu6Ik7aodOFbdV2JNw5uOOGI
42NJMCu/KqabFEFjOuv1oq51OvtOcf4mLzy4W4hp5t2umAcTAso=
=BGlA
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to