Your message dated Thu, 26 Mar 2026 10:49:43 +0000
with message-id <[email protected]>
and subject line Bug#1112614: fixed in acpi-override 0.1+nmu2
has caused the Debian Bug report #1112614,
regarding Should acpi-override be removed from unstable?
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
1112614: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1112614
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Source: acpi-override
Severity: important
User: [email protected]
Usertags: sidremove

Dear maintainer,

I suggest removing acpi-override from Debian for the following reasons:
 * It accumulated one RC-bug:
   + #968604: acpi-override-initramfs makes update-initramfs fail when 
/var/lib/acpi-override/ is empty
     Last modified: 1 year, 4 days

 * It is not part of trixie or forky and is not a key package.

This bug serves as a pre-removal warning. After one month, the bug will be
reassigned to ftp.debian.org to actually request removal of the package.

In case the package should be kept in unstable, please evaluate each of the
RC-bugs listed above.
 * If the bug is meant to permanently prevent the package from entering testing
   or a stable release, but this package should stay part of unstable, please
   add a usertag:

       user [email protected]
       usertags NNN + sidremove-ignore

 * If the bug no longer applies, please close it. If it is closed, check
   whether the fixed version is correct and adjust if necessary.

 * Is the bug really release-critical? If not, please downgrade.

 * If the bug still applies, please send a status update at least once a year.

Once all of the mentioned RC bugs have been acted upon in one way or another,
please close this bug.

In case the package should be removed from unstable, you may reassign this
bug report:

    Control: severity -1 normal
    Control: retitle -1 RM: acpi-override -- RoM; rc-buggy
    Control: reassign -1 ftp.debian.org
    Control: affects -1 + src:acpi-override

Alternatively, you may wait a month and have it reassigned.

In case you disagree with the above, please add a wontfix tag to this bug.

    Control: tags -1 + wontfix

Doing so will also prevent automatic reassignment.

Kind regards

A tool for automatically removing packages from unstable

This bug report has been automatically filed with little human intervention.
If the filing is unclear or in error, don't hesitate to contact
Helmut Grohne <[email protected]> for assistance.

--- End Message ---
--- Begin Message ---
Source: acpi-override
Source-Version: 0.1+nmu2
Done: Andreas Tille <[email protected]>

We believe that the bug you reported is fixed in the latest version of
acpi-override, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Andreas Tille <[email protected]> (supplier of updated acpi-override package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Mon, 16 Mar 2026 11:00:36 +0100
Source: acpi-override
Architecture: source
Version: 0.1+nmu2
Distribution: unstable
Urgency: medium
Maintainer: Thadeu Lima de Souza Cascardo <[email protected]>
Changed-By: Andreas Tille <[email protected]>
Closes: 968604 1112614
Changes:
 acpi-override (0.1+nmu2) unstable; urgency=medium
 .
   * Non-maintainer upload (Closes: #1112614)
 .
   [ YIN Renlong ]
   * Fix update-initramfs crash on empty override directory
     The acpi-override hook script unconditionally executes a copy command
     using a wildcard (*). When the /var/lib/acpi-override/ directory is
     empty (default state), this command fails, causing update-initramfs
     to exit with an error code.
     .
     The change adds a conditional check to ensure the directory exists
     and is populated before attempting the copy operation.
     Closes: #968604 (LP: 1892035)
 .
   [ Andreas Tille ]
   * debhelper-compat (= 13)
   * Maintain in Debian team on Salsa
   * Standards-Version: 4.7.3
Checksums-Sha1:
 ea3b5705a4a1d3eef8de03015831ba517481a328 1620 acpi-override_0.1+nmu2.dsc
 6d55368956b4fa8c195bb4d56f7b2053f6667da6 8216 acpi-override_0.1+nmu2.tar.xz
 8f3c144cf3a8ed2d1e8d215036047d3284683db8 5718 
acpi-override_0.1+nmu2_amd64.buildinfo
Checksums-Sha256:
 f83201b393c8e00b7bec35b3bb2a967274b4dba2b5229c61fc3445bbd3340c19 1620 
acpi-override_0.1+nmu2.dsc
 74281f500a4a2836ae49165a23fc86441e6d56cc59e9bd666b2deae572622625 8216 
acpi-override_0.1+nmu2.tar.xz
 00102eb3a436b99826ef07ca55d02aceabeea76b7a4dc6993f8b43dadfd97b53 5718 
acpi-override_0.1+nmu2_amd64.buildinfo
Files:
 892ffeb2eaa7e761719d2ac8036b57ca 1620 admin optional acpi-override_0.1+nmu2.dsc
 0c3e05418e2ecdb08a87df230c3b1136 8216 admin optional 
acpi-override_0.1+nmu2.tar.xz
 7cfb1adf42f8e476ea96e3a1b3426035 5718 admin optional 
acpi-override_0.1+nmu2_amd64.buildinfo

-----BEGIN PGP SIGNATURE-----
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=NQMG
-----END PGP SIGNATURE-----

Attachment: pgpoChr8LaXRc.pgp
Description: PGP signature


--- End Message ---

Reply via email to