Your message dated Sat, 09 May 2020 11:53:52 +0100
with message-id
<fd7fa4d56896c35aab49a5a51cb69727dc60e87a.ca...@adam-barratt.org.uk>
and subject line Closing requests included in 10.4 point release
has caused the Debian Bug report #953005,
regarding buster-pu: package serverspec-runner/1.2.2-1+deb10u1
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)
--
953005: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=953005
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: release.debian.org
Severity: normal
Tags: buster
User: [email protected]
Usertags: pu
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
This update is to fix #939645 [1]. The debdiff is attached. The issue has
already been fixed in unstable.
[1] https://bugs.debian.org/939645
Regards, Daniel
- -- System Information:
Debian Release: bullseye/sid
APT prefers unstable
APT policy: (990, 'unstable'), (500, 'testing'), (500, 'stable'), (1,
'experimental')
Architecture: amd64 (x86_64)
Kernel: Linux 5.3.0-3-amd64 (SMP w/8 CPU cores)
Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8),
LANGUAGE=de_DE.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
-----BEGIN PGP SIGNATURE-----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=uJcm
-----END PGP SIGNATURE-----
--- End Message ---
--- Begin Message ---
Package: release.debian.org
Version: 10.4
Hi,
Each of the uploads referred to by these bugs was included in today's
stable point release.
Regards,
Adam
--- End Message ---