Your message dated Mon, 04 Jul 2022 09:49:16 +0000
with message-id <e1o8ihg-0009bm...@fasolo.debian.org>
and subject line Bug#1013968: fixed in nodejs 18.4.0+dfsg-2
has caused the Debian Bug report #1013968,
regarding libnode72 (12.22.12~dfsg-1~deb11u1) tries to overwrite a file from 
package nodejs (16.15.1+dfsg-1)
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1013968: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1013968
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: libnode72
Version: 12.22.12~dfsg-1~deb11u1
Severity: important
X-Debbugs-Cc: j.andra...@gmail.com


Dear Maintainer,

When trying to upgrade libnode72 from 12.22.10~dfsg-2 to
12.22.12~dfsg-1~deb11u1, dpkg complains about the following file, wich is also
found in package nodejs 16.15.1+dfsg-1, trying to be overwritten:

/usr/share/systemtap/tapset/node.stp

This is an excerpt from dpkg output, showing the error:

Unpacking libnode72:amd64 (12.22.12~dfsg-1~deb11u1) over (12.22.10~dfsg-2) ...
dpkg: error processing archive
/var/cache/apt/archives/libnode72_12.22.12~dfsg-1~deb11u1_amd64.deb (--unpack):
 trying to overwrite '/usr/share/systemtap/tapset/node.stp', which is also in
package nodejs 16.15.1+dfsg-1
Errors were encountered while processing:
 /var/cache/apt/archives/libnode72_12.22.12~dfsg-1~deb11u1_amd64.deb


Thank you very much,
Best Regards,
Jonas.


-- System Information:
Debian Release: bookworm/sid
  APT prefers stable-security
  APT policy: (500, 'stable-security'), (500, 'unstable'), (500, 'stable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 5.18.0-2-amd64 (SMP w/16 CPU threads; PREEMPT)
Kernel taint flags: TAINT_PROPRIETARY_MODULE, TAINT_OOT_MODULE
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_GB:en
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages libnode72 depends on:
ii  libbrotli1     1.0.9-2+b3
ii  libc-ares2     1.18.1-1+b1
ii  libc6          2.33-7
ii  libgcc-s1      12.1.0-4
ii  libicu67       67.1-7
ii  libnghttp2-14  1.47.0-1+b1
ii  libssl1.1      1.1.1o-1
ii  libstdc++6     12.1.0-4
ii  libuv1         1.44.1-2
ii  zlib1g         1:1.2.11.dfsg-4

libnode72 recommends no packages.

libnode72 suggests no packages.

-- no debconf information

--- End Message ---
--- Begin Message ---
Source: nodejs
Source-Version: 18.4.0+dfsg-2
Done: Jérémy Lal <kapo...@melix.org>

We believe that the bug you reported is fixed in the latest version of
nodejs, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1013...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Jérémy Lal <kapo...@melix.org> (supplier of updated nodejs package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Mon, 04 Jul 2022 11:37:13 +0200
Source: nodejs
Architecture: source
Version: 18.4.0+dfsg-2
Distribution: experimental
Urgency: medium
Maintainer: Debian Javascript Maintainers 
<pkg-javascript-devel@alioth-lists.debian.net>
Changed-By: Jérémy Lal <kapo...@melix.org>
Closes: 977792 1013968 1014214
Changes:
 nodejs (18.4.0+dfsg-2) experimental; urgency=medium
 .
   * Breaks libnode72 << 13 because of bullseye/security
     (Closes: #1013968)
   * Fix bash-completion link (Closes: #977792)
   * Patch: disable fetch until undici is accepted (Closes: #1014214)
Checksums-Sha1:
 36026a51f2a8baadc934a060c869bc545ce13c88 3845 nodejs_18.4.0+dfsg-2.dsc
 0b89dc3ea5d44f31e47fbcd3139e21f9a27918f3 156556 
nodejs_18.4.0+dfsg-2.debian.tar.xz
 a0abf46436274a43443d55a7b04184dbefd63496 10245 
nodejs_18.4.0+dfsg-2_source.buildinfo
Checksums-Sha256:
 b8fa74b74e1fbd9be925103e59e4e220958ef68f4370c7a1df5da1cbef15d8a0 3845 
nodejs_18.4.0+dfsg-2.dsc
 ab61b1b8240e882b170c3d01a36b8d20773ba81a2f14f1e80b20eeb1089cd2bb 156556 
nodejs_18.4.0+dfsg-2.debian.tar.xz
 84c71be614990c989206c940d13d71e3696676be5689ae68581b4d70e1a648b5 10245 
nodejs_18.4.0+dfsg-2_source.buildinfo
Files:
 f53410ae4b2d084b4b2b44800f5c271c 3845 javascript optional 
nodejs_18.4.0+dfsg-2.dsc
 9336c41a300f8fcacf95359cca1a9a10 156556 javascript optional 
nodejs_18.4.0+dfsg-2.debian.tar.xz
 3c8af8ce545667c326af0a62326390fa 10245 javascript optional 
nodejs_18.4.0+dfsg-2_source.buildinfo

-----BEGIN PGP SIGNATURE-----
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=76aY
-----END PGP SIGNATURE-----

--- End Message ---
-- 
Pkg-javascript-devel mailing list
Pkg-javascript-devel@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/pkg-javascript-devel

Reply via email to