Your message dated Tue, 30 Sep 2025 00:19:53 +0000
with message-id <[email protected]>
and subject line Bug#1113720: fixed in libtpms 0.10.1-1
has caused the Debian Bug report #1113720,
regarding ITS: libtpms
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
1113720: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1113720
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Source: libtpms
Severity: important
X-Debbugs-CC: [email protected], [email protected]

Dear Maintainer(s),

This is an Intent to Salvage bug as per process defined in Policy 5.12:

https://www.debian.org/doc/manuals/developers-reference/pkgs.en.html#package-salvaging
https://wiki.debian.org/PackageSalvaging

The integration tests of some of my packages rely on libtpms in order
to function. The current state of the libtpms package is:

- the last maintainer upload was in March 2022, more than 3 years ago
- out of 16 uploads in total, the most recent 7 uploads are unacknowledged NMUs
- multiple upstream releases have not been uploaded, despite a bug
asking for them #1032182
- multiple unanswered bugs

I believe these conditions qualify for the salvaging process as
defined in the policy and wiki pages linked above.

Therefore, if there are no objections or alternative proposals, in 3
weeks from now (2025/09/22) I will do an ITS upload to DELAYED/7 with
the salvaging operation.

A similar ITS bug will be filed for swtpm, as these packages go in
tandem, and the situation is similar.

--- End Message ---
--- Begin Message ---
Source: libtpms
Source-Version: 0.10.1-1
Done: Luca Boccassi <[email protected]>

We believe that the bug you reported is fixed in the latest version of
libtpms, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Luca Boccassi <[email protected]> (supplier of updated libtpms package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Mon, 22 Sep 2025 12:44:18 +0100
Source: libtpms
Architecture: source
Version: 0.10.1-1
Distribution: unstable
Urgency: medium
Maintainer: Luca Boccassi <[email protected]>
Changed-By: Luca Boccassi <[email protected]>
Closes: 998654 1032182 1046479 1113720
Changes:
 libtpms (0.10.1-1) unstable; urgency=medium
 .
   * Implement package salvaging protocol (Closes: #1113720)
   * Import autopkgtest from Ubuntu (Closes: #998654)
   * d/control: bump Standards-Version to 4.7.2, no changes
   * New upstream version 0.10.1 (Closes: #1032182)
   * Drop CVE patches, merged upstream
   * Refresh do_not_inline_makeiv.patch for new upstream release
   * Run wrap-and-sort for build deps
   * Switch from pkg-config to pkgconf
   * Build with package-notes ELF stamping
   * Mark libtpms-dev as MA: same
   * Update symbols file for 0.10.1
   * d/rules: drop unused dh_usrlocal override
   * Enable hardening options
   * Drop 0004-fix-ftbfs-bug.patch, no longer needed
   * Drop do_not_inline_makeiv.patch, no longer needed
   * Rework no_local_check.patch
   * Set forwarded tag in 0003-set-man-page-date-to-last-changelog.patch
   * Add d/salsa-ci.yml
   * Backport patch to fix dist-clean (Closes: #1046479)
Checksums-Sha1:
 448185b737d5adbb81207a0c1967091d8dc7b28a 2075 libtpms_0.10.1-1.dsc
 4f78cc2c00ac416d225d012b963403746b03a69b 1399253 libtpms_0.10.1.orig.tar.gz
 fd86560746d29abdbc6d375e30e0081d9e435b83 10144 libtpms_0.10.1-1.debian.tar.xz
 289c37b710440ae804f8a5864e4de7a5a48a52aa 6446 libtpms_0.10.1-1_source.buildinfo
Checksums-Sha256:
 a2b5e05da469c36df1eba5f5bbf5590c573491bf088e42971e629fd7c5fa266d 2075 
libtpms_0.10.1-1.dsc
 ebc24f3191d90f6cf0b4d4200cd876db4bd224b3c565708bbea0a82ee275e0fb 1399253 
libtpms_0.10.1.orig.tar.gz
 12a1cdd312f435ba020460eaf0dfc96c07469b8dd2d192b50a7079f2127463fa 10144 
libtpms_0.10.1-1.debian.tar.xz
 ad4bda63e7a82a2566e9b87e6782c6afe20c5da3186e9267a62234fce8021dfa 6446 
libtpms_0.10.1-1_source.buildinfo
Files:
 af45c8c0df68e6c2c47e1077f1968bdc 2075 libs optional libtpms_0.10.1-1.dsc
 05c5c0aec50f4afe7de0724d3bf7eb2e 1399253 libs optional 
libtpms_0.10.1.orig.tar.gz
 285c7eebf9854d2f4bd96b9dbd305ee8 10144 libs optional 
libtpms_0.10.1-1.debian.tar.xz
 b6143a8a5ad5aa9b94ed7af80af1cfad 6446 libs optional 
libtpms_0.10.1-1_source.buildinfo

-----BEGIN PGP SIGNATURE-----
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=k6ip
-----END PGP SIGNATURE-----

Attachment: pgpi5GwvO5wEn.pgp
Description: PGP signature


--- End Message ---

Reply via email to