• Bug#1065155: libpoppler-glib8t64 Provides libpoppler-cpp0v5 instead of

    From Andrey Rahmatullin@21:1/5 to All on Fri Mar 1 11:10:01 2024
    Package: libpoppler-glib8t64
    Version: 22.12.0-2.1
    Severity: serious
    X-Debbugs-Cc: Steve Langasek <vorlon@debian.org>

    Actually, looking at the diff in #1064282, all packages have "X-Time64-Compat: libpoppler-cpp0v5", I guess this is incorrect and a typo?


    -- System Information:
    Debian Release: trixie/sid
    APT prefers unstable-debug
    APT policy: (500, 'unstable-debug'), (500, 'testing-debug'), (500, 'unstable'), (500, 'testing'), (101, 'experimental')
    Architecture: amd64 (x86_64)
    Foreign Architectures: i386

    Kernel: Linux 6.7-amd64 (SMP w/4 CPU threads; PREEMPT)
    Kernel taint flags: TAINT_PROPRIETARY_MODULE, TAINT_OOT_MODULE, TAINT_UNSIGNED_MODULE
    Locale: LANG=ru_RU.UTF-8, LC_CTYPE=ru_RU.UTF-8 (charmap=UTF-8), LANGUAGE not set
    Shell: /bin/sh linked to /usr/bin/dash
    Init: systemd (via /run/systemd/system)
    LSM: AppArmor: enabled

    Versions of packages libpoppler-glib8t64 depends on:
    ii libc6 2.37-15.1
    ii libcairo2 1.18.0-1+b1
    ii libfreetype6 2.13.2+dfsg-1+b1
    ii libglib2.0-0t64 2.78.4-2.1
    pn libpoppler126t64 <none>
    ii libstdc++6 14-20240221-2.1

    libpoppler-glib8t64 recommends no packages.

    libpoppler-glib8t64 suggests no packages.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Debian Bug Tracking System@21:1/5 to All on Sun Mar 3 10:10:01 2024
    This is a multi-part message in MIME format...

    Your message dated Sun, 03 Mar 2024 09:06:26 +0000
    with message-id <E1rghne-008YNw-W3@fasolo.debian.org>
    and subject line Bug#1065155: fixed in poppler 22.12.0-2.2
    has caused the Debian Bug report #1065155,
    regarding libpoppler-glib8t64 Provides libpoppler-cpp0v5 instead of libpoppler-glib8
    to be marked as done.

    This means that you claim that the problem has been dealt with.
    If this is not the case it is now your responsibility to reopen the
    Bug report if necessary, and/or fix the problem forthwith.

    (NB: If you are a system administrator and have no idea what this
    message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner@bugs.debian.org
    immediately.)


    --
    1065155: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1065155
    Debian Bug Tracking System
    Contact owner@bugs.debian.org with problems

    Received: (at submit) by bugs.debian.org; 1 Mar 2024 10:02:55 +0000 X-Spam-Checker-Version: SpamAssassin 3.4.6-bugs.debian.org_2005_01_02
    (2021-04-09) on buxtehude.debian.org
    X-Spam-Level:
    X-Spam-Status: No, score=-16.9 required=4.0 tests=BAYES_00,
    BODY_INCLUDES_PACKAGE,DKIM_SIGNED,DKIM_VALID,FORGED_SPF_HELO,FOURLA,
    FROMDEVELOPER,HAS_PACKAGE,SPF_HELO_PASS,SPF_NONE,T_SCC_BODY_TEXT_LINE,
    XMAILER_REPORTBUG autolearn=ham autolearn_force=no
    version=3.4.6-bugs.debian.org_2005_01_02
    X-Spam-Bayes: score:0.0000 Tokens: new, 13; hammy, 150; neutral, 74; spammy,
    0. spammytokens: hammytokens:0.000-+--XDebbugsCc,
    0.000-+--X-Debbugs-Cc, 0.000-+--sk:taint_o, 0.000-+--sk:TAINT_O,
    0.000-+--trixie
    Return-path: <wrar@debian.org>
    Received: from wrar.name ([116.203.248.210]:54356 helo=durkon.wrar.name)
    by buxtehude.debian.org with esmtps (TLS1.3:ECDHE_SECP256R1