[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#1017987: marked as done (bullseye-pu: package debian-security-support/1:11+2022.08.23)



Your message dated Sat, 10 Sep 2022 13:36:19 +0100
with message-id <92fe43e7805e82e43100a6471ccbf91cd9a12944.camel@adam-barratt.org.uk>
and subject line Closing requests for updates in 11.5
has caused the Debian Bug report #1017987,
regarding bullseye-pu: package debian-security-support/1:11+2022.08.23
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
1017987: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1017987
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Package: release.debian.org
Severity: normal
Tags: bullseye
User: release.debian.org@packages.debian.org
Usertags: pu

I've uploaded this now for the next bullseye point release:

$ debdiff debian-security-support_11+2021.03.19.dsc debian-security-support_11+2022.08.23.dsc|diffstat
 debian/changelog         |   13 +++++++++++++
 security-support-limited |   11 +++--------
 2 files changed, 16 insertions(+), 8 deletions(-)

$ debdiff debian-security-support_11+2021.03.19.dsc debian-security-support_11+2022.08.23.dsc
diff -Nru debian-security-support-11+2021.03.19/debian/changelog debian-security-support-11+2022.08.23/debian/changelog
--- debian-security-support-11+2021.03.19/debian/changelog	2021-03-19 21:58:42.000000000 +0100
+++ debian-security-support-11+2022.08.23/debian/changelog	2022-08-23 18:26:34.000000000 +0200
@@ -1,3 +1,16 @@
+debian-security-support (1:11+2022.08.23) bullseye; urgency=medium
+
+  * Update security-support-limited from 1:12+2022.08.19 from unstable,
+    - add khtml. Closes: #1004293.
+    - add openjdk-17 and point to the bullseye release notes (as discussed in
+      #975016).
+    - for golang, point to the bullseye manual instead the buster one.
+    - drop mozjs52 and mozjs60 as they were only present in buster.
+    - drop libv8-3.14, mozjs, mozjs24, swftools and webkitgtk as they were
+      only present in stretch and earlier.
+
+ -- Holger Levsen <holger@debian.org>  Tue, 23 Aug 2022 18:26:34 +0200
+
 debian-security-support (1:11+2021.03.19) unstable; urgency=medium
 
   [ Utkarsh Gupta ]
diff -Nru debian-security-support-11+2021.03.19/security-support-limited debian-security-support-11+2022.08.23/security-support-limited
--- debian-security-support-11+2021.03.19/security-support-limited	2021-01-25 13:28:55.000000000 +0100
+++ debian-security-support-11+2022.08.23/security-support-limited	2022-08-23 18:24:26.000000000 +0200
@@ -11,22 +11,17 @@
 cython          Only included for building packages, not running them, #975058
 ganglia         See README.Debian.security, only supported behind an authenticated HTTP zone, #702775
 ganglia-web     See README.Debian.security, only supported behind an authenticated HTTP zone, #702776
-golang*		See https://www.debian.org/releases/buster/amd64/release-notes/ch-information.en.html#golang-static-linking
+golang*		See https://www.debian.org/releases/bullseye/amd64/release-notes/ch-information.en.html#golang-static-linking
 kde4libs        khtml has no security support upstream, only for use on trusted content
-libv8-3.14      Not covered by security support, only suitable for trusted content
-mozjs           Not covered by security support, only suitable for trusted content
-mozjs24         Not covered by security support, only suitable for trusted content
-mozjs52         Not covered by security support, only suitable for trusted content
-mozjs60         Not covered by security support, only suitable for trusted content
+khtml           khtml has no security support upstream, only for use on trusted content, see #1004293
 mozjs68         Not covered by security support, only suitable for trusted content, see #959804
 mozjs78         Not covered by security support, only suitable for trusted content, see #959804
 ocsinventory-server Only supported behind an authenticated HTTP zone
+openjdk-17	See https://www.debian.org/releases/bullseye/amd64/release-notes/ch-information.en.html#openjdk-17
 python2.7       Only included for building packages, not running them, #975058
 python-stdlib-extensions Only included for building packages, not running them, #975058
 qtwebengine-opensource-src No security support upstream and backports not feasible, only for use on trusted content
 qtwebkit        No security support upstream and backports not feasible, only for use on trusted content
 qtwebkit-opensource-src No security support upstream and backports not feasible, only for use on trusted content
 sql-ledger      Only supported behind an authenticated HTTP zone
-swftools        Not covered by security support, only suitable for trusted content
-webkitgtk       No security support upstream and backports not feasible, only for use on trusted content
 zoneminder      See README.Debian.security, only supported behind an authenticated HTTP zone, #922724

Thanks for all your SRM work!


-- 
cheers,
	Holger

 ⢀⣴⠾⠻⢶⣦⠀
 ⣾⠁⢠⠒⠀⣿⡁  holger@(debian|reproducible-builds|layer-acht).org
 ⢿⡄⠘⠷⠚⠋⠀  OpenPGP: B8BF54137B09D35CF026FE9D 091AB856069AAA1C
 ⠈⠳⣄

The system isn't broken. It was built this way.

Attachment: signature.asc
Description: PGP signature


--- End Message ---
--- Begin Message ---
Package: release.debian.org
Version: 11.5

Hi,

The updates referred to in each of these bugs were included in today's
11.5 point release.

Regards,

Adam

--- End Message ---

Reply to: