[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#987941: marked as done (buster-pu: package pacemaker/2.0.1-5+deb10u2)



Your message dated Sat, 10 Sep 2022 13:40:55 +0100
with message-id <2cfc9645343bdb910fe19c07bddfec2c428346a3.camel@adam-barratt.org.uk>
and subject line Closing requests for updates included in 10.13
has caused the Debian Bug report #987941,
regarding buster-pu: package pacemaker/2.0.1-5+deb10u2
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
987941: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987941
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Package: release.debian.org
Severity: normal
Tags: buster
User: release.debian.org@packages.debian.org
Usertags: pu

Dear Stable Release Team,

The latest stretch security upgrade broke the upgrade path to buster.
Since fixing that in stretch didn't get any traction (#981088), we have
to fix this in buster, as put forward by Andreas Beckmann:

$ debdiff pacemaker_2.0.1-5+deb10u1.dsc pacemaker_2.0.1-5+deb10u2.dsc
diff -Nru pacemaker-2.0.1/debian/changelog pacemaker-2.0.1/debian/changelog
--- pacemaker-2.0.1/debian/changelog	2020-11-07 20:21:48.000000000 +0100
+++ pacemaker-2.0.1/debian/changelog	2021-03-28 03:21:46.000000000 +0200
@@ -1,3 +1,14 @@
+pacemaker (2.0.1-5+deb10u2) buster; urgency=medium
+
+  [ Andreas Beckmann ]
+  * [1088b23] pacemaker-resource-agents: Bump Breaks+Replaces: pacemaker to (<< 2)
+    A new upstream release instroduced as security update 1.1.24-0+deb9u1 in
+    stretch added the new file /usr/lib/ocf/resource.d/pacemaker/ifspeed to
+    pacemaker, while it resides in pacemaker-resource-agents in buster.
+    (Closes: #985173)
+
+ -- Ferenc Wágner <wferi@debian.org>  Sun, 28 Mar 2021 03:21:46 +0200
+
 pacemaker (2.0.1-5+deb10u1) buster-security; urgency=high

   * [bf23450] Apply patch series fixing CVE-2020-25654: ACL bypass.
diff -Nru pacemaker-2.0.1/debian/control pacemaker-2.0.1/debian/control
--- pacemaker-2.0.1/debian/control	2020-11-07 20:21:48.000000000 +0100
+++ pacemaker-2.0.1/debian/control	2021-03-28 03:19:48.000000000 +0200
@@ -84,9 +84,9 @@
  ${misc:Depends},
 # split out of pacemaker so that pacemaker-remote can also use them:
 Breaks:
- pacemaker (<< 1.1.14-2~),
+ pacemaker (<< 2),
 Replaces:
- pacemaker (<< 1.1.14-2~),
+ pacemaker (<< 2),
 Description: cluster resource manager general resource agents
  ${S:X-Common-Description}
  .

I'm ready to upload if you agree.
-- 
Thanks,
Feri.

--- End Message ---
--- Begin Message ---
Package: release.debian.org
Version: 10.13

Hi,

Each of the updates referenced in these bugs was included in today's
10.13 point release.

Regards,

Adam

--- End Message ---

Reply to: