--- Begin Message ---
Package: partman-efi
Version: 25
Severity: normal
Tags: patch
User: ubuntu-devel@lists.ubuntu.com
Usertags: origin-ubuntu vivid ubuntu-patch
*** /tmp/tmpryAK4b/bug_body
In Ubuntu, the attached patch was applied to achieve the following:
* fstab.d/efi: force umask in mount options to ensure directory never
ends up with incorrect permissions. (LP: #1390183)
Thanks for considering the patch.
-- System Information:
Debian Release: jessie/sid
APT prefers utopic-updates
APT policy: (500, 'utopic-updates'), (500, 'utopic-security'), (500, 'utopic-proposed'), (500, 'utopic'), (100, 'utopic-backports')
Architecture: amd64 (x86_64)
Foreign Architectures: i386
Kernel: Linux 3.16.0-25-generic (SMP w/4 CPU cores)
Locale: LANG=en_CA.UTF-8, LC_CTYPE=en_CA.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
diff -Nru partman-efi-25ubuntu6/debian/changelog partman-efi-25ubuntu7/debian/changelog
diff -Nru partman-efi-25ubuntu6/fstab.d/efi partman-efi-25ubuntu7/fstab.d/efi
--- partman-efi-25ubuntu6/fstab.d/efi 2010-09-03 08:40:28.000000000 -0400
+++ partman-efi-25ubuntu7/fstab.d/efi 2014-11-18 08:38:31.000000000 -0500
@@ -23,7 +23,7 @@
[ -f "$id/method" ] || continue
method=$(cat $id/method)
[ "$method" = efi ] || continue
- echo "$path" /boot/efi vfat defaults 0 1
+ echo "$path" /boot/efi vfat umask=0077 0 1
seen_efi=1
done
close_dialog
--- End Message ---
--- Begin Message ---
Source: partman-efi
Source-Version: 56
We believe that the bug you reported is fixed in the latest version of
partman-efi, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to 770033@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Christian Perrier <bubulle@debian.org> (supplier of updated partman-efi package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@ftp-master.debian.org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Format: 1.8
Date: Mon, 24 Nov 2014 09:02:59 +0100
Source: partman-efi
Binary: partman-efi
Architecture: source i386
Version: 56
Distribution: unstable
Urgency: medium
Maintainer: Debian Install System Team <debian-boot@lists.debian.org>
Changed-By: Christian Perrier <bubulle@debian.org>
Description:
partman-efi - Add to partman support for EFI System Partitions (udeb)
Closes: 770033
Changes:
partman-efi (56) unstable; urgency=medium
.
[ Steve McIntyre ]
* Force umask for /boot/efi in mount options. Closes: #770033. Thanks to
Marc Deslauriers for the patch.
.
[ Updated translations ]
* German (de.po) by Holger Wansing
* Italian (it.po) by Milo Casagrande
* Polish (pl.po) by Michał Kułach
* Thai (th.po) by Theppitak Karoonboonyanan
Checksums-Sha1:
e20ca79dbb82cc2b06035ca93549f9a63271e309 1685 partman-efi_56.dsc
11f994b1269583af04229d262fc4dc90ee07c791 60136 partman-efi_56.tar.xz
e813eb5825d8ad4c249f96332d3419ce592858cd 36324 partman-efi_56_i386.udeb
Checksums-Sha256:
68a5092d1ec2ac2b8e859e57f4838f009a5054a3f5fb44b823908834831e62c8 1685 partman-efi_56.dsc
a688a52afdf4248e72b539fe0d3c26ab02668365e33c237c90badaab0c90bc02 60136 partman-efi_56.tar.xz
35bb7b57ce01eee3ce937300a323f1dd5cc842d0f5a6acd507e6ec2f26ae1adf 36324 partman-efi_56_i386.udeb
Files:
29bd4f97bf09e47ea650be27466610d2 1685 debian-installer standard partman-efi_56.dsc
847bb08565f5467a1c67eee23387580e 60136 debian-installer standard partman-efi_56.tar.xz
b0b07c13a0820c2787e72d4253ebc68e 36324 debian-installer standard partman-efi_56_i386.udeb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)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=EhiE
-----END PGP SIGNATURE-----
--- End Message ---