Your message dated Sat, 09 Oct 2021 12:09:40 +0100 with message-id <81741a2f4e370c14a3bec08b7fe6e2b10c32267b.camel@adam-barratt.org.uk> and subject line Closing p-u bugs for updates in 11.1 has caused the Debian Bug report #993396, regarding bullseye-pu: package flatpak/1.10.3-0+deb11u1 to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner@bugs.debian.org immediately.) -- 993396: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=993396 Debian Bug Tracking System Contact owner@bugs.debian.org with problems
--- Begin Message ---
- To: Debian Bug Tracking System <submit@bugs.debian.org>
- Subject: bullseye-pu: package flatpak/1.10.3-0+deb11u1
- From: Simon McVittie <smcv@debian.org>
- Date: Tue, 31 Aug 2021 20:10:17 +0100
- Message-id: <YS5+mc3gjvpQXoGZ@momentum.pseudorandom.co.uk>
Package: release.debian.org Severity: normal Tags: bullseye User: release.debian.org@packages.debian.org Usertags: pu [ Reason ] Sync up with upstream to make future stable/security updates easier. Fix a bug affecting users who set XDG_RUNTIME_DIR to an unusual value. [ Impact ] If not accepted, future stable/security updates will take longer to prepare (backporting fixes to an old upstream release) or longer to review (the first time we pull in a new upstream stable release, the diff will look like this one). Additionally, users with an unusual XDG_RUNTIME_DIR will find that Wayland, Pipewire and similar protocols don't work in a Flatpak sandbox. Most users of systemd-logind or elogind, or users who do not have an XDG_RUNTIME_DIR at all, are unaffected by this. This was a regression in 1.8.5/1.10.0. [ Tests ] Flatpak has fairly thorough autopkgtests. They can't be run on ci.debian.net due to conflicts between LXC and Flatpak containers, but I run them under qemu-system-x86_64 before each upload. I've also done some manual testing on bullseye GNOME desktop/laptop systems and will continue to do so. [ Risks ] It's a high-visibility and security-sensitive package, but the code has hardly changed since stable. All changes are backports from unstable (either the development release 1.11.3, or post-release fixes in 1.11.3-2 which resulted from me testing 1.11.3 under autopkgtest). [ Checklist ] [x] *all* changes are documented in the d/changelog [x] I reviewed all changes and I approve them [x] attach debdiff against the package in (old)stable - It's a filtered git diff rather than a debdiff, but I upload with dgit, so what's in git has to match what's uploaded. I did a diff between patched trees, because the majority of the upstream code changes were previously in debian/patches. [x] the issue is verified as fixed in unstable [ Changes ] common/flatpak-run.c: Make sure user's custom XDG_RUNTIME_DIR is overwritten with the one Flatpak sets up, as intended. Previously, the XDG_RUNTIME_DIR inside the sandbox was only correct for users of systemd-logind or elogind (Flatpak deliberately makes its path consistent with those), or users who do not have that variable set at all. tests/test-run.sh: Assert that the XDG_RUNTIME_DIR bug is fixed. Other files: new upstream stable release (NEWS, version number, Autotools noise). [ Other info ] I would like to keep tracking Flatpak stable releases in bullseye if possible. From its security history and position at a sandbox boundary, I expect to see CVEs during the lifetime of bullseye. Thanks, smcv
--- End Message ---
--- Begin Message ---
- To: 992063-done@bugs.debian.org, 992078-done@bugs.debian.org, 992114-done@bugs.debian.org, 992153-done@bugs.debian.org, 992206-done@bugs.debian.org, 992299-done@bugs.debian.org, 992435-done@bugs.debian.org, 992547-done@bugs.debian.org, 992693-done@bugs.debian.org, 992836-done@bugs.debian.org, 992843-done@bugs.debian.org, 992956-done@bugs.debian.org, 992978-done@bugs.debian.org, 993035-done@bugs.debian.org, 993049-done@bugs.debian.org, 993133-done@bugs.debian.org, 993225-done@bugs.debian.org, 993276-done@bugs.debian.org, 993281-done@bugs.debian.org, 993282-done@bugs.debian.org, 993283-done@bugs.debian.org, 993396-done@bugs.debian.org, 993489-done@bugs.debian.org, 993523-done@bugs.debian.org, 993564-done@bugs.debian.org, 993604-done@bugs.debian.org, 993639-done@bugs.debian.org, 993655-done@bugs.debian.org, 993656-done@bugs.debian.org, 993708-done@bugs.debian.org, 993720-done@bugs.debian.org, 993792-done@bugs.debian.org, 993793-done@bugs.debian.org, 993822-done@bugs.debian.org, 993825-done@bugs.debian.org, 993899-done@bugs.debian.org, 993968-done@bugs.debian.org, 994022-done@bugs.debian.org, 994107-done@bugs.debian.org, 994111-done@bugs.debian.org, 994112-done@bugs.debian.org, 994147-done@bugs.debian.org, 994490-done@bugs.debian.org, 994555-done@bugs.debian.org, 994574-done@bugs.debian.org, 994627-done@bugs.debian.org, 994709-done@bugs.debian.org, 994710-done@bugs.debian.org, 994828-done@bugs.debian.org, 994861-done@bugs.debian.org, 994880-done@bugs.debian.org, 994881-done@bugs.debian.org, 994885-done@bugs.debian.org, 994907-done@bugs.debian.org, 994946-done@bugs.debian.org, 995025-done@bugs.debian.org, 995062-done@bugs.debian.org, 995075-done@bugs.debian.org, 995144-done@bugs.debian.org, 995237-done@bugs.debian.org, 995304-done@bugs.debian.org, 995306-done@bugs.debian.org, 995331-done@bugs.debian.org, 995469-done@bugs.debian.org, 995481-done@bugs.debian.org, 994097-done@bugs.debian.org
- Subject: Closing p-u bugs for updates in 11.1
- From: "Adam D. Barratt" <adam@adam-barratt.org.uk>
- Date: Sat, 09 Oct 2021 12:09:40 +0100
- Message-id: <81741a2f4e370c14a3bec08b7fe6e2b10c32267b.camel@adam-barratt.org.uk>
Package: release.debian.org Version: 11.1 Hi, The updates relating to these bugs were included in this morning's 11.1 point release for bullseye. Regards, Adam
--- End Message ---