Package: release.debian.org Severity: normal Tags: bullseye User: release.debian.org@packages.debian.org Usertags: pu hi, this is a pre-approval request, I have not uploaded this yet (except to unstable). [ Reason ] unfortunatly debian-security-support in both bullseye and bookworm are affected by - #1034077 "debian-security-support: Lots of noise about DEBIAN_VERSION 12 being invalid when upgrading bullseye→bookworm" though fortunatly the fix is trivial and buster is not affected. (And unfortunatly I forgot to fix this in the last bullseye point release...) [ Impact ] Lots of noise on bullseye to bookworm upgrades with debian-security-support installed (which has a popcon of ~2750) [ Tests ] none, but the diff is really small & straightforward, see attachment. check-support-status.in | 2 +- debian/changelog | 11 +++++++++++ debian/rules | 2 +- security-support-limited | 1 + 4 files changed, 14 insertions(+), 2 deletions(-) [ Risks ] more users complaining about noise. [ Checklist ] [x] *all* changes are documented in the d/changelog [x] I reviewed all changes and I approve them [x] attach debdiff against the package in (old)stable [x] the issue is verified as fixed in unstable [ Other info ] As there will be no more bullseye point releases before the bookworm release, this probably needs to go in via bullseye-updates. Is d/changelog correct for this like it is? -- cheers, Holger ⢀⣴⠾⠻⢶⣦⠀ ⣾⠁⢠⠒⠀⣿⡁ holger@(debian|reproducible-builds|layer-acht).org ⢿⡄⠘⠷⠚⠋⠀ OpenPGP: B8BF54137B09D35CF026FE9D 091AB856069AAA1C ⠈⠳⣄ If we'd ban all cars from cities tomorrow, next week we will wonder why we waited for so long.
diff -Nru debian-security-support-11+2022.08.23/check-support-status.in debian-security-support-11+2023.05.04/check-support-status.in
--- debian-security-support-11+2022.08.23/check-support-status.in 2022-08-23 18:24:26.000000000 +0200
+++ debian-security-support-11+2023.05.04/check-support-status.in 2023-05-04 19:24:04.000000000 +0200
@@ -13,7 +13,7 @@
# Oldest Debian version included in debian-security-support
DEB_LOWEST_VER_ID=9
# Version ID for next Debian stable
-DEB_NEXT_VER_ID=11
+DEB_NEXT_VER_ID=12
if [ -z "$DEBIAN_VERSION" ] ; then
DEBIAN_VERSION="$(cat /etc/debian_version | grep '[0-9.]' | cut -d. -f1)"
diff -Nru debian-security-support-11+2022.08.23/debian/changelog debian-security-support-11+2023.05.04/debian/changelog
--- debian-security-support-11+2022.08.23/debian/changelog 2022-08-23 18:26:34.000000000 +0200
+++ debian-security-support-11+2023.05.04/debian/changelog 2023-05-04 19:27:19.000000000 +0200
@@ -1,3 +1,14 @@
+debian-security-support (1:11+2023.05.04) bullseye; urgency=medium
+
+ [ Holger Levsen ]
+ * set DEB_NEXT_VER_ID=12 as bookworm is the next release. Closes: #1034077.
+ Thanks to Stuart Prescott.
+
+ [ Sylvain Beucler ]
+ * security-support-limited: add gnupg1, see #982258.
+
+ -- Holger Levsen <holger@debian.org> Thu, 04 May 2023 19:27:19 +0200
+
debian-security-support (1:11+2022.08.23) bullseye; urgency=medium
* Update security-support-limited from 1:12+2022.08.19 from unstable,
diff -Nru debian-security-support-11+2022.08.23/debian/rules debian-security-support-11+2023.05.04/debian/rules
--- debian-security-support-11+2022.08.23/debian/rules 2022-08-23 18:24:26.000000000 +0200
+++ debian-security-support-11+2023.05.04/debian/rules 2023-05-04 19:24:04.000000000 +0200
@@ -1,6 +1,6 @@
#!/usr/bin/make -f
-NEXT_VERSION_ID=11
+NEXT_VERSION_ID=12
DEBIAN_VERSION ?= $(shell cat /etc/debian_version | grep '[0-9.]' | cut -d. -f1)
ifeq (,$(DEBIAN_VERSION))
diff -Nru debian-security-support-11+2022.08.23/security-support-limited debian-security-support-11+2023.05.04/security-support-limited
--- debian-security-support-11+2022.08.23/security-support-limited 2022-08-23 18:24:26.000000000 +0200
+++ debian-security-support-11+2023.05.04/security-support-limited 2023-05-04 19:24:04.000000000 +0200
@@ -12,6 +12,7 @@
ganglia See README.Debian.security, only supported behind an authenticated HTTP zone, #702775
ganglia-web See README.Debian.security, only supported behind an authenticated HTTP zone, #702776
golang* See https://www.debian.org/releases/bullseye/amd64/release-notes/ch-information.en.html#golang-static-linking
+gnupg1 See #982258 and https://www.debian.org/releases/stretch/amd64/release-notes/ch-whats-new.en.html#modern-gnupg
kde4libs khtml has no security support upstream, only for use on trusted content
khtml khtml has no security support upstream, only for use on trusted content, see #1004293
mozjs68 Not covered by security support, only suitable for trusted content, see #959804
Attachment:
signature.asc
Description: PGP signature