Your message dated Sat, 07 Oct 2023 12:41:28 +0100 with message-id <84bb5ff8312f749ebe536897993782bf35aa1977.camel@adam-barratt.org.uk> and subject line Closing opu requests for updates included in 11.8 has caused the Debian Bug report #1035522, regarding bullseye-pu: package debian-security-support/1:11+2023.05.04 to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner@bugs.debian.org immediately.) -- 1035522: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1035522 Debian Bug Tracking System Contact owner@bugs.debian.org with problems
--- Begin Message ---
- To: Debian Bug Tracking System <submit@bugs.debian.org>
- Subject: bullseye-pu: package debian-security-support/1:11+2023.05.04
- From: Holger Levsen <holger@debian.org>
- Date: Thu, 4 May 2023 19:50:37 +0200
- Message-id: <ZFPwbfueA5Sr1GUQ@layer-acht.org>
Package: release.debian.org Severity: normal Tags: bullseye User: release.debian.org@packages.debian.org Usertags: pu hi, this is a pre-approval request, I have not uploaded this yet (except to unstable). [ Reason ] unfortunatly debian-security-support in both bullseye and bookworm are affected by - #1034077 "debian-security-support: Lots of noise about DEBIAN_VERSION 12 being invalid when upgrading bullseye→bookworm" though fortunatly the fix is trivial and buster is not affected. (And unfortunatly I forgot to fix this in the last bullseye point release...) [ Impact ] Lots of noise on bullseye to bookworm upgrades with debian-security-support installed (which has a popcon of ~2750) [ Tests ] none, but the diff is really small & straightforward, see attachment. check-support-status.in | 2 +- debian/changelog | 11 +++++++++++ debian/rules | 2 +- security-support-limited | 1 + 4 files changed, 14 insertions(+), 2 deletions(-) [ Risks ] more users complaining about noise. [ Checklist ] [x] *all* changes are documented in the d/changelog [x] I reviewed all changes and I approve them [x] attach debdiff against the package in (old)stable [x] the issue is verified as fixed in unstable [ Other info ] As there will be no more bullseye point releases before the bookworm release, this probably needs to go in via bullseye-updates. Is d/changelog correct for this like it is? -- cheers, Holger ⢀⣴⠾⠻⢶⣦⠀ ⣾⠁⢠⠒⠀⣿⡁ holger@(debian|reproducible-builds|layer-acht).org ⢿⡄⠘⠷⠚⠋⠀ OpenPGP: B8BF54137B09D35CF026FE9D 091AB856069AAA1C ⠈⠳⣄ If we'd ban all cars from cities tomorrow, next week we will wonder why we waited for so long.diff -Nru debian-security-support-11+2022.08.23/check-support-status.in debian-security-support-11+2023.05.04/check-support-status.in --- debian-security-support-11+2022.08.23/check-support-status.in 2022-08-23 18:24:26.000000000 +0200 +++ debian-security-support-11+2023.05.04/check-support-status.in 2023-05-04 19:24:04.000000000 +0200 @@ -13,7 +13,7 @@ # Oldest Debian version included in debian-security-support DEB_LOWEST_VER_ID=9 # Version ID for next Debian stable -DEB_NEXT_VER_ID=11 +DEB_NEXT_VER_ID=12 if [ -z "$DEBIAN_VERSION" ] ; then DEBIAN_VERSION="$(cat /etc/debian_version | grep '[0-9.]' | cut -d. -f1)" diff -Nru debian-security-support-11+2022.08.23/debian/changelog debian-security-support-11+2023.05.04/debian/changelog --- debian-security-support-11+2022.08.23/debian/changelog 2022-08-23 18:26:34.000000000 +0200 +++ debian-security-support-11+2023.05.04/debian/changelog 2023-05-04 19:27:19.000000000 +0200 @@ -1,3 +1,14 @@ +debian-security-support (1:11+2023.05.04) bullseye; urgency=medium + + [ Holger Levsen ] + * set DEB_NEXT_VER_ID=12 as bookworm is the next release. Closes: #1034077. + Thanks to Stuart Prescott. + + [ Sylvain Beucler ] + * security-support-limited: add gnupg1, see #982258. + + -- Holger Levsen <holger@debian.org> Thu, 04 May 2023 19:27:19 +0200 + debian-security-support (1:11+2022.08.23) bullseye; urgency=medium * Update security-support-limited from 1:12+2022.08.19 from unstable, diff -Nru debian-security-support-11+2022.08.23/debian/rules debian-security-support-11+2023.05.04/debian/rules --- debian-security-support-11+2022.08.23/debian/rules 2022-08-23 18:24:26.000000000 +0200 +++ debian-security-support-11+2023.05.04/debian/rules 2023-05-04 19:24:04.000000000 +0200 @@ -1,6 +1,6 @@ #!/usr/bin/make -f -NEXT_VERSION_ID=11 +NEXT_VERSION_ID=12 DEBIAN_VERSION ?= $(shell cat /etc/debian_version | grep '[0-9.]' | cut -d. -f1) ifeq (,$(DEBIAN_VERSION)) diff -Nru debian-security-support-11+2022.08.23/security-support-limited debian-security-support-11+2023.05.04/security-support-limited --- debian-security-support-11+2022.08.23/security-support-limited 2022-08-23 18:24:26.000000000 +0200 +++ debian-security-support-11+2023.05.04/security-support-limited 2023-05-04 19:24:04.000000000 +0200 @@ -12,6 +12,7 @@ ganglia See README.Debian.security, only supported behind an authenticated HTTP zone, #702775 ganglia-web See README.Debian.security, only supported behind an authenticated HTTP zone, #702776 golang* See https://www.debian.org/releases/bullseye/amd64/release-notes/ch-information.en.html#golang-static-linking +gnupg1 See #982258 and https://www.debian.org/releases/stretch/amd64/release-notes/ch-whats-new.en.html#modern-gnupg kde4libs khtml has no security support upstream, only for use on trusted content khtml khtml has no security support upstream, only for use on trusted content, see #1004293 mozjs68 Not covered by security support, only suitable for trusted content, see #959804Attachment: signature.asc
Description: PGP signature
--- End Message ---
--- Begin Message ---
- To: 1007787-done@bugs.debian.org, 1007950-done@bugs.debian.org, 1013893-done@bugs.debian.org, 1028992-done@bugs.debian.org, 1032299-done@bugs.debian.org, 1034510-done@bugs.debian.org, 1034713-done@bugs.debian.org, 1034714-done@bugs.debian.org, 1034736-done@bugs.debian.org, 1035046-done@bugs.debian.org, 1035059-done@bugs.debian.org, 1035105-done@bugs.debian.org, 1035304-done@bugs.debian.org, 1035311-done@bugs.debian.org, 1035464-done@bugs.debian.org, 1035475-done@bugs.debian.org, 1035522-done@bugs.debian.org, 1035683-done@bugs.debian.org, 1035924-done@bugs.debian.org, 1036043-done@bugs.debian.org, 1036044-done@bugs.debian.org, 1036046-done@bugs.debian.org, 1036182-done@bugs.debian.org, 1036240-done@bugs.debian.org, 1036300-done@bugs.debian.org, 1036314-done@bugs.debian.org, 1036797-done@bugs.debian.org, 1036811-done@bugs.debian.org, 1036976-done@bugs.debian.org, 1037054-done@bugs.debian.org, 1037175-done@bugs.debian.org, 1037182-done@bugs.debian.org, 1037187-done@bugs.debian.org, 1037196-done@bugs.debian.org, 1037214-done@bugs.debian.org, 1037236-done@bugs.debian.org, 1038153-done@bugs.debian.org, 1038451-done@bugs.debian.org, 1038813-done@bugs.debian.org, 1038943-done@bugs.debian.org, 1039020-done@bugs.debian.org, 1039040-done@bugs.debian.org, 1039470-done@bugs.debian.org, 1039708-done@bugs.debian.org, 1039738-done@bugs.debian.org, 1039854-done@bugs.debian.org, 1039860-done@bugs.debian.org, 1039994-done@bugs.debian.org, 1040137-done@bugs.debian.org, 1040668-done@bugs.debian.org, 1040677-done@bugs.debian.org, 1040758-done@bugs.debian.org, 1040865-done@bugs.debian.org, 1040930-done@bugs.debian.org, 1040950-done@bugs.debian.org, 1041397-done@bugs.debian.org, 1041475-done@bugs.debian.org, 1042057-done@bugs.debian.org, 1043270-done@bugs.debian.org, 1049374-done@bugs.debian.org, 1050044-done@bugs.debian.org, 1050119-done@bugs.debian.org, 1050121-done@bugs.debian.org, 1050332-done@bugs.debian.org, 1050333-done@bugs.debian.org, 1050538-done@bugs.debian.org, 1050573-done@bugs.debian.org, 1050638-done@bugs.debian.org, 1051051-done@bugs.debian.org, 1051339-done@bugs.debian.org, 1051508-done@bugs.debian.org, 1051884-done@bugs.debian.org, 1051902-done@bugs.debian.org, 1051937-done@bugs.debian.org, 1052027-done@bugs.debian.org, 1052082-done@bugs.debian.org, 1052150-done@bugs.debian.org, 1052222-done@bugs.debian.org, 1052288-done@bugs.debian.org, 1052363-done@bugs.debian.org, 1052402-done@bugs.debian.org, 1052420-done@bugs.debian.org, 1052552-done@bugs.debian.org, 1052611-done@bugs.debian.org, 1053177-done@bugs.debian.org, 1053220-done@bugs.debian.org, 1053240-done@bugs.debian.org, 1053270-done@bugs.debian.org, 1053271-done@bugs.debian.org, 1053290-done@bugs.debian.org, 1053522-done@bugs.debian.org
- Subject: Closing opu requests for updates included in 11.8
- From: "Adam D. Barratt" <adam@adam-barratt.org.uk>
- Date: Sat, 07 Oct 2023 12:41:28 +0100
- Message-id: <84bb5ff8312f749ebe536897993782bf35aa1977.camel@adam-barratt.org.uk>
Package: release.debian.org Version: 11.8 Hi, The updates referred to by each of these requests were included in today's 11.8 bullseye point release. Regards, Adam
--- End Message ---