Package: release.debian.org Severity: normal Tags: bullseye User: release.debian....@packages.debian.org Usertags: pu
hi, this is a pre-approval request, I have not uploaded this yet (except to unstable). [ Reason ] unfortunatly debian-security-support in both bullseye and bookworm are affected by - #1034077 "debian-security-support: Lots of noise about DEBIAN_VERSION 12 being invalid when upgrading bullseye→bookworm" though fortunatly the fix is trivial and buster is not affected. (And unfortunatly I forgot to fix this in the last bullseye point release...) [ Impact ] Lots of noise on bullseye to bookworm upgrades with debian-security-support installed (which has a popcon of ~2750) [ Tests ] none, but the diff is really small & straightforward, see attachment. check-support-status.in | 2 +- debian/changelog | 11 +++++++++++ debian/rules | 2 +- security-support-limited | 1 + 4 files changed, 14 insertions(+), 2 deletions(-) [ Risks ] more users complaining about noise. [ Checklist ] [x] *all* changes are documented in the d/changelog [x] I reviewed all changes and I approve them [x] attach debdiff against the package in (old)stable [x] the issue is verified as fixed in unstable [ Other info ] As there will be no more bullseye point releases before the bookworm release, this probably needs to go in via bullseye-updates. Is d/changelog correct for this like it is? -- cheers, Holger ⢀⣴⠾⠻⢶⣦⠀ ⣾⠁⢠⠒⠀⣿⡁ holger@(debian|reproducible-builds|layer-acht).org ⢿⡄⠘⠷⠚⠋⠀ OpenPGP: B8BF54137B09D35CF026FE9D 091AB856069AAA1C ⠈⠳⣄ If we'd ban all cars from cities tomorrow, next week we will wonder why we waited for so long.
diff -Nru debian-security-support-11+2022.08.23/check-support-status.in debian-security-support-11+2023.05.04/check-support-status.in --- debian-security-support-11+2022.08.23/check-support-status.in 2022-08-23 18:24:26.000000000 +0200 +++ debian-security-support-11+2023.05.04/check-support-status.in 2023-05-04 19:24:04.000000000 +0200 @@ -13,7 +13,7 @@ # Oldest Debian version included in debian-security-support DEB_LOWEST_VER_ID=9 # Version ID for next Debian stable -DEB_NEXT_VER_ID=11 +DEB_NEXT_VER_ID=12 if [ -z "$DEBIAN_VERSION" ] ; then DEBIAN_VERSION="$(cat /etc/debian_version | grep '[0-9.]' | cut -d. -f1)" diff -Nru debian-security-support-11+2022.08.23/debian/changelog debian-security-support-11+2023.05.04/debian/changelog --- debian-security-support-11+2022.08.23/debian/changelog 2022-08-23 18:26:34.000000000 +0200 +++ debian-security-support-11+2023.05.04/debian/changelog 2023-05-04 19:27:19.000000000 +0200 @@ -1,3 +1,14 @@ +debian-security-support (1:11+2023.05.04) bullseye; urgency=medium + + [ Holger Levsen ] + * set DEB_NEXT_VER_ID=12 as bookworm is the next release. Closes: #1034077. + Thanks to Stuart Prescott. + + [ Sylvain Beucler ] + * security-support-limited: add gnupg1, see #982258. + + -- Holger Levsen <hol...@debian.org> Thu, 04 May 2023 19:27:19 +0200 + debian-security-support (1:11+2022.08.23) bullseye; urgency=medium * Update security-support-limited from 1:12+2022.08.19 from unstable, diff -Nru debian-security-support-11+2022.08.23/debian/rules debian-security-support-11+2023.05.04/debian/rules --- debian-security-support-11+2022.08.23/debian/rules 2022-08-23 18:24:26.000000000 +0200 +++ debian-security-support-11+2023.05.04/debian/rules 2023-05-04 19:24:04.000000000 +0200 @@ -1,6 +1,6 @@ #!/usr/bin/make -f -NEXT_VERSION_ID=11 +NEXT_VERSION_ID=12 DEBIAN_VERSION ?= $(shell cat /etc/debian_version | grep '[0-9.]' | cut -d. -f1) ifeq (,$(DEBIAN_VERSION)) diff -Nru debian-security-support-11+2022.08.23/security-support-limited debian-security-support-11+2023.05.04/security-support-limited --- debian-security-support-11+2022.08.23/security-support-limited 2022-08-23 18:24:26.000000000 +0200 +++ debian-security-support-11+2023.05.04/security-support-limited 2023-05-04 19:24:04.000000000 +0200 @@ -12,6 +12,7 @@ ganglia See README.Debian.security, only supported behind an authenticated HTTP zone, #702775 ganglia-web See README.Debian.security, only supported behind an authenticated HTTP zone, #702776 golang* See https://www.debian.org/releases/bullseye/amd64/release-notes/ch-information.en.html#golang-static-linking +gnupg1 See #982258 and https://www.debian.org/releases/stretch/amd64/release-notes/ch-whats-new.en.html#modern-gnupg kde4libs khtml has no security support upstream, only for use on trusted content khtml khtml has no security support upstream, only for use on trusted content, see #1004293 mozjs68 Not covered by security support, only suitable for trusted content, see #959804
signature.asc
Description: PGP signature