Hi,

On 07-12-2023 12:20, Adrian Bunk wrote:
On Thu, Dec 07, 2023 at 11:18:42AM +0100, Paul Gevers wrote:
I hope that in several hours,
https://release.debian.org/britney/excuses_s-p-u.html will have the answer.

it should find packages like jtreg6 that are scheduled for the next
point release, but it won't find packages like gmp that went into
bullseye 2 years ago.

Ack. Indeed it spots:
cacti, fastdds, freetype, grub-efi-amd64-signed, grub-efi-arm64-signed, grub-efi-ia32-signed, jtreg6, llvm-toolchain-16, node-babel7, node-browserify-sign and slurm-wlm. A bunch of them have arch:all binaries.

Stopping further regression on this is good, but for the ~ February
point releases we have to discuss whether binNMUs+NMUs for packages that
slipped through in the past should be done for bookworm (and bullseye).

I would agree with this, but I'm not an SRM. A bunch of these are security uploads. We need to discuss this with the security team too (in CC now).

Paul

Attachment: OpenPGP_signature.asc
Description: OpenPGP digital signature

_______________________________________________
Reproducible-builds mailing list
Reproducible-builds@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/reproducible-builds

Reply via email to