Your message dated Fri, 21 Feb 2020 18:07:43 +0000
with message-id <[email protected]>
and subject line Bug#951442: fixed in debian-security-support 2020.02.21
has caused the Debian Bug report #951442,
regarding debian-security-support: Please allow to exclude specific packages 
from the check
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
951442: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=951442
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: debian-security-support
Version: 2019.12.12~deb10u1
Severity: wishlist
Tags: upstream

Dear Maintainer,

   * What led up to the situation?

Two things:

1. I have installed binutils, which is Build-Essential and has limited
security support (#948634).

2. I use «chronic -e sh -c 'check-support-status >&2'» to check whether
any packages with limited security support are installed.

   * What was the outcome of this action?

Every time I run the command from (2), it exits non-zero, because
binutils is installed.

   * What outcome did you expect instead?

I'd like to be to have a way to run, say, «check-support-status
--dont-complain-about=binutils,binutils-common,libbinutils,binutils-x86-64-linux-gnu».
This command would skip the binary packages given on the command line
when looking for and listing installed binary packages with limited
support status.  Thus, in effect, it would let the admin "whitelist"
known issues, so only new ones would be printed.

Would this make sense?

Cheers,

Daniel


-- System Information:
Debian Release: 10.3
  APT prefers stable-debug
  APT policy: (500, 'stable-debug'), (500, 'stable')
Architecture: amd64 (x86_64)

Kernel: Linux 4.19.0-6-amd64 (SMP w/4 CPU cores)
Locale: LANG=C.UTF-8, LC_CTYPE=C.UTF-8 (charmap=UTF-8), LANGUAGE=C.UTF-8 
(charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages debian-security-support depends on:
ii  adduser                3.118
ii  debconf [debconf-2.0]  1.5.71
ii  gettext-base           0.19.8.1-9

debian-security-support recommends no packages.

debian-security-support suggests no packages.

-- debconf-show failed

--- End Message ---
--- Begin Message ---
Source: debian-security-support
Source-Version: 2020.02.21
Done: Holger Levsen <[email protected]>

We believe that the bug you reported is fixed in the latest version of
debian-security-support, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Holger Levsen <[email protected]> (supplier of updated debian-security-support 
package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Fri, 21 Feb 2020 18:38:55 +0100
Source: debian-security-support
Architecture: source
Version: 2020.02.21
Distribution: unstable
Urgency: medium
Maintainer: Holger Levsen <[email protected]>
Changed-By: Holger Levsen <[email protected]>
Closes: 890862 951442 951772
Changes:
 debian-security-support (2020.02.21) unstable; urgency=medium
 .
   [ Holger Levsen ]
   * Drop security-support-ended.deb7, we don't support wheezy anymore. (eLTS
     is maintained outside Debian.)
   * Add nodejs to security-support-ended.deb8 and .deb9.
   * Use runuser instead of su. Closes: #890862. Thanks to Jakobus Schürz.
   * Wrap long lines in changelog entries: 2015.04.04, thanks lintian-brush.
   * Fix day-of-week for changelog entry 2015.04.04, thanks lintian-brush.
 .
   [ Daniel Shahaf ]
   * Allow one to exclude specific packages from the check. Closes: #951442.
   * Prefix "check-support-status: " to error messages. Closes: #951772.
Checksums-Sha1:
 f9c1a0f3ae89a54d807065559390c37e68de9b0c 1857 
debian-security-support_2020.02.21.dsc
 8e44e7f2d48f1df8c2b99b2ced4b962e2dd09dd3 30748 
debian-security-support_2020.02.21.tar.xz
 0ad36ddbbe41d41c78d1c3e15b2fd6a7dc188248 6487 
debian-security-support_2020.02.21_source.buildinfo
Checksums-Sha256:
 3c141c9fc2155b6e658f52291fb7108870aa2451df4d26d8c17a6e5829785d06 1857 
debian-security-support_2020.02.21.dsc
 d0ff8e258e4bb66e4fc5e412e3f43c44a48d4ed9e279fdef6e0378d8ba2cac14 30748 
debian-security-support_2020.02.21.tar.xz
 4b1be4bd97144ba4baea486727e2a596868a27ee46d843c5a5992eecbe0b2e0c 6487 
debian-security-support_2020.02.21_source.buildinfo
Files:
 55b6be521e24df5853adbf6e822c82ee 1857 admin optional 
debian-security-support_2020.02.21.dsc
 bfb1b2da164c31a6be3b519b22835310 30748 admin optional 
debian-security-support_2020.02.21.tar.xz
 87cd4dead0b02b11442a0b17d4a87137 6487 admin optional 
debian-security-support_2020.02.21_source.buildinfo

-----BEGIN PGP SIGNATURE-----
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=79mw
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to