Your message dated Thu, 19 Oct 2023 20:49:31 +0000
with message-id <e1qtzxt-008joq...@fasolo.debian.org>
and subject line Bug#1054237: fixed in jdupes 1.27.3-4
has caused the Debian Bug report #1054237,
regarding jdupes: data loss behaviour from fdupes
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1054237: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1054237
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: jdupes
Version: 1.12-1
Severity: grave
Tags: upstream patch
Justification: causes non-serious data loss

>From the upstream in a private message:

jdupes inherited interactive deletion from fdupes and there were zero
input safeguards. A user tried to use ranges "2-4" and files 3 and 4 were
deleted, not preserved. This is a major data loss concern because the
behavior is destructive and contrary to user expectations. In the latest
commit I've placed heavy safeguards in the interactive deletion code that
should prevent all of the invalid input scenarios I can conceive.

The commit 4888e85[1] can and should be immediately applied to ALL
versions of jdupes that are being distributed. It should cleanly apply
and work without modification to every remotely recent version spanning
several years back.

[1] https://codeberg.org/jbruchon/jdupes/commit/4888e85

--- End Message ---
--- Begin Message ---
Source: jdupes
Source-Version: 1.27.3-4
Done: Joao Eriberto Mota Filho <eribe...@debian.org>

We believe that the bug you reported is fixed in the latest version of
jdupes, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1054...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Joao Eriberto Mota Filho <eribe...@debian.org> (supplier of updated jdupes 
package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Thu, 19 Oct 2023 13:40:10 -0300
Source: jdupes
Architecture: source
Version: 1.27.3-4
Distribution: unstable
Urgency: medium
Maintainer: Joao Eriberto Mota Filho <eribe...@debian.org>
Changed-By: Joao Eriberto Mota Filho <eribe...@debian.org>
Closes: 1054237
Changes:
 jdupes (1.27.3-4) unstable; urgency=medium
 .
   * debian/patches/020_fix-data-loss.patch: created to avoid a potential data
     loss caused by a wrong message that induces the users to use a range of
     values with -d option. Currently, the -d option doesn't understand ranges.
     (Closes: #1054237)
Checksums-Sha1:
 264740eaef8a988cb220f3ab26bb82f17bec0502 1907 jdupes_1.27.3-4.dsc
 071ff93f81e63bd6e64681eff1a3e328113e7083 15312 jdupes_1.27.3-4.debian.tar.xz
 dd8d4ce6b3ada2f889888c40d94291893b624b3c 6090 jdupes_1.27.3-4_source.buildinfo
Checksums-Sha256:
 a9baa90d82c10d37702bb2765c39f25c9283b5cc01c2152f811622ac71ce9cf2 1907 
jdupes_1.27.3-4.dsc
 97d1cdcde0c95d27a1bb9f121911e52c89ea6a9ac7743be2ef6fdc452fce1646 15312 
jdupes_1.27.3-4.debian.tar.xz
 60c71b2b3bf6d1d8036b759456f02204288c8caf4b61de5f28e27ae0c0a287e5 6090 
jdupes_1.27.3-4_source.buildinfo
Files:
 40c0e90834276069b947a11b3d73471a 1907 utils optional jdupes_1.27.3-4.dsc
 642c1273bdeed15c3eb33ec674ebd335 15312 utils optional 
jdupes_1.27.3-4.debian.tar.xz
 cd586755c3574a7c1ecc24887534785d 6090 utils optional 
jdupes_1.27.3-4_source.buildinfo

-----BEGIN PGP SIGNATURE-----
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=361m
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to