Your message dated Sat, 02 Jul 2022 17:17:07 +0000
with message-id <e1o7gjz-000dy7...@fasolo.debian.org>
and subject line Bug#1012195: fixed in dpkg 1.20.11
has caused the Debian Bug report #1012195,
regarding dpkg: lintian autopkgtest *may* have spotted a regression in security 
update of dpkg
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1012195: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1012195
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: dpkg
Version: 1.20.10
Severity: important

Dear Guillem,

Our proposed-updates queue [1] show regressions in the autopkgtest of
lintian with the security version of dpkg. Looking at the logs [2], it
appears to me that the file permissions of files in the test
change. If I understand the security issue correctly, I don't think
that was intended. Again, I may be reading the signs wrong, but I
suspect you want to have a look.

Paul

# Tags do not match
# 
# --- 
../../autopkgtest_tmp/build-and-evaluate-test-packages/eval/checks/files/permissions/legacy-scripts/tags.specified.calibrated
# +++ 
../../autopkgtest_tmp/build-and-evaluate-test-packages/eval/checks/files/permissions/legacy-scripts/tags.actual.parsed
# -scripts (source): octal-permissions scripts_6ds-1ubuntu0.5.10.1.dsc  777 
tkfoo
# -scripts (source): octal-permissions scripts_6ds-1ubuntu0.5.10.1.dsc  777 
gccbug.dpatch
# -scripts (source): octal-permissions scripts_6ds-1ubuntu0.5.10.1.dsc  777 
envfoo
# -scripts (source): octal-permissions scripts_6ds-1ubuntu0.5.10.1.dsc  666 
xsession-test
# -scripts (source): octal-permissions scripts_6ds-1ubuntu0.5.10.1.dsc  666 
wishfoo
# -scripts (source): octal-permissions scripts_6ds-1ubuntu0.5.10.1.dsc  666 
suidperlfoo
# -scripts (source): octal-permissions scripts_6ds-1ubuntu0.5.10.1.dsc  666 
sh-broken
# -scripts (source): octal-permissions scripts_6ds-1ubuntu0.5.10.1.dsc  666 
rubyfoo
# -scripts (source): octal-permissions scripts_6ds-1ubuntu0.5.10.1.dsc  666 
phpfoo
# -scripts (source): octal-permissions scripts_6ds-1ubuntu0.5.10.1.dsc  666 
phpenvfoo
# -scripts (source): octal-permissions scripts_6ds-1ubuntu0.5.10.1.dsc  666 
perlfoo
# -scripts (source): octal-permissions scripts_6ds-1ubuntu0.5.10.1.dsc  666 
perl-bizarre-3
# -scripts (source): octal-permissions scripts_6ds-1ubuntu0.5.10.1.dsc  666 
perl-bizarre-2
# -scripts (source): octal-permissions scripts_6ds-1ubuntu0.5.10.1.dsc  666 
perl-bizarre-1
# -scripts (source): octal-permissions scripts_6ds-1ubuntu0.5.10.1.dsc  666 
make-foo
# -scripts (source): octal-permissions scripts_6ds-1ubuntu0.5.10.1.dsc  666 
lefty-foo
# -scripts (source): octal-permissions scripts_6ds-1ubuntu0.5.10.1.dsc  666 
jruby-broken
# -scripts (source): octal-permissions scripts_6ds-1ubuntu0.5.10.1.dsc  666 
init-skeleton
# -scripts (source): octal-permissions scripts_6ds-1ubuntu0.5.10.1.dsc  666 
init-no-lsb
# -scripts (source): octal-permissions scripts_6ds-1ubuntu0.5.10.1.dsc  666 
init-lsb-other
# -scripts (source): octal-permissions scripts_6ds-1ubuntu0.5.10.1.dsc  666 
init-lsb-broken
# -scripts (source): octal-permissions scripts_6ds-1ubuntu0.5.10.1.dsc  666 
guile-bizarre
# -scripts (source): octal-permissions scripts_6ds-1ubuntu0.5.10.1.dsc  666 
fish-foo
# -scripts (source): octal-permissions scripts_6ds-1ubuntu0.5.10.1.dsc  666 
csh-foo
# +scripts (source): octal-permissions scripts_6ds-1ubuntu0.5.10.1.dsc  755 
tkfoo
# +scripts (source): octal-permissions scripts_6ds-1ubuntu0.5.10.1.dsc  755 
gccbug.dpatch
# +scripts (source): octal-permissions scripts_6ds-1ubuntu0.5.10.1.dsc  755 
envfoo
# +scripts (source): octal-permissions scripts_6ds-1ubuntu0.5.10.1.dsc  644 
xsession-test
# +scripts (source): octal-permissions scripts_6ds-1ubuntu0.5.10.1.dsc  644 
wishfoo
# +scripts (source): octal-permissions scripts_6ds-1ubuntu0.5.10.1.dsc  644 
suidperlfoo
# +scripts (source): octal-permissions scripts_6ds-1ubuntu0.5.10.1.dsc  644 
sh-broken
# +scripts (source): octal-permissions scripts_6ds-1ubuntu0.5.10.1.dsc  644 
rubyfoo
# +scripts (source): octal-permissions scripts_6ds-1ubuntu0.5.10.1.dsc  644 
phpfoo
# +scripts (source): octal-permissions scripts_6ds-1ubuntu0.5.10.1.dsc  644 
phpenvfoo
# +scripts (source): octal-permissions scripts_6ds-1ubuntu0.5.10.1.dsc  644 
perlfoo
# +scripts (source): octal-permissions scripts_6ds-1ubuntu0.5.10.1.dsc  644 
perl-bizarre-3
# +scripts (source): octal-permissions scripts_6ds-1ubuntu0.5.10.1.dsc  644 
perl-bizarre-2
# +scripts (source): octal-permissions scripts_6ds-1ubuntu0.5.10.1.dsc  644 
perl-bizarre-1
# +scripts (source): octal-permissions scripts_6ds-1ubuntu0.5.10.1.dsc  644 
make-foo
# +scripts (source): octal-permissions scripts_6ds-1ubuntu0.5.10.1.dsc  644 
lefty-foo
# +scripts (source): octal-permissions scripts_6ds-1ubuntu0.5.10.1.dsc  644 
jruby-broken
# +scripts (source): octal-permissions scripts_6ds-1ubuntu0.5.10.1.dsc  644 
init-skeleton
# +scripts (source): octal-permissions scripts_6ds-1ubuntu0.5.10.1.dsc  644 
init-no-lsb
# +scripts (source): octal-permissions scripts_6ds-1ubuntu0.5.10.1.dsc  644 
init-lsb-other
# +scripts (source): octal-permissions scripts_6ds-1ubuntu0.5.10.1.dsc  644 
init-lsb-broken
# +scripts (source): octal-permissions scripts_6ds-1ubuntu0.5.10.1.dsc  644 
guile-bizarre
# +scripts (source): octal-permissions scripts_6ds-1ubuntu0.5.10.1.dsc  644 
fish-foo
# +scripts (source): octal-permissions scripts_6ds-1ubuntu0.5.10.1.dsc  644 
csh-foo
# 


[1] https://release.debian.org/proposed-updates/stable.html
[2] 
https://ci.debian.net/data/autopkgtest/stable/amd64/l/lintian/22228243/log.gz

--- End Message ---
--- Begin Message ---
Source: dpkg
Source-Version: 1.20.11
Done: Guillem Jover <guil...@debian.org>

We believe that the bug you reported is fixed in the latest version of
dpkg, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1012...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Guillem Jover <guil...@debian.org> (supplier of updated dpkg package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Sat, 02 Jul 2022 05:08:46 +0200
Source: dpkg
Architecture: source
Version: 1.20.11
Distribution: bullseye
Urgency: medium
Maintainer: Dpkg Developers <debian-d...@lists.debian.org>
Changed-By: Guillem Jover <guil...@debian.org>
Closes: 1004372 1012195
Changes:
 dpkg (1.20.11) bullseye; urgency=medium
 .
   [ Guillem Jover ]
   * dpkg-deb: Fix unexpected end of file conditions on .deb extract.
   * libdpkg: Do not restrict source:* virtual fields to installed packages.
     Closes: #1004372
   * Perl modules:
     - Dpkg::Source::Package::V2: Always fix the permissions for upstream
       tarballs. Closes: #1012195
   * Build system:
     - Build gitlab CI images for bullseye instead of sid.
Checksums-Sha1:
 7416c5537e991456d1f26c5ffe4dcf43295e2411 2124 dpkg_1.20.11.dsc
 ed83da7c2f768f95129dc1ee4b6883d4220e266d 5003992 dpkg_1.20.11.tar.xz
 42cc1b07ed0d90a05ee2758763767ac39729bf7a 7984 dpkg_1.20.11_amd64.buildinfo
Checksums-Sha256:
 2530d21c90639193a365be1ab9db05b7ee15c148219488d9b553724219ceb429 2124 
dpkg_1.20.11.dsc
 da7b28a56a103db23326bfc0dfa5a104286af5527aed9ca1b865ef1b4217c0c3 5003992 
dpkg_1.20.11.tar.xz
 6c6b685e77ea71c8ecfefa44d0c35914913ccd123863b0dde0e6c0daa66603fd 7984 
dpkg_1.20.11_amd64.buildinfo
Files:
 eb9d22540c47db5028d0ee890e9a725c 2124 admin required dpkg_1.20.11.dsc
 64a41af5b0ef1565bf4bcc0aa3591788 5003992 admin required dpkg_1.20.11.tar.xz
 12013199a33ef99c806e67a1ba6799c5 7984 admin required 
dpkg_1.20.11_amd64.buildinfo

-----BEGIN PGP SIGNATURE-----
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=DpS3
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to