Bug#1069943: bullseye-pu: package emacs/27.1+1-3.1+deb11u3

2024-05-25 Thread Jonathan Wiltshire
Control: tag -1 confirmed
Control: retitle -1 bullseye-pu: package emacs/27.1+1-3.1+deb11u4

On Sun, May 19, 2024 at 11:30:26AM +0100, Sean Whitton wrote:
> How should we proceed?

Please go ahead. Since the test package Adam built installs correctly,
which was the original symptom, I'm satisfied that users will be able to
install it as well or we will get better reports to inform a regression
update.

Thanks,

-- 
Jonathan Wiltshire  j...@debian.org
Debian Developer http://people.debian.org/~jmw

4096R: 0xD3524C51 / 0A55 B7C5 1223 3942 86EC  74C3 5394 479D D352 4C51
ed25519/0x196418AAEB74C8A1: CA619D65A72A7BADFC96D280196418AAEB74C8A1



Bug#1069943: bullseye-pu: package emacs/27.1+1-3.1+deb11u3

2024-05-19 Thread Sean Whitton
control: tag -1 - moreinfo

Hello Jonathan,

On Sun 12 May 2024 at 09:00pm +01, Jonathan Wiltshire wrote:

> The security release hasn't been accepted into bullseye yet because
> there were reports of it being broken on mips64el. There was a bug but
> I'm afraid I don't have a reference to it.

I believe this was #1031888.

> Do you know if your version solves the issue?

Upstream addressed the memory leak that Adrian thought might be causing
#1031888.  I prepared a deb11u4 in git which includes that fix.

Unfortunately, however, #1031888 is no longer reproducible.
Adam took a look at my deb11u4 (thank you), but the buildds which were
previously showing the problem are no longer running bullseye.

I just tried preparing a mips64el qemu image and booting that, but the
problem is not reproducible there: deb11u2 installs fine.

How should we proceed?

-- 
Sean Whitton


signature.asc
Description: PGP signature


Bug#1069943: bullseye-pu: package emacs/27.1+1-3.1+deb11u3

2024-05-12 Thread Jonathan Wiltshire
Control: tag -1 moreinfo

Hi,

On Sat, Apr 27, 2024 at 12:34:45PM +0100, Sean Whitton wrote:
> This update also has the effect of rolling in changes already in
> oldstable-security earlier than the usual point release copy, as
> oldstable-security has deb11u2, while oldstable still has deb11u1.

The security release hasn't been accepted into bullseye yet because there
were reports of it being broken on mips64el. There was a bug but I'm afraid
I don't have a reference to it.

Do you know if your version solves the issue? If it does I can accept the
security first for you to rebase against if that helps with the diffs.

Thanks,


-- 
Jonathan Wiltshire  j...@debian.org
Debian Developer http://people.debian.org/~jmw

4096R: 0xD3524C51 / 0A55 B7C5 1223 3942 86EC  74C3 5394 479D D352 4C51
ed25519/0x196418AAEB74C8A1: CA619D65A72A7BADFC96D280196418AAEB74C8A1