Bug#1054237: marked as done (jdupes: data loss behaviour from fdupes)

2023-12-03 Thread Debian Bug Tracking System
Your message dated Sun, 03 Dec 2023 12:32:11 +
with message-id 
and subject line Bug#1054237: fixed in jdupes 1.21.3-1+deb12u1
has caused the Debian Bug report #1054237,
regarding jdupes: data loss behaviour from fdupes
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1054237: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1054237
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: jdupes
Version: 1.12-1
Severity: grave
Tags: upstream patch
Justification: causes non-serious data loss

>From the upstream in a private message:

jdupes inherited interactive deletion from fdupes and there were zero
input safeguards. A user tried to use ranges "2-4" and files 3 and 4 were
deleted, not preserved. This is a major data loss concern because the
behavior is destructive and contrary to user expectations. In the latest
commit I've placed heavy safeguards in the interactive deletion code that
should prevent all of the invalid input scenarios I can conceive.

The commit 4888e85[1] can and should be immediately applied to ALL
versions of jdupes that are being distributed. It should cleanly apply
and work without modification to every remotely recent version spanning
several years back.

[1] https://codeberg.org/jbruchon/jdupes/commit/4888e85
--- End Message ---
--- Begin Message ---
Source: jdupes
Source-Version: 1.21.3-1+deb12u1
Done: Joao Eriberto Mota Filho 

We believe that the bug you reported is fixed in the latest version of
jdupes, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1054...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Joao Eriberto Mota Filho  (supplier of updated jdupes 
package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Wed, 08 Nov 2023 11:24:57 -0300
Source: jdupes
Architecture: source
Version: 1.21.3-1+deb12u1
Distribution: bookworm
Urgency: medium
Maintainer: Joao Eriberto Mota Filho 
Changed-By: Joao Eriberto Mota Filho 
Closes: 1054237
Changes:
 jdupes (1.21.3-1+deb12u1) bookworm; urgency=medium
 .
   * debian/patches/010_fix-data-loss.patch: created to avoid a potential data
 loss caused by a wrong message that induces the users to use a range of
 values with -d option. Currently, the -d option doesn't understand ranges.
 (Closes: #1054237)
Checksums-Sha1:
 6c1d5ab686bd8705ac42ac734d76380d33eac4f2 1922 jdupes_1.21.3-1+deb12u1.dsc
 db5167b2e1b12204daa80f1f8eea95e286af055e 14972 
jdupes_1.21.3-1+deb12u1.debian.tar.xz
 6841da72fa6d7eeb880225788e086e608bfdb858 5616 
jdupes_1.21.3-1+deb12u1_source.buildinfo
Checksums-Sha256:
 bed436beb76a21baaec221afc663146d1eac8582cb8585827b420c1b8564816e 1922 
jdupes_1.21.3-1+deb12u1.dsc
 a5ba96516fc50f9f365798537fe4ed8164f3c11e7e7425e19639db541a13191a 14972 
jdupes_1.21.3-1+deb12u1.debian.tar.xz
 3ce336dd4fda089b99aa92d46f45a2f3718fb99e1fdf43f8685e79f10928dac0 5616 
jdupes_1.21.3-1+deb12u1_source.buildinfo
Files:
 cf29821824bf823a227b9ae10e26230c 1922 utils optional 
jdupes_1.21.3-1+deb12u1.dsc
 7633c6ddb26570f368e26b919c88a551 14972 utils optional 
jdupes_1.21.3-1+deb12u1.debian.tar.xz
 1bb4c67c3a9b7cc263533fed5f22656f 5616 utils optional 
jdupes_1.21.3-1+deb12u1_source.buildinfo

-BEGIN PGP SIGNATURE-
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=Xy52
-END PGP SIGNATURE End Message ---


Bug#1054237: marked as done (jdupes: data loss behaviour from fdupes)

2023-10-19 Thread Debian Bug Tracking System
Your message dated Thu, 19 Oct 2023 20:49:31 +
with message-id 
and subject line Bug#1054237: fixed in jdupes 1.27.3-4
has caused the Debian Bug report #1054237,
regarding jdupes: data loss behaviour from fdupes
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1054237: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1054237
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: jdupes
Version: 1.12-1
Severity: grave
Tags: upstream patch
Justification: causes non-serious data loss

>From the upstream in a private message:

jdupes inherited interactive deletion from fdupes and there were zero
input safeguards. A user tried to use ranges "2-4" and files 3 and 4 were
deleted, not preserved. This is a major data loss concern because the
behavior is destructive and contrary to user expectations. In the latest
commit I've placed heavy safeguards in the interactive deletion code that
should prevent all of the invalid input scenarios I can conceive.

The commit 4888e85[1] can and should be immediately applied to ALL
versions of jdupes that are being distributed. It should cleanly apply
and work without modification to every remotely recent version spanning
several years back.

[1] https://codeberg.org/jbruchon/jdupes/commit/4888e85
--- End Message ---
--- Begin Message ---
Source: jdupes
Source-Version: 1.27.3-4
Done: Joao Eriberto Mota Filho 

We believe that the bug you reported is fixed in the latest version of
jdupes, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1054...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Joao Eriberto Mota Filho  (supplier of updated jdupes 
package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Thu, 19 Oct 2023 13:40:10 -0300
Source: jdupes
Architecture: source
Version: 1.27.3-4
Distribution: unstable
Urgency: medium
Maintainer: Joao Eriberto Mota Filho 
Changed-By: Joao Eriberto Mota Filho 
Closes: 1054237
Changes:
 jdupes (1.27.3-4) unstable; urgency=medium
 .
   * debian/patches/020_fix-data-loss.patch: created to avoid a potential data
 loss caused by a wrong message that induces the users to use a range of
 values with -d option. Currently, the -d option doesn't understand ranges.
 (Closes: #1054237)
Checksums-Sha1:
 264740eaef8a988cb220f3ab26bb82f17bec0502 1907 jdupes_1.27.3-4.dsc
 071ff93f81e63bd6e64681eff1a3e328113e7083 15312 jdupes_1.27.3-4.debian.tar.xz
 dd8d4ce6b3ada2f889888c40d94291893b624b3c 6090 jdupes_1.27.3-4_source.buildinfo
Checksums-Sha256:
 a9baa90d82c10d37702bb2765c39f25c9283b5cc01c2152f811622ac71ce9cf2 1907 
jdupes_1.27.3-4.dsc
 97d1cdcde0c95d27a1bb9f121911e52c89ea6a9ac7743be2ef6fdc452fce1646 15312 
jdupes_1.27.3-4.debian.tar.xz
 60c71b2b3bf6d1d8036b759456f02204288c8caf4b61de5f28e27ae0c0a287e5 6090 
jdupes_1.27.3-4_source.buildinfo
Files:
 40c0e90834276069b947a11b3d73471a 1907 utils optional jdupes_1.27.3-4.dsc
 642c1273bdeed15c3eb33ec674ebd335 15312 utils optional 
jdupes_1.27.3-4.debian.tar.xz
 cd586755c3574a7c1ecc24887534785d 6090 utils optional 
jdupes_1.27.3-4_source.buildinfo

-BEGIN PGP SIGNATURE-
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=361m
-END PGP SIGNATURE End Message ---