[continued from previous message]
- Subject: [dpkg 1.19.8] $as_me: $at_fail_list${at_fail_list:+ failed${at_xpass_list:+, }}$at_xpass_list${at_xpass_list:+ passed unexpectedly}
+ Subject: [dpkg 1.19.9] $as_me: $at_fail_list${at_fail_list:+ failed${at_xpass_list:+, }}$at_xpass_list${at_xpass_list:+ passed unexpectedly}
You may investigate any problem if you feel able to do so, in which
case the test suite provides a good starting point. Its output may
--RQxed1XBHkh17oaw--
Received: (at 1018854-done) by bugs.debian.org; 2 Sep 2022 16:14:02 +0000 X-Spam-Checker-Version: SpamAssassin 3.4.2-bugs.debian.org_2005_01_02
(2018-09-13) on buxtehude.debian.org
X-Spam-Level:
X-Spam-Status: No, score=-15.9 required=4.0 tests=BAYES_00,DKIM_SIGNED,
DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,HAS_BUG_NUMBER,SHIP_ID_INT,
SPF_HELO_PASS,SPF_PASS,TXREP,T_SCC_BODY_TEXT_LINE autolearn=ham
autolearn_force=no version=3.4.2-bugs.debian.org_2005_01_02 X-Spam-Bayes: score:0.0000 Tokens: new, 14; hammy, 141; neutral, 34; spammy,
0. spammytokens: hammytokens:0.000-+--H*F:D*adam-barratt.org.uk,
0.000-+--H*rp:D*adam-barratt.org.uk, 0.000-+--H*u:Evolution,
0.000-+--H*M:barratt, 0.000-+--H*UA:3.30.5-1.1
Return-path: <
adam@adam-barratt.org.uk>
Received: from baloo.adam-barratt.org.uk ([2a02:e00:ffe9:ca::1]:59288)
by buxtehude.debian.org with esmtps (TLS1.3:ECDHE_RSA_AES_256_GCM_SHA384:256)
(Exim 4.92)
(envelope-from <
adam@adam-barratt.org.uk>)
id 1oU9Iw-00022G-Hb
for
1018854-done@bugs.debian.org; Fri, 02 Sep 2022 16:14:02 +0000 DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
d=adam-barratt.org.uk; s=ab20190809; h=Content-Transfer-Encoding:MIME-Version
:Content-Type:References:In-Reply-To:Date:To:From:Subject:Message-ID:Sender:
Reply-To:Cc:Content-ID:Content-Description:Resent-Date:Resent-From:
Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:List-Id:List-Help:
List-Unsubscribe:List-Subscribe:List-Post:List-Owner:List-Archive;
bh=oTANtbge9WP9mfFa60+gldIdNGIGaGhYrqqcsQmpkRE=; b=akPB7gDsxi0UgmpOoekOIxjSqH
0/VnIwg0WVtIJwijdJCe0KxeeUEjvd9RCFgczHfg3ERfTLzlT9ou1YAE6S5JfDBKRiX6ysKJydHI6
hFK8sfh/Ccnqa14FGG+D4bOQXa36afFeqLqXxtl8hzzPFBwvtkKzOuWsvXhYIiuEle7UbdTDOv6cV
ZbLDf8/z8mcCcID6J19AAzH4ZvWjCfquIBfqKocjzWGR8lEjoh8Op6VNYrs+5QkNzWxWpcIeQ/0BG
P0HyOCflKEzeKavhjAgNQpYh7cuocL9up6QE4gvfaBkBh+VjVo43IoAt6ajKMOHIYz4U+lyvwzzI5
FOEtQ39g==;
Received: from kotick.adam-barratt.org.uk ([2a02:8010:66ea:1:240::2]:43636 helo=kotick)
by baloo.adam-barratt.org.uk with esmtps (TLS1.3:ECDHE_RSA_AES_256_GCM_SHA384:256)
(Exim 4.92 #3 (Debian))
(envelope-from <
adam@adam-barratt.org.uk>)
id 1oU9Iv-0001V0-1C; Fri, 02 Sep 2022 17:14:01 +0100
Received: from localhost ([127.0.0.1])
by kotick with esmtp (Exim 4.92)
(envelope-from <
adam@adam-barratt.org.uk>)
id 1oU9Iu-0003Sy-O0; Fri, 02 Sep 2022 17:14:00 +0100
Message-ID: <
27af18a0b37ad87ba2bca3da76f9966cf5637a2b.camel@adam-barratt.org.uk>
Subject: Re: Bug#1018854: buster-pu: package dpkg/1.19.9
From: "Adam D. Barratt" <
adam@adam-barratt.org.uk>
To: Guillem Jover <
guillem@debian.org>,
1018854-done@bugs.debian.org
Date: Fri, 02 Sep 2022 17:12:00 +0100
In-Reply-To: <YxAc4QulDppgjJ0/@thunder.hadrons.org>
References: <YxAc4QulDppgjJ0/@thunder.hadrons.org>
Content-Type: text/plain; charset="UTF-8"
User-Agent: Evolution 3.30.5-1.1
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
X-ADSB-Scan-Signature: 81c0fd7d5340ddf412b800a2e64d2b0a
On Thu, 2022-09-01 at 04:45 +0200, Guillem Jover wrote:
[ Reason ]
This update fixes the same regression (introduced in the security fix
in dpkg 1.19.8) that was fixed in bullseye for dpkg 1.20.11
(#1014206).
I'm afraid that the window for getting updates in to the final buster
point release closed last weekend; see
https://lists.debian.org/debian-project/2022/08/msg00006.html
Any further updates to buster need to made via the LTS process, so I'm
going to close this request now.
Regards,
Adam
--- SoupGate-Win32 v1.05
* Origin: fsxNet Usenet Gateway (21:1/5)