• Can someone tell me if this bug is in the proper state?

    From Dan Mick@21:1/5 to All on Fri Aug 11 05:40:01 2023
    Hi guys; sorry for the out-of-band email.

    https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1030129

    is affecting a number of projects on bookworm, ceph among them; I see
    that it's been tagged 'bookworm-ignore' and I worry that maybe that
    means no one is considering a backport to bookworm, but I think it
    warrants a backport.

    Can you advise?

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Vladimir Petko@21:1/5 to dmick@redhat.com on Fri Aug 11 06:00:01 2023
    Hi,

    As far as I know, the bug was fixed in [1] which is safe to update to.
    Updating to 20230710 is also safe as the July security release version
    contains ca-certificates-java trigger in the postinstall script.

    Best Regards,
    Vladimir.

    [1] https://tracker.debian.org/news/1436785/accepted-ca-certificates-java-20230620-source-into-unstable/


    On Fri, Aug 11, 2023 at 3:30 PM Dan Mick <dmick@redhat.com> wrote:

    Hi guys; sorry for the out-of-band email.

    https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1030129

    is affecting a number of projects on bookworm, ceph among them; I see
    that it's been tagged 'bookworm-ignore' and I worry that maybe that
    means no one is considering a backport to bookworm, but I think it
    warrants a backport.

    Can you advise?


    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Thorsten Glaser@21:1/5 to Vladimir Petko on Fri Aug 11 06:50:01 2023
    On Fri, 11 Aug 2023, Vladimir Petko wrote:

    As far as I know, the bug was fixed in [1] which is safe to update to.

    20230620~deb12u1 is in bookworm-p-u which you could enable to get that
    kind of fixes for stable earlier; it’ll otherwise be in the next point release.

    bye,
    //mirabilos
    --
    Infrastrukturexperte • tarent solutions GmbH
    Am Dickobskreuz 10, D-53121 Bonn • http://www.tarent.de/
    Telephon +49 228 54881-393 • Fax: +49 228 54881-235
    HRB AG Bonn 5168 • USt-ID (VAT): DE122264941
    Geschäftsführer: Dr. Stefan Barth, Kai Ebenrett, Boris Esser, Alexander Steeg

    **************************************************** /⁀\ The UTF-8 Ribbon
    ╲ ╱ Campaign against Mit dem tarent-Newsletter nichts mehr verpassen:  ╳  HTML eMail! Also, https://www.tarent.de/newsletter
    ╱ ╲ header encryption!
    ****************************************************

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Dan Mick@21:1/5 to All on Fri Aug 11 06:50:01 2023
    How would that work for a pbuilder base image of bookworm? Would I need a
    hook script to set up the unstable repo and install the package?

    On Thu, Aug 10, 2023, 9:03 PM Vladimir Petko <vladimir.petko@canonical.com> wrote:

    Hi,

    As far as I know, the bug was fixed in [1] which is safe to update to. Updating to 20230710 is also safe as the July security release version contains ca-certificates-java trigger in the postinstall script.

    Best Regards,
    Vladimir.

    [1] https://tracker.debian.org/news/1436785/accepted-ca-certificates-java-20230620-source-into-unstable/


    On Fri, Aug 11, 2023 at 3:30 PM Dan Mick <dmick@redhat.com> wrote:

    Hi guys; sorry for the out-of-band email.

    https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1030129

    is affecting a number of projects on bookworm, ceph among them; I see
    that it's been tagged 'bookworm-ignore' and I worry that maybe that
    means no one is considering a backport to bookworm, but I think it
    warrants a backport.

    Can you advise?




    <div dir="auto">How would that work for a pbuilder base image of bookworm?  Would I need a hook script to set up the unstable repo and install the package?</div><br><div class="gmail_quote"><div dir="ltr" class="gmail_attr">On Thu, Aug 10, 2023, 9:03 PM
    Vladimir Petko &lt;<a href="mailto:vladimir.petko@canonical.com">vladimir.petko@canonical.com</a>&gt; wrote:<br></div><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">Hi,<br>

    As far as I know, the bug was fixed in [1] which is safe to update to.<br> Updating to 20230710 is also safe as the July security release version<br> contains ca-certificates-java trigger in the postinstall script.<br>

    Best Regards,<br>
     Vladimir.<br>

    [1] <a href="https://tracker.debian.org/news/1436785/accepted-ca-certificates-java-20230620-source-into-unstable/" rel="noreferrer noreferrer" target="_blank">https://tracker.debian.org/news/1436785/accepted-ca-certificates-java-20230620-source-into-
    unstable/</a><br>


    On Fri, Aug 11, 2023 at 3:30 PM Dan Mick &lt;<a href="mailto:dmick@redhat.com" target="_blank" rel="noreferrer">dmick@redhat.com</a>&gt; wrote:<br>
    &gt;<br>
    &gt; Hi guys; sorry for the out-of-band email.<br>
    &gt;<br>
    &gt; <a href="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1030129" rel="noreferrer noreferrer" target="_blank">https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1030129</a><br>
    &gt;<br>
    &gt; is affecting a number of projects on bookworm, ceph among them; I see<br> &gt; that it&#39;s been tagged &#39;bookworm-ignore&#39; and I worry that maybe that<br>
    &gt; means no one is considering a backport to bookworm, but I think it<br> &gt; warrants a backport.<br>
    &gt;<br>
    &gt; Can you advise?<br>
    &gt;<br>

    </blockquote></div>

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)