GNU bug report logs -
#46454
[PATCH] gnu: Update zfs.
Previous Next
To add a comment to this bug, you must first unarchive it, by sending
a message to control AT debbugs.gnu.org, with unarchive 46454 in the body.
You can then email your comments to 46454 AT debbugs.gnu.org in the normal way.
Toggle the display of automated, internal messages from the tracker.
Report forwarded
to
guix-patches <at> gnu.org
:
bug#46454
; Package
guix-patches
.
(Fri, 12 Feb 2021 02:24:02 GMT)
Full text and
rfc822 format available.
Acknowledgement sent
to
raid5atemyhomework <raid5atemyhomework <at> protonmail.com>
:
New bug report received and forwarded. Copy sent to
guix-patches <at> gnu.org
.
(Fri, 12 Feb 2021 02:24:02 GMT)
Full text and
rfc822 format available.
Message #5 received at submit <at> debbugs.gnu.org (full text, mbox):
Please prioritize, as this release fixes a (minor and low-probability) security issue: https://github.com/openzfs/zfs/issues/11474#issuecomment-775383738 Upstream even released this point release "early" in order to get this fix deployed, we should do same over in Guix.
Minimally tested with `guix build zfs`. Given that the difference from 2.0.2 is very tiny (the only substantive change is the fix to the above issue, this point release only exists to fix that one issue), I expect no particular problems updating in Guix.
From 753ecc32252b8b7d3e806ed7a16b2771c6b78559 Mon Sep 17 00:00:00 2001
From: raid5atemyhomework <raid5atemyhomework <at> protonmail.com>
Date: Fri, 12 Feb 2021 10:09:56 +0800
Subject: [PATCH] gnu: Update zfs.
* gnu/packages/file-systems.scm (zfs): Update to 2.0.3.
---
gnu/packages/file-systems.scm | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/gnu/packages/file-systems.scm b/gnu/packages/file-systems.scm
index b7321addd4..118e0d9faf 100644
--- a/gnu/packages/file-systems.scm
+++ b/gnu/packages/file-systems.scm
@@ -847,7 +847,7 @@ APFS.")
(define-public zfs
(package
(name "zfs")
- (version "2.0.2")
+ (version "2.0.3")
(outputs '("out" "module" "src"))
(source
(origin
@@ -856,7 +856,7 @@ APFS.")
"/download/zfs-" version
"/zfs-" version ".tar.gz"))
(sha256
- (base32 "090b2pp0cgzkjcnbjf8ms28dah5dff8s04q31z62czapwiy0drdx"))))
+ (base32 "0fg5hz1yy2z5ah0hzjv3xy5vcg1c214rps90dr80lfkalx5gd506"))))
(build-system linux-module-build-system)
(arguments
`(;; The ZFS kernel module should not be downloaded since the license
--
2.30.0
Reply sent
to
宋文武 <iyzsong <at> outlook.com>
:
You have taken responsibility.
(Fri, 12 Feb 2021 05:56:02 GMT)
Full text and
rfc822 format available.
Notification sent
to
raid5atemyhomework <raid5atemyhomework <at> protonmail.com>
:
bug acknowledged by developer.
(Fri, 12 Feb 2021 05:56:02 GMT)
Full text and
rfc822 format available.
Message #10 received at 46454-done <at> debbugs.gnu.org (full text, mbox):
raid5atemyhomework <raid5atemyhomework <at> protonmail.com> writes:
> * gnu/packages/file-systems.scm (zfs): Update to 2.0.3.
Pushed, thank you!
Information forwarded
to
guix-patches <at> gnu.org
:
bug#46454
; Package
guix-patches
.
(Sat, 13 Feb 2021 15:00:03 GMT)
Full text and
rfc822 format available.
Message #13 received at 46454 <at> debbugs.gnu.org (full text, mbox):
RAID,
On 2021-02-12 3:23, raid5atemyhomework via Guix-patches via wrote:
> Please prioritize, as this release fixes a (minor and low-probability)
> security issue:
Thank you very much for taking care of this!
To ensure that security updates stand out more, both on the list and in
the commit log, please use our (de facto?) standard commit message
format.
Instead of
gnu: Update zfs.
write
gnu: zfs: Update 2.0.3 [fixes CVE-0000-001].
or, if no CVE (or equivalent like TROVE) has yet been assigned:
gnu: zfs: Update 2.0.3 [security fixes].
Also note the changes to the rest of the subject.
Using this exact format makes it easi(er) to grep/automate the git log.
Everyone doing their own thing makes it hard.
Kind regards,
T G-R
Sent from a Web browser. Excuse or enjoy my brevity.
Information forwarded
to
guix-patches <at> gnu.org
:
bug#46454
; Package
guix-patches
.
(Sat, 13 Feb 2021 16:18:02 GMT)
Full text and
rfc822 format available.
Message #16 received at 46454 <at> debbugs.gnu.org (full text, mbox):
On 2021-02-13 16:00, Tobias Geerinckx-Rice via Guix-patches via wrote:
> gnu: zfs: Update 2.0.3 [fixes CVE-0000-001].
^^^
to
Kind regards,
T G-R
Sent from a Web browser. Excuse or enjoy my brevity.
bug archived.
Request was from
Debbugs Internal Request <help-debbugs <at> gnu.org>
to
internal_control <at> debbugs.gnu.org
.
(Sun, 14 Mar 2021 11:24:04 GMT)
Full text and
rfc822 format available.
This bug report was last modified 3 years and 43 days ago.
Previous Next
GNU bug tracking system
Copyright (C) 1999 Darren O. Benham,
1997,2003 nCipher Corporation Ltd,
1994-97 Ian Jackson.