Package: dpkg
Version: 1.19.7ubuntu3
Severity: important
File: /usr/bin/dpkg-deb

Dear Maintainer,

Building a .deb for an OpenSource product using a script that I used years ago 
as a template.
This bug is very very old.

has bad permissions 644 (must be >=0555 and <=0775)

That was happening during the Ubuntu 14.04 days. Here it is 20.04 and it is 
happening again.
Check out bugs 48914  70078 2899 

popped up again in 2015
https://github.com/kristrev/multi/pull/10
2014
https://github.com/sbt/sbt-native-packager/issues/419

I haven't tried the hack around yet, but as I recall the hack around was to set 
permission
to either 0775 or 0555 because the "between" logic wasn't correct.

After all of these years and all of the examples scripts using 0644 over the 
decades I 
really expected this bug to be dead.

-- Package-specific info:
System tainted due to merged-usr-via-symlinks.

-- System Information:
Debian Release: bullseye/sid
  APT prefers focal-updates
  APT policy: (500, 'focal-updates'), (500, 'focal-security'), (500, 'focal'), 
(100, 'focal-backports')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 5.4.0-47-generic (SMP w/6 CPU cores)
Kernel taint flags: TAINT_PROPRIETARY_MODULE, TAINT_OOT_MODULE, 
TAINT_UNSIGNED_MODULE
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages dpkg depends on:
ii  libbz2-1.0   1.0.8-2
ii  libc6        2.31-0ubuntu9
ii  liblzma5     5.2.4-1ubuntu1
ii  libselinux1  3.0-1build2
ii  libzstd1     1.4.4+dfsg-3
ii  tar          1.30+dfsg-7
ii  zlib1g       1:1.2.11.dfsg-2ubuntu1

dpkg recommends no packages.

Versions of packages dpkg suggests:
ii  apt            2.0.2ubuntu0.1
pn  debsig-verify  <none>

-- no debconf information

Reply via email to