[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#924124: unblock: virtualbox/6.0.4-dfsg-6



Package: release.debian.org
User: release.debian.org@packages.debian.org
Usertags: unblock
Severity: normal

Please unblock package virtualbox

- Added a Security.Debian.news file (or whatever is called), asked by security team
- added a two line build fix for kernel 5.0
- dropped a non-used patch.

debdiff attached.

unblock virtualbox/6.0.4-dfsg-6
diff --git a/debian/README.Debian.security b/debian/README.Debian.security
new file mode 100644
index 000000000..f64508dca
--- /dev/null
+++ b/debian/README.Debian.security
@@ -0,0 +1,7 @@
+Virtualbox package is in contrib, and upstream refuses to give patches for security bugs.
+Their attitude is to update to the latest version, something not feasible for stable
+releases, specially when the minor releases of a particular major version are not
+published anymore.
+For this reason, virtualbox might not be covered by security.debian.org support,
+nor by stable-proposed-updates in case the maintaining is impossible due to
+lack of upstream support.
diff --git a/debian/changelog b/debian/changelog
index 99021d52c..c3f155286 100644
--- a/debian/changelog
+++ b/debian/changelog
@@ -1,3 +1,9 @@
+virtualbox (6.0.4-dfsg-6) unstable; urgency=medium
+
+  * Upstream build fix with kernel 5.0 (LP: #1813071)
+
+ -- Gianfranco Costamagna <locutusofborg@debian.org>  Sat, 09 Mar 2019 13:50:34 +0100
+
 virtualbox (6.0.4-dfsg-5) unstable; urgency=medium
 
   * Tweak java patch with upstream approach
diff --git a/debian/patches/77542.patch b/debian/patches/77542.patch
new file mode 100644
index 000000000..7f97cd7da
--- /dev/null
+++ b/debian/patches/77542.patch
@@ -0,0 +1,17 @@
+Description: fix build with kernel 5.0
+Origin: upstream
+Index: virtualbox/src/VBox/Additions/linux/sharedfolders/vfsmod.c
+===================================================================
+--- virtualbox.orig/src/VBox/Additions/linux/sharedfolders/vfsmod.c
++++ virtualbox/src/VBox/Additions/linux/sharedfolders/vfsmod.c
+@@ -40,7 +40,9 @@
+ #include "revision-generated.h"
+ #include "product-generated.h"
+ #include "VBoxGuestR0LibInternal.h"
+-#if LINUX_VERSION_CODE < KERNEL_VERSION(3, 3, 0)
++#if LINUX_VERSION_CODE >= KERNEL_VERSION(5, 0, 0)
++# include <uapi/linux/mount.h> /* for MS_REMOUNT */
++#elif LINUX_VERSION_CODE < KERNEL_VERSION(3, 3, 0)
+ # include <linux/mount.h>
+ #endif
+ #include <linux/seq_file.h>
diff --git a/debian/patches/fix-backports.patch b/debian/patches/fix-backports.patch
deleted file mode 100644
index 43d97638b..000000000
--- a/debian/patches/fix-backports.patch
+++ /dev/null
@@ -1,22 +0,0 @@
-Description: We should not just don't care about security issues, but this needs fixes in gsoap(stable)
-Author: Gianfranco Costamagna <locutusofborg@debian.org>
-Last-Update: 2019-01-17
-
-Index: virtualbox/src/VBox/Main/webservice/vboxweb.cpp
-===================================================================
---- virtualbox.orig/src/VBox/Main/webservice/vboxweb.cpp
-+++ virtualbox/src/VBox/Main/webservice/vboxweb.cpp
-@@ -616,11 +616,13 @@
-         // keepalive, otherwise stale connections tie up worker threads.
-         m_soap->send_timeout = 60;
-         m_soap->recv_timeout = 60;
-+#if GSOAP_VERSION >= 20850
-         // Limit the maximum SOAP request size to a generous amount, just to
-         // be on the safe side (SOAP is quite wordy when representing arrays,
-         // and some API uses need to deal with large arrays). Good that binary
-         // data is no longer represented by byte arrays...
-         m_soap->recv_maxlength = _16M;
-+#endif
-         // process the request; this goes into the COM code in methodmaps.cpp
-         do {
- #ifdef WITH_OPENSSL
diff --git a/debian/patches/series b/debian/patches/series
index 71127fc9e..6f0774885 100644
--- a/debian/patches/series
+++ b/debian/patches/series
@@ -17,3 +17,4 @@
 do-not-run-if-not-in-vm.patch
 77040.patch
 java11-upstream.patch
+77542.patch

Reply to: