Your message dated Sat, 08 Feb 2020 14:21:36 +0000 with message-id <cf1cb2f35981916a86b98b83609df15c95aa378b.camel@adam-barratt.org.uk> and subject line Closing requests included in 10.3 point release has caused the Debian Bug report #946901, regarding buster-pu: package unhide/20130526-3+deb10u1 to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner@bugs.debian.org immediately.) -- 946901: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=946901 Debian Bug Tracking System Contact owner@bugs.debian.org with problems
--- Begin Message ---
- To: Debian Bug Tracking System <submit@bugs.debian.org>
- Subject: buster-pu: package unhide/20130526-3+deb10u1
- From: Thiago Andrade Marques <thmarques@gmail.com>
- Date: Tue, 17 Dec 2019 11:49:58 -0300
- Message-id: <157659419846.11780.10577004872505857206.reportbug@maria>
Package: release.debian.org Severity: important Tags: buster User: release.debian.org@packages.debian.org Usertags: pu Dear Release Team, I would like to upload the debdiff available below to fix a segmentation fault in unhide. The reason for this behaviour is that the application is exhausting its stack by allocation an integer array with maxpid elements. This issue is already fixed in Sid. For details, please see #945864. Best regards, Thiago Andrade -- System Information: Debian Release: 10.2 APT prefers stable APT policy: (500, 'stable') Architecture: amd64 (x86_64) Kernel: Linux 4.19.0-6-amd64 (SMP w/2 CPU cores) Locale: LANG=C.UTF-8, LC_CTYPE=C.UTF-8 (charmap=UTF-8) (ignored: LC_ALL set to C.UTF-8), LANGUAGE=C.UTF-8 (charmap=UTF-8) (ignored: LC_ALL set to C.UTF-8) Shell: /bin/sh linked to /usr/bin/dash Init: unable to detectdiff -Nru unhide-20130526/debian/changelog unhide-20130526/debian/changelog --- unhide-20130526/debian/changelog 2018-12-15 14:01:03.000000000 -0200 +++ unhide-20130526/debian/changelog 2019-12-17 09:08:39.000000000 -0300 @@ -1,3 +1,12 @@ +unhide (20130526-3+deb10u1) buster; urgency=medium + + * Team Upload. + * debian/patch/allocate-pid-arrays-from-heap.patch: Added to fix a stack + exhausting. Thanks to Bernhard Übelacker <bernhardu@mailbox.org>. + (Closes: #945864) + + -- Thiago Andrade Marques <thmarques@gmail.com> Tue, 17 Dec 2019 09:08:39 -0300 + unhide (20130526-3) unstable; urgency=medium * Team upload. diff -Nru unhide-20130526/debian/patches/allocate-pid-arrays-from-heap.patch unhide-20130526/debian/patches/allocate-pid-arrays-from-heap.patch --- unhide-20130526/debian/patches/allocate-pid-arrays-from-heap.patch 1969-12-31 21:00:00.000000000 -0300 +++ unhide-20130526/debian/patches/allocate-pid-arrays-from-heap.patch 2019-12-17 09:08:39.000000000 -0300 @@ -0,0 +1,40 @@ +Description: Allocate pid arrays from the stack + +Author: Bernhard Übelacker <bernhardu@mailbox.org> +Bug-Debian: https://bugs.debian.org/945864 +Forwarded: no +Last-Update: 2019-12-03 + +--- unhide-20130526.orig/unhide-linux-bruteforce.c ++++ unhide-20130526/unhide-linux-bruteforce.c +@@ -64,14 +64,20 @@ void *funcionThread (void *parametro) + void brute(void) + { + int i=0; +- int allpids[maxpid] ; +- int allpids2[maxpid] ; ++ int* allpids; ++ int* allpids2; + int x; + int y; + int z; + + msgln(unlog, 0, "[*]Starting scanning using brute force against PIDS with fork()\n") ; + ++ allpids = malloc(sizeof(int)*maxpid) ; ++ allpids2 = malloc(sizeof(int)*maxpid) ; ++ if (!allpids || !allpids2) { ++ die(unlog, "Error: Cannot allocate pid arrays ! Exiting."); ++ } ++ + // PID under 301 are reserved for kernel + for(x=0; x < 301; x++) + { +@@ -214,4 +220,7 @@ void brute(void) + } + } + } ++ ++ free(allpids); ++ free(allpids2); + } diff -Nru unhide-20130526/debian/patches/series unhide-20130526/debian/patches/series --- unhide-20130526/debian/patches/series 2018-12-15 13:57:25.000000000 -0200 +++ unhide-20130526/debian/patches/series 2019-12-17 09:08:39.000000000 -0300 @@ -1 +1,2 @@ fix-man +allocate-pid-arrays-from-heap.patch
--- End Message ---
--- Begin Message ---
- To: 939036-done@bugs.debian.org, 939802-done@bugs.debian.org, 940647-done@bugs.debian.org, 941365-done@bugs.debian.org, 941713-done@bugs.debian.org, 942575-done@bugs.debian.org, 944294-done@bugs.debian.org, 944348-done@bugs.debian.org, 944856-done@bugs.debian.org, 944865-done@bugs.debian.org, 945518-done@bugs.debian.org, 945845-done@bugs.debian.org, 945896-done@bugs.debian.org, 945925-done@bugs.debian.org, 945965-done@bugs.debian.org, 946032-done@bugs.debian.org, 946033-done@bugs.debian.org, 946083-done@bugs.debian.org, 946175-done@bugs.debian.org, 946184-done@bugs.debian.org, 946402-done@bugs.debian.org, 946557-done@bugs.debian.org, 946559-done@bugs.debian.org, 946651-done@bugs.debian.org, 946705-done@bugs.debian.org, 946819-done@bugs.debian.org, 946822-done@bugs.debian.org, 946831-done@bugs.debian.org, 946841-done@bugs.debian.org, 946864-done@bugs.debian.org, 946901-done@bugs.debian.org, 946960-done@bugs.debian.org, 947038-done@bugs.debian.org, 947125-done@bugs.debian.org, 947201-done@bugs.debian.org, 947254-done@bugs.debian.org, 947321-done@bugs.debian.org, 947331-done@bugs.debian.org, 947832-done@bugs.debian.org, 948104-done@bugs.debian.org, 948203-done@bugs.debian.org, 948205-done@bugs.debian.org, 948290-done@bugs.debian.org, 948363-done@bugs.debian.org, 948390-done@bugs.debian.org, 948400-done@bugs.debian.org, 948464-done@bugs.debian.org, 948472-done@bugs.debian.org, 948485-done@bugs.debian.org, 948544-done@bugs.debian.org, 948545-done@bugs.debian.org, 948550-done@bugs.debian.org, 948601-done@bugs.debian.org, 948609-done@bugs.debian.org, 948695-done@bugs.debian.org, 948796-done@bugs.debian.org, 948826-done@bugs.debian.org, 948850-done@bugs.debian.org, 948854-done@bugs.debian.org, 948857-done@bugs.debian.org, 948899-done@bugs.debian.org, 948904-done@bugs.debian.org, 948910-done@bugs.debian.org, 948979-done@bugs.debian.org, 948988-done@bugs.debian.org, 948991-done@bugs.debian.org, 949120-done@bugs.debian.org, 949121-done@bugs.debian.org, 949310-done@bugs.debian.org, 949541-done@bugs.debian.org, 949704-done@bugs.debian.org, 949728-done@bugs.debian.org, 949842-done@bugs.debian.org, 949852-done@bugs.debian.org, 949895-done@bugs.debian.org, 949898-done@bugs.debian.org, 949899-done@bugs.debian.org, 949904-done@bugs.debian.org, 949906-done@bugs.debian.org, 949908-done@bugs.debian.org, 949957-done@bugs.debian.org, 950018-done@bugs.debian.org, 950139-done@bugs.debian.org, 950166-done@bugs.debian.org, 950257-done@bugs.debian.org, 950272-done@bugs.debian.org, 950280-done@bugs.debian.org, 950369-done@bugs.debian.org, 950466-done@bugs.debian.org
- Subject: Closing requests included in 10.3 point release
- From: "Adam D. Barratt" <adam@adam-barratt.org.uk>
- Date: Sat, 08 Feb 2020 14:21:36 +0000
- Message-id: <cf1cb2f35981916a86b98b83609df15c95aa378b.camel@adam-barratt.org.uk>
Package: release.debian.org Version: 10.3 Hi, Each of the uploads referred to by these bugs was included in today's stable point release. Regards, Adam
--- End Message ---