[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#1004861: marked as done (libc6: dist-upgrade to stable fails kernel version checks on LXC guests)



Your message dated Sat, 19 Mar 2022 10:02:10 +0000
with message-id <E1nVVuU-0002uV-0A@fasolo.debian.org>
and subject line Bug#1004861: fixed in glibc 2.31-13+deb11u3
has caused the Debian Bug report #1004861,
regarding libc6: dist-upgrade to stable fails kernel version checks on LXC guests
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
1004861: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1004861
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Package: libc6
Version: 2.31-13
Severity: normal

Dear Maintainer,

I tried to upgrade from old-stable to stable on an LXC guest running on
an ASUS NAS (underlying "ADM" OS) and got blocked during preinst :

Preparing to unpack .../libc6_2.31-13+deb11u2_amd64.deb ...
/var/lib/dpkg/tmp.ci/preinst: 105: [: Illegal number:
/var/lib/dpkg/tmp.ci/preinst: 9: /var/lib/dpkg/tmp.ci/preinst:
arithmetic expression: expecting primary: "5 * 10000 + 4 * 100 + "
dpkg: error processing archive
/var/cache/apt/archives/libc6_2.31-13+deb11u2_amd64.deb (--unpack):
  new libc6:amd64 package pre-installation script subprocess returned
error exit status 2
Errors were encountered while processing:
  /var/cache/apt/archives/libc6_2.31-13+deb11u2_amd64.deb

It appears a workaround is to create a fake uname script in
/usr/local/bin that will report 5.4.0 (for instance) instead of the
5.4.x which is returned by uname -r in this Debian guest (why the NAS
maintainers have such numbering of kernels... who knows).

This was discussed in french on
https://debian-facile.org/viewtopic.php?id=25401 but I though this might
deserve a proper bug report.

I guess this wouldn't be too hard to fix in the preinst script, but
haven't checked the code.

Dunno which side effects might depend on having .0 in the end, but
appart that, the upgrade went smoothless.

Hope this helps,

-- 
Olivier BERGER
https://www-public.imtbs-tsp.eu/~berger_o/ - OpenPGP 2048R/0xF9EAE3A65819D7E8
Ingenieur Recherche - Dept INF
Institut Mines-Telecom, Telecom SudParis, Evry (France)

--- End Message ---
--- Begin Message ---
Source: glibc
Source-Version: 2.31-13+deb11u3
Done: Aurelien Jarno <aurel32@debian.org>

We believe that the bug you reported is fixed in the latest version of
glibc, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1004861@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Aurelien Jarno <aurel32@debian.org> (supplier of updated glibc package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Thu, 17 Mar 2022 22:37:00 +0100
Source: glibc
Architecture: source
Version: 2.31-13+deb11u3
Distribution: bullseye
Urgency: medium
Maintainer: GNU Libc Maintainers <debian-glibc@lists.debian.org>
Changed-By: Aurelien Jarno <aurel32@debian.org>
Closes: 987266 989147 998008 998622 1004861
Changes:
 glibc (2.31-13+deb11u3) bullseye; urgency=medium
 .
   [ Aurelien Jarno ]
   * debian/patches/git-updates.diff: update from upstream stable branch:
     - Fix bad conversion from ISO-2022-JP-3 with iconv (CVE-2021-43396).
       Closes: #998622.
     - Remove PIE check on amd64 to fix FTBFS with binutils 2.37.
     - Fix a buffer overflow in sunrpc svcunix_create (CVE-2022-23218).
     - Fix a buffer overflow in sunrpc clnt_create (CVE-2022-23219).
   * debian/debhelper.in/libc-bin.postinst: stop replacing older versions from
     /etc/nsswitch.conf.  Closes: #998008.
   * debian/debhelper.in/libc.preinst: simplify the version comparison by only
     comparing the two first parts, now that kernel 2.X are not supported
     anymore.  Closes: #1004861.
   * debian/debhelper.in/libc.preinst: drop the check for kernel release > 255
     now that glibc and preinstall script are fixed.  Closes: #987266.
   * debian/patches/local-CVE-2021-33574-mq_notify-use-after-free.diff:
     fix a possible use-after-free in mq_notify (CVE-2021-33574).  Closes:
     #989147.
Checksums-Sha1:
 fdc75bac6fd6f430366dae36fd7807aefb2fc46d 8347 glibc_2.31-13+deb11u3.dsc
 b95746511969a1071f03c7a79855dfd4181f4238 916044 glibc_2.31-13+deb11u3.debian.tar.xz
 8311b1881f16eb90968469c7b26d445ace889426 8907 glibc_2.31-13+deb11u3_source.buildinfo
Checksums-Sha256:
 1a8c389b5664962dda78e289d6938a2276b8b450d41e3081e7bf82db2fe1e409 8347 glibc_2.31-13+deb11u3.dsc
 1accd7015160a589e8ad1111011fa9c911a572e673aa5689b99f64ce6740226c 916044 glibc_2.31-13+deb11u3.debian.tar.xz
 f828487f38283f566b310deb099466d5a5979faef6944d021c23a8503c6735b2 8907 glibc_2.31-13+deb11u3_source.buildinfo
Files:
 2cd4f1126a06d943b2b56256ef7d4294 8347 libs required glibc_2.31-13+deb11u3.dsc
 8a4a07322785138fbd85c61134702e25 916044 libs required glibc_2.31-13+deb11u3.debian.tar.xz
 2a048422f04673d3c7cf746f7593e7e7 8907 libs required glibc_2.31-13+deb11u3_source.buildinfo

-----BEGIN PGP SIGNATURE-----
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=pu7d
-----END PGP SIGNATURE-----

--- End Message ---

Reply to: