Your message dated Sun, 22 Dec 2024 23:19:33 +0000 with message-id <E1tPVET-00GesH-PF@fasolo.debian.org> and subject line Bug#1091160: fixed in gcin 2.9.4+dfsg1-2 has caused the Debian Bug report #1091160, regarding gcin: FTBFS on arm64: make[1]: *** [Makefile:110: all] Error 2 to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner@bugs.debian.org immediately.) -- 1091160: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1091160 Debian Bug Tracking System Contact owner@bugs.debian.org with problems
--- Begin Message ---
- To: submit@bugs.debian.org
- Subject: gcin: FTBFS on arm64: make[1]: *** [Makefile:110: all] Error 2
- From: Lucas Nussbaum <lucas@debian.org>
- Date: Sun, 22 Dec 2024 18:41:02 +0100
- Message-id: <[🔎] Z2hPLh7IC8nOOajZ@grub.nussbaum.fr>
Source: gcin Version: 2.9.4+dfsg1-1 Severity: serious Justification: FTBFS Tags: trixie sid ftbfs User: lucas@debian.org Usertags: ftbfs-20241222 ftbfs-trixie Hi, During a rebuild of all packages in sid, your package failed to build on arm64. Relevant part (hopefully): > ../gcin2tab array10a.cin > -- gcin2tab encoding UTF-8 -- > --- please use iconv -f big5 -t utf-8 if your file is in big5 encoding > KeyNum:11 keybits:6 > char def > MaxPress: 8 > Defined Characters:31700 > export LD_LIBRARY_PATH=../im-client;../tsa2d32 en-american.src > double free or corruption (out) > Aborted > gmake[2]: *** [Makefile:30: en-american] Error 134 > gmake[2]: Leaving directory '/<<PKGBUILDDIR>>/data' > make[1]: *** [Makefile:110: all] Error 2 The full build log is available from: http://qa-logs.debian.net/2024/12/22/gcin_2.9.4+dfsg1-1_unstable-arm64.log All bugs filed during this archive rebuild are listed at: https://bugs.debian.org/cgi-bin/pkgreport.cgi?tag=ftbfs-20241222;users=lucas@debian.org or: https://udd.debian.org/bugs/?release=na&merged=ign&fnewerval=7&flastmodval=7&fusertag=only&fusertagtag=ftbfs-20241222&fusertaguser=lucas@debian.org&allbugs=1&cseverity=1&ctags=1&caffected=1#results A list of current common problems and possible solutions is available at http://wiki.debian.org/qa.debian.org/FTBFS . You're welcome to contribute! If you reassign this bug to another package, please mark it as 'affects'-ing this package. See https://www.debian.org/Bugs/server-control#affects If you fail to reproduce this, please provide a build log and diff it with mine so that we can identify if something relevant changed in the meantime.
--- End Message ---
--- Begin Message ---
- To: 1091160-close@bugs.debian.org
- Subject: Bug#1091160: fixed in gcin 2.9.4+dfsg1-2
- From: Debian FTP Masters <ftpmaster@ftp-master.debian.org>
- Date: Sun, 22 Dec 2024 23:19:33 +0000
- Message-id: <E1tPVET-00GesH-PF@fasolo.debian.org>
- Reply-to: Boyuan Yang <byang@debian.org>
Source: gcin Source-Version: 2.9.4+dfsg1-2 Done: Boyuan Yang <byang@debian.org> We believe that the bug you reported is fixed in the latest version of gcin, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 1091160@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Boyuan Yang <byang@debian.org> (supplier of updated gcin package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmaster@ftp-master.debian.org) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Format: 1.8 Date: Sun, 22 Dec 2024 17:44:22 -0500 Source: gcin Architecture: source Version: 2.9.4+dfsg1-2 Distribution: unstable Urgency: high Maintainer: Debian Input Method Team <debian-input-method@lists.debian.org> Changed-By: Boyuan Yang <byang@debian.org> Closes: 1091160 Changes: gcin (2.9.4+dfsg1-2) unstable; urgency=high . * Team upload. * debian/patches/: + 0015-tsa2d32.cpp-Do-not-free-pointers-to-avoid-crash-on-a.patch: Add a patch to disable potentially problematic free(3) calls to circumvent a pointer double-free crash issue during build. The potential side-effect of memory leakage is acceptable. (Closes: #1091160) Checksums-Sha1: 6d19cd25db3760d249e43db4f48c833c05a89453 2832 gcin_2.9.4+dfsg1-2.dsc 8b73d91e17de358f72e8429d46dd22d88588ca17 4258796 gcin_2.9.4+dfsg1.orig.tar.xz bfc3ca31901b6470a084be434f202ecb03e0b346 24752 gcin_2.9.4+dfsg1-2.debian.tar.xz b87f91408211024d0673b1d0285c8e3dbd883167 21567 gcin_2.9.4+dfsg1-2_amd64.buildinfo Checksums-Sha256: 2fc8a5b14a65e7d80bb69a7fb4861a8eff5bafc988fa682c7364501efe897b9e 2832 gcin_2.9.4+dfsg1-2.dsc 996c66343894e52fc28f18cec20650888f09ee54a08238bf2548e031ffb63931 4258796 gcin_2.9.4+dfsg1.orig.tar.xz fbb8e19c7226f032b47febc80fc9790b525daa10718493509c0943d314b532cd 24752 gcin_2.9.4+dfsg1-2.debian.tar.xz 87202e61fb710bf10810cc8899835cfac081cded03944e34cd5bc990e8b885b3 21567 gcin_2.9.4+dfsg1-2_amd64.buildinfo Files: fe3c1d324d8910f06aa80ab5afa72401 2832 utils optional gcin_2.9.4+dfsg1-2.dsc 0dbf26e81a251bd51917d4b7211af7fb 4258796 utils optional gcin_2.9.4+dfsg1.orig.tar.xz 1f9001d59bce10e6a4cc49ae3bfded6a 24752 utils optional gcin_2.9.4+dfsg1-2.debian.tar.xz 6e3735a9c2d45ee9664f134973097910 21567 utils optional gcin_2.9.4+dfsg1-2_amd64.buildinfo -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEfncpR22H1vEdkazLwpPntGGCWs4FAmdomBgACgkQwpPntGGC Ws5g1xAAhXQ5D+x2vGG/gwmGXICfdwVFTAaBFwgsBiRbyLBFb9GmlYoPfh88PZzG amWrehkSYmHCGcLO7zXkM9Vibu3rVRwLgJnddEXifcwA/fJqhba5IJEotBAF0Ktq qnsmGkTqSERdqmHTcEonXp2XiKaoylH3Dk0ZQhhGV6qr5FNXq1KjJp8kFyMfMxa6 +lp2VqAIGlp/y4oMMYSSW4IQocDKLJbSdOXfSpD5ySpXmHVzjrTf+ZdsWLWbhh1H 4RM7GdGT89T5FC/gszjQYxluY0bwQUBNLDATzVkX9w+IO7NS7/c4Hi07sa2qtYFT /OC56jboQ8RM+1vZ10pAlY1pZ3cof35huuOLHLsFj10WkgWac6xn1nX0MxdBrMff 2W3kmuLffOO4ipoQN+W2JDgrZ3PxFG62NgDQGoJVa6v5lRaYQa3wdvXAFblazPTu qlKlqg+FinR5gKQHgwecVvCiths9f/y9ulIwz8H2lZNryZbnNU52bWTSK4g2q/Em hTy/BfsrFp57hqtiaux2E4e0u0AHfyg4O+M3T58mNY2Klw6+1k4pwefkaDl/yqT/ NjyjVI9z+C8zVeE5aoA+kZ5ROVckt5JIatFs7eE7c0eYuuWr95vV9I/ca05+cjsN A5HGd++qrJufjLLriW8lM6LKbky15mLmELaCY7gWySUPoqXVMrI= =KKGu -----END PGP SIGNATURE-----Attachment: pgp5DXLXb5_Mp.pgp
Description: PGP signature
--- End Message ---