Your message dated Tue, 02 Jan 2018 18:21:51 +0000 with message-id <E1eWRCB-000JAt-8F@fasolo.debian.org> and subject line Bug#716640: fixed in zapping 0.10~cvs6-12 has caused the Debian Bug report #716640, regarding [Mayhem] Bug report on zapping: zapping_setup_fb crashes with exit status 139 to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner@bugs.debian.org immediately.) -- 716640: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=716640 Debian Bug Tracking System Contact owner@bugs.debian.org with problems
--- Begin Message ---
- To: Debian Bug Tracking System: <maintonly@bugs.debian.org>
- Cc:
- Subject: [Mayhem] Bug report on zapping: zapping_setup_fb crashes with exit status 139
- From: Alexandre Rebert <alexandre@cmu.edu>
- Date: Wed, 10 Jul 2013 16:13:35 -0400
- Message-id: <201307102013.r6AKDZQQ001312@smtp.andrew.cmu.edu>
Package: zapping Version: 0.10~cvs6-9 Severity: normal User: mayhem@forallsecure.com Usertags: mayhem zapping_setup_fb crashes with exit status 139. We confirmed the crash by re-running it in a fresh debian unstable installation. The attachment [1] contains a testcase (under ./crash) crashing the program. It ensures that you can easily reproduce the bug. Additionally, under ./crash_info/, we include more information about the crash such as a core dump, the dmesg generated by the crash, and its output. Regards, The Mayhem Team (Alexandre Rebert, Thanassis Avgerinos, Sang Kil Cha, David Brumley, Manuel Egele) Cylab, Carnegie Mellon University [1] http://www.forallsecure.com/bug-reports/4738232f1dffaf0533a172d739ca28157b7f4632/full_report -- System Information: Debian Release: jessie/sid APT prefers unstable APT policy: (500, 'unstable') Architecture: i386 (i686) Kernel: Linux 3.9-1-686-pae (SMP w/1 CPU core) Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968) Shell: /bin/sh linked to /bin/dash Versions of packages zapping depends on: ii gconf-service 3.2.6-1 ii gconf2 3.2.6-1 ii libc6 2.17-6 ii libesd0 0.2.41-11 ii libgconf-2-4 3.2.6-1 ii libgdk-pixbuf2.0-0 2.28.2-1 ii libglade2-0 1:2.6.4-1 ii libglib2.0-0 2.36.3-2 ii libgnome2-0 2.32.1-4 ii libgnomeui-0 2.24.5-2 ii libgnomevfs2-0 1:2.24.4-3 ii libgtk2.0-0 2.24.18-1 ii libjpeg8 8d-1 ii liblircclient0 0.9.0~pre1-1 ii libpango-1.0-0 1.32.5-5+b1 ii libpng12-0 1.2.49-4 ii libpython2.7 2.7.5-6 ii libx11-6 2:1.6.0-1 ii libxext6 2:1.3.1-2+deb7u1 ii libxinerama1 2:1.1.2-1+deb7u1 ii libxml2 2.9.1+dfsg1-2 ii libxmu6 2:1.1.1-1 ii libxv1 2:1.0.7-1+deb7u1 ii libxxf86dga1 2:1.1.3-2+deb7u1 ii libxxf86vm1 1:1.1.2-1+deb7u1 ii libzvbi0 0.2.33-7 zapping recommends no packages. zapping suggests no packages. -- no debconf informationAttachment: zapping_setup_fb-report.tar.bz2
Description: Binary data
--- End Message ---
--- Begin Message ---
- To: 716640-close@bugs.debian.org
- Subject: Bug#716640: fixed in zapping 0.10~cvs6-12
- From: Yavor Doganov <yavor@gnu.org>
- Date: Tue, 02 Jan 2018 18:21:51 +0000
- Message-id: <E1eWRCB-000JAt-8F@fasolo.debian.org>
Source: zapping Source-Version: 0.10~cvs6-12 We believe that the bug you reported is fixed in the latest version of zapping, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 716640@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Yavor Doganov <yavor@gnu.org> (supplier of updated zapping package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmaster@ftp-master.debian.org) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Format: 1.8 Date: Sat, 30 Dec 2017 00:03:52 +0200 Source: zapping Binary: zapping Architecture: source Version: 0.10~cvs6-12 Distribution: unstable Urgency: medium Maintainer: Debian QA Group <packages@qa.debian.org> Changed-By: Yavor Doganov <yavor@gnu.org> Description: zapping - television viewer for the GNOME environment Closes: 716640 829824 856096 868412 Changes: zapping (0.10~cvs6-12) unstable; urgency=medium . * QA upload. * debian/compat: Bump to 11. * debian/control (Priority): Set to optional. (Build-Depends): Remove libesd0-dev (Closes: #856096). Require debhelper >= 11. Remove dh-autoreconf and automake. Add autoconf-archive for the AX_COMPILER_FLAGS macro. Remove ancient version requirements for libgnomeui-dev, libgtk2.0-dev, libzvbi-dev. Add freebsd-glue [hurd-any] in an attempt to fix FTBFS on GNU/Hurd. (Vcs-Git, Vcs-Browser): Use secure/canonical URIs. (zapping-dbg): Remove in favor of automatic -dbgsym. (Standards-Version): Claim compliance with 4.1.3 as of this release. * debian/rules: Simplify -- remove unused variables, use standard targets, order overrides sequentially. Remove trailing whitespace. Enable all hardening flags. Don't invoke dh_autoreconf. Don't install the .xpm icon. (override_dh_strip): Pass --dbgsym-migration. * debian/gnome-television.xpm: * debian/menu: Delete as per Policy requirement. * debian/zapping.install: * debian/preinst: Delete, no longer necessary. * debian/README.Debian: Fix two typos. * debian/patches/03-Desktop.patch: Add Keywords field. * debian/patches/08-Spelling-typos.patch: Fix yet another typo. * debian/patches/15-Misc-warnings.patch: Fix more warnings. * debian/patches/19-zapping_setup_fb_crash.patch: New; fix a segfault when zapping_setup_fb is invoked with an invalid display name. Thanks Alexandre Rebert / Mayhem Team for the report (Closes: #716640). * debian/patches/20-Check-return-value.patch: New; fix compiler warnings [-Wunused-result] which popped up due to the hardened CPPFLAGS. * debian/patches/21-GnomeVFS-to-GIO.patch: New; port to GIO, hopefully done right (Closes: #868412). * debian/patches/22-gnome-common-deprecate.patch: New; don't use deprecated gnome-common macro (Closes: #829824). * debian/patches/series: Update. * debian/changelog: Whitespace cleanup. * debian/copyright: Rewrite to adhere to copryight-format 1.0. Checksums-Sha1: 8602a803ef7d3a71fcda46acf8e3dfc344fed78a 2220 zapping_0.10~cvs6-12.dsc bcc040af4806336405751ecce07eb7ca4ceca35d 32724 zapping_0.10~cvs6-12.debian.tar.xz 9931cb264706c63a57cd7501d020138cda752644 13507 zapping_0.10~cvs6-12_source.buildinfo Checksums-Sha256: c1e070707450d8249c03646bebd46409aa276ac03296190a8fad5c528b51c48d 2220 zapping_0.10~cvs6-12.dsc 9f1f2f5098f8b83e97454ed139d69a51033a3e934ab31ae0a79b5628bc99b74b 32724 zapping_0.10~cvs6-12.debian.tar.xz 3db28c3156e86266d3426a0854afb20cabe1f68c7a3e1c2cb649c86380093bc9 13507 zapping_0.10~cvs6-12_source.buildinfo Files: d582a9a1a8233f71c361fa028c19a28b 2220 gnome optional zapping_0.10~cvs6-12.dsc 90d92ad069ab31d61cac17ec5ae90380 32724 gnome optional zapping_0.10~cvs6-12.debian.tar.xz bd0f665f8fc8ec447d4c2cbcb5248618 13507 gnome optional zapping_0.10~cvs6-12_source.buildinfo -----BEGIN PGP SIGNATURE----- iQIcBAEBCAAGBQJaS8uqAAoJEPNPCXROn13Z5cUQAK8ZZmWBSWFsJO+gpT0/NAjJ IpzXzfhaugRow0UsZqxCkKYGkpmv2buFb2eFCwq4tzNZbar0NSEnlblFBfDoTsnH 2BPaVAQj6fawEyr54V7Ap4xdTpSTTwW7fGisz/SJdyW255rhDedNH/5ZwsbrOkiD E2apGRx6KdAKDgIUsPFy4lr/jBaPhaDf1XAXI6YnKlbWKvGn58ZVc1cM0q4fjVxo SpBCjnogeEBqNtWbZO2vYwNz/3Q+m3UUF3pLhmuJgQWfwMGdhAWYGC1F7T3A2rkn aRLshdHTT03bn6JfGXtWwwzkZ1kb39hc9CDT701hrot97AjP2CAEYqzg4SIpa84E bazuU2l4o9fKUX942Y+q/ZMCSsaik6e9lnN01PsVWEEYfP9pLfmL+rhuZmtnb4aF KM/Mxegh6I/eVIUAiOJVeYqFUKaSw2K2hG8rSIuZ+d4cVKg4Cvup9PuRlO6ocAIL YmAg1zhC5yhTsNPDx0JUVB9gvmrSCfdEJSiA/21U1WUKh+s9ehi/r0m9te6+bJ/L NhUG1KdRbrUq/pAk3FCVNmOrzTL2u3MBhjMhZha8UjEc6+Kxi5vatkSay2lf1C2u ft+rGTDzmu4JXkaKWkvFcx1bmRgufxvGJIeWjr1nbkiifntqLRRnJVu+xqXo26gI BF1e2wdmyb6MCKLKfii/ =X1ya -----END PGP SIGNATURE-----
--- End Message ---