[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#1109025: marked as done (firmware-b43-installer: firmware download fails due to broken upstream URL and checksum mismatch)



Your message dated Wed, 30 Jul 2025 18:17:09 +0000
with message-id <E1uhBMT-00Cs2L-1y@fasolo.debian.org>
and subject line Bug#1109025: fixed in b43-fwcutter 1:019-8+deb12u1
has caused the Debian Bug report #1109025,
regarding firmware-b43-installer: firmware download fails due to broken upstream URL and checksum mismatch
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
1109025: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1109025
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Package: firmware-b43-installer
Version: 1:019-13
Severity: serious
Justification: Policy 4.9

Dear Maintainer,

When attempting to install the package `firmware-b43-installer` on Debian 13
"Trixie" (testing), the installation fails due to a checksum mismatch of the
downloaded Broadcom firmware:

broadcom-wl-6.30.163.46.tar.bz2: checksum mismatch
sha512sum: WARNING: 1 computed checksum did NOT match
firmware-b43-installer.postinst: Downloaded firmware did not match known SHA512
checksum, aborting.
dpkg: error processing package firmware-b43-installer (--configure)

This happens because the URL used to fetch the firmware redirects to a
suspended hosting page (`cgi-sys/suspendedpage.cgi`), meaning the downloaded
content is not valid, resulting in a broken installation.

Steps to reproduce (on Debian Trixie):
1. `sudo apt install firmware-b43-installer`
2. Observe download and checksum failure.
3. Package fails to configure; Wi-Fi support is broken.

Expected result:
- The installer should download a valid firmware file or handle the missing
source gracefully.
- Systems relying on Broadcom Wi-Fi should not be left without a working
driver.

This violates Debian Policy §4.9: maintainer scripts should be robust and not
fail in this way.

Thank you for your work maintaining Debian packages.

Best regards,
catmaster
(Reporting from Debian Bookworm, but the issue occurs on Trixie)


-- System Information:
Debian Release: 12.11
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'stable-security'), (500, 'stable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 6.1.0-37-amd64 (SMP w/2 CPU threads; PREEMPT)
Kernel taint flags: TAINT_OOT_MODULE, TAINT_UNSIGNED_MODULE
Locale: LANG=es_CO.UTF-8, LC_CTYPE=es_CO.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages firmware-b43-installer depends on:
ii  b43-fwcutter     1:019-8
ii  bzip2            1.0.8-5+b1
ii  ca-certificates  20230311
ii  pciutils         1:3.9.0-4
ii  wget             1.21.3-1+deb12u1

firmware-b43-installer recommends no packages.

firmware-b43-installer suggests no packages.

-- no debconf information

--- End Message ---
--- Begin Message ---
Source: b43-fwcutter
Source-Version: 1:019-8+deb12u1
Done: Mathias Gibbens <gibmat@debian.org>

We believe that the bug you reported is fixed in the latest version of
b43-fwcutter, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1109025@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Mathias Gibbens <gibmat@debian.org> (supplier of updated b43-fwcutter package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Wed, 23 Jul 2025 11:05:22 +0000
Source: b43-fwcutter
Architecture: source
Version: 1:019-8+deb12u1
Distribution: bookworm
Urgency: medium
Maintainer: Debian QA Group <packages@qa.debian.org>
Changed-By: Mathias Gibbens <gibmat@debian.org>
Closes: 1109025
Changes:
 b43-fwcutter (1:019-8+deb12u1) bookworm; urgency=medium
 .
   * QA upload.
   * Update remote site where firmware can be fetched (Closes: #1109025)
Checksums-Sha1:
 7236a54186407b54bdaa83042380a547a5920f5c 2155 b43-fwcutter_019-8+deb12u1.dsc
 64198fd2885b0eb0f8968ce3dc2037545b67f065 46769 b43-fwcutter_019.orig.tar.bz2
 8a4cb054178981d7e19ae1468fb52559380a1a22 20280 b43-fwcutter_019-8+deb12u1.debian.tar.xz
 e2367252d1963aac80e6d31f8bc2d54c40f96694 7154 b43-fwcutter_019-8+deb12u1_amd64.buildinfo
Checksums-Sha256:
 15b7f163c51910f42ea57d49a25832d425d33e83857101c0bbf2507c6d84628c 2155 b43-fwcutter_019-8+deb12u1.dsc
 d6ea85310df6ae08e7f7e46d8b975e17fc867145ee249307413cfbe15d7121ce 46769 b43-fwcutter_019.orig.tar.bz2
 366bb0cb30fcb246802fe6548e068f5642cd447ecc2a4b251be0d8bc9a58a430 20280 b43-fwcutter_019-8+deb12u1.debian.tar.xz
 034ab77c7381874d9da08fa17c360087bf92c75c7b3103329b1f8cc4224f0e30 7154 b43-fwcutter_019-8+deb12u1_amd64.buildinfo
Files:
 a89bf8bbab276ddebff220cfbd8d59ea 2155 contrib/utils optional b43-fwcutter_019-8+deb12u1.dsc
 19d1f4226a625756726bdf7ed5dc2a0a 46769 contrib/utils optional b43-fwcutter_019.orig.tar.bz2
 e9d8523a9eca3b61b2ab50b7bb404e36 20280 contrib/utils optional b43-fwcutter_019-8+deb12u1.debian.tar.xz
 0f94ad7fc9776b99d4990d5378f06b70 7154 contrib/utils optional b43-fwcutter_019-8+deb12u1_amd64.buildinfo

-----BEGIN PGP SIGNATURE-----

iQJGBAEBCgAwFiEE1Bp60H32xfynSJ8cKe7i1uz0QvkFAmiKMSYSHGdpYm1hdEBk
ZWJpYW4ub3JnAAoJECnu4tbs9EL5nxkP/3GAE7KvD9wgjAmmomHVkOK3wKMmMuAg
CFXywT69lY2fydhQgd5T7FazPe06i6XtztpWHK3vljzy+S5NEc4HDzcTbsGQ0e9l
NOfdFdIb72FDzNyTuRZgIWy1bbb5PjkQwrn5EnAjHoskWp03kQBex1glh2r5GV/B
3s5PWI5lr2k1hyfzABsomIr7kHLg4GZ0j1wJ/GMI9Binhi3woi9s/S6HnP7CSH+W
tSFQCWgekm0P0MV4VCpNQqltLVbgtaa2ylvJDqi1pt/CIzYwWe8mfqyRymn0TrMH
4vZu92J5ngvr7yXWItVl8zBb8RjqRbQgfg184snvi+M47hJDPZkkysuefbQcT/wP
n1HEmwKeqWOaH0/ZN/PsYMphIJMrsMvDPCz1uPtt6pWG1E2l1foFNGxfqKZOo6dw
BXKc0dOuFZwStaYvOlUiK7F0W67l7Hsp2OufLUt6Ng5NyxZw/s/Q5nF+UAWCkVve
PNPVsoBiKUs9Au3IWZBBHmwUBNKcy4/L2SnAweOpIydvy5JoA7Y4xlxZ4CHDI3lb
IEn4qah4urv91ksJn6xk4ElRE9kzXTRX3uW4iuNQ31L5uEp1M2VTf+KGspjkFyS/
cn2J/O6LzqVaDdnoTEwHhSA/oZCbFnv3Ruh5/45eRFSAXDua1Xl1nsIk8T17Rkoo
DgHLcqARxk/D
=JweL
-----END PGP SIGNATURE-----

Attachment: pgphsNUJ4mU9z.pgp
Description: PGP signature


--- End Message ---

Reply to: