Your message dated Sun, 26 Aug 2012 02:56:07 +0200 with message-id <20120826005607.GE19361@mraw.org> and subject line Re: Bug#685868: unblock: gccintro/1.0-2 has caused the Debian Bug report #685868, regarding unblock: gccintro/1.0-2 to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner@bugs.debian.org immediately.) -- 685868: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=685868 Debian Bug Tracking System Contact owner@bugs.debian.org with problems
--- Begin Message ---
- To: Debian Bug Tracking System <submit@bugs.debian.org>
- Subject: unblock: gccintro/1.0-2
- From: Osamu Aoki <osamu@debian.org>
- Date: Sun, 26 Aug 2012 00:42:44 +0900
- Message-id: <[🔎] 20120825154244.GA30272@goofy.localdomain>
Package: release.debian.org Severity: normal User: release.debian.org@packages.debian.org Usertags: unblock Please unblock package gccintro Just typo-fixes and clarification of difference from upstream. unblock gccintro/1.0-2 -- System Information: Debian Release: wheezy/sid APT prefers unstable APT policy: (500, 'unstable'), (500, 'testing'), (10, 'experimental') Architecture: amd64 (x86_64) Foreign Architectures: i386 Kernel: Linux 3.5-trunk-amd64 (SMP w/8 CPU cores) Locale: LANG=en_US.utf8, LC_CTYPE=en_US.utf8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dashdiff -Nru gccintro-1.0/debian/changelog gccintro-1.0/debian/changelog --- gccintro-1.0/debian/changelog 2012-07-16 17:18:15.000000000 +0900 +++ gccintro-1.0/debian/changelog 2012-08-18 20:36:46.000000000 +0900 @@ -1,3 +1,10 @@ +gccintro (1.0-2) unstable; urgency=low + + * Fix spell errors. + * Describe changes made to the upstream more accurately. + + -- Osamu Aoki <osamu@debian.org> Sat, 18 Aug 2012 20:32:58 +0900 + gccintro (1.0-1) unstable; urgency=low * Initial release (Closes: #681725) diff -Nru gccintro-1.0/debian/patches/0002-Update-contents-for-Debian.patch gccintro-1.0/debian/patches/0002-Update-contents-for-Debian.patch --- gccintro-1.0/debian/patches/0002-Update-contents-for-Debian.patch 2012-07-16 17:18:07.000000000 +0900 +++ gccintro-1.0/debian/patches/0002-Update-contents-for-Debian.patch 2012-08-18 20:22:07.000000000 +0900 @@ -1,4 +1,4 @@ -From fa6d91492feb455dca740ffb851aec28b4947713 Mon Sep 17 00:00:00 2001 +From 306e2fd31d176bc0840321a1286a7ca2a5cf3d62 Mon Sep 17 00:00:00 2001 From: Osamu Aoki <osamu@debian.org> Date: Sat, 14 Jul 2012 01:58:12 +0900 Subject: [PATCH 2/3] Update contents for Debian @@ -69,7 +69,7 @@ +} + diff --git a/gccintro.texi b/gccintro.texi -index bfa0a60..ed84052 100644 +index bfa0a60..4148e38 100644 --- a/gccintro.texi +++ b/gccintro.texi @@ -103,6 +103,7 @@ published by Network Theory Ltd raise money for more free documentation. @@ -161,24 +161,24 @@ +@cindex uncontrolled format string +The possible security vulnerability of uncontrolled format +string@footnote{@uref{http://en.wikipedia.org/wiki/Uncontrolled_format_string}} -+in @code{printf()} and similars can be detected and warned with GCC using the ++in @code{printf()} and the similar functions can be detected and warned with GCC using the +option @option{-Wformat -Wformat-security}. + -+Example of unsecure code: @file{format.c} ++Example of insecure code: @file{format.c} + +@example +@verbatiminclude format.c +@end example +@noindent + -+The unsecure program @file{format.c} can be compiled without obvious warnings. ++The insecure program @file{format.c} can be compiled without obvious warnings. + +@example +$ gcc -Wall format.c +@end example +@noindent + -+The unsecure program @file{format.c} can be compiled with the option ++The insecure program @file{format.c} can be compiled with the option +@option{-Wformat -Wformat-security} with warnings. + +@example @@ -211,14 +211,14 @@ +vulnerability in the program, the application will be killed immediately. This +reduces the risk of any unknown potential exploits to a denial-of-service. + -+Example of unsecure code: @file{bof.c} ++Example of insecure code: @file{bof.c} + +@example +@verbatiminclude bof.c +@end example +@noindent + -+The unsecure program @file{bof.c} can be compiled without obvious warnings. ++The insecure program @file{bof.c} can be compiled without obvious warnings. + +@example +$ gcc -Wall bof.c -o bof @@ -230,9 +230,9 @@ + +The output shows that the @file{bof.c} program compiled without using +the option @option{-fstack-protector} creates an executable @file{bof} which -+executes an unsecure buffer overflow code silently. ++executes an insecure buffer overflow code silently. + -+The unsecure program @file{bof.c} can be compiled with the option ++The insecure program @file{bof.c} can be compiled with the option +@option{-fstack-protector}. + +@example @@ -249,7 +249,7 @@ + +The output shows that the @file{bof.c} program compiled with the option +@option{-fstack-protector} creates an executable @file{bof-ssp}. When the -+executable @file{bof-ssp} executed, it detacts stack smashing and exit safely. ++executable @file{bof-ssp} is executed, it detects stack smashing and exits safely. + +@node Buffer overflow protection +@section Buffer overflow protection @@ -261,11 +261,11 @@ +The GCC macro definition of @option{-D_FORTIFY_SOURCE} provides a lightweight +buffer overflow protection to some memory and string functions provided by the +GLIBC. This feature uses macro substitution of such vulnerable functions to -+prevent an unsecure buffer overflow code to be excuted. The compilar ++prevent an insecure buffer overflow code to be executed. The compiler +optimization option needs to be @option{-O1} or higher to enable +@option{-D_FORTIFY_SOURCE}.@footnote{@uref{http://www.redhat.com/archives/fedora-tools-list/2004-September/msg00002.html}} + -+The unsecure program @file{bof.c} shown in the previos section can be compiled ++The insecure program @file{bof.c} shown in the previous section can be compiled +with the option @option{-D_FORTIFY_SOURCE=2 -O2}. + +@example @@ -281,7 +281,7 @@ + +The output shows that the @file{bof.c} program compiled with the option +@option{-D_FORTIFY_SOURCE=2 -O2} creates an executable @file{bof-fort} which -+stops before executing an unsecure buffer overflow code. ++stops before executing an insecure buffer overflow code. + +This @option{-D_FORTIFY_SOURCE} option is a quick fix for older programs +written with fixed length buffers. But if you are writing a software program @@ -307,9 +307,9 @@ +forces the program to load and link completely and marks its GOT read-only with +the @option{-Wl,z,relro} option before turning over control to the program. + -+Since this option causes startup slowdown for large applications, this is not ++Since this option causes start-up slowdown for large applications, this is not +enabled by default. But this option may be interesting for the security -+concious network daemons. ++conscious network daemons. @node Platform-specific options @chapter Platform-specific options diff -Nru gccintro-1.0/debian/patches/0003-Update-title-etc.-for-Debian.patch gccintro-1.0/debian/patches/0003-Update-title-etc.-for-Debian.patch --- gccintro-1.0/debian/patches/0003-Update-title-etc.-for-Debian.patch 2012-07-16 17:18:07.000000000 +0900 +++ gccintro-1.0/debian/patches/0003-Update-title-etc.-for-Debian.patch 2012-08-18 20:22:07.000000000 +0900 @@ -1,4 +1,4 @@ -From 822227b15bc74fedb070388a493c81c93e315151 Mon Sep 17 00:00:00 2001 +From f761be5e2075b87d01e54a2a42ccc451522d7565 Mon Sep 17 00:00:00 2001 From: Osamu Aoki <osamu@debian.org> Date: Sun, 15 Jul 2012 14:18:43 +0900 Subject: [PATCH 3/3] Update title etc. for Debian @@ -7,14 +7,14 @@ No @ifset publish Add comment of Debian adjustment to the original --- - gccintro.texi | 13 ++++++++++--- - 1 file changed, 10 insertions(+), 3 deletions(-) + gccintro.texi | 15 ++++++++++++--- + 1 file changed, 12 insertions(+), 3 deletions(-) diff --git a/gccintro.texi b/gccintro.texi -index ed84052..26da569 100644 +index 4148e38..2036470 100644 --- a/gccintro.texi +++ b/gccintro.texi -@@ -25,13 +25,18 @@ +@@ -25,13 +25,19 @@ @titlepage @title An Introduction to GCC @subtitle for the GNU Compilers @code{gcc} and @code{g++} @@ -25,8 +25,9 @@ @page +Debian package version. 2012 + -+The content of this Debian packaged version has some minor adjustments to -+match learning experiences under the Debian environment. ++The content of this Debian packaged version adds a chapter on ``Security ++enhancement options'' and makes some minor file path adjustments to match ++learning experiences under the Debian environment. @vskip 0pt plus 1filll -@ifset publish @flushleft @@ -35,7 +36,7 @@ A catalogue record for this book is available from the British Library. Second printing, August 2005 (1/8/2005). Revised and updated. -@@ -61,7 +66,6 @@ of Static Free Software +@@ -61,7 +67,6 @@ of Static Free Software Free Software provides support for Electric to the electronics design industry. @vskip 1ex @@ -43,13 +44,14 @@ Copyright @copyright{} 2004, 2005 Network Theory Ltd. Permission is granted to copy, distribute and/or modify this document -@@ -93,6 +97,9 @@ This manual provides an introduction to the GNU C and C++ Compilers, +@@ -93,6 +98,10 @@ This manual provides an introduction to the GNU C and C++ Compilers, The development of this manual was funded entirely by @uref{http://www.network-theory.co.uk/,Network Theory Ltd}. Copies published by Network Theory Ltd raise money for more free documentation. + -+The content of this Debian packaged version has some minor adjustments to -+match learning experiences under the Debian environment. ++The content of this Debian packaged version adds a chapter on ``Security ++enhancement options'' and makes some minor file path adjustments to match ++learning experiences under the Debian environment. @end ifnottex @menu diff -Nru gccintro-1.0/debian/README.Debian gccintro-1.0/debian/README.Debian --- gccintro-1.0/debian/README.Debian 2012-07-16 17:18:15.000000000 +0900 +++ gccintro-1.0/debian/README.Debian 2012-08-18 20:32:47.000000000 +0900 @@ -1,7 +1,8 @@ gccintro for Debian ------------------- -The content of this Debian packaged version has some minor adjustments to -match learning experiences under the Debian environment. +The content of this Debian packaged version adds a chapter on ``Security +enhancement options'' and makes some minor file path adjustments to match +learning experiences under the Debian environment. - -- Osamu Aoki <osamu@debian.org> Mon, 16 Jul 2012 00:58:02 +0900 + -- Osamu Aoki <osamu@debian.org> Sat, 18 Aug 2012 20:32:36 +0900
--- End Message ---
--- Begin Message ---
- To: Osamu Aoki <osamu@debian.org>, 685868-done@bugs.debian.org
- Subject: Re: Bug#685868: unblock: gccintro/1.0-2
- From: Cyril Brulebois <kibi@debian.org>
- Date: Sun, 26 Aug 2012 02:56:07 +0200
- Message-id: <20120826005607.GE19361@mraw.org>
- In-reply-to: <[🔎] 20120825154244.GA30272@goofy.localdomain>
- References: <[🔎] 20120825154244.GA30272@goofy.localdomain>
Hi, Osamu Aoki <osamu@debian.org> (26/08/2012): > Package: release.debian.org > Severity: normal > User: release.debian.org@packages.debian.org > Usertags: unblock > > Please unblock package gccintro > > Just typo-fixes and clarification of difference from upstream. > > unblock gccintro/1.0-2 this package hasn't reached testing since it was first accepted in unstable one full month after the freeze has started. ;) So I'm afraid there's nothing to unblock, it's going to enter testing after wheezy is released. Mraw, KiBi.Attachment: signature.asc
Description: Digital signature
--- End Message ---