[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#924124: marked as done (unblock: virtualbox/6.0.4-dfsg-7)



Your message dated Tue, 23 Apr 2019 12:31:56 +0200
with message-id <20190423103154.67bl35vcvwjoltz7@debian.org>
and subject line Re: Bug#924124: unblock: virtualbox/6.0.4-dfsg-7
has caused the Debian Bug report #924124,
regarding unblock: virtualbox/6.0.4-dfsg-7
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
924124: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=924124
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Package: release.debian.org
User: release.debian.org@packages.debian.org
Usertags: unblock
Severity: normal

Please unblock package virtualbox

- Added a Security.Debian.news file (or whatever is called), asked by security team
- added a two line build fix for kernel 5.0
- dropped a non-used patch.

debdiff attached.

unblock virtualbox/6.0.4-dfsg-6
diff --git a/debian/README.Debian.security b/debian/README.Debian.security
new file mode 100644
index 000000000..f64508dca
--- /dev/null
+++ b/debian/README.Debian.security
@@ -0,0 +1,7 @@
+Virtualbox package is in contrib, and upstream refuses to give patches for security bugs.
+Their attitude is to update to the latest version, something not feasible for stable
+releases, specially when the minor releases of a particular major version are not
+published anymore.
+For this reason, virtualbox might not be covered by security.debian.org support,
+nor by stable-proposed-updates in case the maintaining is impossible due to
+lack of upstream support.
diff --git a/debian/changelog b/debian/changelog
index 99021d52c..c3f155286 100644
--- a/debian/changelog
+++ b/debian/changelog
@@ -1,3 +1,9 @@
+virtualbox (6.0.4-dfsg-6) unstable; urgency=medium
+
+  * Upstream build fix with kernel 5.0 (LP: #1813071)
+
+ -- Gianfranco Costamagna <locutusofborg@debian.org>  Sat, 09 Mar 2019 13:50:34 +0100
+
 virtualbox (6.0.4-dfsg-5) unstable; urgency=medium
 
   * Tweak java patch with upstream approach
diff --git a/debian/patches/77542.patch b/debian/patches/77542.patch
new file mode 100644
index 000000000..7f97cd7da
--- /dev/null
+++ b/debian/patches/77542.patch
@@ -0,0 +1,17 @@
+Description: fix build with kernel 5.0
+Origin: upstream
+Index: virtualbox/src/VBox/Additions/linux/sharedfolders/vfsmod.c
+===================================================================
+--- virtualbox.orig/src/VBox/Additions/linux/sharedfolders/vfsmod.c
++++ virtualbox/src/VBox/Additions/linux/sharedfolders/vfsmod.c
+@@ -40,7 +40,9 @@
+ #include "revision-generated.h"
+ #include "product-generated.h"
+ #include "VBoxGuestR0LibInternal.h"
+-#if LINUX_VERSION_CODE < KERNEL_VERSION(3, 3, 0)
++#if LINUX_VERSION_CODE >= KERNEL_VERSION(5, 0, 0)
++# include <uapi/linux/mount.h> /* for MS_REMOUNT */
++#elif LINUX_VERSION_CODE < KERNEL_VERSION(3, 3, 0)
+ # include <linux/mount.h>
+ #endif
+ #include <linux/seq_file.h>
diff --git a/debian/patches/fix-backports.patch b/debian/patches/fix-backports.patch
deleted file mode 100644
index 43d97638b..000000000
--- a/debian/patches/fix-backports.patch
+++ /dev/null
@@ -1,22 +0,0 @@
-Description: We should not just don't care about security issues, but this needs fixes in gsoap(stable)
-Author: Gianfranco Costamagna <locutusofborg@debian.org>
-Last-Update: 2019-01-17
-
-Index: virtualbox/src/VBox/Main/webservice/vboxweb.cpp
-===================================================================
---- virtualbox.orig/src/VBox/Main/webservice/vboxweb.cpp
-+++ virtualbox/src/VBox/Main/webservice/vboxweb.cpp
-@@ -616,11 +616,13 @@
-         // keepalive, otherwise stale connections tie up worker threads.
-         m_soap->send_timeout = 60;
-         m_soap->recv_timeout = 60;
-+#if GSOAP_VERSION >= 20850
-         // Limit the maximum SOAP request size to a generous amount, just to
-         // be on the safe side (SOAP is quite wordy when representing arrays,
-         // and some API uses need to deal with large arrays). Good that binary
-         // data is no longer represented by byte arrays...
-         m_soap->recv_maxlength = _16M;
-+#endif
-         // process the request; this goes into the COM code in methodmaps.cpp
-         do {
- #ifdef WITH_OPENSSL
diff --git a/debian/patches/series b/debian/patches/series
index 71127fc9e..6f0774885 100644
--- a/debian/patches/series
+++ b/debian/patches/series
@@ -17,3 +17,4 @@
 do-not-run-if-not-in-vm.patch
 77040.patch
 java11-upstream.patch
+77542.patch

--- End Message ---
--- Begin Message ---
Hi,

On Mon, Mar 11, 2019 at 09:27:16AM +0100, Gianfranco Costamagna wrote:
> control: retitle -1 unblock: virtualbox/6.0.4-dfsg-7

virtualbox is no longer in testing and 6.0.6-dfsg-1 was uploaded to unstable,
so this request is no longer relevant.

Closing.

Ivo

--- End Message ---

Reply to: