Your message dated Sat, 07 Sep 2019 14:34:49 +0100 with message-id <[🔎] f49e2985d8466065c49c03185c24465a32228fb5.camel@adam-barratt.org.uk> and subject line Closing bugs for fixes including in 10.1 point release has caused the Debian Bug report #932009, regarding buster-pu: package gcab/1.2-3 to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner@bugs.debian.org immediately.) -- 932009: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=932009 Debian Bug Tracking System Contact owner@bugs.debian.org with problems
--- Begin Message ---
- To: Debian Bug Tracking System <submit@bugs.debian.org>
- Subject: buster-pu: package gcab/1.2-3
- From: Stephen Kitt <skitt@debian.org>
- Date: Sat, 13 Jul 2019 20:52:45 +0200
- Message-id: <156304396544.16340.1273333667458732474.reportbug@heffalump.sk2.org>
Package: release.debian.org Severity: normal Tags: stretch User: release.debian.org@packages.debian.org Usertags: pu Hi, Would it be possible to consider a stable update to gcab 1.2-3 (or its equivalent as a stable upload)? It fixes a data corruption bug, #913487; that’s the only change between 1.2-2, which is in Buster, and 1.2-3, which is in Bullseye. The debdiff is as follows: diff -Nru gcab-1.2/debian/changelog gcab-1.2/debian/changelog --- gcab-1.2/debian/changelog 2018-12-22 12:37:31.000000000 +0100 +++ gcab-1.2/debian/changelog 2019-07-06 10:18:07.000000000 +0200 @@ -1,3 +1,10 @@ +gcab (1.2-3) unstable; urgency=medium + + * Apply upstream patch to fix corruption when extracting. + Closes: #931487. LP: #1835589. + + -- Stephen Kitt <skitt@debian.org> Sat, 06 Jul 2019 10:18:07 +0200 + gcab (1.2-2) unstable; urgency=medium * Avoid needing PATH_MAX, so we can build on Hurd. Closes: #888640; diff -Nru gcab-1.2/debian/patches/overflow.patch gcab-1.2/debian/patches/overflow.patch --- gcab-1.2/debian/patches/overflow.patch 1970-01-01 01:00:00.000000000 +0100 +++ gcab-1.2/debian/patches/overflow.patch 2019-07-06 10:16:47.000000000 +0200 @@ -0,0 +1,44 @@ +commit 5619f4cd2ca3108c8dea17ba656b5ce44a60ca29 +Author: Marc-André Lureau <marcandre.lureau@redhat.com> +Date: Fri Jan 11 19:42:40 2019 +0400 + + Revert "decomp: fix gcc warning strict-overflow" + + The warning doesn't happen with current build-sys. + + The overlapping behaviour is undefined with memcpy. memmove doesn't + have the same semantic either than the loop. Let's revert! + + Fixes: + https://gitlab.gnome.org/GNOME/gcab/issues/12 + + This reverts commit e48074952743f53d8ac529d4debc421e7e0f6937. + + Signed-off-by: Marc-André Lureau <marcandre.lureau@redhat.com> + +diff --git a/libgcab/decomp.c b/libgcab/decomp.c +index 64d97f8..0c2b184 100644 +--- a/libgcab/decomp.c ++++ b/libgcab/decomp.c +@@ -1015,9 +1015,7 @@ int LZXfdi_decomp(int inlen, int outlen, fdi_decomp_state *decomp_state) { + window_posn += match_length; + + /* copy match data - no worries about destination wraps */ +- memcpy(rundest, runsrc, match_length); +- rundest += match_length; +- runsrc += match_length; ++ while (match_length-- > 0) *rundest++ = *runsrc++; + } + } + break; +@@ -1106,9 +1104,7 @@ int LZXfdi_decomp(int inlen, int outlen, fdi_decomp_state *decomp_state) { + window_posn += match_length; + + /* copy match data - no worries about destination wraps */ +- memcpy(rundest, runsrc, match_length); +- rundest += match_length; +- runsrc += match_length; ++ while (match_length-- > 0) *rundest++ = *runsrc++; + } + } + break; diff -Nru gcab-1.2/debian/patches/series gcab-1.2/debian/patches/series --- gcab-1.2/debian/patches/series 2018-12-22 12:34:22.000000000 +0100 +++ gcab-1.2/debian/patches/series 2019-07-06 10:17:15.000000000 +0200 @@ -2,3 +2,4 @@ zalloc_integer_overflow.patch no-git-version.patch do-not-use-path-max.patch +overflow.patch Regards, Stephen -- System Information: Debian Release: 10.0 APT prefers stable-debug APT policy: (500, 'stable-debug'), (500, 'stable'), (100, 'unstable-debug'), (100, 'testing-debug'), (100, 'unstable'), (100, 'testing'), (1, 'experimental-debug'), (1, 'experimental') Architecture: amd64 (x86_64) Foreign Architectures: i386 Kernel: Linux 4.19.0-5-amd64 (SMP w/8 CPU cores) Kernel taint flags: TAINT_UNSIGNED_MODULE Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8), LANGUAGE=en_GB.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Init: systemd (via /run/systemd/system)
--- End Message ---
--- Begin Message ---
- To: 930795-done@bugs.debian.org, 931126-done@bugs.debian.org, 931198-done@bugs.debian.org, 931199-done@bugs.debian.org, 931358-done@bugs.debian.org, 931596-done@bugs.debian.org, 931608-done@bugs.debian.org, 931615-done@bugs.debian.org, 931616-done@bugs.debian.org, 931724-done@bugs.debian.org, 931817-done@bugs.debian.org, 931967-done@bugs.debian.org, 932009-done@bugs.debian.org, 932030-done@bugs.debian.org, 932069-done@bugs.debian.org, 932111-done@bugs.debian.org, 932193-done@bugs.debian.org, 932318-done@bugs.debian.org, 932335-done@bugs.debian.org, 932441-done@bugs.debian.org, 932448-done@bugs.debian.org, 932518-done@bugs.debian.org, 932522-done@bugs.debian.org, 932588-done@bugs.debian.org, 932606-done@bugs.debian.org, 932684-done@bugs.debian.org, 932790-done@bugs.debian.org, 932945-done@bugs.debian.org, 933036-done@bugs.debian.org, 933125-done@bugs.debian.org, 933147-done@bugs.debian.org, 933175-done@bugs.debian.org, 933369-done@bugs.debian.org, 933379-done@bugs.debian.org, 933392-done@bugs.debian.org, 933535-done@bugs.debian.org, 933754-done@bugs.debian.org, 933764-done@bugs.debian.org, 933769-done@bugs.debian.org, 933787-done@bugs.debian.org, 933899-done@bugs.debian.org, 933911-done@bugs.debian.org, 933976-done@bugs.debian.org, 934094-done@bugs.debian.org, 934163-done@bugs.debian.org, 934183-done@bugs.debian.org, 934308-done@bugs.debian.org, 934311-done@bugs.debian.org, 934329-done@bugs.debian.org, 934343-done@bugs.debian.org, 934345-done@bugs.debian.org, 934507-done@bugs.debian.org, 934537-done@bugs.debian.org, 934650-done@bugs.debian.org, 934689-done@bugs.debian.org, 934704-done@bugs.debian.org, 934826-done@bugs.debian.org, 934827-done@bugs.debian.org, 934928-done@bugs.debian.org, 934934-done@bugs.debian.org, 934956-done@bugs.debian.org, 935137-done@bugs.debian.org, 935165-done@bugs.debian.org, 935200-done@bugs.debian.org, 935253-done@bugs.debian.org, 935261-done@bugs.debian.org, 935265-done@bugs.debian.org, 935308-done@bugs.debian.org, 935370-done@bugs.debian.org, 935386-done@bugs.debian.org, 935411-done@bugs.debian.org, 935465-done@bugs.debian.org, 935474-done@bugs.debian.org, 935479-done@bugs.debian.org, 935480-done@bugs.debian.org, 935576-done@bugs.debian.org, 935583-done@bugs.debian.org, 935704-done@bugs.debian.org, 935707-done@bugs.debian.org, 935719-done@bugs.debian.org, 935746-done@bugs.debian.org, 935770-done@bugs.debian.org, 935776-done@bugs.debian.org, 935809-done@bugs.debian.org, 935815-done@bugs.debian.org, 935827-done@bugs.debian.org, 935888-done@bugs.debian.org, 935957-done@bugs.debian.org, 935988-done@bugs.debian.org, 936022-done@bugs.debian.org, 936056-done@bugs.debian.org, 938954-done@bugs.debian.org, 938975-done@bugs.debian.org, 939019-done@bugs.debian.org
- Cc: 935588@bugs.debian.org
- Subject: Closing bugs for fixes including in 10.1 point release
- From: "Adam D. Barratt" <adam@adam-barratt.org.uk>
- Date: Sat, 07 Sep 2019 14:34:49 +0100
- Message-id: <[🔎] f49e2985d8466065c49c03185c24465a32228fb5.camel@adam-barratt.org.uk>
Version: 10.1 Hi, The fixes referenced by each of these bugs were included in today's buster point release. Regards, Adam
--- End Message ---