[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#1115257: marked as done (trixie-pu: package samhain/4.1.4-6+deb13u1)



Your message dated Mon, 15 Sep 2025 17:35:11 +0000
with message-id <E1uyD6d-00CqV7-0w@fasolo.debian.org>
and subject line Bug#1115257: fixed in xfireworks 1.3-16
has caused the Debian Bug report #1115257,
regarding trixie-pu: package samhain/4.1.4-6+deb13u1
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
1115257: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1115257
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Package: release.debian.org
Severity: normal
Tags: trixie
X-Debbugs-Cc: samhain@packages.debian.org
Control: affects -1 + src:samhain
User: release.debian.org@packages.debian.org
Usertags: pu

[ Reason ]
Depending on the configuration and the host (not clear what host
condition trigger the issue), samhain segfaults on startup. It has been
tracked as an issue dnmalloc, the samhain memory allocator, when
"recent" GCC versions are used.

[ Impact ]
samhain is unusable on the affects hosts / configurations.

[ Tests ]
There is no automated test for the code. That said I have reproduced the
issue on an affected system using the provided configuration file in
#1111631 and checked that the issue is correctly fixed with the change.

[ Risks ]
The risk of disabling the dnmalloc allocator is quite low, the well
tested glibc memory allocator is used instead. This is the one used on
non-amd64 and non-i386 builds, and samhain works fine on these
architectures.

[ Checklist ]
  [x] *all* changes are documented in the d/changelog
  [x] I reviewed all changes and I approve them
  [x] attach debdiff against the package in (old)stable
  [x] the issue is verified as fixed in unstable

[ Changes ]
The only change is to unconditionally disable the dnmalloc memory
allocator (it was enabled only on amd64 and i386) to workaround the
issue. The same commit of the forky/sid version is used directly.

[ Other info ]
I have already uploaded the package to the archive. Thanks for
considering.
diff -Nru samhain-4.1.4/debian/changelog samhain-4.1.4/debian/changelog
--- samhain-4.1.4/debian/changelog	2025-03-26 19:48:21.000000000 +0100
+++ samhain-4.1.4/debian/changelog	2025-09-14 17:43:34.000000000 +0200
@@ -1,3 +1,10 @@
+samhain (4.1.4-6+deb13u1) trixie; urgency=medium
+
+  * d/rules:
+    - Quick fix preventing potential segfaults (Closes: #1111631)
+
+ -- Aurelien Jarno <aurel32@debian.org>  Sun, 14 Sep 2025 17:43:34 +0200
+
 samhain (4.1.4-6) unstable; urgency=medium
 
   * Team upload.
diff -Nru samhain-4.1.4/debian/rules samhain-4.1.4/debian/rules
--- samhain-4.1.4/debian/rules	2025-03-26 19:48:21.000000000 +0100
+++ samhain-4.1.4/debian/rules	2025-09-14 17:43:34.000000000 +0200
@@ -37,6 +37,15 @@
 endif
 
 
+# This is a quick fix regarding bug #1111631 following a patch provided by
+# Aurelien Jarno <aurel32@debian.org>, see https://bugs.debian.org/1111631
+# for further details. I suggest to report the problem upstream so that they
+# can rework the dnmalloc code.
+#
+# Disable dnmalloc for all architectures at it is unmaintained and has issues
+# with GCC >= 11 (see #1111631)
+DNMALLOC = --disable-dnmalloc
+
 %:
 	dh $@
 

--- End Message ---
--- Begin Message ---
Source: xfireworks
Source-Version: 1.3-16
Done: Yukiharu YABUKI <yyabuki@debian.org>

We believe that the bug you reported is fixed in the latest version of
xfireworks, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1115257@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Yukiharu YABUKI <yyabuki@debian.org> (supplier of updated xfireworks package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Tue, 16 Sep 2025 00:16:36 +0900
Source: xfireworks
Architecture: source
Version: 1.3-16
Distribution: unstable
Urgency: medium
Maintainer: Yukiharu YABUKI <yyabuki@debian.org>
Changed-By: Yukiharu YABUKI <yyabuki@debian.org>
Closes: 1114447 1115257
Changes:
 xfireworks (1.3-16) unstable; urgency=medium
 .
   [Yukiharu YABUKI]
   * Adopt otto's patch for FBTFS.
   (Closes: #1114447)
   * Update upstream source code location.
   (Closes: #1115257)
   * Update upstream mail address.
   * Update upstream Web Page information in README.Debian
   * Update Standards-Version from 4.6.2 to 4.7.2
   [otto Kekäläinen]
   * Gave me advice for FBTFS
   * Game me Merge Request for fixing gbp pq
     - He gave me great help. Thank you so much!
Checksums-Sha1:
 61f16e886b31b0b06426534249df9aa7c280c87b 1833 xfireworks_1.3-16.dsc
 309a195653c006bacc54e65d097fe6906e2f5b8f 51824 xfireworks_1.3-16.debian.tar.xz
 ed43b96033661769f594e54bd2c4de32130df36f 6374 xfireworks_1.3-16_amd64.buildinfo
Checksums-Sha256:
 d2d2e92136e0d28701619a7ad8b34eaa0e3aa435cd65d9d05d63dd9bc52d16f7 1833 xfireworks_1.3-16.dsc
 d97f08fbe19b4ee1d6de24d1c5d34cf3f3b63466fef748d3c8a661f52ae9141c 51824 xfireworks_1.3-16.debian.tar.xz
 b0f2018dc50caabe034beaacf7429ada0eff5082fdc82e817468c468b2a79002 6374 xfireworks_1.3-16_amd64.buildinfo
Files:
 fe17b10b03b44dff57d9d982851b76c8 1833 games optional xfireworks_1.3-16.dsc
 036825d054076014140bad051fc5a08a 51824 games optional xfireworks_1.3-16.debian.tar.xz
 1ee8631ac2f645e340801c428be53bae 6374 games optional xfireworks_1.3-16_amd64.buildinfo

-----BEGIN PGP SIGNATURE-----

iQJHBAEBCgAxFiEEZ4rGejxaFgWBItYhcagC0LzRvJIFAmjIPogTHHl5YWJ1a2lA
ZGViaWFuLm9yZwAKCRBxqALQvNG8klxwEACRbXukfV9ELu5niN5EXXRV/xAzSp5W
ieQXpRXNJmJF9E0Tl3b5ARr9/6X7qJdf/pd8LqhOpcgt1yx3+168Rr1AO6iMhH5f
kyLwri7ySvNSk8WWobDsClNW3cCgz2sdcexk3QMKuUqEX8+8aAhhSFzEeRUx3HrZ
+vW+u6OWhypex/uOdU/qsVDYRGr4AbxRk1wLQbujdccvyvu0BSN1IGCrz/3E+RtJ
wdtvv6n+8d85eiVh6u84d2NVdXHk+B5HL4yebJrloJpD25UTnm48jcs4J27smnj6
K+2W0pKjR4bnzoscoex73KhDWkLQs/IQ+1sjd0qABvb8YXoUoVzg2bYhKhKRAg+q
/UrLjHITQWlg+PLDigGa/Css9oIDwYBrXN9vYdMhGiYpMAg6Xio30Iwc+L+pT/w5
2yWOyeKjEBUpyGHYcGO08X8b818gSWt1xu+O0fcY0fI0jSUkU6u3R+GlQAqllt/T
cvwIu/X/Op+5Z8rA43Jtvl8xD9Cq+d5K3WRi97se6NEVa9hOsmkzsgDfL+eGWvsc
fyOSmPJX540f/5wavURnmNvS1AA0giFRSEiq4C+HhCL/BexNcjeQklHvaZpjHuu5
mZafri74CJZY6nFDTC0rHo1YWvoo+JiVVRiakOVKn8XWFgvJCl/d/fmOwrhfmqk1
TytfgifG2vnx4A==
=NxSP
-----END PGP SIGNATURE-----

Attachment: pgpByCbK4NPGR.pgp
Description: PGP signature


--- End Message ---

Reply to: