[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#1102457: marked as done (tightvnc uselessly links -lcrypt)



Your message dated Mon, 18 Aug 2025 12:35:12 +0000
with message-id <E1unz4y-00FD0d-0u@fasolo.debian.org>
and subject line Bug#1102457: fixed in tightvnc 1:1.3.10-10
has caused the Debian Bug report #1102457,
regarding tightvnc uselessly links -lcrypt
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
1102457: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1102457
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Source: tightvnc
Version: 1:1.3.10-9
Tags: patch
User: helmutg@debian.org
Usertags: libcrypt-unused

tightvnc links -lcrypt without using any of its symbols. As we consider 
dropping libcrypt-dev from build-essential, this may cause a FTBFS. 
Consider dropping the unnecessary linkage already.

Helmut

--- tightvnc-1.3.10.orig/Xvnc/programs/Xserver/Makefile
+++ tightvnc-1.3.10/Xvnc/programs/Xserver/Makefile
@@ -1,5 +1,5 @@
 DEFS += -DSHAPE -DSTATIC_COLOR -DAVOID_GLYPHBLT -DPIXPRIV -DMITMISC -DXTEST -DXSYNC -DXCMISC -DMITSHM -DBIGREQS -DGLX_MODULE # -DGCCUSESGAS # <- Only required for assembler optimization which has been disabled in Makefile.cfb-common
-LIBS = dix/libdix.a os/libos.a ../../lib/Xau/libXau.a ../../lib/Xdmcp/libXdmcp.a ../../lib/font/libfont.a  hw/vnc/libvnc.a ../../../libvncauth/libvncauth.a cfb/libcfb.a cfb16/libcfb.a cfb24/libcfb.a cfb32/libcfb.a mfb/libmfb.a dix/libxpstubs.a mi/libmi.a Xext/libext.a -lm -lz -ljpeg -lcrypt
+LIBS = dix/libdix.a os/libos.a ../../lib/Xau/libXau.a ../../lib/Xdmcp/libXdmcp.a ../../lib/font/libfont.a  hw/vnc/libvnc.a ../../../libvncauth/libvncauth.a cfb/libcfb.a cfb16/libcfb.a cfb24/libcfb.a cfb32/libcfb.a mfb/libmfb.a dix/libxpstubs.a mi/libmi.a Xext/libext.a -lm -lz -ljpeg
 SUBDIRS = dix os mi Xext mfb cfb cfb16 cfb24 cfb32 hw/vnc
 
 all: Xvnc

--- End Message ---
--- Begin Message ---
Source: tightvnc
Source-Version: 1:1.3.10-10
Done: Sven Geuer <sge@debian.org>

We believe that the bug you reported is fixed in the latest version of
tightvnc, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1102457@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Sven Geuer <sge@debian.org> (supplier of updated tightvnc package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Mon, 18 Aug 2025 14:10:37 +0200
Source: tightvnc
Architecture: source
Version: 1:1.3.10-10
Distribution: unstable
Urgency: medium
Maintainer: Debian Remote Maintainers <debian-remote@lists.debian.org>
Changed-By: Sven Geuer <sge@debian.org>
Closes: 1097998 1102457
Changes:
 tightvnc (1:1.3.10-10) unstable; urgency=medium
 .
   * Revert "d/control + d/rules: Force using gcc-15.", effectively bringing
     the changes of version 1:1.3.10-10~exp1 to unstable.
 .
 tightvnc (1:1.3.10-10~exp2) experimental; urgency=medium
 .
   * d/control + d/rules: Force using gcc-15.
 .
 tightvnc (1:1.3.10-10~exp1) experimental; urgency=medium
 .
   * d/rules:
     - Extend CFLAGS with -std=gnu90 instead of -fpermissive (Closes: #1097998).
     - Fix a comment.
   * d/p/*:
     - Remove unused -lcrypt from install-makefile-build-system.patch
       (Closes: #1102457).
     - Remove more-arm64-fixes.patch, its functionality is fully covered by
       configure-by-size-width-and-byte-order.patch.
     - Fix DEP-3 headers of CVE-2018-20021.patch, CVE-2018-20022.patch,
       CVE-2019-8287.patch and CVE-2019-15680.patch.
   * d/copyright:
     - In GPL-2+ license, replace GNU postal address by URL.
     - Bump Debian copyright years.
   * d/control: Bump Standards-Version to 4.7.2.
Checksums-Sha1:
 4ee2db04fa5012e0a02218575919bd186aee39a4 2587 tightvnc_1.3.10-10.dsc
 16baa651abaf5b4aa8302d4e870470213507197a 244888 tightvnc_1.3.10-10.debian.tar.xz
 6637855f74b07729d0601934829d261e8255ca20 4604944 tightvnc_1.3.10-10.git.tar.xz
 4843d06ac9a19ff926924ac3820488a3b00878cb 18068 tightvnc_1.3.10-10_source.buildinfo
Checksums-Sha256:
 e43045ff9368972816134c51c51660c5b3a6c727517cd25cbd93a42b673829ce 2587 tightvnc_1.3.10-10.dsc
 ebf7d1a87366d5f768476c94c059fe27bf213385bf7cf5798b51e1e4ffe1e6b1 244888 tightvnc_1.3.10-10.debian.tar.xz
 968a6fa9b579fd0fb177425e2aa7155451a14150f6185ba033ee8e7e0a2b420a 4604944 tightvnc_1.3.10-10.git.tar.xz
 e9a92cf5d77adb2fe512091933a8f5ff3506f406348a7918c1a0d0f7d41777f5 18068 tightvnc_1.3.10-10_source.buildinfo
Files:
 771f2b691dffa65dbc4aa5fed9967ae9 2587 x11 optional tightvnc_1.3.10-10.dsc
 41aa95f7958a04d8ab04e935a42bae24 244888 x11 optional tightvnc_1.3.10-10.debian.tar.xz
 cf301471fb34845ecb5ef90974c388d9 4604944 x11 optional tightvnc_1.3.10-10.git.tar.xz
 2213b5e3c31038570ebac9079366e12b 18068 x11 optional tightvnc_1.3.10-10_source.buildinfo
Git-Tag-Info: tag=eca1170f7d89354c8e5321dcb64e55aeb12e5fd4 fp=3df5e8aa43fc9fdfd086f195adf50edaf8add585
Git-Tag-Tagger: Sven Geuer <sge@debian.org>

-----BEGIN PGP SIGNATURE-----
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=/fh9
-----END PGP SIGNATURE-----

Attachment: pgpOLMevbB5UR.pgp
Description: PGP signature


--- End Message ---

Reply to: