Your message dated Sat, 22 Feb 2014 19:10:25 -0600
with message-id <[email protected]>
and subject line Re: aptitude: Segfault in update
has caused the Debian Bug report #679843,
regarding aptitude: Segfault in update
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
679843: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=679843
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: aptitude
Version: 0.6.8-1
Severity: important

Dear Maintainer,

upon trying to update my package lists ('u') in aptitude, I just
received a segmentation fault with this backtrace:

#0  0x00007ffff7b89365 in
debListParser::LoadReleaseInfo(pkgCache::PkgFileIterator&, FileFd&,
std::string) () from /usr/lib/x86_64-linux-gnu/libapt-pkg.so.4.12
#1  0x00007ffff7ba40d1 in debPackagesIndex::Merge(pkgCacheGenerator&,
OpProgress*) const () from /usr/lib/x86_64-linux-gnu/libapt-pkg.so.4.12
#2  0x00007ffff7b49892 in ?? ()
   from /usr/lib/x86_64-linux-gnu/libapt-pkg.so.4.12
   #3  0x00007ffff7b4c669 in
   pkgCacheGenerator::MakeStatusCache(pkgSourceList&, OpProgress*,
   MMap**, bool) () from /usr/lib/x86_64-linux-gnu/libapt-pkg.so.4.12
   #4  0x00007ffff7b4330d in pkgCacheFile::BuildCaches(OpProgress*,
   bool) ()
      from /usr/lib/x86_64-linux-gnu/libapt-pkg.so.4.12
      #5  0x000055555577e081 in ?? ()
      #6  0x00005555556c5f4c in ?? ()
      #7  0x000055555562bdf7 in ?? ()
      #8  0x000055555562fa21 in
      sigc::internal::slot_call0<sigc::bind_functor<-1,
      sigc::pointer_functor3<download_thread*, pkgAcquire::RunResult,
      safe_slot2<void, download_thread*, pkgAcquire::RunResult>, void>,
      download_thread*, pkgAcquire::RunResult, safe_slot2<void,
      download_thread*, pkgAcquire::RunResult>, sigc::nil, sigc::nil,
      sigc::nil, sigc::nil>, void>::call_it(sigc::internal::slot_rep*)
      ()
      #9  0x00005555556bd31a in ?? ()
      #10 0x00007ffff71b0f33 in cwidget::toplevel::mainloop(int) ()
         from /usr/lib/libcwidget.so.3
         #11 0x00005555556aa36d in ?? ()
         #12 0x00005555555eaa36 in main ()

Here's my sources.list:

-------------------------------------------------------------------------------
deb [arch=amd64,i386] http://mirror.cc.columbia.edu/debian/ stable main contrib 
non-free
deb [arch=amd64,i386] http://mirror.cc.columbia.edu/debian/ testing main 
contrib non-free
deb [arch=amd64,i386] http://mirror.cc.columbia.edu/debian/ unstable main 
contrib non-free
deb [arch=amd64,i386] http://mirror.cc.columbia.edu/debian/ experimental main 
contrib non-free
#deb-src http://mirror.cc.columbia.edu/debian/ testing main
#deb-src http://mirror.cc.columbia.edu/debian/ unstable main
#deb-src http://mirror.cc.columbia.edu/debian/ experimental main

deb http://security.debian.org/ wheezy/updates main contrib non-free
deb http://security.debian.org/ squeeze/updates main contrib non-free

deb http://debian.netcologne.de/debian-multimedia.org testing main
deb http://debian.netcologne.de/debian-multimedia.org unstable main
deb http://debian.netcologne.de/debian-multimedia.org experimental main

deb http://ppa.launchpad.net/pcf/miro-releases/ubuntu oneiric main 
-------------------------------------------------------------------------------

Thanks,
Andreas

-- Package-specific info:
Terminal: xterm-256color
$DISPLAY is set.
which aptitude: /usr/bin/aptitude

aptitude version information:
aptitude 0.6.8 compiled at Jun  9 2012 10:02:58
Compiler: g++ 4.7.0
Compiled against:
  apt version 4.12.0
  NCurses version 5.9
  libsigc++ version: 2.2.10
  Ept support enabled.
  Gtk+ support disabled.
  Qt support disabled.

Current library versions:
  NCurses version: ncurses 5.9.20110404
  cwidget version: 0.5.16
  Apt version: 4.12.0

aptitude linkage:
        linux-vdso.so.1 =>  (0x00007fffc6577000)
        libapt-pkg.so.4.12 => /usr/lib/x86_64-linux-gnu/libapt-pkg.so.4.12 
(0x00007f77d48fd000)
        libncursesw.so.5 => /lib/x86_64-linux-gnu/libncursesw.so.5 
(0x00007f77d46cd000)
        libtinfo.so.5 => /lib/x86_64-linux-gnu/libtinfo.so.5 
(0x00007f77d44a3000)
        libsigc-2.0.so.0 => /usr/lib/libsigc-2.0.so.0 (0x00007f77d429e000)
        libcwidget.so.3 => /usr/lib/libcwidget.so.3 (0x00007f77d3f9e000)
        libept.so.1.0.5.4.12 => /usr/lib/libept.so.1.0.5.4.12 
(0x00007f77d3d4b000)
        libxapian.so.22 => /usr/lib/libxapian.so.22 (0x00007f77d3965000)
        libz.so.1 => /lib/x86_64-linux-gnu/libz.so.1 (0x00007f77d374e000)
        libsqlite3.so.0 => /usr/lib/x86_64-linux-gnu/libsqlite3.so.0 
(0x00007f77d34a2000)
        libboost_iostreams.so.1.49.0 => /usr/lib/libboost_iostreams.so.1.49.0 
(0x00007f77d3289000)
        libpthread.so.0 => /lib/x86_64-linux-gnu/libpthread.so.0 
(0x00007f77d306d000)
        libstdc++.so.6 => /usr/lib/x86_64-linux-gnu/libstdc++.so.6 
(0x00007f77d2d65000)
        libm.so.6 => /lib/x86_64-linux-gnu/libm.so.6 (0x00007f77d2ae3000)
        libgcc_s.so.1 => /lib/x86_64-linux-gnu/libgcc_s.so.1 
(0x00007f77d28cd000)
        libc.so.6 => /lib/x86_64-linux-gnu/libc.so.6 (0x00007f77d2545000)
        libutil.so.1 => /lib/x86_64-linux-gnu/libutil.so.1 (0x00007f77d2342000)
        libdl.so.2 => /lib/x86_64-linux-gnu/libdl.so.2 (0x00007f77d213e000)
        libbz2.so.1.0 => /lib/x86_64-linux-gnu/libbz2.so.1.0 
(0x00007f77d1f2d000)
        libuuid.so.1 => /lib/x86_64-linux-gnu/libuuid.so.1 (0x00007f77d1d28000)
        librt.so.1 => /lib/x86_64-linux-gnu/librt.so.1 (0x00007f77d1b1f000)
        /lib64/ld-linux-x86-64.so.2 (0x00007f77d52a3000)

-- System Information:
Debian Release: wheezy/sid
  APT prefers testing
  APT policy: (990, 'testing'), (500, 'unstable'), (500, 'stable'), (1, 
'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 3.4-trunk-amd64 (SMP w/4 CPU cores)
Locale: LANG=de_DE.utf8, LC_CTYPE=de_DE.utf8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages aptitude depends on:
ii  aptitude-common           0.6.8-1
ii  libapt-pkg4.12            0.9.6
ii  libboost-iostreams1.49.0  1.49.0-3
ii  libc6                     2.13-33
ii  libcwidget3               0.5.16-3.3
ii  libept1.4.12              1.0.6.1
ii  libgcc1                   1:4.7.0-8
ii  libncursesw5              5.9-9
ii  libsigc++-2.0-0c2a        2.2.10-0.1
ii  libsqlite3-0              3.7.13-1
ii  libstdc++6                4.7.0-8
ii  libtinfo5                 5.9-9
ii  libxapian22               1.2.10-2
ii  zlib1g                    1:1.2.7.dfsg-13

Versions of packages aptitude recommends:
pn  apt-xapian-index                <none>
pn  aptitude-doc-en | aptitude-doc  <none>
pn  libparse-debianchangelog-perl   <none>
ii  sensible-utils                  0.0.7

Versions of packages aptitude suggests:
pn  debtags  <none>
ii  tasksel  3.09

-- no debconf information



--- End Message ---
--- Begin Message ---
"Manuel A. Fernandez Montecelo" <[email protected]> writes:

> Control: tags -1 + moreinfo
>
> 2012-07-02 01:46 Andreas Kloeckner:
>>Package: aptitude
>>Version: 0.6.8-1
>>Severity: important
>>
>>Dear Maintainer,
>>
>>upon trying to update my package lists ('u') in aptitude, I just
>>received a segmentation fault with this backtrace:
>
> Did it happen only for a few days, or for a long time, for example until
> you reinstalled?  Or still happening now?
>
> I'm wondering if it was a transient problem in apt, or a corrupt file or
> something, I haven't seen this in recent times.  Giving the backtrace
> and that segfaults in apt code, I am not sure if this can be dealt with
> from aptitude.

Hasn't happened in a while. Probably fixed. Thanks for checking back.

Andreas

Attachment: pgpWyExLuiZZV.pgp
Description: PGP signature


--- End Message ---
_______________________________________________
Aptitude-devel mailing list
[email protected]
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/aptitude-devel

Reply via email to