Your message dated Wed, 10 Sep 2025 16:10:49 +0000
with message-id <[email protected]>
and subject line Bug#1111809: fixed in qemu 1:10.1.0+ds-3
has caused the Debian Bug report #1111809,
regarding qemu-img info https://.. (using libcurl) always segfaults
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)
--
1111809: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1111809
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: qemu-block-extra
Version: 1:10.0.2+ds-2+b1
Severity: normal
Tags: upstream
Forwarded: https://gitlab.com/qemu-project/qemu/-/issues/3081
With qemu-utils and qemu-block-extra (where block-curl.so module
resides) installed, we have:
$ $ qemu-img info
https://cloud.debian.org/images/cloud/trixie/latest/debian-13-generic-arm64.qcow2
Segmentation fault
This always happens with https: URLs, it looks like.
It also looks like this is an issue in libcurl, not qemu
(or, in the way how qemu uses libcurl). In particular,
using qemu-img & block-curl.so from bookworm and installing
libcurl from trixie triggers the same issue, so the prob
happens when upgrading libcurl3-gnutls to a trixie version.
This is tested on amd64, so there's no difference between
t64 and non-t64 versions.
Thanks,
/mjt
--- End Message ---
--- Begin Message ---
Source: qemu
Source-Version: 1:10.1.0+ds-3
Done: Michael Tokarev <[email protected]>
We believe that the bug you reported is fixed in the latest version of
qemu, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Michael Tokarev <[email protected]> (supplier of updated qemu package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Wed, 10 Sep 2025 10:56:33 +0300
Source: qemu
Architecture: source
Version: 1:10.1.0+ds-3
Distribution: unstable
Urgency: medium
Maintainer: Debian QEMU Team <[email protected]>
Changed-By: Michael Tokarev <[email protected]>
Closes: 1111809
Changes:
qemu (1:10.1.0+ds-3) unstable; urgency=medium
.
* block-curl-fix-curl-internal-handles-handling.patch (Closes: #1111809)
* e1000e-prevent-crash-from-legacy-interrupt-firing-af.patch
* u-boot-sam460ex-stdc23.patch: two more cases of bool typedef
Checksums-Sha1:
282865c8cbbdc368d46e01dc24ec0743bffba90b 12340 qemu_10.1.0+ds-3.dsc
e285f982a21d48c4a315a7299c99b3b5e8572056 125184 qemu_10.1.0+ds-3.debian.tar.xz
f7570e5212abab9d11a896bdbed2f2ef06660591 7729 qemu_10.1.0+ds-3_source.buildinfo
Checksums-Sha256:
dfe7d22130f275c0593333c8e2bbb2b7c723dd69f316aadf1f41dcc375cdf9d6 12340
qemu_10.1.0+ds-3.dsc
d87fe91ae09b450af59fc93baba225eb61cf5203f082020b537f8c1e9d476972 125184
qemu_10.1.0+ds-3.debian.tar.xz
ffb8149c438bdc0c1eead20e6b454441c64cafdd59f431b9713fb6717e7f5003 7729
qemu_10.1.0+ds-3_source.buildinfo
Files:
5213793e843a3baed8ce60ab12e8bfbd 12340 otherosfs optional qemu_10.1.0+ds-3.dsc
a2695b47fd0e91a4082005215b859c81 125184 otherosfs optional
qemu_10.1.0+ds-3.debian.tar.xz
20f9c9e6a94ebf014f3337b53abe513a 7729 otherosfs optional
qemu_10.1.0+ds-3_source.buildinfo
-----BEGIN PGP SIGNATURE-----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=N/35
-----END PGP SIGNATURE-----
pgpttCl7h3KCB.pgp
Description: PGP signature
--- End Message ---