Your message dated Sun, 01 Mar 2026 18:09:02 +0000
with message-id <[email protected]>
and subject line Bug#1111118: fixed in trickle 1.08+ds-2
has caused the Debian Bug report #1111118,
regarding trickle fails with "trickle: Could not find overload object"
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)
--
1111118: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1111118
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: trickle
Version: 1.08+ds-1.1
Severity: important
Dear Maintainer,
I use trickle in some cron entries to limit the bandwidth of my
backups transmitted via UUCP. After updating my system from Debian 12
to Debian 13, these existing trickle invocations stopped working.
When the trickle binary is called, it writes "trickle: Could not find
overload object" to stderr and then exits with exit code 1.
I can reproduce this error via the first EXAMPLE from the trickle(1)
manpage:
$ trickle -u 10 -d 20 ncftp
trickle: Could not find overload object
$ echo $?
1
(I actually don't have ncftp installed, but trickle throws the error
before calling the binary. I get the same result with other binaries,
eg. "/usr/bin/uucico" or "curl http://example.com").
I have found a similar bugreport upstream where a downgrade to trickle
1.07 seems to fix the error:
https://github.com/mariusae/trickle/issues/35#issuecomment-3028163448
-- System Information:
Debian Release: 13.0
APT prefers stable-updates
APT policy: (500, 'stable-updates'), (500, 'stable-security'), (500, 'stable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386
Kernel: Linux 6.12.38+deb13-amd64 (SMP w/8 CPU threads; PREEMPT)
Kernel taint flags: TAINT_PROPRIETARY_MODULE, TAINT_OOT_MODULE,
TAINT_UNSIGNED_MODULE
Locale: LANG=de_DE.utf-8, LC_CTYPE=de_DE.utf-8 (charmap=UTF-8),
LANGUAGE=de_DE.utf-8
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled
Versions of packages trickle depends on:
ii libc6 2.41-12
ii libevent-2.1-7t64 2.1.12-stable-10+b1
ii libtirpc3t64 1.3.6+ds-1
trickle recommends no packages.
trickle suggests no packages.
-- no debconf information
--- End Message ---
--- Begin Message ---
Source: trickle
Source-Version: 1.08+ds-2
Done: Arian Ott <[email protected]>
We believe that the bug you reported is fixed in the latest version of
trickle, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Arian Ott <[email protected]> (supplier of updated trickle package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Sun, 01 Mar 2026 15:39:59 +0000
Source: trickle
Architecture: source
Version: 1.08+ds-2
Distribution: unstable
Urgency: medium
Maintainer: Alex Myczko <[email protected]>
Changed-By: Arian Ott <[email protected]>
Closes: 1111118
Changes:
trickle (1.08+ds-2) unstable; urgency=medium
.
* Added gbp.conf.
* Drop redundant Priority: optional.
* Bump standards version to 4.7.3.
* Fixed patch. (Closes: #1111118)
Checksums-Sha1:
7c4953fa5eaa6c93835053a535fad6ea9516a3de 1910 trickle_1.08+ds-2.dsc
32fb896e0304c07c717cfac7f89c321ca35b8037 11584 trickle_1.08+ds-2.debian.tar.xz
721eccc06ec64403ee6618c2f63b29b1b88087b9 6974
trickle_1.08+ds-2_source.buildinfo
Checksums-Sha256:
c82b737c97c0473d03b508888adc383d3aa39461da7653bfa47687464600c3dd 1910
trickle_1.08+ds-2.dsc
64e91de48ff6993ac9881466360e1cb8fd8a07691523f0d5e485a398aa011215 11584
trickle_1.08+ds-2.debian.tar.xz
6bf6d568891c08eff45126fca3b113ce3b00c245dc2c9f78019a925e33051e19 6974
trickle_1.08+ds-2_source.buildinfo
Files:
bb00ac706384c25c05ba1ea2d72f326b 1910 net optional trickle_1.08+ds-2.dsc
e3a494a3a23ed7c91b8b8257aa0ac9c9 11584 net optional
trickle_1.08+ds-2.debian.tar.xz
4bdd6c111f2e69e3e91812c2e9c95ab0 6974 net optional
trickle_1.08+ds-2_source.buildinfo
-----BEGIN PGP SIGNATURE-----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=AsLy
-----END PGP SIGNATURE-----
pgpgnqXRJMWAn.pgp
Description: PGP signature
--- End Message ---