Your message dated Tue, 24 Sep 2024 20:35:54 +0000
with message-id <e1stcgi-000cls...@fasolo.debian.org>
and subject line Bug#328303: fixed in glibc 2.40-3
has caused the Debian Bug report #328303,
regarding iconv breaks on piped input, because it tries to read whole input
into a buffer
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)
--
328303: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=328303
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: libc6
Version: 2.3.2.ds1-22
iconv(1) tries to read in its whole input before doing
conversion. This is no good if you want to use it in a
pipe.
Example:
yes | iconv -f utf-8 -t iso-8859-1
expected result: ten lines of `y'
actual result: iconv runs out of memory
As a more serious example, consider
zcat dump-of-wikipedia.xml.gz | iconv -f utf-8 -t $charset | ...
--
``The Strategic Railway Authority is not in the business of railway lines.''
(Cambridgeshire County Councillor Shona Johnstone)
--- End Message ---
--- Begin Message ---
Source: glibc
Source-Version: 2.40-3
Done: Aurelien Jarno <aure...@debian.org>
We believe that the bug you reported is fixed in the latest version of
glibc, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to 328...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Aurelien Jarno <aure...@debian.org> (supplier of updated glibc package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Tue, 24 Sep 2024 21:46:16 +0200
Source: glibc
Architecture: source
Version: 2.40-3
Distribution: unstable
Urgency: medium
Maintainer: GNU Libc Maintainers <debian-glibc@lists.debian.org>
Changed-By: Aurelien Jarno <aure...@debian.org>
Closes: 328303 1000652
Changes:
glibc (2.40-3) unstable; urgency=medium
.
[ Samuel Thibault ]
* debian/testsuite-xfail-debian.mk: Avoid tests overflowing memory.
* debian/testsuite-xfail-debian.mk: Update hurd xfails.
.
[ Aurelien Jarno ]
* debian/rules: build with gcc-14.
* debian/control.in/main: adjust g++-for-host version on arm64 to ensure
PAC/BTI support.
* debian/patches/git-updates.diff: update from upstream stable branch.
* debian/patches/any/git-iconv-*: backport iconv fixes and improvement from
upstream master. Closes: #328303, #1000652.
Checksums-Sha1:
d96378d7546e6f73183ba9a56cf20860f34a1e78 7550 glibc_2.40-3.dsc
09a651e8f3e07c2eb71922b855248db1fdc079ff 417288 glibc_2.40-3.debian.tar.xz
cf383b3d306bafbcc58caf2294dbe6b061acd159 11229 glibc_2.40-3_source.buildinfo
Checksums-Sha256:
ad595e37545bf472d2ce8de51712121c88ca960d2e5617af6359d795d7d35f84 7550
glibc_2.40-3.dsc
1a30c14bc68422b6085c0a4d9f0db2be82dffd7da0bf3090307bbbe237c08f73 417288
glibc_2.40-3.debian.tar.xz
408085bbc892ad3df04ff48c1665d94d868f69f35cae96e5e008ce8b39539542 11229
glibc_2.40-3_source.buildinfo
Files:
3965b42ac0ddd5751115bfca56465804 7550 libs required glibc_2.40-3.dsc
6eedbba101473dd163b516a6d9d5a013 417288 libs required
glibc_2.40-3.debian.tar.xz
4cbca4b6a5480e8295e32094693461f2 11229 libs required
glibc_2.40-3_source.buildinfo
-----BEGIN PGP SIGNATURE-----
iQIzBAEBCgAdFiEEUryGlb40+QrX1Ay4E4jA+JnoM2sFAmbzGPgACgkQE4jA+Jno
M2tOmw//UBasQYrGcw6S4XdO1wqAqu6T2DAORQXSJdlMjsHGT7O+2xcRydEIXJhx
dASmgTt66apsZKOCy/Ew+V8WrdQ6riaZyxF7rMxxPwu7Mg5tms1T+xf9tEqD/zJH
Qnn22/ZVT2U8pRNZ9Dgq/sIYVbIQSZLuQso56+Q3YYGAdnhi4KJlhZHX4NTMCHlu
pcCM411BMHgqvMm05GdE1iZnR9QW50eyM4c73v+lZxhMIubPcksOKMTMKEbJG9rL
6BYpegDSQ22j41+ffTjNu7fkyjdwG0zHQP2i81kWEyjIqBB+gv/CXnRgGSZCWFRO
oaWda0hk/kowcH8E35pDrPusA8jlbMsB3EBBVcOKat2TcWyrCD3A8MtEWeiCFa8r
3zEbvKaGg3RANcuGQk5upulchHssG8wn2jDvEswG2Kq5P7VBN9Lt7uM2iG3FoXGj
DDEj0E8JpLvSodzit4PRueZyGJmINN9sAmYqyBgXBXXHO3DBJakamNwV1s9uho/T
wjBkD9dP64p5rd/30k9eFNXIyTHz61rveKYYuFv8g1DoZOVhwOvmt00P2+lh2gXK
OPv55tdZjEtp4PTuZshZKfiSUXkLLuUSc57bB4wDC2Jr5Hrw/o6Z5TCOSDKQSI3j
iGUIW3CImucJuJOGlzqx55F3xdhNpFr/0/RwVu5UlQ81GyAyPHg=
=l0zl
-----END PGP SIGNATURE-----
pgpfMoek9IoPR.pgp
Description: PGP signature
--- End Message ---