Processed (with 5 errors): limit source to glibc, tagging 785796, tagging 798064, tagging 797831, tagging 797538, tagging 800574 ...
Processing commands for cont...@bugs.debian.org: > limit source glibc Limiting to bugs with field 'source' containing at least one of 'glibc' Limit currently set to 'source':'glibc' > tags 785796 + pending Bug #785796 [src:glibc] glibc: kfreebsd should define F_DUPFD_CLOEXEC Added tag(s) pending. > tags 798064 + pending Bug #798064 [src:glibc] glibc: please find kfreebsd-kernel-headers in multiarch path Bug #672774 [src:glibc] build fix for multiarch-enabled kfreebsd-kernel-headers Added tag(s) pending. Added tag(s) pending. > tags 797831 + pending Bug #797831 [src:glibc] glibc: further problems with stage1 Added tag(s) pending. > tags 797538 + pending source: "eglibc, glibc"' does not match at least one of "glibc" Failed to alter tags of Bug 797538: limit failed for bugs: 797538. > tags 800574 + pending source: "eglibc, glibc"' does not match at least one of "glibc" Failed to alter tags of Bug 800574: limit failed for bugs: 800574. > tags 800846 + pending source: "eglibc, glibc"' does not match at least one of "glibc" Failed to alter tags of Bug 800846: limit failed for bugs: 800846. > tags 788799 + pending source: "eglibc, glibc"' does not match at least one of "glibc" Failed to alter tags of Bug 788799: limit failed for bugs: 788799. > tags 764692 + pending source: "eglibc, glibc"' does not match at least one of "glibc" Failed to alter tags of Bug 764692: limit failed for bugs: 764692. > tags 672774 + pending Bug #672774 [src:glibc] build fix for multiarch-enabled kfreebsd-kernel-headers Bug #798064 [src:glibc] glibc: please find kfreebsd-kernel-headers in multiarch path Ignoring request to alter tags of bug #672774 to the same tags previously set Ignoring request to alter tags of bug #798064 to the same tags previously set > thanks Stopping processing here. Please contact me if you need assistance. -- 672774: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=672774 785796: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=785796 797831: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=797831 798064: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798064 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems
r6647 - in glibc-package/branches/glibc-2.21/debian: . patches patches/any
Author: aurel32 Date: 2015-10-18 20:36:25 + (Sun, 18 Oct 2015) New Revision: 6647 Added: glibc-package/branches/glibc-2.21/debian/patches/any/cvs-ld_pointer_guard.diff Modified: glibc-package/branches/glibc-2.21/debian/changelog glibc-package/branches/glibc-2.21/debian/patches/series Log: patches/any/cvs-ld_pointer_guard.diff: new patch from upstream to unconditionally disable LD_POINTER_GUARD. Closes: #798316, #801691. Modified: glibc-package/branches/glibc-2.21/debian/changelog === --- glibc-package/branches/glibc-2.21/debian/changelog 2015-10-18 20:36:20 UTC (rev 6646) +++ glibc-package/branches/glibc-2.21/debian/changelog 2015-10-18 20:36:25 UTC (rev 6647) @@ -66,6 +66,8 @@ build failure. * debhelper.in/libc.preinst: fix up error message for too old Linux kernels. Closes: #800846. + * patches/any/cvs-ld_pointer_guard.diff: new patch from upstream to +unconditionally disable LD_POINTER_GUARD. Closes: #798316, #801691. [ Steven Chamberlain ] * sysdeps/kfreebsd.mk: find kfreebsd-kernel-headers in multiarch path. Added: glibc-package/branches/glibc-2.21/debian/patches/any/cvs-ld_pointer_guard.diff === --- glibc-package/branches/glibc-2.21/debian/patches/any/cvs-ld_pointer_guard.diff (rev 0) +++ glibc-package/branches/glibc-2.21/debian/patches/any/cvs-ld_pointer_guard.diff 2015-10-18 20:36:25 UTC (rev 6647) @@ -0,0 +1,62 @@ +2015-10-15 Florian Weimer+ + [BZ #18928] + * sysdeps/generic/ldsodefs.h (struct rtld_global_ro): Remove + _dl_pointer_guard member. + * elf/rtld.c (_rtld_global_ro): Remove _dl_pointer_guard + initializer. + (security_init): Always set up pointer guard. + (process_envvars): Do not process LD_POINTER_GUARD. + +--- a/elf/rtld.c b/elf/rtld.c +@@ -162,7 +162,6 @@ struct rtld_global_ro _rtld_global_ro attribute_relro = + ._dl_hwcap_mask = HWCAP_IMPORTANT, + ._dl_lazy = 1, + ._dl_fpu_control = _FPU_DEFAULT, +-._dl_pointer_guard = 1, + ._dl_pagesize = EXEC_PAGESIZE, + ._dl_inhibit_cache = 0, + +@@ -709,15 +708,12 @@ security_init (void) + #endif + + /* Set up the pointer guard as well, if necessary. */ +- if (GLRO(dl_pointer_guard)) +-{ +- uintptr_t pointer_chk_guard = _dl_setup_pointer_guard (_dl_random, +- stack_chk_guard); ++ uintptr_t pointer_chk_guard ++= _dl_setup_pointer_guard (_dl_random, stack_chk_guard); + #ifdef THREAD_SET_POINTER_GUARD +- THREAD_SET_POINTER_GUARD (pointer_chk_guard); ++ THREAD_SET_POINTER_GUARD (pointer_chk_guard); + #endif +- __pointer_chk_guard_local = pointer_chk_guard; +-} ++ __pointer_chk_guard_local = pointer_chk_guard; + + /* We do not need the _dl_random value anymore. The less + information we leave behind, the better, so clear the +@@ -2471,9 +2467,6 @@ process_envvars (enum mode *modep) + GLRO(dl_use_load_bias) = envline[14] == '1' ? -1 : 0; + break; + } +- +-if (memcmp (envline, "POINTER_GUARD", 13) == 0) +- GLRO(dl_pointer_guard) = envline[14] != '0'; + break; + + case 14: +--- a/sysdeps/generic/ldsodefs.h b/sysdeps/generic/ldsodefs.h +@@ -592,9 +592,6 @@ struct rtld_global_ro + /* List of auditing interfaces. */ + struct audit_ifaces *_dl_audit; + unsigned int _dl_naudit; +- +- /* 0 if internal pointer values should not be guarded, 1 if they should. */ +- EXTERN int _dl_pointer_guard; + }; + # define __rtld_global_attribute__ + # if IS_IN (rtld) Modified: glibc-package/branches/glibc-2.21/debian/patches/series === --- glibc-package/branches/glibc-2.21/debian/patches/series 2015-10-18 20:36:20 UTC (rev 6646) +++ glibc-package/branches/glibc-2.21/debian/patches/series 2015-10-18 20:36:25 UTC (rev 6647) @@ -267,3 +267,4 @@ any/cvs-make-typo.diff any/cvs-logbl-accuracy.diff any/local-math-logb.diff +any/cvs-ld_pointer_guard.diff
r6646 - in glibc-package/branches/glibc-branch-jessie/debian: . patches patches/any
Author: aurel32 Date: 2015-10-18 20:36:20 + (Sun, 18 Oct 2015) New Revision: 6646 Added: glibc-package/branches/glibc-branch-jessie/debian/patches/any/cvs-ld_pointer_guard.diff Modified: glibc-package/branches/glibc-branch-jessie/debian/changelog glibc-package/branches/glibc-branch-jessie/debian/patches/series Log: patches/any/cvs-ld_pointer_guard.diff: new patch from upstream to unconditionally disable LD_POINTER_GUARD. Closes: #798316, #801691. Modified: glibc-package/branches/glibc-branch-jessie/debian/changelog === --- glibc-package/branches/glibc-branch-jessie/debian/changelog 2015-10-18 19:56:19 UTC (rev 6645) +++ glibc-package/branches/glibc-branch-jessie/debian/changelog 2015-10-18 20:36:20 UTC (rev 6646) @@ -9,6 +9,8 @@ * Replace patches/amd64/local-blacklist-on-TSX-Haswell.diff by local-blacklist-for-Intel-TSX.diff also blacklisting some Broadwell models. Closes: #800574. + * patches/any/cvs-ld_pointer_guard.diff: new patch from upstream to +unconditionally disable LD_POINTER_GUARD. Closes: #798316, #801691. -- Aurelien JarnoSat, 29 Aug 2015 11:19:53 +0200 Added: glibc-package/branches/glibc-branch-jessie/debian/patches/any/cvs-ld_pointer_guard.diff === --- glibc-package/branches/glibc-branch-jessie/debian/patches/any/cvs-ld_pointer_guard.diff (rev 0) +++ glibc-package/branches/glibc-branch-jessie/debian/patches/any/cvs-ld_pointer_guard.diff 2015-10-18 20:36:20 UTC (rev 6646) @@ -0,0 +1,62 @@ +2015-10-15 Florian Weimer + + [BZ #18928] + * sysdeps/generic/ldsodefs.h (struct rtld_global_ro): Remove + _dl_pointer_guard member. + * elf/rtld.c (_rtld_global_ro): Remove _dl_pointer_guard + initializer. + (security_init): Always set up pointer guard. + (process_envvars): Do not process LD_POINTER_GUARD. + +--- a/elf/rtld.c b/elf/rtld.c +@@ -162,7 +162,6 @@ + ._dl_hwcap_mask = HWCAP_IMPORTANT, + ._dl_lazy = 1, + ._dl_fpu_control = _FPU_DEFAULT, +-._dl_pointer_guard = 1, + ._dl_pagesize = EXEC_PAGESIZE, + ._dl_inhibit_cache = 0, + +@@ -857,15 +856,12 @@ + #endif + + /* Set up the pointer guard as well, if necessary. */ +- if (GLRO(dl_pointer_guard)) +-{ +- uintptr_t pointer_chk_guard = _dl_setup_pointer_guard (_dl_random, +- stack_chk_guard); ++ uintptr_t pointer_chk_guard ++= _dl_setup_pointer_guard (_dl_random, stack_chk_guard); + #ifdef THREAD_SET_POINTER_GUARD +- THREAD_SET_POINTER_GUARD (pointer_chk_guard); ++ THREAD_SET_POINTER_GUARD (pointer_chk_guard); + #endif +- __pointer_chk_guard_local = pointer_chk_guard; +-} ++ __pointer_chk_guard_local = pointer_chk_guard; + + /* We do not need the _dl_random value anymore. The less + information we leave behind, the better, so clear the +@@ -2607,9 +2603,6 @@ + GLRO(dl_use_load_bias) = envline[14] == '1' ? -1 : 0; + break; + } +- +-if (memcmp (envline, "POINTER_GUARD", 13) == 0) +- GLRO(dl_pointer_guard) = envline[14] != '0'; + break; + + case 14: +--- a/sysdeps/generic/ldsodefs.h b/sysdeps/generic/ldsodefs.h +@@ -591,9 +591,6 @@ + /* List of auditing interfaces. */ + struct audit_ifaces *_dl_audit; + unsigned int _dl_naudit; +- +- /* 0 if internal pointer values should not be guarded, 1 if they should. */ +- EXTERN int _dl_pointer_guard; + }; + # define __rtld_global_attribute__ + # ifdef IS_IN_rtld Modified: glibc-package/branches/glibc-branch-jessie/debian/patches/series === --- glibc-package/branches/glibc-branch-jessie/debian/patches/series 2015-10-18 19:56:19 UTC (rev 6645) +++ glibc-package/branches/glibc-branch-jessie/debian/patches/series 2015-10-18 20:36:20 UTC (rev 6646) @@ -272,3 +272,4 @@ any/cvs-vfprintf.diff any/cvs-wscanf.diff any/cvs-ldconfig-aux-cache.diff +any/cvs-ld_pointer_guard.diff
Bug#798955: Moving glibc headers from /usr/include to /usr/include/$(DEB_HOST_MULTIARCH)
On 2015-09-23 21:38, Aurelien Jarno wrote: > On 2015-09-14 15:13, Aurélien Gérôme wrote: > > Source: glibc > > Version: 2.21-0experimental1 > > Severity: wishlist > > Tags: patch moreinfo > > > > Hi, > > > > On a multiarch-enabled Debian system, there is an impossibility to > > install libc0.1-dev, libc0.3-dev, libc6-dev, and libc6.1-dev binary > > packages at the same time, because glibc headers are all installed > > in /usr/include. Therefore, it does not allow us to install (in a > > simple multiarch manner) several dependencies needed to cross-compile > > for another target, e.g. cross-compiling for an amd64 target on a > > hurd-i386 host. > > > > This patch moves those headers from /usr/include to > > /usr/include/$(DEB_HOST_MULTIARCH) and removes conflicts between > > libc0.1-dev, libc0.3-dev, libc6-dev, and libc6.1-dev binary packages. > > That looks fine on the principle, though that unfortunately prevent > sharing files between packages. I guess at some point we'll want to > provide an arch:all libc-dev-common file to put them. That said we > have to do the change anyway, as musl people will request it. > > > So far, Helmut rebuilt ~100 packages fine with that include-moved > > glibc. Right now, we are waiting for a Debian access to Amazon > > instances to rebuild the entire archive against that patched glibc > > and to deal with possible FTBFS. Tracking can be done on [0]. > > Before doing such a change, I clearly want to make sure it won't > introduce (unknown) regressions. Doing an archive rebuild is clearly the > way to go, thanks for doing that. A small update from IRC: 23:52 < helmut> aurel32: quick update on #798955: 1) we know that it breaks any package that uses multilib 2) we know that it breaks gcc's fixincludes 3) we know that it breaks python2.7 23:53 < helmut> aurel32: i.e. sorting it out will take longer -- Aurelien Jarno GPG: 4096R/1DDD8C9B aurel...@aurel32.net http://www.aurel32.net
Bug#800574: Final analysis for Broadwell
On Sun, 18 Oct 2015, Aurelien Jarno wrote: > > Broadwell-H with a very recent microcode update (rev 0x12, from > > 2015-06-04) was confirmed to have broken TSX-NI (RTM) and to _leave it > > enabled_ in CPUID, causing glibc with lock elision enabled to SIGSEGV. > > An even more recent Broadwell-H microcode update, rev 0x13 from > > 2015-08-03, is confirmed to (finally) disable the HLE and RTM CPUID > > bits. This should make blacklisting signature 0x40671 uncontroversial. FWIW, in the last few days it became clear that so far, the mobile Broadwell-H disables Intel TSX, but no instances of the desktop Broadwell-H with RTM disabled were found yet, not even with the latest microcode. And they all use the same microcode. It has also became clear a few days ago that it is very likely that the BIOS can disable Intel TSX-NI (RTM) and HLE, and it doesn't need very recent microcode to do that either. If this is true, it should be something like MSR 0x13c (bit 1 of that MSR disables AES-NI when set, and bit 0 locks that MSR against writting when set). Maybe the Intel TSX-NI (HLE and RTM) disable switches are even on this very same MSR... I've also since became aware of Debian bug #750792, and it describes the same SIGSEGV observed by Broadwell and Skylake Arch-linux users on lock-elision-enabled glibc. From that bug report, it is clear that the SIGSEGVs in __lll_unlock_elision can easily happen due to software bugs, so it need not be linked to any Intel-TSX processor errata. And this kind of defect is quite common, apparently. However, since Intel's current public specification update states (as errata) that Intel TSX-NI is not supposed to be usable in the Broadwell and Broadwell-H cores, that it should not even be reported in CPUID by these processors (but it is :p), and that this is not supposed to be fixable or worked around, I still think we need to blacklist it. I will keep tracking this issue, and report back any relevant information that becomes available. It would be _really_ nice if the Intel team that works with Canonical were to shed a light on this, though. > Thanks for the patch, I have committed it to the jessie and the 2.21 > branches. Thank you. -- "One disk to rule them all, One disk to find them. One disk to bring them all and in the darkness grind them. In the Land of Redmond where the shadows lie." -- The Silicon Valley Tarot Henrique Holschuh
Processed: fixed 779587 in 2.21-0experimental0
Processing commands for cont...@bugs.debian.org: > fixed 779587 2.21-0experimental0 Bug #779587 [glibc] glibc: Three vulnerabilities There is no source info for the package 'glibc' at version '2.21-0experimental0' with architecture '' Unable to make a source version for version '2.21-0experimental0' Marked as fixed in versions 2.21-0experimental0. > thanks Stopping processing here. Please contact me if you need assistance. -- 779587: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=779587 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems
Bug#800574: Final analysis for Broadwell
On 2015-10-08 22:20, Henrique de Moraes Holschuh wrote: > tag 800574 + patch > thanks > > Attached updated version of amd64/local-blacklist-on-TSX-Haswell.diff. > I believe it should be renamed to > "amd64/local-blacklist-for-Intel-TSX.diff" as it is not just about Intel > Haswell anymore. > > The updated patch has been package-compile-tested on glibc 2.19-22. > > This new version of the blacklist patch had the patch header text and > blacklist code comments updated. It doesn't change anything for > Haswell. It adds to the blacklist the current Broadwell CPU models and > steppings. > > Broadwell-H with a very recent microcode update (rev 0x12, from > 2015-06-04) was confirmed to have broken TSX-NI (RTM) and to _leave it > enabled_ in CPUID, causing glibc with lock elision enabled to SIGSEGV. > An even more recent Broadwell-H microcode update, rev 0x13 from > 2015-08-03, is confirmed to (finally) disable the HLE and RTM CPUID > bits. This should make blacklisting signature 0x40671 uncontroversial. > > Refer to https://bugzilla.kernel.org/show_bug.cgi?id=103351 for details. > > This version of the blacklist patch leaves upcoming Broadwell-E > unblacklisted. It also leaves Skylake unblacklisted, as I have not been > able to confirm whether the newest Skylake-S microcode updates have > working Intel TSX-NI, or have it disabled. > > I propose that the updated blacklist patch be added to glibc in > unstable, and after it spends a few weeks in testing, that it should > also be the added to stable through a stable update. Thanks for the patch, I have committed it to the jessie and the 2.21 branches. -- Aurelien Jarno GPG: 4096R/1DDD8C9B aurel...@aurel32.net http://www.aurel32.net
r6645 - in glibc-package/branches/glibc-2.21/debian: . patches patches/amd64
Author: aurel32 Date: 2015-10-18 19:56:19 + (Sun, 18 Oct 2015) New Revision: 6645 Added: glibc-package/branches/glibc-2.21/debian/patches/amd64/local-blacklist-for-Intel-TSX.diff Removed: glibc-package/branches/glibc-2.21/debian/patches/amd64/local-blacklist-on-TSX-Haswell.diff Modified: glibc-package/branches/glibc-2.21/debian/changelog glibc-package/branches/glibc-2.21/debian/patches/series Log: Replace patches/amd64/local-blacklist-on-TSX-Haswell.diff by local-blacklist-for-Intel-TSX.diff also blacklisting some Broadwell models. Closes: #800574. Modified: glibc-package/branches/glibc-2.21/debian/changelog === --- glibc-package/branches/glibc-2.21/debian/changelog 2015-10-18 17:42:25 UTC (rev 6644) +++ glibc-package/branches/glibc-2.21/debian/changelog 2015-10-18 19:56:19 UTC (rev 6645) @@ -79,6 +79,11 @@ support for futex_atomic_cmpxchg_inatomic to restore the previous state and fix the pulsesink (and others) regression on ARM (closes: #788799) + [ Henrique de Moraes Holschuh ] + * Replace patches/amd64/local-blacklist-on-TSX-Haswell.diff by +local-blacklist-for-Intel-TSX.diff also blacklisting some Broadwell +models. Closes: #800574. + -- Aurelien JarnoSat, 29 Aug 2015 00:43:44 +0200 glibc (2.21-0experimental1) experimental; urgency=medium Added: glibc-package/branches/glibc-2.21/debian/patches/amd64/local-blacklist-for-Intel-TSX.diff === --- glibc-package/branches/glibc-2.21/debian/patches/amd64/local-blacklist-for-Intel-TSX.diff (rev 0) +++ glibc-package/branches/glibc-2.21/debian/patches/amd64/local-blacklist-for-Intel-TSX.diff 2015-10-18 19:56:19 UTC (rev 6645) @@ -0,0 +1,99 @@ +Intel TSX is broken on Haswell based processors (erratum HSD136/HSW136) +and a microcode update is available to simply disable the corresponding +instructions. + +A live microcode update will disable the TSX instructions causing +already started binaries to segfault. This patch simply disable Intel +TSX (HLE and RTM) on processors which might receive a microcode update, +so that it doesn't happen. We might expect newer steppings to fix the +issue (e.g. as Haswell-EX did). + +Intel TSX-NI is also broken on Broadwell systems, and documented as +being unavailable in their specification updates errata list. However, +some end-user systems were shipped with old microcode that left Intel +TSX-NI still enabled in CPUID on these processors. We must not allow +RTM to be used by glibc on these systems, due to runtime system +misbehavior and live-update of microcode hazards. + +Author: Henrique de Moraes Holschuh + +--- a/sysdeps/x86_64/multiarch/init-arch.c b/sysdeps/x86_64/multiarch/init-arch.c +@@ -26,7 +26,7 @@ + + + static void +-get_common_indeces (unsigned int *family, unsigned int *model) ++get_common_indeces (unsigned int *family, unsigned int *model, unsigned int *stepping) + { + __cpuid (1, __cpu_features.cpuid[COMMON_CPUID_INDEX_1].eax, + __cpu_features.cpuid[COMMON_CPUID_INDEX_1].ebx, +@@ -36,6 +36,7 @@ + unsigned int eax = __cpu_features.cpuid[COMMON_CPUID_INDEX_1].eax; + *family = (eax >> 8) & 0x0f; + *model = (eax >> 4) & 0x0f; ++ *stepping = eax & 0x0f; + } + + +@@ -47,6 +48,7 @@ + unsigned int edx; + unsigned int family = 0; + unsigned int model = 0; ++ unsigned int stepping = 0; + enum cpu_features_kind kind; + + __cpuid (0, __cpu_features.max_cpuid, ebx, ecx, edx); +@@ -56,7 +58,7 @@ + { + kind = arch_kind_intel; + +- get_common_indeces (, ); ++ get_common_indeces (, , ); + + unsigned int eax = __cpu_features.cpuid[COMMON_CPUID_INDEX_1].eax; + unsigned int extended_family = (eax >> 20) & 0xff; +@@ -135,7 +137,7 @@ + { + kind = arch_kind_amd; + +- get_common_indeces (, ); ++ get_common_indeces (, , ); + + ecx = __cpu_features.cpuid[COMMON_CPUID_INDEX_1].ecx; + +@@ -188,6 +190,24 @@ + } + } + ++ /* Disable Intel TSX (HLE and RTM) due to erratum HSD136/HSW136 ++ on all Haswell processors, except Haswell-EX/Xeon E7-v3 (306F4), ++ to work around outdated microcode that doesn't disable the ++ broken feature by default. ++ ++ Disable TSX on Broadwell, due to errata BDM53/BDW51/BDD51/ ++ BDE42. The errata documentation states that RTM is unusable, ++ and that it should not be advertised by CPUID at all on any ++ such processors. Unfortunately, it _is_ advertised in some ++ (older) microcode versions. Exceptions: Broadwell-E (406Fx), ++ likely already fixed at launch */ ++ if (kind == arch_kind_intel && family == 6 && ++ ((model == 63 && stepping <= 2) || (model == 60 && stepping <= 3) || ++ (model == 69 && stepping <= 1) || (model == 70 && stepping <= 1) || ++ (model == 61 && stepping <= 4) ||
Processed: reassign 801691 to libc
Processing commands for cont...@bugs.debian.org: > reassign 801691 libc Bug #801691 [glibc] glibc: pointer guarding weakness Bug reassigned from package 'glibc' to 'libc'. Warning: Unknown package 'libc' Warning: Unknown package 'libc' Ignoring request to alter found versions of bug #801691 to the same values previously set Warning: Unknown package 'libc' Warning: Unknown package 'libc' Ignoring request to alter fixed versions of bug #801691 to the same values previously set Warning: Unknown package 'libc' > thanks Stopping processing here. Please contact me if you need assistance. -- 801691: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=801691 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems
Processed: fixed 799966 in 2.21-0experimental0
Processing commands for cont...@bugs.debian.org: > fixed 799966 2.21-0experimental0 Bug #799966 [src:glibc] glibc: CVE-2015-5277: data corruption while reading the NSS files database Marked as fixed in versions glibc/2.21-0experimental0. > thanks Stopping processing here. Please contact me if you need assistance. -- 799966: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=799966 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems
Bug#800574: Final analysis for Broadwell
On 2015-10-07 07:32, Henrique de Moraes Holschuh wrote: > Meanwhile, a suggestion by Samuel Thibault to try to use hwcap did > provide for a possible long-term plan to fine-tune the lock-elision > blacklist (and anything else of that sort). > > We would have to (finally) extend x86-64 hwcap to cpuid(1) fully, and > also at least cpuid(7), which is anything but trivial and a lot of work. > This is _not_ worth the trouble if it is done just for lock elision > blacklisting purposes. > > However, it would be useful for link-time optimization in libraries > (e.g. avx2 flavours of something that really benefits from it, etc), so > it is likely worth pursuing... but only if we get buy-in from upstream. Why do you believe that hwcap is better for handling that than the current STT_GNU_IFUNC mechanism? For me hwcap is clearly superseded by the STT_GNU_IFUNC: 1) With the hwcap mechanism the libraries need to be recompiled multiple times, increasing build time, but also the disk space on the users computer. 2) It makes the upgrades more complex (see the nohwcap part of the libc preinst/postinst). 3) We need to ensure the ABI is the same for all versions of the same library (this is not the case for upstream glibc between i586 and i686). 4) The fact that the CPU supports a feature doesn't mean it supports it with good performances. For instance Intel Silvermont supports SSE4.2, but SSE2/SSSE3 based version of string functions are much faster there. 5) Finally it means that we need to provide a version of the libc for all combinations. Think on i386, we would need to provide: - libc6 - libc6-i686 - libc6-i686-tsx - libc6-xen - libc6-xen-tsx -- Aurelien Jarno GPG: 4096R/1DDD8C9B aurel...@aurel32.net http://www.aurel32.net
Processed: reassign 801691 to libc6
Processing commands for cont...@bugs.debian.org: > reassign 801691 libc6 Bug #801691 [libc] glibc: pointer guarding weakness Warning: Unknown package 'libc' Bug reassigned from package 'libc' to 'libc6'. Ignoring request to alter found versions of bug #801691 to the same values previously set Ignoring request to alter fixed versions of bug #801691 to the same values previously set > thanks Stopping processing here. Please contact me if you need assistance. -- 801691: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=801691 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems
Processed: merging 798316 801691
Processing commands for cont...@bugs.debian.org: > merge 798316 801691 Bug #798316 [libc6] libc6: Pointer guarding bypass in dynamic Setuid binaries Bug #801691 [libc6] glibc: pointer guarding weakness Merged 798316 801691 > thanks Stopping processing here. Please contact me if you need assistance. -- 798316: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798316 801691: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=801691 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems
r6649 - in glibc-package/branches/glibc-2.21/debian: . patches patches/any
Author: aurel32 Date: 2015-10-18 22:16:32 + (Sun, 18 Oct 2015) New Revision: 6649 Added: glibc-package/branches/glibc-2.21/debian/patches/any/cvs-mangle-tls_dtor_list.diff Modified: glibc-package/branches/glibc-2.21/debian/changelog glibc-package/branches/glibc-2.21/debian/patches/series Log: patches/any/cvs-mangle-tls_dtor_list.diff: new patch from upstream to mangle function pointers in tls_dtor_list. Closes: #802256. Modified: glibc-package/branches/glibc-2.21/debian/changelog === --- glibc-package/branches/glibc-2.21/debian/changelog 2015-10-18 21:08:35 UTC (rev 6648) +++ glibc-package/branches/glibc-2.21/debian/changelog 2015-10-18 22:16:32 UTC (rev 6649) @@ -68,6 +68,8 @@ kernels. Closes: #800846. * patches/any/cvs-ld_pointer_guard.diff: new patch from upstream to unconditionally disable LD_POINTER_GUARD. Closes: #798316, #801691. + * patches/any/cvs-mangle-tls_dtor_list.diff: new patch from upstream to +mangle function pointers in tls_dtor_list. Closes: #802256. [ Steven Chamberlain ] * sysdeps/kfreebsd.mk: find kfreebsd-kernel-headers in multiarch path. Added: glibc-package/branches/glibc-2.21/debian/patches/any/cvs-mangle-tls_dtor_list.diff === --- glibc-package/branches/glibc-2.21/debian/patches/any/cvs-mangle-tls_dtor_list.diff (rev 0) +++ glibc-package/branches/glibc-2.21/debian/patches/any/cvs-mangle-tls_dtor_list.diff 2015-10-18 22:16:32 UTC (rev 6649) @@ -0,0 +1,35 @@ +2015-10-06 Florian Weimer+ + [BZ #19018] + * stdlib/cxa_thread_atexit_impl.c (__cxa_thread_atexit_impl): + Mangle function pointer before storing it. + (__call_tls_dtors): Demangle function pointer before calling it. + +--- a/stdlib/cxa_thread_atexit_impl.c b/stdlib/cxa_thread_atexit_impl.c +@@ -42,6 +42,10 @@ + int + __cxa_thread_atexit_impl (dtor_func func, void *obj, void *dso_symbol) + { ++#ifdef PTR_MANGLE ++ PTR_MANGLE (func); ++#endif ++ + /* Prepend. */ + struct dtor_list *new = calloc (1, sizeof (struct dtor_list)); + new->func = func; +@@ -83,9 +87,13 @@ + while (tls_dtor_list) + { + struct dtor_list *cur = tls_dtor_list; ++ dtor_func func = cur->func; ++#ifdef PTR_DEMANGLE ++ PTR_DEMANGLE (func); ++#endif + tls_dtor_list = tls_dtor_list->next; + +- cur->func (cur->obj); ++ func (cur->obj); + + __rtld_lock_lock_recursive (GL(dl_load_lock)); + Modified: glibc-package/branches/glibc-2.21/debian/patches/series === --- glibc-package/branches/glibc-2.21/debian/patches/series 2015-10-18 21:08:35 UTC (rev 6648) +++ glibc-package/branches/glibc-2.21/debian/patches/series 2015-10-18 22:16:32 UTC (rev 6649) @@ -268,3 +268,4 @@ any/cvs-logbl-accuracy.diff any/local-math-logb.diff any/cvs-ld_pointer_guard.diff +any/cvs-mangle-tls_dtor_list.diff
Bug#802256: Backport tls_dtor_list hardening
Package: libc6 Version: 2.19-18+deb8u1 Please backport this upstream hardening patch to jessie (wheezy does not have this feature yet): https://sourceware.org/bugzilla/show_bug.cgi?id=19018 https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=f586e1328681b400078c995a0bb6ad301ef73549 Also recommended for testing purposes: https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=99e1dc0a688d6c25d3f422bc9f3fa29adb483339 Thanks, Florian
r6648 - in glibc-package/branches/glibc-branch-jessie/debian: . patches
Author: aurel32 Date: 2015-10-18 21:08:35 + (Sun, 18 Oct 2015) New Revision: 6648 Modified: glibc-package/branches/glibc-branch-jessie/debian/changelog glibc-package/branches/glibc-branch-jessie/debian/patches/git-updates.diff Log: Fix data corruption while reading the NSS files database (CVE-2015-5277). Closes: #799966. Modified: glibc-package/branches/glibc-branch-jessie/debian/changelog === --- glibc-package/branches/glibc-branch-jessie/debian/changelog 2015-10-18 20:36:25 UTC (rev 6647) +++ glibc-package/branches/glibc-branch-jessie/debian/changelog 2015-10-18 21:08:35 UTC (rev 6648) @@ -4,6 +4,8 @@ * Update from upstream stable branch: - Fix getaddrinfo sometimes returning uninitialized data with nscd. Closes: #798515. +- Fix data corruption while reading the NSS files database + (CVE-2015-5277). Closes: #799966. [ Henrique de Moraes Holschuh ] * Replace patches/amd64/local-blacklist-on-TSX-Haswell.diff by Modified: glibc-package/branches/glibc-branch-jessie/debian/patches/git-updates.diff === --- glibc-package/branches/glibc-branch-jessie/debian/patches/git-updates.diff 2015-10-18 20:36:25 UTC (rev 6647) +++ glibc-package/branches/glibc-branch-jessie/debian/patches/git-updates.diff 2015-10-18 21:08:35 UTC (rev 6648) @@ -1,10 +1,16 @@ GIT update of git://sourceware.org/git/glibc.git/release/2.19/master from glibc-2.19 diff --git a/ChangeLog b/ChangeLog -index 81c393a..6aff2a2 100644 +index 81c393a..815acf0 100644 --- a/ChangeLog +++ b/ChangeLog -@@ -1,3 +1,358 @@ +@@ -1,3 +1,364 @@ ++2014-06-23 Andreas Schwab++ ++ [BZ #17079] ++ * nss/nss_files/files-XXX.c (get_contents): Store overflow marker ++ before reading the next line. ++ +2015-10-02 Andreas Schwab + + * sysdeps/posix/getaddrinfo.c (gaih_inet): Advance address pointer @@ -364,7 +370,7 @@ [BZ #16529] diff --git a/NEWS b/NEWS -index 98b479e..fb0fa3c 100644 +index 98b479e..ed33f47 100644 --- a/NEWS +++ b/NEWS @@ -5,6 +5,59 @@ See the end for copying conditions. @@ -376,8 +382,8 @@ +* The following bugs are resolved with this release: + + 15946, 16545, 16574, 16623, 16657, 16695, 16743, 16878, 16882, 16885, -+ 16916, 16932, 16943, 16958, 17048, 17069, 17137, 17153, 17213, 17263, -+ 17325, 17555, 18287. ++ 16916, 16932, 16943, 16958, 17048, 17069, 17079, 17137, 17153, 17213, ++ 17263, 17325, 17555, 18287. + +* A buffer overflow in gethostbyname_r and related functions performing DNS + requests has been fixed. If the NSS functions were called with a @@ -1735,6 +1741,24 @@ } enum nss_status (*endfct) (struct __netgrent *); +diff --git a/nss/nss_files/files-XXX.c b/nss/nss_files/files-XXX.c +index 36242f9..d4cd95e 100644 +--- a/nss/nss_files/files-XXX.c b/nss/nss_files/files-XXX.c +@@ -198,10 +198,12 @@ get_contents (char *linebuf, size_t len, FILE *stream) + { + int curlen = ((remaining_len > (size_t) INT_MAX) ? INT_MAX + : remaining_len); +- char *p = fgets_unlocked (curbuf, curlen, stream); + ++ /* Terminate the line so that we can test for overflow. */ + ((unsigned char *) curbuf)[curlen - 1] = 0xff; + ++ char *p = fgets_unlocked (curbuf, curlen, stream); ++ + /* EOF or read error. */ + if (p == NULL) + return gcr_error; diff --git a/nss/nss_files/files-netgrp.c b/nss/nss_files/files-netgrp.c index 34eae4c..bc0b367 100644 --- a/nss/nss_files/files-netgrp.c
Bug#800574: Final analysis for Broadwell
On Sun, 18 Oct 2015, Aurelien Jarno wrote: > On 2015-10-07 07:32, Henrique de Moraes Holschuh wrote: > > Meanwhile, a suggestion by Samuel Thibault to try to use hwcap did > > provide for a possible long-term plan to fine-tune the lock-elision > > blacklist (and anything else of that sort). > > > > We would have to (finally) extend x86-64 hwcap to cpuid(1) fully, and > > also at least cpuid(7), which is anything but trivial and a lot of work. > > This is _not_ worth the trouble if it is done just for lock elision > > blacklisting purposes. > > > > However, it would be useful for link-time optimization in libraries > > (e.g. avx2 flavours of something that really benefits from it, etc), so > > it is likely worth pursuing... but only if we get buy-in from upstream. > > Why do you believe that hwcap is better for handling that than the > current STT_GNU_IFUNC mechanism? I was not aware of STT_GNU_IFUNC. I will look into it. > 5) Finally it means that we need to provide a version of the libc for > all combinations. Think on i386, we would need to provide: > - libc6 > - libc6-i686 > - libc6-i686-tsx > - libc6-xen > - libc6-xen-tsx No. We need nothing of the sort for Intel TSX. TSX-NI is something already detected at runtime by glibc using the cpuid instruction, there is no need to use the dynamic loader's hwcap object selection for this. What I proposed was to extend the kernel-supplied hwcap area for x86-64 (and x32, I suppose) to export the full flags information returned by CPUID.EAX=1, and also by CPUID.EAX=7 to all processes... and use _that_ instead of a direct call to the cpuid instruction to detect Intel TSX (and anything else based on cpuid(1) and cpuid(7) in glibc). We could do it for 32-bit too, I suppose. But if hardware-assisted lock elision is important enough to justify that kind of work for i686, that just means we should deploy x32 instead, as far as I'm concerned. Then, change glibc to use this extended hwcap information to detect such runtime-selected features instead of calling the cpuid instruction directly on the processor. On an older kernel without the extended hwcap fields, either call cpuid directly, or disable them. However, for stuff like AVX512, you might want to have the *entire* library compiled with a much more advanced instruction set (based on the fact that AVX512 being available also implies that very fast SSE4.2 is available, for example). It would be possible to use the dynamic linker's hwcap support to do that, if one wanted to. -- "One disk to rule them all, One disk to find them. One disk to bring them all and in the darkness grind them. In the Land of Redmond where the shadows lie." -- The Silicon Valley Tarot Henrique Holschuh
r6654 - glibc-package/branches/glibc-2.21/debian
Author: aurel32 Date: 2015-10-19 05:05:33 + (Mon, 19 Oct 2015) New Revision: 6654 Modified: glibc-package/branches/glibc-2.21/debian/changelog Log: New changelog entry Modified: glibc-package/branches/glibc-2.21/debian/changelog === --- glibc-package/branches/glibc-2.21/debian/changelog 2015-10-19 05:04:32 UTC (rev 6653) +++ glibc-package/branches/glibc-2.21/debian/changelog 2015-10-19 05:05:33 UTC (rev 6654) @@ -1,3 +1,9 @@ +glibc (2.21-0experimental3) UNRELEASED; urgency=medium + + * + + -- Aurelien JarnoMon, 19 Oct 2015 07:05:23 +0200 + glibc (2.21-0experimental2) experimental; urgency=medium [ Samuel Thibault ]
glibc_2.21-0experimental2_source.changes ACCEPTED into experimental
Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Mon, 19 Oct 2015 00:20:34 +0200 Source: glibc Binary: libc-bin libc-dev-bin libc-l10n glibc-doc glibc-source locales locales-all nscd multiarch-support libc6 libc6-dev libc6-dbg libc6-pic libc6-udeb libc6.1 libc6.1-dev libc6.1-dbg libc6.1-pic libc6.1-udeb libc0.3 libc0.3-dev libc0.3-dbg libc0.3-pic libc0.3-udeb libc0.1 libc0.1-dev libc0.1-dbg libc0.1-pic libc0.1-udeb libc6-i386 libc6-dev-i386 libc6-sparc libc6-dev-sparc libc6-sparc64 libc6-dev-sparc64 libc6-s390 libc6-dev-s390 libc6-amd64 libc6-dev-amd64 libc6-powerpc libc6-dev-powerpc libc6-ppc64 libc6-dev-ppc64 libc6-mips32 libc6-dev-mips32 libc6-mipsn32 libc6-dev-mipsn32 libc6-mips64 libc6-dev-mips64 libc0.1-i386 libc0.1-dev-i386 libc6-x32 libc6-dev-x32 libc6-i686 libc6-xen libc0.1-i686 libc0.3-i686 libc0.3-xen libc6.1-alphaev67 libnss-dns-udeb libnss-files-udeb Architecture: source Version: 2.21-0experimental2 Distribution: experimental Urgency: medium Maintainer: GNU Libc MaintainersChanged-By: Aurelien Jarno Description: glibc-doc - GNU C Library: Documentation glibc-source - GNU C Library: sources libc-bin - GNU C Library: Binaries libc-dev-bin - GNU C Library: Development binaries libc-l10n - GNU C Library: localization files libc0.1- GNU C Library: Shared libraries libc0.1-dbg - GNU C Library: detached debugging symbols libc0.1-dev - GNU C Library: Development Libraries and Header Files libc0.1-dev-i386 - GNU C Library: 32bit development libraries for AMD64 libc0.1-i386 - GNU C Library: 32bit shared libraries for AMD64 libc0.1-i686 - GNU C Library: Shared libraries [i686 optimized] libc0.1-pic - GNU C Library: PIC archive library libc0.1-udeb - GNU C Library: Shared libraries - udeb (udeb) libc0.3- GNU C Library: Shared libraries libc0.3-dbg - GNU C Library: detached debugging symbols libc0.3-dev - GNU C Library: Development Libraries and Header Files libc0.3-i686 - GNU C Library: Shared libraries [i686 optimized] libc0.3-pic - GNU C Library: PIC archive library libc0.3-udeb - GNU C Library: Shared libraries - udeb (udeb) libc0.3-xen - GNU C Library: Shared libraries [Xen version] libc6 - GNU C Library: Shared libraries libc6-amd64 - GNU C Library: 64bit Shared libraries for AMD64 libc6-dbg - GNU C Library: detached debugging symbols libc6-dev - GNU C Library: Development Libraries and Header Files libc6-dev-amd64 - GNU C Library: 64bit Development Libraries for AMD64 libc6-dev-i386 - GNU C Library: 32-bit development libraries for AMD64 libc6-dev-mips32 - GNU C Library: o32 Development Libraries for MIPS libc6-dev-mips64 - GNU C Library: 64bit Development Libraries for MIPS64 libc6-dev-mipsn32 - GNU C Library: n32 Development Libraries for MIPS64 libc6-dev-powerpc - GNU C Library: 32bit powerpc development libraries for ppc64 libc6-dev-ppc64 - GNU C Library: 64bit Development Libraries for PowerPC64 libc6-dev-s390 - GNU C Library: 32bit Development Libraries for IBM zSeries libc6-dev-sparc - GNU C Library: 32bit Development Libraries for SPARC libc6-dev-sparc64 - GNU C Library: 64bit Development Libraries for UltraSPARC libc6-dev-x32 - GNU C Library: X32 ABI Development Libraries for AMD64 libc6-i386 - GNU C Library: 32-bit shared libraries for AMD64 libc6-i686 - GNU C Library: Shared libraries [i686 optimized] libc6-mips32 - GNU C Library: o32 Shared libraries for MIPS libc6-mips64 - GNU C Library: 64bit Shared libraries for MIPS64 libc6-mipsn32 - GNU C Library: n32 Shared libraries for MIPS64 libc6-pic - GNU C Library: PIC archive library libc6-powerpc - GNU C Library: 32bit powerpc shared libraries for ppc64 libc6-ppc64 - GNU C Library: 64bit Shared libraries for PowerPC64 libc6-s390 - GNU C Library: 32bit Shared libraries for IBM zSeries libc6-sparc - GNU C Library: 32bit Shared libraries for SPARC libc6-sparc64 - GNU C Library: 64bit Shared libraries for UltraSPARC libc6-udeb - GNU C Library: Shared libraries - udeb (udeb) libc6-x32 - GNU C Library: X32 ABI Shared libraries for AMD64 libc6-xen - GNU C Library: Shared libraries [Xen version] libc6.1- GNU C Library: Shared libraries libc6.1-alphaev67 - GNU C Library: Shared libraries (EV67 optimized) libc6.1-dbg - GNU C Library: detached debugging symbols libc6.1-dev - GNU C Library: Development Libraries and Header Files libc6.1-pic - GNU C Library: PIC archive library libc6.1-udeb - GNU C Library: Shared libraries - udeb (udeb) libnss-dns-udeb - GNU C Library: NSS helper for DNS - udeb (udeb) libnss-files-udeb - GNU C Library: NSS helper for files - udeb (udeb) locales- GNU C Library: National Language (locale) data [support] locales-all - GNU C Library: Precompiled locale data multiarch-support - Transitional package to ensure multiarch compatibility nscd - GNU C Library: Name Service Cache Daemon Closes: 672774 764692 785796 788799 797538 797831 798064
r6653 - glibc-package/tags/glibc-2.21
Author: aurel32 Date: 2015-10-19 05:04:32 + (Mon, 19 Oct 2015) New Revision: 6653 Added: glibc-package/tags/glibc-2.21/2.21-0experimental2/ Log: tagging package glibc version 2.21-0experimental2
r6651 - glibc-package/branches/glibc-2.21/debian
Author: aurel32 Date: 2015-10-19 05:04:23 + (Mon, 19 Oct 2015) New Revision: 6651 Modified: glibc-package/branches/glibc-2.21/debian/changelog Log: releasing package glibc version 2.21-0experimental2 Modified: glibc-package/branches/glibc-2.21/debian/changelog === --- glibc-package/branches/glibc-2.21/debian/changelog 2015-10-18 22:18:25 UTC (rev 6650) +++ glibc-package/branches/glibc-2.21/debian/changelog 2015-10-19 05:04:23 UTC (rev 6651) @@ -1,4 +1,4 @@ -glibc (2.21-0experimental2) UNRELEASED; urgency=medium +glibc (2.21-0experimental2) experimental; urgency=medium [ Samuel Thibault ] * Symbol versions which contain _DEBIAN_ are unexpected by upstream scripts. @@ -90,7 +90,7 @@ local-blacklist-for-Intel-TSX.diff also blacklisting some Broadwell models. Closes: #800574. - -- Aurelien JarnoSat, 29 Aug 2015 00:43:44 +0200 + -- Aurelien Jarno Mon, 19 Oct 2015 00:20:34 +0200 glibc (2.21-0experimental1) experimental; urgency=medium
r6652 - glibc-package/tags
Author: aurel32 Date: 2015-10-19 05:04:29 + (Mon, 19 Oct 2015) New Revision: 6652 Added: glibc-package/tags/glibc-2.21/ Log: create tag directory
Bug#764692: marked as done (glibc: removed __FAVOR_BSD from features.h)
Your message dated Mon, 19 Oct 2015 05:19:14 + with message-idand subject line Bug#764692: fixed in glibc 2.21-0experimental2 has caused the Debian Bug report #764692, regarding glibc: removed __FAVOR_BSD from features.h to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 764692: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=764692 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems --- Begin Message --- Package: src:usbmuxd Version: 1.0.8+git20140527.e72f2f7-1 Severity: serious Justification: FTBFS (but built successfully in the past) Hi, usbmuxd fails to build on kfreebsd-amd64 and kfreebsd-i386 with the message: make[3]: Entering directory '/«BUILDDIR»/usbmuxd-1.0.8+git20140527.e72f2f7/src' CC usbmuxd-client.o CC usbmuxd-device.o device.c: In function 'send_anon_rst': device.c:264:4: error: 'struct tcphdr' has no member named 'th_sport' th.th_sport = htons(sport); ^ device.c:265:4: error: 'struct tcphdr' has no member named 'th_dport' th.th_dport = htons(dport); ^ device.c:266:4: error: 'struct tcphdr' has no member named 'th_ack' th.th_ack = htonl(ack); ^ device.c:267:4: error: 'struct tcphdr' has no member named 'th_flags' th.th_flags = TH_RST; ^ (and so on, until make abandons ship.) -- Jonathan Wiltshire j...@debian.org Debian Developer http://people.debian.org/~jmw 4096R: 0xD3524C51 / 0A55 B7C5 1223 3942 86EC 74C3 5394 479D D352 4C51 i have six years of solaris sysadmin experience, from 8->10. i am well qualified to say it is made from bonghits layered on top of bonghits --- End Message --- --- Begin Message --- Source: glibc Source-Version: 2.21-0experimental2 We believe that the bug you reported is fixed in the latest version of glibc, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 764...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Aurelien Jarno (supplier of updated glibc package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@ftp-master.debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Mon, 19 Oct 2015 00:20:34 +0200 Source: glibc Binary: libc-bin libc-dev-bin libc-l10n glibc-doc glibc-source locales locales-all nscd multiarch-support libc6 libc6-dev libc6-dbg libc6-pic libc6-udeb libc6.1 libc6.1-dev libc6.1-dbg libc6.1-pic libc6.1-udeb libc0.3 libc0.3-dev libc0.3-dbg libc0.3-pic libc0.3-udeb libc0.1 libc0.1-dev libc0.1-dbg libc0.1-pic libc0.1-udeb libc6-i386 libc6-dev-i386 libc6-sparc libc6-dev-sparc libc6-sparc64 libc6-dev-sparc64 libc6-s390 libc6-dev-s390 libc6-amd64 libc6-dev-amd64 libc6-powerpc libc6-dev-powerpc libc6-ppc64 libc6-dev-ppc64 libc6-mips32 libc6-dev-mips32 libc6-mipsn32 libc6-dev-mipsn32 libc6-mips64 libc6-dev-mips64 libc0.1-i386 libc0.1-dev-i386 libc6-x32 libc6-dev-x32 libc6-i686 libc6-xen libc0.1-i686 libc0.3-i686 libc0.3-xen libc6.1-alphaev67 libnss-dns-udeb libnss-files-udeb Architecture: source Version: 2.21-0experimental2 Distribution: experimental Urgency: medium Maintainer: GNU Libc Maintainers Changed-By: Aurelien Jarno Description: glibc-doc - GNU C Library: Documentation glibc-source - GNU C Library: sources libc-bin - GNU C Library: Binaries libc-dev-bin - GNU C Library: Development binaries libc-l10n - GNU C Library: localization files libc0.1- GNU C Library: Shared libraries libc0.1-dbg - GNU C Library: detached debugging symbols libc0.1-dev - GNU C Library: Development Libraries and Header Files libc0.1-dev-i386 - GNU C Library: 32bit development libraries for AMD64 libc0.1-i386 - GNU C Library: 32bit shared libraries for AMD64 libc0.1-i686 - GNU C Library: Shared libraries [i686 optimized] libc0.1-pic - GNU C Library: PIC archive library libc0.1-udeb - GNU C Library: Shared libraries - udeb (udeb) libc0.3- GNU C Library: Shared libraries libc0.3-dbg - GNU C Library: detached debugging symbols libc0.3-dev - GNU C Library: Development Libraries and Header Files libc0.3-i686 - GNU C Library: Shared libraries [i686 optimized] libc0.3-pic
Bug#798064: marked as done (glibc: please find kfreebsd-kernel-headers in multiarch path)
Your message dated Mon, 19 Oct 2015 05:19:14 + with message-idand subject line Bug#672774: fixed in glibc 2.21-0experimental2 has caused the Debian Bug report #672774, regarding glibc: please find kfreebsd-kernel-headers in multiarch path to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 672774: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=672774 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems --- Begin Message --- Package: glibc Version: 2.19-19 Severity: wishlist Tags: patch Hi, We're hoping to move kfreebsd-kernel-headers' files to multiarch path /usr/include/$(DEB_TARGET_MULTIARCH), so that headers of other kernels are co-installable on a build machine (for cross-building and bootstrapping). gcc-5 is already fine with this. And since gcc's default include search path has /usr/include/$(DEB_TARGET_MULTIARCH), it is expected to not cause many problems; except where -nostdinc is used. Please could glibc be patched as attached, to always look in that directory for system includes, even for native builds (HOST==BUILD). We hope to make this change with kfreebsd-kernel-headers (>= 10.1~7~), unless there are objections, or if my upcoming mass rebuild reveal any other breakage in reverse-depends. Thanks! -- System Information: Debian Release: stretch/sid APT prefers unstable APT policy: (500, 'unstable'), (1, 'experimental') Architecture: kfreebsd-amd64 (x86_64) Kernel: kFreeBSD 9.0-2-amd64-xenhvm-ipsec Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash --- glibc-2.19/debian/sysdeps/kfreebsd.mk.orig 2015-07-09 12:28:06.0 + +++ glibc-2.19/debian/sysdeps/kfreebsd.mk 2015-09-04 16:04:43.104028000 + @@ -11,11 +11,7 @@ libc_extra_config_options = $(extra_config_options) ifndef KFREEBSD_SOURCE - ifeq ($(DEB_HOST_GNU_TYPE),$(DEB_BUILD_GNU_TYPE)) -KFREEBSD_HEADERS := /usr/include - else -KFREEBSD_HEADERS := /usr/$(DEB_HOST_GNU_TYPE)/include - endif + KFREEBSD_HEADERS := /usr/include/$(DEB_TARGET_MULTIARCH) else KFREEBSD_HEADERS := $(KFREEBSD_SOURCE)/sys endif --- End Message --- --- Begin Message --- Source: glibc Source-Version: 2.21-0experimental2 We believe that the bug you reported is fixed in the latest version of glibc, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 672...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Aurelien Jarno (supplier of updated glibc package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@ftp-master.debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Mon, 19 Oct 2015 00:20:34 +0200 Source: glibc Binary: libc-bin libc-dev-bin libc-l10n glibc-doc glibc-source locales locales-all nscd multiarch-support libc6 libc6-dev libc6-dbg libc6-pic libc6-udeb libc6.1 libc6.1-dev libc6.1-dbg libc6.1-pic libc6.1-udeb libc0.3 libc0.3-dev libc0.3-dbg libc0.3-pic libc0.3-udeb libc0.1 libc0.1-dev libc0.1-dbg libc0.1-pic libc0.1-udeb libc6-i386 libc6-dev-i386 libc6-sparc libc6-dev-sparc libc6-sparc64 libc6-dev-sparc64 libc6-s390 libc6-dev-s390 libc6-amd64 libc6-dev-amd64 libc6-powerpc libc6-dev-powerpc libc6-ppc64 libc6-dev-ppc64 libc6-mips32 libc6-dev-mips32 libc6-mipsn32 libc6-dev-mipsn32 libc6-mips64 libc6-dev-mips64 libc0.1-i386 libc0.1-dev-i386 libc6-x32 libc6-dev-x32 libc6-i686 libc6-xen libc0.1-i686 libc0.3-i686 libc0.3-xen libc6.1-alphaev67 libnss-dns-udeb libnss-files-udeb Architecture: source Version: 2.21-0experimental2 Distribution: experimental Urgency: medium Maintainer: GNU Libc Maintainers Changed-By: Aurelien Jarno Description: glibc-doc - GNU C Library: Documentation glibc-source - GNU C Library: sources libc-bin - GNU C Library: Binaries libc-dev-bin - GNU C Library: Development binaries libc-l10n - GNU C Library: localization files libc0.1- GNU C Library: Shared libraries libc0.1-dbg - GNU C Library: detached debugging symbols libc0.1-dev - GNU C Library: Development Libraries and Header Files libc0.1-dev-i386 - GNU C Library: 32bit development libraries for AMD64 libc0.1-i386 - GNU C Library: 32bit shared libraries for
Bug#672774: marked as done (build fix for multiarch-enabled kfreebsd-kernel-headers)
Your message dated Mon, 19 Oct 2015 05:19:14 + with message-idand subject line Bug#672774: fixed in glibc 2.21-0experimental2 has caused the Debian Bug report #672774, regarding build fix for multiarch-enabled kfreebsd-kernel-headers to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 672774: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=672774 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems --- Begin Message --- Package: eglibc Version: 2.13-32 Tags: patch User: debian-...@lists.debian.org Usertags: kfreebsd As eglibc needs special handling for headers provided by kfreebsd-kernel-headers package, it will FTBFS when kfreebsd-kernel-headers switches to multiarch-style directories (e.g. /usr/include/x86_64-kfreebsd-gnu/machine). Please consider fixing the problem preemptively using the attached patch. This patch doesn't breal backward compatibility with current kfreebsd-kernel-headers (0.79). It's been tested on i386 and amd64, both with pristine kfreebsd-kernel-headers and with a multiarch-enabled version. -- System Information: Debian Release: wheezy/sid APT prefers unstable APT policy: (500, 'unstable'), (1, 'experimental') Architecture: kfreebsd-i386 (i386) Kernel: kFreeBSD 8.1-1-amd64 Locale: LANG=ca_AD.UTF-8, LC_CTYPE=ca_AD.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Index: debian/sysdeps/kfreebsd.mk === --- debian/sysdeps/kfreebsd.mk (revision 5248) +++ debian/sysdeps/kfreebsd.mk (working copy) @@ -18,21 +18,31 @@ endif # Minimum Kernel supported -with_headers = --with-headers=$(shell pwd)/debian/include --enable-kernel=$(call xx,MIN_KERNEL_SUPPORTED) +with_headers = --with-headers=$(shell pwd)/debian/include:$(shell pwd)/debian/include/$(DEB_HOST_MULTIARCH) --enable-kernel=$(call xx,MIN_KERNEL_SUPPORTED) KERNEL_HEADER_DIR = $(stamp)mkincludedir $(stamp)mkincludedir: rm -rf debian/include mkdir debian/include - for file in bsm net netatalk netipx nfs osreldate.h sys x86 vm ; do \ + for file in bsm net netatalk netipx nfs osreldate.h sys x86 vm machine ; do \ if test -e $(KFREEBSD_HEADERS)/$$file ; then \ ln -s $(KFREEBSD_HEADERS)/$$file debian/include ; \ fi ; \ + for arch in i386 x86_64 ; do \ + if test -e $(KFREEBSD_HEADERS)/$${arch}-kfreebsd-gnu/$$file ; then \ + mkdir -p debian/include/$${arch}-kfreebsd-gnu ; \ + ln -s $(KFREEBSD_HEADERS)/$${arch}-kfreebsd-gnu/$$file debian/include/$${arch}-kfreebsd-gnu ; \ + fi ; \ + done ; \ done # Link all machine directories. We can't just link machine # because of explicit references to and # . + # + # FIXME: This can be removed when kfreebsd-kernel-headers switches to + # Multiarch-style directories. + # find $(KFREEBSD_HEADERS) -maxdepth 1 -xtype d -name machine\* \ -exec ln -s '{}' debian/include ';' @@ -42,7 +52,7 @@ touch $@ # Also to make configure happy. -export CPPFLAGS = -isystem $(shell pwd)/debian/include +CPPFLAGS = -isystem $(shell pwd)/debian/include -isystem $(shell pwd)/debian/include/$(DEB_HOST_MULTIARCH) # This round of ugliness decomposes the FreeBSD kernel version number # into an integer so it can be easily compared and then does so. Index: debian/sysdeps/kfreebsd-amd64.mk === --- debian/sysdeps/kfreebsd-amd64.mk (revision 5248) +++ debian/sysdeps/kfreebsd-amd64.mk (working copy) @@ -8,10 +8,12 @@ i386_configure_target = i686-kfreebsd-gnu i386_CC = $(CC) -m32 +i386_CPPFLAGS = -isystem $(shell pwd)/debian/include -isystem $(shell pwd)/debian/include/i386-kfreebsd-gnu i386_CXX = $(CXX) -m32 i386_add-ons = ports linuxthreads $(add-ons) i386_extra_cflags = -march=pentium4 -mtune=generic i386_extra_config_options = $(extra_config_options) --disable-profile +i386_with_headers = --with-headers=$(shell pwd)/debian/include:$(shell pwd)/debian/include/i386-kfreebsd-gnu --enable-kernel=$(call xx,MIN_KERNEL_SUPPORTED) i386_slibdir = /lib32 i386_libdir = /usr/lib32 Index: debian/rules.d/build.mk === --- debian/rules.d/build.mk (revision 5248) +++ debian/rules.d/build.mk (working copy) @@ -23,6 +23,7 @@ @echo Configuring $(curpass) rm -f $(DEB_BUILDDIR)/configparms echo "CC = $(call xx,CC)" >> $(DEB_BUILDDIR)/configparms + echo "CPPFLAGS = $(call xx,CPPFLAGS)" >> $(DEB_BUILDDIR)/configparms echo "CXX = $(call xx,CXX)" >> $(DEB_BUILDDIR)/configparms echo "BUILD_CC = $(BUILD_CC)" >>
Bug#785796: marked as done (glibc: kfreebsd should define F_DUPFD_CLOEXEC)
Your message dated Mon, 19 Oct 2015 05:19:14 + with message-idand subject line Bug#785796: fixed in glibc 2.21-0experimental2 has caused the Debian Bug report #785796, regarding glibc: kfreebsd should define F_DUPFD_CLOEXEC to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 785796: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=785796 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems --- Begin Message --- Source: util-linux Version: 2.26.2-1 Severity: important Tags: patch Control: found -1 util-linux/2.26.2-2 Hi, the new util-linux 2.26.2 FTBFSes on non-Linux architectures, because of Linux-only symbols in libmount. Attached there is the easy update to debian/libmount1.symbols. Thanks, -- Pino --- a/debian/libmount1.symbols +++ b/debian/libmount1.symbols @@ -181,19 +181,19 @@ libmount.so.1 libmount1 #MINVER# mnt_mangle@MOUNT_2.19 2.19.1 mnt_match_fstype@MOUNT_2.19 2.19.1 mnt_match_options@MOUNT_2.19 2.19.1 - mnt_monitor_close_fd@MOUNT_2.26 2.26.2 - mnt_monitor_enable_kernel@MOUNT_2.26 2.26.2 - mnt_monitor_enable_userspace@MOUNT_2.26 2.26.2 - mnt_monitor_event_cleanup@MOUNT_2.26 2.26.2 - mnt_monitor_get_fd@MOUNT_2.26 2.26.2 - mnt_monitor_next_change@MOUNT_2.26 2.26.2 - mnt_monitor_wait@MOUNT_2.26 2.26.2 + (arch=linux-any)mnt_monitor_close_fd@MOUNT_2.26 2.26.2 + (arch=linux-any)mnt_monitor_enable_kernel@MOUNT_2.26 2.26.2 + (arch=linux-any)mnt_monitor_enable_userspace@MOUNT_2.26 2.26.2 + (arch=linux-any)mnt_monitor_event_cleanup@MOUNT_2.26 2.26.2 + (arch=linux-any)mnt_monitor_get_fd@MOUNT_2.26 2.26.2 + (arch=linux-any)mnt_monitor_next_change@MOUNT_2.26 2.26.2 + (arch=linux-any)mnt_monitor_wait@MOUNT_2.26 2.26.2 mnt_new_cache@MOUNT_2.19 2.19.1 (arch=linux-any)mnt_new_context@MOUNT_2.19 2.19.1 mnt_new_fs@MOUNT_2.19 2.19.1 mnt_new_iter@MOUNT_2.19 2.19.1 mnt_new_lock@MOUNT_2.19 2.19.1 - mnt_new_monitor@MOUNT_2.26 2.26.2 + (arch=linux-any)mnt_new_monitor@MOUNT_2.26 2.26.2 mnt_new_tabdiff@MOUNT_2.20 2.20.1 mnt_new_table@MOUNT_2.19 2.19.1 mnt_new_table_from_dir@MOUNT_2.19 2.19.1 @@ -213,7 +213,7 @@ libmount.so.1 libmount1 #MINVER# mnt_pretty_path@MOUNT_2.20 2.20.1 mnt_ref_cache@MOUNT_2.24 2.24.2 mnt_ref_fs@MOUNT_2.24 2.24.2 - mnt_ref_monitor@MOUNT_2.26 2.26.2 + (arch=linux-any)mnt_ref_monitor@MOUNT_2.26 2.26.2 mnt_ref_table@MOUNT_2.24 2.24.2 (arch=linux-any)mnt_reset_context@MOUNT_2.19 2.19.1 mnt_reset_fs@MOUNT_2.19 2.19.1 @@ -271,7 +271,7 @@ libmount.so.1 libmount1 #MINVER# mnt_unmangle@MOUNT_2.19 2.19.1 mnt_unref_cache@MOUNT_2.24 2.24.2 mnt_unref_fs@MOUNT_2.24 2.24.2 - mnt_unref_monitor@MOUNT_2.26 2.26.2 + (arch=linux-any)mnt_unref_monitor@MOUNT_2.26 2.26.2 mnt_unref_table@MOUNT_2.24 2.24.2 mnt_update_force_rdonly@MOUNT_2.19 2.19.1 mnt_update_get_filename@MOUNT_2.19 2.19.1 --- End Message --- --- Begin Message --- Source: glibc Source-Version: 2.21-0experimental2 We believe that the bug you reported is fixed in the latest version of glibc, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 785...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Aurelien Jarno (supplier of updated glibc package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@ftp-master.debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Mon, 19 Oct 2015 00:20:34 +0200 Source: glibc Binary: libc-bin libc-dev-bin libc-l10n glibc-doc glibc-source locales locales-all nscd multiarch-support libc6 libc6-dev libc6-dbg libc6-pic libc6-udeb libc6.1 libc6.1-dev libc6.1-dbg libc6.1-pic libc6.1-udeb libc0.3 libc0.3-dev libc0.3-dbg libc0.3-pic libc0.3-udeb libc0.1 libc0.1-dev libc0.1-dbg libc0.1-pic libc0.1-udeb libc6-i386 libc6-dev-i386 libc6-sparc libc6-dev-sparc libc6-sparc64 libc6-dev-sparc64 libc6-s390 libc6-dev-s390 libc6-amd64 libc6-dev-amd64 libc6-powerpc libc6-dev-powerpc libc6-ppc64 libc6-dev-ppc64 libc6-mips32 libc6-dev-mips32 libc6-mipsn32 libc6-dev-mipsn32 libc6-mips64 libc6-dev-mips64 libc0.1-i386 libc0.1-dev-i386 libc6-x32 libc6-dev-x32 libc6-i686 libc6-xen libc0.1-i686 libc0.3-i686 libc0.3-xen libc6.1-alphaev67 libnss-dns-udeb libnss-files-udeb Architecture: source Version: 2.21-0experimental2
Processing of glibc_2.21-0experimental2_source.changes
glibc_2.21-0experimental2_source.changes uploaded successfully to localhost along with the files: glibc_2.21-0experimental2.dsc glibc_2.21-0experimental2.debian.tar.xz Greetings, Your Debian queue daemon (running on host franck.debian.org)
Bug#798316: marked as done (libc6: Pointer guarding bypass in dynamic Setuid binaries)
Your message dated Mon, 19 Oct 2015 05:19:14 + with message-idand subject line Bug#798316: fixed in glibc 2.21-0experimental2 has caused the Debian Bug report #798316, regarding libc6: Pointer guarding bypass in dynamic Setuid binaries to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 798316: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798316 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems --- Begin Message --- Package: libc6 Severity: important Tags: security Hi, Just FYI. security vulnerablity was found in glibc. http://hmarco.org/bugs/glibc_ptr_mangle_weakness.html Probably no CVE is not assigned yet. http://seclists.org/oss-sec/2015/q3/504 One of my friend confirmed it works with stretch, so testing/unstable is affected (probably experimental, too). -- Hideki Yamane --- End Message --- --- Begin Message --- Source: glibc Source-Version: 2.21-0experimental2 We believe that the bug you reported is fixed in the latest version of glibc, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 798...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Aurelien Jarno (supplier of updated glibc package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@ftp-master.debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Mon, 19 Oct 2015 00:20:34 +0200 Source: glibc Binary: libc-bin libc-dev-bin libc-l10n glibc-doc glibc-source locales locales-all nscd multiarch-support libc6 libc6-dev libc6-dbg libc6-pic libc6-udeb libc6.1 libc6.1-dev libc6.1-dbg libc6.1-pic libc6.1-udeb libc0.3 libc0.3-dev libc0.3-dbg libc0.3-pic libc0.3-udeb libc0.1 libc0.1-dev libc0.1-dbg libc0.1-pic libc0.1-udeb libc6-i386 libc6-dev-i386 libc6-sparc libc6-dev-sparc libc6-sparc64 libc6-dev-sparc64 libc6-s390 libc6-dev-s390 libc6-amd64 libc6-dev-amd64 libc6-powerpc libc6-dev-powerpc libc6-ppc64 libc6-dev-ppc64 libc6-mips32 libc6-dev-mips32 libc6-mipsn32 libc6-dev-mipsn32 libc6-mips64 libc6-dev-mips64 libc0.1-i386 libc0.1-dev-i386 libc6-x32 libc6-dev-x32 libc6-i686 libc6-xen libc0.1-i686 libc0.3-i686 libc0.3-xen libc6.1-alphaev67 libnss-dns-udeb libnss-files-udeb Architecture: source Version: 2.21-0experimental2 Distribution: experimental Urgency: medium Maintainer: GNU Libc Maintainers Changed-By: Aurelien Jarno Description: glibc-doc - GNU C Library: Documentation glibc-source - GNU C Library: sources libc-bin - GNU C Library: Binaries libc-dev-bin - GNU C Library: Development binaries libc-l10n - GNU C Library: localization files libc0.1- GNU C Library: Shared libraries libc0.1-dbg - GNU C Library: detached debugging symbols libc0.1-dev - GNU C Library: Development Libraries and Header Files libc0.1-dev-i386 - GNU C Library: 32bit development libraries for AMD64 libc0.1-i386 - GNU C Library: 32bit shared libraries for AMD64 libc0.1-i686 - GNU C Library: Shared libraries [i686 optimized] libc0.1-pic - GNU C Library: PIC archive library libc0.1-udeb - GNU C Library: Shared libraries - udeb (udeb) libc0.3- GNU C Library: Shared libraries libc0.3-dbg - GNU C Library: detached debugging symbols libc0.3-dev - GNU C Library: Development Libraries and Header Files libc0.3-i686 - GNU C Library: Shared libraries [i686 optimized] libc0.3-pic - GNU C Library: PIC archive library libc0.3-udeb - GNU C Library: Shared libraries - udeb (udeb) libc0.3-xen - GNU C Library: Shared libraries [Xen version] libc6 - GNU C Library: Shared libraries libc6-amd64 - GNU C Library: 64bit Shared libraries for AMD64 libc6-dbg - GNU C Library: detached debugging symbols libc6-dev - GNU C Library: Development Libraries and Header Files libc6-dev-amd64 - GNU C Library: 64bit Development Libraries for AMD64 libc6-dev-i386 - GNU C Library: 32-bit development libraries for AMD64 libc6-dev-mips32 - GNU C Library: o32 Development Libraries for MIPS libc6-dev-mips64 - GNU C Library: 64bit Development Libraries for MIPS64 libc6-dev-mipsn32 - GNU C Library: n32 Development Libraries for MIPS64 libc6-dev-powerpc - GNU C Library: 32bit powerpc development libraries for ppc64
Bug#798316: marked as done (libc6: Pointer guarding bypass in dynamic Setuid binaries)
Your message dated Mon, 19 Oct 2015 05:19:14 + with message-idand subject line Bug#801691: fixed in glibc 2.21-0experimental2 has caused the Debian Bug report #801691, regarding libc6: Pointer guarding bypass in dynamic Setuid binaries to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 801691: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=801691 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems --- Begin Message --- Package: libc6 Severity: important Tags: security Hi, Just FYI. security vulnerablity was found in glibc. http://hmarco.org/bugs/glibc_ptr_mangle_weakness.html Probably no CVE is not assigned yet. http://seclists.org/oss-sec/2015/q3/504 One of my friend confirmed it works with stretch, so testing/unstable is affected (probably experimental, too). -- Hideki Yamane --- End Message --- --- Begin Message --- Source: glibc Source-Version: 2.21-0experimental2 We believe that the bug you reported is fixed in the latest version of glibc, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 801...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Aurelien Jarno (supplier of updated glibc package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@ftp-master.debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Mon, 19 Oct 2015 00:20:34 +0200 Source: glibc Binary: libc-bin libc-dev-bin libc-l10n glibc-doc glibc-source locales locales-all nscd multiarch-support libc6 libc6-dev libc6-dbg libc6-pic libc6-udeb libc6.1 libc6.1-dev libc6.1-dbg libc6.1-pic libc6.1-udeb libc0.3 libc0.3-dev libc0.3-dbg libc0.3-pic libc0.3-udeb libc0.1 libc0.1-dev libc0.1-dbg libc0.1-pic libc0.1-udeb libc6-i386 libc6-dev-i386 libc6-sparc libc6-dev-sparc libc6-sparc64 libc6-dev-sparc64 libc6-s390 libc6-dev-s390 libc6-amd64 libc6-dev-amd64 libc6-powerpc libc6-dev-powerpc libc6-ppc64 libc6-dev-ppc64 libc6-mips32 libc6-dev-mips32 libc6-mipsn32 libc6-dev-mipsn32 libc6-mips64 libc6-dev-mips64 libc0.1-i386 libc0.1-dev-i386 libc6-x32 libc6-dev-x32 libc6-i686 libc6-xen libc0.1-i686 libc0.3-i686 libc0.3-xen libc6.1-alphaev67 libnss-dns-udeb libnss-files-udeb Architecture: source Version: 2.21-0experimental2 Distribution: experimental Urgency: medium Maintainer: GNU Libc Maintainers Changed-By: Aurelien Jarno Description: glibc-doc - GNU C Library: Documentation glibc-source - GNU C Library: sources libc-bin - GNU C Library: Binaries libc-dev-bin - GNU C Library: Development binaries libc-l10n - GNU C Library: localization files libc0.1- GNU C Library: Shared libraries libc0.1-dbg - GNU C Library: detached debugging symbols libc0.1-dev - GNU C Library: Development Libraries and Header Files libc0.1-dev-i386 - GNU C Library: 32bit development libraries for AMD64 libc0.1-i386 - GNU C Library: 32bit shared libraries for AMD64 libc0.1-i686 - GNU C Library: Shared libraries [i686 optimized] libc0.1-pic - GNU C Library: PIC archive library libc0.1-udeb - GNU C Library: Shared libraries - udeb (udeb) libc0.3- GNU C Library: Shared libraries libc0.3-dbg - GNU C Library: detached debugging symbols libc0.3-dev - GNU C Library: Development Libraries and Header Files libc0.3-i686 - GNU C Library: Shared libraries [i686 optimized] libc0.3-pic - GNU C Library: PIC archive library libc0.3-udeb - GNU C Library: Shared libraries - udeb (udeb) libc0.3-xen - GNU C Library: Shared libraries [Xen version] libc6 - GNU C Library: Shared libraries libc6-amd64 - GNU C Library: 64bit Shared libraries for AMD64 libc6-dbg - GNU C Library: detached debugging symbols libc6-dev - GNU C Library: Development Libraries and Header Files libc6-dev-amd64 - GNU C Library: 64bit Development Libraries for AMD64 libc6-dev-i386 - GNU C Library: 32-bit development libraries for AMD64 libc6-dev-mips32 - GNU C Library: o32 Development Libraries for MIPS libc6-dev-mips64 - GNU C Library: 64bit Development Libraries for MIPS64 libc6-dev-mipsn32 - GNU C Library: n32 Development Libraries for MIPS64 libc6-dev-powerpc - GNU C Library: 32bit powerpc development libraries for ppc64
Bug#788799: marked as done (libc6: pthread_cond_broadcast issue when surrounded by PTHREAD_PRIO_INHERIT mutex on ARM)
Your message dated Mon, 19 Oct 2015 05:19:14 + with message-idand subject line Bug#788799: fixed in glibc 2.21-0experimental2 has caused the Debian Bug report #788799, regarding libc6: pthread_cond_broadcast issue when surrounded by PTHREAD_PRIO_INHERIT mutex on ARM to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 788799: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=788799 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems --- Begin Message --- Package: libc6 Version: 2.21-0experimental0 Severity: normal Tags: upstream fixed-upstream Forwarded: https://sourceware.org/bugzilla/show_bug.cgi?id=18463 Hello, the attached program fails with an error on ARM platforms. (I only tested armhf, but I think armel is affected, too.) The problem is that pthread_mutex_unlock() in the main thread returns EPERM which it shouldn't. This only happens when using pthread_cond_broadcast, at least two threads and PTHREAD_PRIO_INHERIT. For more details refer to the upstream bug[1]. A possible solution documented in the upstream bug report is to pass --enable-kernel=3.15 (or something bigger). According to https://buildd.debian.org/status/fetch.php?pkg=glibc=armhf=2.21-0experimental0=1426842906 glibc is build using --enable-kernel=2.6.32, I guess that's from the setting MIN_KERNEL_SUPPORTED in debian/sysdeps/linux.mk. Given that stable has kernel 3.16 the probably easiest solution would be to bump the dependency to >= 3.16?! Best regards Uwe [1] https://sourceware.org/bugzilla/show_bug.cgi?id=18463 -- System Information: Debian Release: 8.1 APT prefers stable APT policy: (990, 'stable'), (500, 'unstable'), (500, 'testing'), (1, 'experimental') Architecture: armhf (armv7l) Kernel: Linux 3.16.0-4-armmp (SMP w/1 CPU core) Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Init: systemd (via /run/systemd/system) Versions of packages libc6 depends on: ii libgcc1 1:4.9.2-10 libc6 recommends no packages. Versions of packages libc6 suggests: ii debconf [debconf-2.0] 1.5.56 pn glibc-doc ii locales2.21-0experimental0 -- debconf information excluded --- End Message --- --- Begin Message --- Source: glibc Source-Version: 2.21-0experimental2 We believe that the bug you reported is fixed in the latest version of glibc, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 788...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Aurelien Jarno (supplier of updated glibc package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@ftp-master.debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Mon, 19 Oct 2015 00:20:34 +0200 Source: glibc Binary: libc-bin libc-dev-bin libc-l10n glibc-doc glibc-source locales locales-all nscd multiarch-support libc6 libc6-dev libc6-dbg libc6-pic libc6-udeb libc6.1 libc6.1-dev libc6.1-dbg libc6.1-pic libc6.1-udeb libc0.3 libc0.3-dev libc0.3-dbg libc0.3-pic libc0.3-udeb libc0.1 libc0.1-dev libc0.1-dbg libc0.1-pic libc0.1-udeb libc6-i386 libc6-dev-i386 libc6-sparc libc6-dev-sparc libc6-sparc64 libc6-dev-sparc64 libc6-s390 libc6-dev-s390 libc6-amd64 libc6-dev-amd64 libc6-powerpc libc6-dev-powerpc libc6-ppc64 libc6-dev-ppc64 libc6-mips32 libc6-dev-mips32 libc6-mipsn32 libc6-dev-mipsn32 libc6-mips64 libc6-dev-mips64 libc0.1-i386 libc0.1-dev-i386 libc6-x32 libc6-dev-x32 libc6-i686 libc6-xen libc0.1-i686 libc0.3-i686 libc0.3-xen libc6.1-alphaev67 libnss-dns-udeb libnss-files-udeb Architecture: source Version: 2.21-0experimental2 Distribution: experimental Urgency: medium Maintainer: GNU Libc Maintainers Changed-By: Aurelien Jarno Description: glibc-doc - GNU C Library: Documentation glibc-source - GNU C Library: sources libc-bin - GNU C Library: Binaries libc-dev-bin - GNU C Library: Development binaries libc-l10n - GNU C Library: localization files libc0.1- GNU C Library: Shared libraries libc0.1-dbg - GNU C Library: detached debugging symbols libc0.1-dev - GNU C Library: Development Libraries and Header Files libc0.1-dev-i386 - GNU C Library: 32bit development
Bug#800846: marked as done (error message in preinst doesn't match test, checks for kernel 3.2 but tells the user it needs 2.6.32)
Your message dated Mon, 19 Oct 2015 05:19:14 + with message-idand subject line Bug#800846: fixed in glibc 2.21-0experimental2 has caused the Debian Bug report #800846, regarding error message in preinst doesn't match test, checks for kernel 3.2 but tells the user it needs 2.6.32 to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 800846: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=800846 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems --- Begin Message --- Package: libc6 Version: 2.21-0experimental1 I had an expermimental chroot on a system that happened to be running an old kernel. I got an error message about needing a 2.6.32 kernel which was strange as I already had a 2.6.32 kernel. Reading the preinst revealed # The GNU libc requires a >= 3.2 kernel, found in wheezy if linux_compare_versions "$kernel_ver" lt 3.2 then echo WARNING: this version of the GNU libc requires kernel version echo 2.6.32 or later. Please upgrade your kernel before installing echo glibc. kernel26_help exit 1 fi So it's checking for 3.2 but telling the user they need 2.6.32. --- End Message --- --- Begin Message --- Source: glibc Source-Version: 2.21-0experimental2 We believe that the bug you reported is fixed in the latest version of glibc, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 800...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Aurelien Jarno (supplier of updated glibc package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@ftp-master.debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Mon, 19 Oct 2015 00:20:34 +0200 Source: glibc Binary: libc-bin libc-dev-bin libc-l10n glibc-doc glibc-source locales locales-all nscd multiarch-support libc6 libc6-dev libc6-dbg libc6-pic libc6-udeb libc6.1 libc6.1-dev libc6.1-dbg libc6.1-pic libc6.1-udeb libc0.3 libc0.3-dev libc0.3-dbg libc0.3-pic libc0.3-udeb libc0.1 libc0.1-dev libc0.1-dbg libc0.1-pic libc0.1-udeb libc6-i386 libc6-dev-i386 libc6-sparc libc6-dev-sparc libc6-sparc64 libc6-dev-sparc64 libc6-s390 libc6-dev-s390 libc6-amd64 libc6-dev-amd64 libc6-powerpc libc6-dev-powerpc libc6-ppc64 libc6-dev-ppc64 libc6-mips32 libc6-dev-mips32 libc6-mipsn32 libc6-dev-mipsn32 libc6-mips64 libc6-dev-mips64 libc0.1-i386 libc0.1-dev-i386 libc6-x32 libc6-dev-x32 libc6-i686 libc6-xen libc0.1-i686 libc0.3-i686 libc0.3-xen libc6.1-alphaev67 libnss-dns-udeb libnss-files-udeb Architecture: source Version: 2.21-0experimental2 Distribution: experimental Urgency: medium Maintainer: GNU Libc Maintainers Changed-By: Aurelien Jarno Description: glibc-doc - GNU C Library: Documentation glibc-source - GNU C Library: sources libc-bin - GNU C Library: Binaries libc-dev-bin - GNU C Library: Development binaries libc-l10n - GNU C Library: localization files libc0.1- GNU C Library: Shared libraries libc0.1-dbg - GNU C Library: detached debugging symbols libc0.1-dev - GNU C Library: Development Libraries and Header Files libc0.1-dev-i386 - GNU C Library: 32bit development libraries for AMD64 libc0.1-i386 - GNU C Library: 32bit shared libraries for AMD64 libc0.1-i686 - GNU C Library: Shared libraries [i686 optimized] libc0.1-pic - GNU C Library: PIC archive library libc0.1-udeb - GNU C Library: Shared libraries - udeb (udeb) libc0.3- GNU C Library: Shared libraries libc0.3-dbg - GNU C Library: detached debugging symbols libc0.3-dev - GNU C Library: Development Libraries and Header Files libc0.3-i686 - GNU C Library: Shared libraries [i686 optimized] libc0.3-pic - GNU C Library: PIC archive library libc0.3-udeb - GNU C Library: Shared libraries - udeb (udeb) libc0.3-xen - GNU C Library: Shared libraries [Xen version] libc6 - GNU C Library: Shared libraries libc6-amd64 - GNU C Library: 64bit Shared libraries for AMD64 libc6-dbg - GNU C Library: detached debugging symbols libc6-dev - GNU C Library: Development Libraries and Header Files libc6-dev-amd64 - GNU C Library: 64bit Development Libraries for AMD64
Bug#801691: marked as done (glibc: pointer guarding weakness)
Your message dated Mon, 19 Oct 2015 05:19:14 + with message-idand subject line Bug#798316: fixed in glibc 2.21-0experimental2 has caused the Debian Bug report #798316, regarding glibc: pointer guarding weakness to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 798316: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798316 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems --- Begin Message --- Package: glibc Severity: important Tags: security Justification: user security hole Please see http://www.openwall.com/lists/oss-security/2015/09/05/8 for details. Cheers, Moritz --- End Message --- --- Begin Message --- Source: glibc Source-Version: 2.21-0experimental2 We believe that the bug you reported is fixed in the latest version of glibc, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 798...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Aurelien Jarno (supplier of updated glibc package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@ftp-master.debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Mon, 19 Oct 2015 00:20:34 +0200 Source: glibc Binary: libc-bin libc-dev-bin libc-l10n glibc-doc glibc-source locales locales-all nscd multiarch-support libc6 libc6-dev libc6-dbg libc6-pic libc6-udeb libc6.1 libc6.1-dev libc6.1-dbg libc6.1-pic libc6.1-udeb libc0.3 libc0.3-dev libc0.3-dbg libc0.3-pic libc0.3-udeb libc0.1 libc0.1-dev libc0.1-dbg libc0.1-pic libc0.1-udeb libc6-i386 libc6-dev-i386 libc6-sparc libc6-dev-sparc libc6-sparc64 libc6-dev-sparc64 libc6-s390 libc6-dev-s390 libc6-amd64 libc6-dev-amd64 libc6-powerpc libc6-dev-powerpc libc6-ppc64 libc6-dev-ppc64 libc6-mips32 libc6-dev-mips32 libc6-mipsn32 libc6-dev-mipsn32 libc6-mips64 libc6-dev-mips64 libc0.1-i386 libc0.1-dev-i386 libc6-x32 libc6-dev-x32 libc6-i686 libc6-xen libc0.1-i686 libc0.3-i686 libc0.3-xen libc6.1-alphaev67 libnss-dns-udeb libnss-files-udeb Architecture: source Version: 2.21-0experimental2 Distribution: experimental Urgency: medium Maintainer: GNU Libc Maintainers Changed-By: Aurelien Jarno Description: glibc-doc - GNU C Library: Documentation glibc-source - GNU C Library: sources libc-bin - GNU C Library: Binaries libc-dev-bin - GNU C Library: Development binaries libc-l10n - GNU C Library: localization files libc0.1- GNU C Library: Shared libraries libc0.1-dbg - GNU C Library: detached debugging symbols libc0.1-dev - GNU C Library: Development Libraries and Header Files libc0.1-dev-i386 - GNU C Library: 32bit development libraries for AMD64 libc0.1-i386 - GNU C Library: 32bit shared libraries for AMD64 libc0.1-i686 - GNU C Library: Shared libraries [i686 optimized] libc0.1-pic - GNU C Library: PIC archive library libc0.1-udeb - GNU C Library: Shared libraries - udeb (udeb) libc0.3- GNU C Library: Shared libraries libc0.3-dbg - GNU C Library: detached debugging symbols libc0.3-dev - GNU C Library: Development Libraries and Header Files libc0.3-i686 - GNU C Library: Shared libraries [i686 optimized] libc0.3-pic - GNU C Library: PIC archive library libc0.3-udeb - GNU C Library: Shared libraries - udeb (udeb) libc0.3-xen - GNU C Library: Shared libraries [Xen version] libc6 - GNU C Library: Shared libraries libc6-amd64 - GNU C Library: 64bit Shared libraries for AMD64 libc6-dbg - GNU C Library: detached debugging symbols libc6-dev - GNU C Library: Development Libraries and Header Files libc6-dev-amd64 - GNU C Library: 64bit Development Libraries for AMD64 libc6-dev-i386 - GNU C Library: 32-bit development libraries for AMD64 libc6-dev-mips32 - GNU C Library: o32 Development Libraries for MIPS libc6-dev-mips64 - GNU C Library: 64bit Development Libraries for MIPS64 libc6-dev-mipsn32 - GNU C Library: n32 Development Libraries for MIPS64 libc6-dev-powerpc - GNU C Library: 32bit powerpc development libraries for ppc64 libc6-dev-ppc64 - GNU C Library: 64bit Development Libraries for PowerPC64 libc6-dev-s390 - GNU C Library: 32bit Development Libraries for IBM zSeries libc6-dev-sparc - GNU C Library: 32bit Development Libraries for
Bug#797831: marked as done (glibc: further problems with stage1)
Your message dated Mon, 19 Oct 2015 05:19:14 + with message-idand subject line Bug#797831: fixed in glibc 2.21-0experimental2 has caused the Debian Bug report #797831, regarding glibc: further problems with stage1 to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 797831: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=797831 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems --- Begin Message --- Source: glibc Version: 2.21-0experimental1 Tags: patch User: helm...@debian.org Usertags: rebootstrap Hi Aurelien, thank you very much for applying #766877 and uploading to experimental. This has moved us a big step closer to a working stage1. We are not quite there yet. At this point I estimate a remaining patch stack for the following problems: * stage1 fails to build for various reasons * stage1 libc6-dev not installable due to dependency on libc6 * wrong set of packages being built for stage1 * dh_shlibdeps fails * linux headers cannot be found * various hurd things Even though I still carry patches for these, it is not clear that all of these problems are still reproducible. The above list is meant as an outlook, not a cumulative bug report. This particular bug shall address only the first of those problems above, because I have a good understanding and can answer your questions. I am attaching a patch and also explain the individual hunks in what follows. All of them apply to stage1-specific code. - *:/lib32 | *:/lib64 | *:/libx32 | *:/lib/arm-linux-gnueabi*) \ + *:/lib32 | *:/lib64 | *:/libo32 | *:/libx32 | *:/lib/arm-linux-gnueabi*) \ The code fails to identify a certain mips architecture multilib build and thus places the multilib build into the main package. + *:* ) \ + templates="" \ + ;; \ This extra case ensures that no templates are interpolated for optimized builds (e.g. libc6-i686). These do not generate development packages anyway, so dropping them (for stage1) is the right thing to do. Failing to do so again overwrites the main package. - -e "/$$libdir.*.a /d" \ + -e "/LIBDIR.*\.a /d" \ The immediate error resulting from this sed invocation is that the command "u" is not understood by sed. $libdir becomes "/usr/lib/triplet". Thus the resulting sed command starts with "//u" which sed does not like. Fixing the escaping is not enough however, since LIBDIR is not yet interpolated. That only happens a few lines later. So instead, the match needs to target non-interpolated filenames and thus match LIBDIR. I hope that the level of detail given is sufficient. If not, please ask. Otherwise, please consider applying the patch. I would appreciate another experimental upload that also includes the hurd changes staged to SVN by Samuel Thibault already within a month from now. Thank you for your support. Helmut diff -Nru glibc-2.19/debian/rules.d/debhelper.mk glibc-2.19/debian/rules.d/debhelper.mk --- glibc-2.19/debian/rules.d/debhelper.mk +++ glibc-2.19/debian/rules.d/debhelper.mk @@ -197,10 +197,13 @@ case "$$curpass:$$slibdir" in \ libc:*) \ ;; \ - *:/lib32 | *:/lib64 | *:/libx32 | *:/lib/arm-linux-gnueabi*) \ + *:/lib32 | *:/lib64 | *:/libo32 | *:/libx32 | *:/lib/arm-linux-gnueabi*) \ pass="-alt" \ suffix="-$(curpass)" \ ;; \ + *:* ) \ + templates="" \ + ;; \ esac ; \ for t in $$templates ; do \ for s in debian/$$t$$pass.* ; do \ @@ -219,7 +219,7 @@ cp $$s $$t ; \ fi ; \ sed -i \ - -e "/$$libdir.*.a /d" \ + -e "/LIBDIR.*\.a /d" \ -e "s#TMPDIR#debian/tmp-$$curpass#g" \ -e "s#RTLDDIR#$$rtlddir#g" \ -e "s#SLIBDIR#$$slibdir#g" \ --- End Message --- --- Begin Message --- Source: glibc Source-Version: 2.21-0experimental2 We believe that the bug you reported is fixed in the latest version of glibc, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 797...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Aurelien Jarno (supplier of updated glibc package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@ftp-master.debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8
Bug#799418: marked as done (glibc: [INTL:pt_BR] Brazilian Portuguese debconf templates translation)
Your message dated Mon, 19 Oct 2015 05:19:14 + with message-idand subject line Bug#799418: fixed in glibc 2.21-0experimental2 has caused the Debian Bug report #799418, regarding glibc: [INTL:pt_BR] Brazilian Portuguese debconf templates translation to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 799418: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=799418 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems --- Begin Message --- Package: glibc Tags: l10n patch Severity: wishlist Hello, Please, Could you update the Brazilian Portuguese Translation? Attached you will find the file pt_BR.po. It is UTF-8 encoded and it is tested with msgfmt and podebconf-display-po. Kind regards. pt_BR.po.gz Description: application/gzip signature.asc Description: Digital signature --- End Message --- --- Begin Message --- Source: glibc Source-Version: 2.21-0experimental2 We believe that the bug you reported is fixed in the latest version of glibc, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 799...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Aurelien Jarno (supplier of updated glibc package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@ftp-master.debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Mon, 19 Oct 2015 00:20:34 +0200 Source: glibc Binary: libc-bin libc-dev-bin libc-l10n glibc-doc glibc-source locales locales-all nscd multiarch-support libc6 libc6-dev libc6-dbg libc6-pic libc6-udeb libc6.1 libc6.1-dev libc6.1-dbg libc6.1-pic libc6.1-udeb libc0.3 libc0.3-dev libc0.3-dbg libc0.3-pic libc0.3-udeb libc0.1 libc0.1-dev libc0.1-dbg libc0.1-pic libc0.1-udeb libc6-i386 libc6-dev-i386 libc6-sparc libc6-dev-sparc libc6-sparc64 libc6-dev-sparc64 libc6-s390 libc6-dev-s390 libc6-amd64 libc6-dev-amd64 libc6-powerpc libc6-dev-powerpc libc6-ppc64 libc6-dev-ppc64 libc6-mips32 libc6-dev-mips32 libc6-mipsn32 libc6-dev-mipsn32 libc6-mips64 libc6-dev-mips64 libc0.1-i386 libc0.1-dev-i386 libc6-x32 libc6-dev-x32 libc6-i686 libc6-xen libc0.1-i686 libc0.3-i686 libc0.3-xen libc6.1-alphaev67 libnss-dns-udeb libnss-files-udeb Architecture: source Version: 2.21-0experimental2 Distribution: experimental Urgency: medium Maintainer: GNU Libc Maintainers Changed-By: Aurelien Jarno Description: glibc-doc - GNU C Library: Documentation glibc-source - GNU C Library: sources libc-bin - GNU C Library: Binaries libc-dev-bin - GNU C Library: Development binaries libc-l10n - GNU C Library: localization files libc0.1- GNU C Library: Shared libraries libc0.1-dbg - GNU C Library: detached debugging symbols libc0.1-dev - GNU C Library: Development Libraries and Header Files libc0.1-dev-i386 - GNU C Library: 32bit development libraries for AMD64 libc0.1-i386 - GNU C Library: 32bit shared libraries for AMD64 libc0.1-i686 - GNU C Library: Shared libraries [i686 optimized] libc0.1-pic - GNU C Library: PIC archive library libc0.1-udeb - GNU C Library: Shared libraries - udeb (udeb) libc0.3- GNU C Library: Shared libraries libc0.3-dbg - GNU C Library: detached debugging symbols libc0.3-dev - GNU C Library: Development Libraries and Header Files libc0.3-i686 - GNU C Library: Shared libraries [i686 optimized] libc0.3-pic - GNU C Library: PIC archive library libc0.3-udeb - GNU C Library: Shared libraries - udeb (udeb) libc0.3-xen - GNU C Library: Shared libraries [Xen version] libc6 - GNU C Library: Shared libraries libc6-amd64 - GNU C Library: 64bit Shared libraries for AMD64 libc6-dbg - GNU C Library: detached debugging symbols libc6-dev - GNU C Library: Development Libraries and Header Files libc6-dev-amd64 - GNU C Library: 64bit Development Libraries for AMD64 libc6-dev-i386 - GNU C Library: 32-bit development libraries for AMD64 libc6-dev-mips32 - GNU C Library: o32 Development Libraries for MIPS libc6-dev-mips64 - GNU C Library: 64bit Development Libraries for MIPS64 libc6-dev-mipsn32 - GNU C Library: n32 Development Libraries for MIPS64 libc6-dev-powerpc - GNU C Library: 32bit powerpc development libraries for ppc64 libc6-dev-ppc64 - GNU C Library:
Bug#797538: marked as done (dpkg: warning: version 'Glibc6_VERSION' has bad syntax: version number does not start with digit)
Your message dated Mon, 19 Oct 2015 05:19:14 + with message-idand subject line Bug#797538: fixed in glibc 2.21-0experimental2 has caused the Debian Bug report #797538, regarding dpkg: warning: version 'Glibc6_VERSION' has bad syntax: version number does not start with digit to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 797538: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=797538 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems --- Begin Message --- Package: libc-bin Version: 2.21-0experimental1 Setting up libc-bin (2.21-0experimental1) ... (Reading database ... 137239 files and directories currently installed.) Preparing to unpack .../libc6_2.21-0experimental1_i386.deb ... dpkg: warning: version 'Glibc6_VERSION' has bad syntax: version number does not start with digit Checking for services that may need to be restarted... Checking init scripts... dpkg: warning: version 'Glibc6_VERSION' has bad syntax: version number does not start with digit Unpacking libc6:i386 (2.21-0experimental1) over (2.21-0experimental0) ... Setting up libc6:i386 (2.21-0experimental1) ... dpkg: warning: version 'Glibc6_VERSION' has bad syntax: version number does not start with digit --- End Message --- --- Begin Message --- Source: glibc Source-Version: 2.21-0experimental2 We believe that the bug you reported is fixed in the latest version of glibc, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 797...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Aurelien Jarno (supplier of updated glibc package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@ftp-master.debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Mon, 19 Oct 2015 00:20:34 +0200 Source: glibc Binary: libc-bin libc-dev-bin libc-l10n glibc-doc glibc-source locales locales-all nscd multiarch-support libc6 libc6-dev libc6-dbg libc6-pic libc6-udeb libc6.1 libc6.1-dev libc6.1-dbg libc6.1-pic libc6.1-udeb libc0.3 libc0.3-dev libc0.3-dbg libc0.3-pic libc0.3-udeb libc0.1 libc0.1-dev libc0.1-dbg libc0.1-pic libc0.1-udeb libc6-i386 libc6-dev-i386 libc6-sparc libc6-dev-sparc libc6-sparc64 libc6-dev-sparc64 libc6-s390 libc6-dev-s390 libc6-amd64 libc6-dev-amd64 libc6-powerpc libc6-dev-powerpc libc6-ppc64 libc6-dev-ppc64 libc6-mips32 libc6-dev-mips32 libc6-mipsn32 libc6-dev-mipsn32 libc6-mips64 libc6-dev-mips64 libc0.1-i386 libc0.1-dev-i386 libc6-x32 libc6-dev-x32 libc6-i686 libc6-xen libc0.1-i686 libc0.3-i686 libc0.3-xen libc6.1-alphaev67 libnss-dns-udeb libnss-files-udeb Architecture: source Version: 2.21-0experimental2 Distribution: experimental Urgency: medium Maintainer: GNU Libc Maintainers Changed-By: Aurelien Jarno Description: glibc-doc - GNU C Library: Documentation glibc-source - GNU C Library: sources libc-bin - GNU C Library: Binaries libc-dev-bin - GNU C Library: Development binaries libc-l10n - GNU C Library: localization files libc0.1- GNU C Library: Shared libraries libc0.1-dbg - GNU C Library: detached debugging symbols libc0.1-dev - GNU C Library: Development Libraries and Header Files libc0.1-dev-i386 - GNU C Library: 32bit development libraries for AMD64 libc0.1-i386 - GNU C Library: 32bit shared libraries for AMD64 libc0.1-i686 - GNU C Library: Shared libraries [i686 optimized] libc0.1-pic - GNU C Library: PIC archive library libc0.1-udeb - GNU C Library: Shared libraries - udeb (udeb) libc0.3- GNU C Library: Shared libraries libc0.3-dbg - GNU C Library: detached debugging symbols libc0.3-dev - GNU C Library: Development Libraries and Header Files libc0.3-i686 - GNU C Library: Shared libraries [i686 optimized] libc0.3-pic - GNU C Library: PIC archive library libc0.3-udeb - GNU C Library: Shared libraries - udeb (udeb) libc0.3-xen - GNU C Library: Shared libraries [Xen version] libc6 - GNU C Library: Shared libraries libc6-amd64 - GNU C Library: 64bit Shared libraries for AMD64 libc6-dbg - GNU C Library: detached debugging symbols libc6-dev - GNU C Library: Development Libraries and Header Files libc6-dev-amd64 - GNU C Library: 64bit Development Libraries for AMD64
Bug#672774: marked as done (build fix for multiarch-enabled kfreebsd-kernel-headers)
Your message dated Mon, 19 Oct 2015 05:19:14 + with message-idand subject line Bug#798064: fixed in glibc 2.21-0experimental2 has caused the Debian Bug report #798064, regarding build fix for multiarch-enabled kfreebsd-kernel-headers to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 798064: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798064 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems --- Begin Message --- Package: eglibc Version: 2.13-32 Tags: patch User: debian-...@lists.debian.org Usertags: kfreebsd As eglibc needs special handling for headers provided by kfreebsd-kernel-headers package, it will FTBFS when kfreebsd-kernel-headers switches to multiarch-style directories (e.g. /usr/include/x86_64-kfreebsd-gnu/machine). Please consider fixing the problem preemptively using the attached patch. This patch doesn't breal backward compatibility with current kfreebsd-kernel-headers (0.79). It's been tested on i386 and amd64, both with pristine kfreebsd-kernel-headers and with a multiarch-enabled version. -- System Information: Debian Release: wheezy/sid APT prefers unstable APT policy: (500, 'unstable'), (1, 'experimental') Architecture: kfreebsd-i386 (i386) Kernel: kFreeBSD 8.1-1-amd64 Locale: LANG=ca_AD.UTF-8, LC_CTYPE=ca_AD.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Index: debian/sysdeps/kfreebsd.mk === --- debian/sysdeps/kfreebsd.mk (revision 5248) +++ debian/sysdeps/kfreebsd.mk (working copy) @@ -18,21 +18,31 @@ endif # Minimum Kernel supported -with_headers = --with-headers=$(shell pwd)/debian/include --enable-kernel=$(call xx,MIN_KERNEL_SUPPORTED) +with_headers = --with-headers=$(shell pwd)/debian/include:$(shell pwd)/debian/include/$(DEB_HOST_MULTIARCH) --enable-kernel=$(call xx,MIN_KERNEL_SUPPORTED) KERNEL_HEADER_DIR = $(stamp)mkincludedir $(stamp)mkincludedir: rm -rf debian/include mkdir debian/include - for file in bsm net netatalk netipx nfs osreldate.h sys x86 vm ; do \ + for file in bsm net netatalk netipx nfs osreldate.h sys x86 vm machine ; do \ if test -e $(KFREEBSD_HEADERS)/$$file ; then \ ln -s $(KFREEBSD_HEADERS)/$$file debian/include ; \ fi ; \ + for arch in i386 x86_64 ; do \ + if test -e $(KFREEBSD_HEADERS)/$${arch}-kfreebsd-gnu/$$file ; then \ + mkdir -p debian/include/$${arch}-kfreebsd-gnu ; \ + ln -s $(KFREEBSD_HEADERS)/$${arch}-kfreebsd-gnu/$$file debian/include/$${arch}-kfreebsd-gnu ; \ + fi ; \ + done ; \ done # Link all machine directories. We can't just link machine # because of explicit references to and # . + # + # FIXME: This can be removed when kfreebsd-kernel-headers switches to + # Multiarch-style directories. + # find $(KFREEBSD_HEADERS) -maxdepth 1 -xtype d -name machine\* \ -exec ln -s '{}' debian/include ';' @@ -42,7 +52,7 @@ touch $@ # Also to make configure happy. -export CPPFLAGS = -isystem $(shell pwd)/debian/include +CPPFLAGS = -isystem $(shell pwd)/debian/include -isystem $(shell pwd)/debian/include/$(DEB_HOST_MULTIARCH) # This round of ugliness decomposes the FreeBSD kernel version number # into an integer so it can be easily compared and then does so. Index: debian/sysdeps/kfreebsd-amd64.mk === --- debian/sysdeps/kfreebsd-amd64.mk (revision 5248) +++ debian/sysdeps/kfreebsd-amd64.mk (working copy) @@ -8,10 +8,12 @@ i386_configure_target = i686-kfreebsd-gnu i386_CC = $(CC) -m32 +i386_CPPFLAGS = -isystem $(shell pwd)/debian/include -isystem $(shell pwd)/debian/include/i386-kfreebsd-gnu i386_CXX = $(CXX) -m32 i386_add-ons = ports linuxthreads $(add-ons) i386_extra_cflags = -march=pentium4 -mtune=generic i386_extra_config_options = $(extra_config_options) --disable-profile +i386_with_headers = --with-headers=$(shell pwd)/debian/include:$(shell pwd)/debian/include/i386-kfreebsd-gnu --enable-kernel=$(call xx,MIN_KERNEL_SUPPORTED) i386_slibdir = /lib32 i386_libdir = /usr/lib32 Index: debian/rules.d/build.mk === --- debian/rules.d/build.mk (revision 5248) +++ debian/rules.d/build.mk (working copy) @@ -23,6 +23,7 @@ @echo Configuring $(curpass) rm -f $(DEB_BUILDDIR)/configparms echo "CC = $(call xx,CC)" >> $(DEB_BUILDDIR)/configparms + echo "CPPFLAGS = $(call xx,CPPFLAGS)" >> $(DEB_BUILDDIR)/configparms echo "CXX = $(call xx,CXX)" >> $(DEB_BUILDDIR)/configparms echo "BUILD_CC = $(BUILD_CC)" >>
Bug#802256: marked as done (Backport tls_dtor_list hardening)
Your message dated Mon, 19 Oct 2015 05:19:14 + with message-idand subject line Bug#802256: fixed in glibc 2.21-0experimental2 has caused the Debian Bug report #802256, regarding Backport tls_dtor_list hardening to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 802256: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=802256 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems --- Begin Message --- Package: libc6 Version: 2.19-18+deb8u1 Please backport this upstream hardening patch to jessie (wheezy does not have this feature yet): https://sourceware.org/bugzilla/show_bug.cgi?id=19018 https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=f586e1328681b400078c995a0bb6ad301ef73549 Also recommended for testing purposes: https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=99e1dc0a688d6c25d3f422bc9f3fa29adb483339 Thanks, Florian --- End Message --- --- Begin Message --- Source: glibc Source-Version: 2.21-0experimental2 We believe that the bug you reported is fixed in the latest version of glibc, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 802...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Aurelien Jarno (supplier of updated glibc package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@ftp-master.debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Mon, 19 Oct 2015 00:20:34 +0200 Source: glibc Binary: libc-bin libc-dev-bin libc-l10n glibc-doc glibc-source locales locales-all nscd multiarch-support libc6 libc6-dev libc6-dbg libc6-pic libc6-udeb libc6.1 libc6.1-dev libc6.1-dbg libc6.1-pic libc6.1-udeb libc0.3 libc0.3-dev libc0.3-dbg libc0.3-pic libc0.3-udeb libc0.1 libc0.1-dev libc0.1-dbg libc0.1-pic libc0.1-udeb libc6-i386 libc6-dev-i386 libc6-sparc libc6-dev-sparc libc6-sparc64 libc6-dev-sparc64 libc6-s390 libc6-dev-s390 libc6-amd64 libc6-dev-amd64 libc6-powerpc libc6-dev-powerpc libc6-ppc64 libc6-dev-ppc64 libc6-mips32 libc6-dev-mips32 libc6-mipsn32 libc6-dev-mipsn32 libc6-mips64 libc6-dev-mips64 libc0.1-i386 libc0.1-dev-i386 libc6-x32 libc6-dev-x32 libc6-i686 libc6-xen libc0.1-i686 libc0.3-i686 libc0.3-xen libc6.1-alphaev67 libnss-dns-udeb libnss-files-udeb Architecture: source Version: 2.21-0experimental2 Distribution: experimental Urgency: medium Maintainer: GNU Libc Maintainers Changed-By: Aurelien Jarno Description: glibc-doc - GNU C Library: Documentation glibc-source - GNU C Library: sources libc-bin - GNU C Library: Binaries libc-dev-bin - GNU C Library: Development binaries libc-l10n - GNU C Library: localization files libc0.1- GNU C Library: Shared libraries libc0.1-dbg - GNU C Library: detached debugging symbols libc0.1-dev - GNU C Library: Development Libraries and Header Files libc0.1-dev-i386 - GNU C Library: 32bit development libraries for AMD64 libc0.1-i386 - GNU C Library: 32bit shared libraries for AMD64 libc0.1-i686 - GNU C Library: Shared libraries [i686 optimized] libc0.1-pic - GNU C Library: PIC archive library libc0.1-udeb - GNU C Library: Shared libraries - udeb (udeb) libc0.3- GNU C Library: Shared libraries libc0.3-dbg - GNU C Library: detached debugging symbols libc0.3-dev - GNU C Library: Development Libraries and Header Files libc0.3-i686 - GNU C Library: Shared libraries [i686 optimized] libc0.3-pic - GNU C Library: PIC archive library libc0.3-udeb - GNU C Library: Shared libraries - udeb (udeb) libc0.3-xen - GNU C Library: Shared libraries [Xen version] libc6 - GNU C Library: Shared libraries libc6-amd64 - GNU C Library: 64bit Shared libraries for AMD64 libc6-dbg - GNU C Library: detached debugging symbols libc6-dev - GNU C Library: Development Libraries and Header Files libc6-dev-amd64 - GNU C Library: 64bit Development Libraries for AMD64 libc6-dev-i386 - GNU C Library: 32-bit development libraries for AMD64 libc6-dev-mips32 - GNU C Library: o32 Development Libraries for MIPS libc6-dev-mips64 - GNU C Library: 64bit Development Libraries for MIPS64 libc6-dev-mipsn32 - GNU C Library: n32 Development Libraries for MIPS64 libc6-dev-powerpc - GNU C Library: 32bit powerpc
Bug#800574: marked as done (libc6: lock elision hazard on Intel Broadwell and Skylake)
Your message dated Mon, 19 Oct 2015 05:19:14 + with message-idand subject line Bug#800574: fixed in glibc 2.21-0experimental2 has caused the Debian Bug report #800574, regarding libc6: lock elision hazard on Intel Broadwell and Skylake to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 800574: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=800574 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems --- Begin Message --- Package: libc6 Version: 2.19-4 Severity: grave Justification: causes non-serious data loss Intel Broadwell-H and Skylake-S/H have critical errata that causes HLE to be extremely dangerous to use on those processors, resulting in unpredictable behavior (i.e. process crashes when you are lucky, data corruption when you are not) when hardware lock-elision is enabled in glibc/libpthread. Broadwell errata BBD50 (desktop/mobile), BDW50 (server): An HLE (Hardware Lock Elision) transactional region begins with an instruction with the XACQUIRE prefix. Due to this erratum, reads from within the transactional region of the memory destination of that instruction may return the value that was in memory before the transactional region began According to the Intel errata list, a firmware fix is possible, but I have no idea whether it is done by toggling a boot-locked MSR that disables HLE, or through a microcode update. The MSR is more likely, but if it is a microcode update, it is going to be as much of a hazard as the Haswell one that disabled TSX+HLE. I recommend that we extend the HLE blacklist in glibc to also include CPU signature 0x40671. This will disable HLE on Xeon E3-1200v4, and 5th-generation Core i5/i7. These processors are supposed to already have TSX disabled (errata BBD51/BDW51). Skylake's latest public specification update still doesn't list any HLE errata, but it is not really recent. OTOH, there is a Gentoo user's report that Skylake is also unstable when HLE is enabled in glibc and that the crashes stop when glibc is compiled without lock elision. For that reason, it might be a good idea to also blacklist HLE on CPU signatures 0x506e1, 0x506e2 and 0x506e3, which would disable HLE on Skylake-S and Skylake-H (6th gen Core i5/i7). This won't cover the Skylake Xeon E3-1200v5, for which there are no reports of breakage (nor a public specification update I could find). References: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=762195 https://bbs.archlinux.org/viewtopic.php?id=202545 In hindsight, it looks like we would have been better off by disabling lock elision entirely for Debian jessie when we fixed #762195. Something to consider when the time comes to fix this bug in stable through a stable update... -- "One disk to rule them all, One disk to find them. One disk to bring them all and in the darkness grind them. In the Land of Redmond where the shadows lie." -- The Silicon Valley Tarot Henrique Holschuh --- End Message --- --- Begin Message --- Source: glibc Source-Version: 2.21-0experimental2 We believe that the bug you reported is fixed in the latest version of glibc, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 800...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Aurelien Jarno (supplier of updated glibc package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@ftp-master.debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Mon, 19 Oct 2015 00:20:34 +0200 Source: glibc Binary: libc-bin libc-dev-bin libc-l10n glibc-doc glibc-source locales locales-all nscd multiarch-support libc6 libc6-dev libc6-dbg libc6-pic libc6-udeb libc6.1 libc6.1-dev libc6.1-dbg libc6.1-pic libc6.1-udeb libc0.3 libc0.3-dev libc0.3-dbg libc0.3-pic libc0.3-udeb libc0.1 libc0.1-dev libc0.1-dbg libc0.1-pic libc0.1-udeb libc6-i386 libc6-dev-i386 libc6-sparc libc6-dev-sparc libc6-sparc64 libc6-dev-sparc64 libc6-s390 libc6-dev-s390 libc6-amd64 libc6-dev-amd64 libc6-powerpc libc6-dev-powerpc libc6-ppc64 libc6-dev-ppc64 libc6-mips32 libc6-dev-mips32 libc6-mipsn32 libc6-dev-mipsn32 libc6-mips64 libc6-dev-mips64 libc0.1-i386 libc0.1-dev-i386 libc6-x32
Bug#798064: marked as done (glibc: please find kfreebsd-kernel-headers in multiarch path)
Your message dated Mon, 19 Oct 2015 05:19:14 + with message-idand subject line Bug#798064: fixed in glibc 2.21-0experimental2 has caused the Debian Bug report #798064, regarding glibc: please find kfreebsd-kernel-headers in multiarch path to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 798064: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798064 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems --- Begin Message --- Package: glibc Version: 2.19-19 Severity: wishlist Tags: patch Hi, We're hoping to move kfreebsd-kernel-headers' files to multiarch path /usr/include/$(DEB_TARGET_MULTIARCH), so that headers of other kernels are co-installable on a build machine (for cross-building and bootstrapping). gcc-5 is already fine with this. And since gcc's default include search path has /usr/include/$(DEB_TARGET_MULTIARCH), it is expected to not cause many problems; except where -nostdinc is used. Please could glibc be patched as attached, to always look in that directory for system includes, even for native builds (HOST==BUILD). We hope to make this change with kfreebsd-kernel-headers (>= 10.1~7~), unless there are objections, or if my upcoming mass rebuild reveal any other breakage in reverse-depends. Thanks! -- System Information: Debian Release: stretch/sid APT prefers unstable APT policy: (500, 'unstable'), (1, 'experimental') Architecture: kfreebsd-amd64 (x86_64) Kernel: kFreeBSD 9.0-2-amd64-xenhvm-ipsec Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash --- glibc-2.19/debian/sysdeps/kfreebsd.mk.orig 2015-07-09 12:28:06.0 + +++ glibc-2.19/debian/sysdeps/kfreebsd.mk 2015-09-04 16:04:43.104028000 + @@ -11,11 +11,7 @@ libc_extra_config_options = $(extra_config_options) ifndef KFREEBSD_SOURCE - ifeq ($(DEB_HOST_GNU_TYPE),$(DEB_BUILD_GNU_TYPE)) -KFREEBSD_HEADERS := /usr/include - else -KFREEBSD_HEADERS := /usr/$(DEB_HOST_GNU_TYPE)/include - endif + KFREEBSD_HEADERS := /usr/include/$(DEB_TARGET_MULTIARCH) else KFREEBSD_HEADERS := $(KFREEBSD_SOURCE)/sys endif --- End Message --- --- Begin Message --- Source: glibc Source-Version: 2.21-0experimental2 We believe that the bug you reported is fixed in the latest version of glibc, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 798...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Aurelien Jarno (supplier of updated glibc package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@ftp-master.debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Mon, 19 Oct 2015 00:20:34 +0200 Source: glibc Binary: libc-bin libc-dev-bin libc-l10n glibc-doc glibc-source locales locales-all nscd multiarch-support libc6 libc6-dev libc6-dbg libc6-pic libc6-udeb libc6.1 libc6.1-dev libc6.1-dbg libc6.1-pic libc6.1-udeb libc0.3 libc0.3-dev libc0.3-dbg libc0.3-pic libc0.3-udeb libc0.1 libc0.1-dev libc0.1-dbg libc0.1-pic libc0.1-udeb libc6-i386 libc6-dev-i386 libc6-sparc libc6-dev-sparc libc6-sparc64 libc6-dev-sparc64 libc6-s390 libc6-dev-s390 libc6-amd64 libc6-dev-amd64 libc6-powerpc libc6-dev-powerpc libc6-ppc64 libc6-dev-ppc64 libc6-mips32 libc6-dev-mips32 libc6-mipsn32 libc6-dev-mipsn32 libc6-mips64 libc6-dev-mips64 libc0.1-i386 libc0.1-dev-i386 libc6-x32 libc6-dev-x32 libc6-i686 libc6-xen libc0.1-i686 libc0.3-i686 libc0.3-xen libc6.1-alphaev67 libnss-dns-udeb libnss-files-udeb Architecture: source Version: 2.21-0experimental2 Distribution: experimental Urgency: medium Maintainer: GNU Libc Maintainers Changed-By: Aurelien Jarno Description: glibc-doc - GNU C Library: Documentation glibc-source - GNU C Library: sources libc-bin - GNU C Library: Binaries libc-dev-bin - GNU C Library: Development binaries libc-l10n - GNU C Library: localization files libc0.1- GNU C Library: Shared libraries libc0.1-dbg - GNU C Library: detached debugging symbols libc0.1-dev - GNU C Library: Development Libraries and Header Files libc0.1-dev-i386 - GNU C Library: 32bit development libraries for AMD64 libc0.1-i386 - GNU C Library: 32bit shared libraries for
Bug#801691: marked as done (glibc: pointer guarding weakness)
Your message dated Mon, 19 Oct 2015 05:19:14 + with message-idand subject line Bug#801691: fixed in glibc 2.21-0experimental2 has caused the Debian Bug report #801691, regarding glibc: pointer guarding weakness to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 801691: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=801691 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems --- Begin Message --- Package: glibc Severity: important Tags: security Justification: user security hole Please see http://www.openwall.com/lists/oss-security/2015/09/05/8 for details. Cheers, Moritz --- End Message --- --- Begin Message --- Source: glibc Source-Version: 2.21-0experimental2 We believe that the bug you reported is fixed in the latest version of glibc, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 801...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Aurelien Jarno (supplier of updated glibc package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@ftp-master.debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Mon, 19 Oct 2015 00:20:34 +0200 Source: glibc Binary: libc-bin libc-dev-bin libc-l10n glibc-doc glibc-source locales locales-all nscd multiarch-support libc6 libc6-dev libc6-dbg libc6-pic libc6-udeb libc6.1 libc6.1-dev libc6.1-dbg libc6.1-pic libc6.1-udeb libc0.3 libc0.3-dev libc0.3-dbg libc0.3-pic libc0.3-udeb libc0.1 libc0.1-dev libc0.1-dbg libc0.1-pic libc0.1-udeb libc6-i386 libc6-dev-i386 libc6-sparc libc6-dev-sparc libc6-sparc64 libc6-dev-sparc64 libc6-s390 libc6-dev-s390 libc6-amd64 libc6-dev-amd64 libc6-powerpc libc6-dev-powerpc libc6-ppc64 libc6-dev-ppc64 libc6-mips32 libc6-dev-mips32 libc6-mipsn32 libc6-dev-mipsn32 libc6-mips64 libc6-dev-mips64 libc0.1-i386 libc0.1-dev-i386 libc6-x32 libc6-dev-x32 libc6-i686 libc6-xen libc0.1-i686 libc0.3-i686 libc0.3-xen libc6.1-alphaev67 libnss-dns-udeb libnss-files-udeb Architecture: source Version: 2.21-0experimental2 Distribution: experimental Urgency: medium Maintainer: GNU Libc Maintainers Changed-By: Aurelien Jarno Description: glibc-doc - GNU C Library: Documentation glibc-source - GNU C Library: sources libc-bin - GNU C Library: Binaries libc-dev-bin - GNU C Library: Development binaries libc-l10n - GNU C Library: localization files libc0.1- GNU C Library: Shared libraries libc0.1-dbg - GNU C Library: detached debugging symbols libc0.1-dev - GNU C Library: Development Libraries and Header Files libc0.1-dev-i386 - GNU C Library: 32bit development libraries for AMD64 libc0.1-i386 - GNU C Library: 32bit shared libraries for AMD64 libc0.1-i686 - GNU C Library: Shared libraries [i686 optimized] libc0.1-pic - GNU C Library: PIC archive library libc0.1-udeb - GNU C Library: Shared libraries - udeb (udeb) libc0.3- GNU C Library: Shared libraries libc0.3-dbg - GNU C Library: detached debugging symbols libc0.3-dev - GNU C Library: Development Libraries and Header Files libc0.3-i686 - GNU C Library: Shared libraries [i686 optimized] libc0.3-pic - GNU C Library: PIC archive library libc0.3-udeb - GNU C Library: Shared libraries - udeb (udeb) libc0.3-xen - GNU C Library: Shared libraries [Xen version] libc6 - GNU C Library: Shared libraries libc6-amd64 - GNU C Library: 64bit Shared libraries for AMD64 libc6-dbg - GNU C Library: detached debugging symbols libc6-dev - GNU C Library: Development Libraries and Header Files libc6-dev-amd64 - GNU C Library: 64bit Development Libraries for AMD64 libc6-dev-i386 - GNU C Library: 32-bit development libraries for AMD64 libc6-dev-mips32 - GNU C Library: o32 Development Libraries for MIPS libc6-dev-mips64 - GNU C Library: 64bit Development Libraries for MIPS64 libc6-dev-mipsn32 - GNU C Library: n32 Development Libraries for MIPS64 libc6-dev-powerpc - GNU C Library: 32bit powerpc development libraries for ppc64 libc6-dev-ppc64 - GNU C Library: 64bit Development Libraries for PowerPC64 libc6-dev-s390 - GNU C Library: 32bit Development Libraries for IBM zSeries libc6-dev-sparc - GNU C Library: 32bit Development Libraries for
Processed: unmerging 802256
Processing commands for cont...@bugs.debian.org: > unmerge 802256 Bug #802256 [libc6] Backport tls_dtor_list hardening Ignoring request to unmerge a bug which is not merged with any others. > thanks Stopping processing here. Please contact me if you need assistance. -- 802256: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=802256 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems
Processed (with 1 error): merging 798316 802256
Processing commands for cont...@bugs.debian.org: > merge 798316 802256 Bug #798316 [libc6] libc6: Pointer guarding bypass in dynamic Setuid binaries Unable to merge bugs because: severity of #802256 is 'normal' not 'important' Failed to merge 798316: Did not alter merged bugs. > thanks Stopping processing here. Please contact me if you need assistance. -- 798316: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798316 802256: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=802256 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems
Processed (with 1 error): merging 798316 801691
Processing commands for cont...@bugs.debian.org: > merge 798316 801691 Bug #798316 [libc6] libc6: Pointer guarding bypass in dynamic Setuid binaries Unable to merge bugs because: package of #801691 is 'glibc' not 'libc6' Failed to merge 798316: Did not alter merged bugs. > thanks Stopping processing here. Please contact me if you need assistance. -- 798316: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798316 801691: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=801691 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems
r6650 - in glibc-package/branches/glibc-2.21/debian: . po
Author: aurel32 Date: 2015-10-18 22:18:25 + (Sun, 18 Oct 2015) New Revision: 6650 Modified: glibc-package/branches/glibc-2.21/debian/changelog glibc-package/branches/glibc-2.21/debian/po/pt_BR.po Log: Update Brazilian Portuguese debconf translation, by Adriano Rafael Gomes. Closes: #799418. Modified: glibc-package/branches/glibc-2.21/debian/changelog === --- glibc-package/branches/glibc-2.21/debian/changelog 2015-10-18 22:16:32 UTC (rev 6649) +++ glibc-package/branches/glibc-2.21/debian/changelog 2015-10-18 22:18:25 UTC (rev 6650) @@ -70,6 +70,8 @@ unconditionally disable LD_POINTER_GUARD. Closes: #798316, #801691. * patches/any/cvs-mangle-tls_dtor_list.diff: new patch from upstream to mangle function pointers in tls_dtor_list. Closes: #802256. + * Update Brazilian Portuguese debconf translation, by Adriano Rafael +Gomes. Closes: #799418. [ Steven Chamberlain ] * sysdeps/kfreebsd.mk: find kfreebsd-kernel-headers in multiarch path. Modified: glibc-package/branches/glibc-2.21/debian/po/pt_BR.po === --- glibc-package/branches/glibc-2.21/debian/po/pt_BR.po2015-10-18 22:16:32 UTC (rev 6649) +++ glibc-package/branches/glibc-2.21/debian/po/pt_BR.po2015-10-18 22:18:25 UTC (rev 6650) @@ -2,21 +2,22 @@ # Copyright (C) 2007 THE glibc'S COPYRIGHT HOLDER # This file is distributed under the same license as the glibc package. # Felipe Augusto van de Wiel (faw), 2007-2008. +# Fernando Ike de Oliveira (fike) , 2013. +# Adriano Rafael Gomes , 2014-2015. # msgid "" msgstr "" -"Project-Id-Version: libc6\n" +"Project-Id-Version: glibc\n" "Report-Msgid-Bugs-To: gl...@packages.debian.org\n" "POT-Creation-Date: 2014-05-21 00:04+0200\n" -"PO-Revision-Date: 2008-06-09 01:17-0300\n" -"Last-Translator: Felipe Augusto van de Wiel (faw) \n" +"PO-Revision-Date: 2015-09-18 20:29-0300\n" +"Last-Translator: Adriano Rafael Gomes \n" "Language-Team: Brazilian Portuguese \n" "Language: pt_BR\n" "MIME-Version: 1.0\n" "Content-Type: text/plain; charset=UTF-8\n" "Content-Transfer-Encoding: 8bit\n" -"pt_BR utf-8\n" #. Type: multiselect #. Choices @@ -37,9 +38,9 @@ "Locales are a framework to switch between multiple languages and allow users " "to use their language, country, characters, collation order, etc." msgstr "" -"Locales são uma infra-estrutura para alternar entre múltiplos idiomas e " -"permite aos usuários utilizar o seu idioma, país, caracteres, ordem de " -"colação, etc." +"Locales são uma infraestrutura para alternar entre múltiplos idiomas e " +"permitem aos usuários utilizar o seu idioma, país, caracteres, ordenação, " +"etc." #. Type: multiselect #. Description @@ -88,7 +89,7 @@ msgstr "" "Isto selecionará o idioma padrão para o sistema inteiro. Se este sistema é " "um sistema multiusuário no qual nem todos os usuários são capazes de falar o " -"idioma padrão, eles vão enfrentar dificuldades." +"idioma padrão, eles enfrentarão dificuldades." #. Type: boolean #. Description @@ -108,12 +109,13 @@ "yourself is xdm - because automatic restart might disconnect your active X11 " "sessions." msgstr "" -"Serviços em execução e programas que usam NSS precisam ser reiniciados, caso " -"contrário eles podem não ser capazes de realizar consultas ou autenticação. " +"Serviços e programas em execução que usam NSS precisam ser reiniciados, caso " +"contrário, eles podem não ser capazes de realizar consultas ou autenticação. " "O processo de instalação é capaz de reiniciar alguns desses serviços (como " -"ssh, isto pode afetar sua habilidade de fazer login). Por favor, reveja a " -"seguinte lista separada por espaços de scripts init.d que serão reiniciados " -"agora, e corrija-a se necessário." +"ssh ou telnetd), mas outros programas não podem ser reiniciados " +"automaticamente. Um programa que precisa ser parado e reiniciado manualmente " +"por você depois da atualização da glibc é o xdm - porque reiniciar " +"automaticamente pode desconectar suas sessões ativas do X11." #. Type: boolean #. Description @@ -139,8 +141,7 @@ #. Description #: ../debhelper.in/libc.templates:2001 msgid "Services to restart for GNU libc library upgrade:" -msgstr "" -"Serviços para reiniciar por causa da atualização da biblioteca GNU libc:" +msgstr "Serviços a serem reiniciados para atualização da biblioteca GNU libc:" #. Type: string #. Description @@ -152,11 +153,11 @@ "review the following space-separated list of init.d scripts for services to " "be restarted now, and correct it if needed." msgstr "" -"Serviços em execução e programas que usam NSS precisam ser reiniciados, caso " -"contrário eles podem não ser capazes de realizar consultas ou autenticação " +"Serviços e programas em
Bug#801638: marked as done (libc-2.19.so: segfault at 0 ip 00000000f763946c sp 00000000ffe955e8 error 4 in libc-2.19.so[f74fb000+1a4000])
Your message dated Sun, 18 Oct 2015 21:08:46 +0200 with message-id <20151018190846.ga29...@aurel32.net> and subject line Re: Bug#801638: libc-2.19.so: segfault at 0 ip f763946c sp ffe955e8 error 4 in libc-2.19.so[f74fb000+1a4000] has caused the Debian Bug report #801638, regarding libc-2.19.so: segfault at 0 ip f763946c sp ffe955e8 error 4 in libc-2.19.so[f74fb000+1a4000] to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 801638: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=801638 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems --- Begin Message --- Package: libc6 Version: 2.19-18+deb8u1 Severity: normal File: libc-2.19.so Dear Maintainer, *** Reporter, please consider answering these questions, where appropriate *** * What led up to the situation? * What exactly did you do (or not do) that was effective (or ineffective)? * What was the outcome of this action? * What outcome did you expect instead? *** End of the template - remove these template lines *** -- System Information: Debian Release: 8.2 APT prefers stable-updates APT policy: (500, 'stable-updates'), (500, 'oldoldstable'), (500, 'stable') Architecture: amd64 (x86_64) Kernel: Linux 3.16.0-4-amd64 (SMP w/4 CPU cores) Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968) Shell: /bin/sh linked to /bin/bash Init: systemd (via /run/systemd/system) Versions of packages libc6:amd64 depends on: ii libgcc1 1:4.9.2-10 libc6:amd64 recommends no packages. Versions of packages libc6:amd64 suggests: ii debconf [debconf-2.0] 1.5.56 pn glibc-doc ii locales2.19-18+deb8u1 -- debconf information: glibc/restart-services: glibc/disable-screensaver: glibc/restart-failed: glibc/upgrade: true libraries/restart-without-asking: false --- End Message --- --- Begin Message --- On 2015-10-18 19:44, Aurelien Jarno wrote: > On 2015-10-13 00:27, Segmentation fault wrote: > > Package: libc6 > > Version: 2.19-18+deb8u1 > > Severity: normal > > File: libc-2.19.so > > > > Dear Maintainer, > > > > *** Reporter, please consider answering these questions, where appropriate > > *** > > > >* What led up to the situation? > >* What exactly did you do (or not do) that was effective (or > > ineffective)? > >* What was the outcome of this action? > >* What outcome did you expect instead? > > The error message you report likely means that one of the libc functions > was wrongly passed a NULL pointer. As such it's a bug in the application > you used and not in the libc. Can you please consider answering the > above question, so that we can identify the broken application and > reassign the bug to it? In the contrary we'll simply close this bug in > the next days. I got the following error message when sending the mail. | This message was created automatically by mail delivery software. | | A message that you sent could not be delivered to one or more of its | recipients. This is a permanent error. The following address(es) failed: | | volg...@list.ru | SMTP error from remote mail server after end of data: | host mxs.mail.ru [217.69.139.150]: 550 Message was not accepted -- invalid mailbox. Local mailbox volg...@list.ru is unavailable: | account is disabled I am therefore closing the bug. Please reopen it if more details if the bug can be reproduced. Aurelien -- Aurelien Jarno GPG: 4096R/1DDD8C9B aurel...@aurel32.net http://www.aurel32.net--- End Message ---
r6636 - in tzdata/branches/glibc-branch-jessie/debian: . po
Author: aurel32 Date: 2015-10-18 16:31:10 + (Sun, 18 Oct 2015) New Revision: 6636 Modified: tzdata/branches/glibc-branch-jessie/debian/po/be.po tzdata/branches/glibc-branch-jessie/debian/po/bg.po tzdata/branches/glibc-branch-jessie/debian/po/ca.po tzdata/branches/glibc-branch-jessie/debian/po/cs.po tzdata/branches/glibc-branch-jessie/debian/po/da.po tzdata/branches/glibc-branch-jessie/debian/po/de.po tzdata/branches/glibc-branch-jessie/debian/po/en.po tzdata/branches/glibc-branch-jessie/debian/po/es.po tzdata/branches/glibc-branch-jessie/debian/po/eu.po tzdata/branches/glibc-branch-jessie/debian/po/fi.po tzdata/branches/glibc-branch-jessie/debian/po/fr.po tzdata/branches/glibc-branch-jessie/debian/po/gl.po tzdata/branches/glibc-branch-jessie/debian/po/gu.po tzdata/branches/glibc-branch-jessie/debian/po/he.po tzdata/branches/glibc-branch-jessie/debian/po/hr.po tzdata/branches/glibc-branch-jessie/debian/po/hu.po tzdata/branches/glibc-branch-jessie/debian/po/id.po tzdata/branches/glibc-branch-jessie/debian/po/it.po tzdata/branches/glibc-branch-jessie/debian/po/ja.po tzdata/branches/glibc-branch-jessie/debian/po/ku.po tzdata/branches/glibc-branch-jessie/debian/po/lt.po tzdata/branches/glibc-branch-jessie/debian/po/ml.po tzdata/branches/glibc-branch-jessie/debian/po/nl.po tzdata/branches/glibc-branch-jessie/debian/po/pl.po tzdata/branches/glibc-branch-jessie/debian/po/pt.po tzdata/branches/glibc-branch-jessie/debian/po/pt_BR.po tzdata/branches/glibc-branch-jessie/debian/po/ru.po tzdata/branches/glibc-branch-jessie/debian/po/sk.po tzdata/branches/glibc-branch-jessie/debian/po/sq.po tzdata/branches/glibc-branch-jessie/debian/po/sv.po tzdata/branches/glibc-branch-jessie/debian/po/templates.pot tzdata/branches/glibc-branch-jessie/debian/po/th.po tzdata/branches/glibc-branch-jessie/debian/po/tr.po tzdata/branches/glibc-branch-jessie/debian/po/vi.po tzdata/branches/glibc-branch-jessie/debian/po/wo.po tzdata/branches/glibc-branch-jessie/debian/tzdata.templates Log: Import autogenerated templates and corresponding po files Modified: tzdata/branches/glibc-branch-jessie/debian/po/be.po === --- tzdata/branches/glibc-branch-jessie/debian/po/be.po 2015-10-14 22:05:48 UTC (rev 6635) +++ tzdata/branches/glibc-branch-jessie/debian/po/be.po 2015-10-18 16:31:10 UTC (rev 6636) @@ -21,7 +21,7 @@ msgstr "" "Project-Id-Version: tzdata_2008i-2_be\n" "Report-Msgid-Bugs-To: tzd...@packages.debian.org\n" -"POT-Creation-Date: 2013-12-24 23:07+0100\n" +"POT-Creation-Date: 2015-10-08 14:48+\n" "PO-Revision-Date: 2013-12-24 23:13+0100\n" "Last-Translator: Pavel Piatruk\n" "Language-Team: Belarusian (Official spelling) \n" @@ -1016,6 +1016,13 @@ #. Choices #. Translators: do not translate underscores. You can use spaces instead. #: ../tzdata.templates:3001 +msgid "Fort_Nelson" +msgstr "" + +#. Type: select +#. Choices +#. Translators: do not translate underscores. You can use spaces instead. +#: ../tzdata.templates:3001 msgid "Fortaleza" msgstr "Фарталеза" @@ -1785,6 +1792,13 @@ #. Choices #. Translators: do not translate underscores. You can use spaces instead. #: ../tzdata.templates:4001 +msgid "Troll" +msgstr "" + +#. Type: select +#. Choices +#. Translators: do not translate underscores. You can use spaces instead. +#: ../tzdata.templates:4001 msgid "Vostok" msgstr "Васток" @@ -1995,6 +2009,13 @@ #. Choices #. Translators: do not translate underscores. You can use spaces instead. #: ../tzdata.templates:7001 +msgid "Chita" +msgstr "" + +#. Type: select +#. Choices +#. Translators: do not translate underscores. You can use spaces instead. +#: ../tzdata.templates:7001 msgid "Choibalsan" msgstr "Чойбалсан" @@ -2365,6 +2386,13 @@ #. Choices #. Translators: do not translate underscores. You can use spaces instead. #: ../tzdata.templates:7001 +msgid "Srednekolymsk" +msgstr "" + +#. Type: select +#. Choices +#. Translators: do not translate underscores. You can use spaces instead. +#: ../tzdata.templates:7001 msgid "Taipei" msgstr "Тайпэй" @@ -3044,6 +3072,15 @@ #. Choices #. Translators: do not translate underscores. You can use spaces instead. #: ../tzdata.templates:11001 +#, fuzzy +#| msgid "Brazzaville" +msgid "Bougainville" +msgstr "Бразавіль" + +#. Type: select +#. Choices +#. Translators: do not translate underscores. You can use spaces instead. +#: ../tzdata.templates:11001 msgid "Chatham" msgstr "Чатам" Modified: tzdata/branches/glibc-branch-jessie/debian/po/bg.po === --- tzdata/branches/glibc-branch-jessie/debian/po/bg.po 2015-10-14 22:05:48 UTC (rev 6635) +++ tzdata/branches/glibc-branch-jessie/debian/po/bg.po 2015-10-18 16:31:10 UTC (rev 6636) @@ -17,7 +17,7 @@ msgstr "" "Project-Id-Version: bg\n"
r6638 - tzdata/branches/glibc-branch-squeeze/debian
Author: aurel32 Date: 2015-10-18 16:39:45 + (Sun, 18 Oct 2015) New Revision: 6638 Modified: tzdata/branches/glibc-branch-squeeze/debian/changelog Log: * New upstream version: - Fiji - Fort Nelson, British Columbia - Norfolk Island - Turkey (closes: #801172) - North Korea switches to +0830 on 2015-08-15. - Uruguay no longer observes DST (closes: #801336). - DST suspension from 2015-06-14 03:00 through 2015-07-19 02:00 in Morroco. Modified: tzdata/branches/glibc-branch-squeeze/debian/changelog === --- tzdata/branches/glibc-branch-squeeze/debian/changelog 2015-10-18 16:32:54 UTC (rev 6637) +++ tzdata/branches/glibc-branch-squeeze/debian/changelog 2015-10-18 16:39:45 UTC (rev 6638) @@ -1,3 +1,17 @@ +tzdata (2015g-0+deb6u1) UNRELEASED; urgency=medium + + * New upstream version: +- Fiji +- Fort Nelson, British Columbia +- Norfolk Island +- Turkey (closes: #801172) +- North Korea switches to +0830 on 2015-08-15. +- Uruguay no longer observes DST (closes: #801336). +- DST suspension from 2015-06-14 03:00 through 2015-07-19 02:00 in + Morroco. + + -- Aurelien JarnoSun, 18 Oct 2015 18:39:20 +0200 + tzdata (2015d-0+deb6u1) squeeze-lts; urgency=medium * New upstream version:
r6640 - tzdata/branches/glibc-branch-squeeze/debian
Author: aurel32 Date: 2015-10-18 16:45:54 + (Sun, 18 Oct 2015) New Revision: 6640 Modified: tzdata/branches/glibc-branch-squeeze/debian/templates Log: Import templates Modified: tzdata/branches/glibc-branch-squeeze/debian/templates === --- tzdata/branches/glibc-branch-squeeze/debian/templates 2015-10-18 16:43:30 UTC (rev 6639) +++ tzdata/branches/glibc-branch-squeeze/debian/templates 2015-10-18 16:45:54 UTC (rev 6640) @@ -5,93 +5,100 @@ #of "GMT+xx" or "GMT-xx" timezones # - SystemV will give the choice between zone named as per SystemV conventions: # EST5, MST7, etc. -__Choices: Africa, America, Antarctica, Australia, Arctic, Asia, Atlantic, Europe, Indian, Pacific, SystemV, Etc +__Choices: Africa, America, Antarctica, Australia, Arctic, Asia, Atlantic, Europe, Indian, Pacific, SystemV, US, Etc _Description: Geographic area: - Please select the geographic area you live in. Subsequent + Please select the geographic area in which you live. Subsequent configuration questions will narrow this down by presenting a list of cities, representing the time zones in which they are located. Template: tzdata/Zones/Africa Type: select # Translators: do not translate underscores. You can use spaces instead. -__Choices: Abidjan, Accra, Addis_Ababa, Algiers, Asmara, Bamako, Bangui, Banjul, Bissau, Blantyre, Brazzaville, Bujumbura, Cairo, Casablanca, Ceuta, Conakry, Dakar, Dar_es_Salaam, Djibouti, Douala, El_Aaiun, Freetown, Gaborone, Harare, Johannesburg, Kampala, Khartoum, Kigali, Kinshasa, Lagos, Libreville, Lome, Luanda, Lubumbashi, Lusaka, Malabo, Maputo, Maseru, Mbabane, Mogadishu, Monrovia, Nairobi, Ndjamena, Niamey, Nouakchott, Ouagadougou, Porto-Novo, Sao_Tome, Timbuktu, Tripoli, Tunis, Windhoek +__Choices: Abidjan, Accra, Addis_Ababa, Algiers, Asmara, Bamako, Bangui, Banjul, Bissau, Blantyre, Brazzaville, Bujumbura, Cairo, Casablanca, Ceuta, Conakry, Dakar, Dar_es_Salaam, Djibouti, Douala, El_Aaiun, Freetown, Gaborone, Harare, Johannesburg, Juba, Kampala, Khartoum, Kigali, Kinshasa, Lagos, Libreville, Lome, Luanda, Lubumbashi, Lusaka, Malabo, Maputo, Maseru, Mbabane, Mogadishu, Monrovia, Nairobi, Ndjamena, Niamey, Nouakchott, Ouagadougou, Porto-Novo, Sao_Tome, Timbuktu, Tripoli, Tunis, Windhoek _Description: Time zone: - Please select the time zone corresponding to your location. + Please select the city or region corresponding to your time zone. Template: tzdata/Zones/America Type: select # Translators: do not translate underscores. You can use spaces instead. -__Choices: Adak, Anchorage, Anguilla, Antigua, Araguaina, Argentina/Buenos_Aires, Argentina/Catamarca, Argentina/Cordoba, Argentina/Jujuy, Argentina/La_Rioja, Argentina/Mendoza, Argentina/Rio_Gallegos, Argentina/Salta, Argentina/San_Juan, Argentina/San_Luis, Argentina/Tucuman, Argentina/Ushuaia, Aruba, Asuncion, Atikokan, Atka, Bahia, Barbados, Belem, Belize, Blanc-Sablon, Boa_Vista, Bogota, Boise, Cambridge_Bay, Campo_Grande, Cancun, Caracas, Cayenne, Cayman, Chicago, Chihuahua, Coral_Harbour, Costa_Rica, Cuiaba, Curacao, Danmarkshavn, Dawson, Dawson_Creek, Denver, Detroit, Dominica, Edmonton, Eirunepe, El_Salvador, Ensenada, Fortaleza, Glace_Bay, Godthab, Goose_Bay, Grand_Turk, Grenada, Guadeloupe, Guatemala, Guayaquil, Guyana, Halifax, Havana, Hermosillo, Indiana/Indianapolis, Indiana/Knox, Indiana/Marengo, Indiana/Petersburg, Indiana/Tell_City, Indiana/Vevay, Indiana/Vincennes, Indiana/Winamac, Inuvik, Iqaluit, Jamaica, Juneau, Kentucky/Louisville, Kentucky/Monticello, La_Paz, L ima, Los_Angeles, Maceio, Managua, Manaus, Marigot, Martinique, Mazatlan, Menominee, Merida, Mexico_City, Miquelon, Moncton, Monterrey, Montevideo, Montreal, Montserrat, Nassau, New_York, Nipigon, Nome, Noronha, North_Dakota/Center, North_Dakota/New_Salem, Panama, Pangnirtung, Paramaribo, Phoenix, Port-au-Prince, Port_of_Spain, Porto_Acre, Porto_Velho, Puerto_Rico, Rainy_River, Rankin_Inlet, Recife, Regina, Resolute, Rio_Branco, Santarem, Santiago, Santo_Domingo, Sao_Paulo, Scoresbysund, Shiprock, St_Barthelemy, St_Johns, St_Kitts, St_Lucia, St_Thomas, St_Vincent, Swift_Current, Tegucigalpa, Thule, Thunder_Bay, Tijuana, Toronto, Tortola, Vancouver, Virgin, Whitehorse, Winnipeg, Yakutat, Yellowknife +__Choices: Adak, Anchorage, Anguilla, Antigua, Araguaina, Argentina/Buenos_Aires, Argentina/Catamarca, Argentina/Cordoba, Argentina/Jujuy, Argentina/La_Rioja, Argentina/Mendoza, Argentina/Rio_Gallegos, Argentina/Salta, Argentina/San_Juan, Argentina/San_Luis, Argentina/Tucuman, Argentina/Ushuaia, Aruba, Asuncion, Atikokan, Atka, Bahia, Bahia_Banderas, Barbados, Belem, Belize, Blanc-Sablon, Boa_Vista, Bogota, Boise, Cambridge_Bay, Campo_Grande, Cancun, Caracas, Cayenne, Cayman, Chicago, Chihuahua, Coral_Harbour, Costa_Rica, Creston, Cuiaba, Curacao, Danmarkshavn, Dawson, Dawson_Creek, Denver, Detroit, Dominica, Edmonton,
r6642 - tzdata/tags
Author: aurel32 Date: 2015-10-18 16:46:32 + (Sun, 18 Oct 2015) New Revision: 6642 Added: tzdata/tags/glibc-branch-squeeze/ Log: create tag directory
r6641 - tzdata/branches/glibc-branch-squeeze/debian
Author: aurel32 Date: 2015-10-18 16:46:13 + (Sun, 18 Oct 2015) New Revision: 6641 Modified: tzdata/branches/glibc-branch-squeeze/debian/changelog Log: releasing package tzdata version 2015g-0+deb6u1 Modified: tzdata/branches/glibc-branch-squeeze/debian/changelog === --- tzdata/branches/glibc-branch-squeeze/debian/changelog 2015-10-18 16:45:54 UTC (rev 6640) +++ tzdata/branches/glibc-branch-squeeze/debian/changelog 2015-10-18 16:46:13 UTC (rev 6641) @@ -1,4 +1,4 @@ -tzdata (2015g-0+deb6u1) UNRELEASED; urgency=medium +tzdata (2015g-0+deb6u1) squeeze-lts; urgency=medium * New upstream version: - Fiji @@ -10,7 +10,7 @@ - DST suspension from 2015-06-14 03:00 through 2015-07-19 02:00 in Morroco. - -- Aurelien JarnoSun, 18 Oct 2015 18:39:20 +0200 + -- Aurelien Jarno Sun, 18 Oct 2015 18:46:00 +0200 tzdata (2015d-0+deb6u1) squeeze-lts; urgency=medium
tzdata_2015g-0+deb6u1_amd64.changes ACCEPTED into squeeze-lts
Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Sun, 18 Oct 2015 18:46:00 +0200 Source: tzdata Binary: tzdata tzdata-java Architecture: source all Version: 2015g-0+deb6u1 Distribution: squeeze-lts Urgency: medium Maintainer: GNU Libc MaintainersChanged-By: Aurelien Jarno Description: tzdata - time zone and daylight-saving time data tzdata-java - time zone and daylight-saving time data for use by java runtimes Closes: 801172 801336 Changes: tzdata (2015g-0+deb6u1) squeeze-lts; urgency=medium . * New upstream version: - Fiji - Fort Nelson, British Columbia - Norfolk Island - Turkey (closes: #801172) - North Korea switches to +0830 on 2015-08-15. - Uruguay no longer observes DST (closes: #801336). - DST suspension from 2015-06-14 03:00 through 2015-07-19 02:00 in Morroco. Checksums-Sha1: 4fda9115f2d0b61d2accc2e640bccaae234b5e63 1787 tzdata_2015g-0+deb6u1.dsc 96528dcbb790ed181a47db7e4cace4eeaec5728e 300363 tzdata_2015g.orig.tar.gz 6439bd0082fcfd361f7ee60753d45efd1769d00e 266652 tzdata_2015g-0+deb6u1.debian.tar.gz b309f042ce2876340a191468daa116bab842981a 566706 tzdata_2015g-0+deb6u1_all.deb d30d46b572dad4bacf829b0fe85a6056cad1c9fe 127532 tzdata-java_2015g-0+deb6u1_all.deb Checksums-Sha256: bb44012aedd5a5326df39feddcd47ae74a62924f8d2d532e46b18b20bce6b5b6 1787 tzdata_2015g-0+deb6u1.dsc b923cdbf078491696b17bc8d069c74bce73fabc5774629da2f410c9b31576161 300363 tzdata_2015g.orig.tar.gz 33b8e96d21f7d789233103c698e6e94c567c4fb684761767fb0dd3d362540919 266652 tzdata_2015g-0+deb6u1.debian.tar.gz cd2d02fdc0e014b0c06952fb61cf759422987fec40d540f909518b0053135040 566706 tzdata_2015g-0+deb6u1_all.deb dd5cbe4c6158bf288bf16d96f988d1dce49a661f2eef3e609863cfd8ac574d27 127532 tzdata-java_2015g-0+deb6u1_all.deb Files: 9c6cf71c25b1b1213fbd6b9be0884e46 1787 libs required tzdata_2015g-0+deb6u1.dsc 8d46e8b225b9a04c75f5c39636435ad6 300363 libs required tzdata_2015g.orig.tar.gz d591b2b1ecf41f4846763abc63543c7a 266652 libs required tzdata_2015g-0+deb6u1.debian.tar.gz 7783975f008417218fa1feb0680c78ca 566706 libs required tzdata_2015g-0+deb6u1_all.deb 848131b7752ee56fabb53b4f843f3eb0 127532 java optional tzdata-java_2015g-0+deb6u1_all.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1 iQIcBAEBAgAGBQJWI80cAAoJELqceAYd3YybEC0QAKtsbWd+EERn6t3B2V8dw9QA Qrwg+8FS2yZApbdga3E5n5yOK9Cdi2j3wQCWU5Pcwh5mCGcVYlb0fnnXFKjrkXJZ zM8FoTQxifpXsMpGKwz8M/NhSHEGpzEiZM96cJZEMIqBnm1820sqj9F/NlgMFsfD +3/YSdQBSgh21mxgJMFIuh2gPp3lbUAeXxaUXx9x3u+OZoqQ8vzBc0XIQ/CV/j1E 4XbPiOoS8O01opnMdDdKGVIo3Fnk//KbwyqXeSoaIoijxzOpL5SShCcThuHnCjwG bn2DTM3zhR3HoBpgPQgjYPxxBwPOp6mUkhJufnC8TcFZZ8bezsIUZyAx+W2kr2pD KC+7tZ9T4RpoYfjTeSBl41LIt72+/0Q3YeFWpxr9mEUR+NJ2Th2uBDMDZT9N6rk5 GzQxzy+762/ALzCwtWVS30o6SiNXcU6cEsdLtVouy+5bBcciDPLWhIuv6e7951Y1 D7aZKKrv8yAotTL88KJtZiQNq5WHP2KGHGc5j5x8Hr2it1qQ19egbluoivZ0asTo jwJp7SpvcN982wiH4j6/e19+g2pHEmFCANvIMTBv/W3+qq7Zue1jTKbMFR50SSpf G3gPmHgorkVAKyYclzkw2wjxzsOGbr6/jFBpSX31i5r6fd5pZk4/S2u1o6SNrFxf 2XU8ElMOC+bHVkvBxZPu =yLdO -END PGP SIGNATURE- Thank you for your contribution to Debian.
Bug#801638: libc-2.19.so: segfault at 0 ip 00000000f763946c sp 00000000ffe955e8 error 4 in libc-2.19.so[f74fb000+1a4000]
On 2015-10-13 00:27, Segmentation fault wrote: > Package: libc6 > Version: 2.19-18+deb8u1 > Severity: normal > File: libc-2.19.so > > Dear Maintainer, > > *** Reporter, please consider answering these questions, where appropriate *** > >* What led up to the situation? >* What exactly did you do (or not do) that was effective (or > ineffective)? >* What was the outcome of this action? >* What outcome did you expect instead? The error message you report likely means that one of the libc functions was wrongly passed a NULL pointer. As such it's a bug in the application you used and not in the libc. Can you please consider answering the above question, so that we can identify the broken application and reassign the bug to it? In the contrary we'll simply close this bug in the next days. Aurelien -- Aurelien Jarno GPG: 4096R/1DDD8C9B aurel...@aurel32.net http://www.aurel32.net
r6644 - in glibc-package/branches/glibc-branch-jessie/debian: . patches patches/amd64
Author: aurel32 Date: 2015-10-18 17:42:25 + (Sun, 18 Oct 2015) New Revision: 6644 Added: glibc-package/branches/glibc-branch-jessie/debian/patches/amd64/local-blacklist-for-Intel-TSX.diff Removed: glibc-package/branches/glibc-branch-jessie/debian/patches/amd64/local-blacklist-on-TSX-Haswell.diff Modified: glibc-package/branches/glibc-branch-jessie/debian/changelog glibc-package/branches/glibc-branch-jessie/debian/patches/series Log: Replace patches/amd64/local-blacklist-on-TSX-Haswell.diff by local-blacklist-for-Intel-TSX.diff also blacklisting some Broadwell models. Closes: #800574. Modified: glibc-package/branches/glibc-branch-jessie/debian/changelog === --- glibc-package/branches/glibc-branch-jessie/debian/changelog 2015-10-18 16:49:35 UTC (rev 6643) +++ glibc-package/branches/glibc-branch-jessie/debian/changelog 2015-10-18 17:42:25 UTC (rev 6644) @@ -5,6 +5,11 @@ - Fix getaddrinfo sometimes returning uninitialized data with nscd. Closes: #798515. + [ Henrique de Moraes Holschuh ] + * Replace patches/amd64/local-blacklist-on-TSX-Haswell.diff by +local-blacklist-for-Intel-TSX.diff also blacklisting some Broadwell +models. Closes: #800574. + -- Aurelien JarnoSat, 29 Aug 2015 11:19:53 +0200 glibc (2.19-18+deb8u1) stable; urgency=medium Added: glibc-package/branches/glibc-branch-jessie/debian/patches/amd64/local-blacklist-for-Intel-TSX.diff === --- glibc-package/branches/glibc-branch-jessie/debian/patches/amd64/local-blacklist-for-Intel-TSX.diff (rev 0) +++ glibc-package/branches/glibc-branch-jessie/debian/patches/amd64/local-blacklist-for-Intel-TSX.diff 2015-10-18 17:42:25 UTC (rev 6644) @@ -0,0 +1,99 @@ +Intel TSX is broken on Haswell based processors (erratum HSD136/HSW136) +and a microcode update is available to simply disable the corresponding +instructions. + +A live microcode update will disable the TSX instructions causing +already started binaries to segfault. This patch simply disable Intel +TSX (HLE and RTM) on processors which might receive a microcode update, +so that it doesn't happen. We might expect newer steppings to fix the +issue (e.g. as Haswell-EX did). + +Intel TSX-NI is also broken on Broadwell systems, and documented as +being unavailable in their specification updates errata list. However, +some end-user systems were shipped with old microcode that left Intel +TSX-NI still enabled in CPUID on these processors. We must not allow +RTM to be used by glibc on these systems, due to runtime system +misbehavior and live-update of microcode hazards. + +Author: Henrique de Moraes Holschuh + +--- a/sysdeps/x86_64/multiarch/init-arch.c b/sysdeps/x86_64/multiarch/init-arch.c +@@ -26,7 +26,7 @@ + + + static void +-get_common_indeces (unsigned int *family, unsigned int *model) ++get_common_indeces (unsigned int *family, unsigned int *model, unsigned int *stepping) + { + __cpuid (1, __cpu_features.cpuid[COMMON_CPUID_INDEX_1].eax, + __cpu_features.cpuid[COMMON_CPUID_INDEX_1].ebx, +@@ -36,6 +36,7 @@ + unsigned int eax = __cpu_features.cpuid[COMMON_CPUID_INDEX_1].eax; + *family = (eax >> 8) & 0x0f; + *model = (eax >> 4) & 0x0f; ++ *stepping = eax & 0x0f; + } + + +@@ -47,6 +48,7 @@ + unsigned int edx; + unsigned int family = 0; + unsigned int model = 0; ++ unsigned int stepping = 0; + enum cpu_features_kind kind; + + __cpuid (0, __cpu_features.max_cpuid, ebx, ecx, edx); +@@ -56,7 +58,7 @@ + { + kind = arch_kind_intel; + +- get_common_indeces (, ); ++ get_common_indeces (, , ); + + unsigned int eax = __cpu_features.cpuid[COMMON_CPUID_INDEX_1].eax; + unsigned int extended_family = (eax >> 20) & 0xff; +@@ -131,7 +133,7 @@ + { + kind = arch_kind_amd; + +- get_common_indeces (, ); ++ get_common_indeces (, , ); + + ecx = __cpu_features.cpuid[COMMON_CPUID_INDEX_1].ecx; + +@@ -176,6 +178,24 @@ + } + } + ++ /* Disable Intel TSX (HLE and RTM) due to erratum HSD136/HSW136 ++ on all Haswell processors, except Haswell-EX/Xeon E7-v3 (306F4), ++ to work around outdated microcode that doesn't disable the ++ broken feature by default. ++ ++ Disable TSX on Broadwell, due to errata BDM53/BDW51/BDD51/ ++ BDE42. The errata documentation states that RTM is unusable, ++ and that it should not be advertised by CPUID at all on any ++ such processors. Unfortunately, it _is_ advertised in some ++ (older) microcode versions. Exceptions: Broadwell-E (406Fx), ++ likely already fixed at launch */ ++ if (kind == arch_kind_intel && family == 6 && ++ ((model == 63 && stepping <= 2) || (model == 60 && stepping <= 3) || ++ (model == 69 && stepping <= 1) || (model == 70 && stepping <= 1) || ++ (model == 61 &&
r6643 - tzdata/branches/glibc-branch-wheezy/debian
Author: aurel32 Date: 2015-10-18 16:49:35 + (Sun, 18 Oct 2015) New Revision: 6643 Modified: tzdata/branches/glibc-branch-wheezy/debian/tzdata.templates Log: Also import tzdata.templates Modified: tzdata/branches/glibc-branch-wheezy/debian/tzdata.templates === --- tzdata/branches/glibc-branch-wheezy/debian/tzdata.templates 2015-10-18 16:46:32 UTC (rev 6642) +++ tzdata/branches/glibc-branch-wheezy/debian/tzdata.templates 2015-10-18 16:49:35 UTC (rev 6643) @@ -21,14 +21,14 @@ Template: tzdata/Zones/America Type: select # Translators: do not translate underscores. You can use spaces instead. -__Choices: Adak, Anchorage, Anguilla, Antigua, Araguaina, Argentina/Buenos_Aires, Argentina/Catamarca, Argentina/Cordoba, Argentina/Jujuy, Argentina/La_Rioja, Argentina/Mendoza, Argentina/Rio_Gallegos, Argentina/Salta, Argentina/San_Juan, Argentina/San_Luis, Argentina/Tucuman, Argentina/Ushuaia, Aruba, Asuncion, Atikokan, Atka, Bahia, Bahia_Banderas, Barbados, Belem, Belize, Blanc-Sablon, Boa_Vista, Bogota, Boise, Cambridge_Bay, Campo_Grande, Cancun, Caracas, Cayenne, Cayman, Chicago, Chihuahua, Coral_Harbour, Costa_Rica, Creston, Cuiaba, Curacao, Danmarkshavn, Dawson, Dawson_Creek, Denver, Detroit, Dominica, Edmonton, Eirunepe, El_Salvador, Ensenada, Fortaleza, Glace_Bay, Godthab, Goose_Bay, Grand_Turk, Grenada, Guadeloupe, Guatemala, Guayaquil, Guyana, Halifax, Havana, Hermosillo, Indiana/Indianapolis, Indiana/Knox, Indiana/Marengo, Indiana/Petersburg, Indiana/Tell_City, Indiana/Vevay, Indiana/Vincennes, Indiana/Winamac, Inuvik, Iqaluit, Jamaica, Juneau, Kentucky/Louisville, Kentu cky/Monticello, Kralendijk, La_Paz, Lima, Los_Angeles, Lower_Princes, Maceio, Managua, Manaus, Marigot, Martinique, Matamoros, Mazatlan, Menominee, Merida, Metlakatla, Mexico_City, Miquelon, Moncton, Monterrey, Montevideo, Montreal, Montserrat, Nassau, New_York, Nipigon, Nome, Noronha, North_Dakota/Beulah, North_Dakota/Center, North_Dakota/New_Salem, Ojinaga, Panama, Pangnirtung, Paramaribo, Phoenix, Port-au-Prince, Port_of_Spain, Porto_Acre, Porto_Velho, Puerto_Rico, Rainy_River, Rankin_Inlet, Recife, Regina, Resolute, Rio_Branco, Santa_Isabel, Santarem, Santiago, Santo_Domingo, Sao_Paulo, Scoresbysund, Shiprock, Sitka, St_Barthelemy, St_Johns, St_Kitts, St_Lucia, St_Thomas, St_Vincent, Swift_Current, Tegucigalpa, Thule, Thunder_Bay, Tijuana, Toronto, Tortola, Vancouver, Virgin, Whitehorse, Winnipeg, Yakutat, Yellowknife +__Choices: Adak, Anchorage, Anguilla, Antigua, Araguaina, Argentina/Buenos_Aires, Argentina/Catamarca, Argentina/Cordoba, Argentina/Jujuy, Argentina/La_Rioja, Argentina/Mendoza, Argentina/Rio_Gallegos, Argentina/Salta, Argentina/San_Juan, Argentina/San_Luis, Argentina/Tucuman, Argentina/Ushuaia, Aruba, Asuncion, Atikokan, Atka, Bahia, Bahia_Banderas, Barbados, Belem, Belize, Blanc-Sablon, Boa_Vista, Bogota, Boise, Cambridge_Bay, Campo_Grande, Cancun, Caracas, Cayenne, Cayman, Chicago, Chihuahua, Coral_Harbour, Costa_Rica, Creston, Cuiaba, Curacao, Danmarkshavn, Dawson, Dawson_Creek, Denver, Detroit, Dominica, Edmonton, Eirunepe, El_Salvador, Ensenada, Fort_Nelson, Fortaleza, Glace_Bay, Godthab, Goose_Bay, Grand_Turk, Grenada, Guadeloupe, Guatemala, Guayaquil, Guyana, Halifax, Havana, Hermosillo, Indiana/Indianapolis, Indiana/Knox, Indiana/Marengo, Indiana/Petersburg, Indiana/Tell_City, Indiana/Vevay, Indiana/Vincennes, Indiana/Winamac, Inuvik, Iqaluit, Jamaica, Juneau, Kentucky/Loui sville, Kentucky/Monticello, Kralendijk, La_Paz, Lima, Los_Angeles, Lower_Princes, Maceio, Managua, Manaus, Marigot, Martinique, Matamoros, Mazatlan, Menominee, Merida, Metlakatla, Mexico_City, Miquelon, Moncton, Monterrey, Montevideo, Montreal, Montserrat, Nassau, New_York, Nipigon, Nome, Noronha, North_Dakota/Beulah, North_Dakota/Center, North_Dakota/New_Salem, Ojinaga, Panama, Pangnirtung, Paramaribo, Phoenix, Port-au-Prince, Port_of_Spain, Porto_Acre, Porto_Velho, Puerto_Rico, Rainy_River, Rankin_Inlet, Recife, Regina, Resolute, Rio_Branco, Santa_Isabel, Santarem, Santiago, Santo_Domingo, Sao_Paulo, Scoresbysund, Shiprock, Sitka, St_Barthelemy, St_Johns, St_Kitts, St_Lucia, St_Thomas, St_Vincent, Swift_Current, Tegucigalpa, Thule, Thunder_Bay, Tijuana, Toronto, Tortola, Vancouver, Virgin, Whitehorse, Winnipeg, Yakutat, Yellowknife _Description: Time zone: Please select the city or region corresponding to your time zone. Template: tzdata/Zones/Antarctica Type: select # Translators: do not translate underscores. You can use spaces instead. -__Choices: Casey, Davis, DumontDUrville, Macquarie, Mawson, McMurdo, Palmer, Rothera, Syowa, Vostok +__Choices: Casey, Davis, DumontDUrville, Macquarie, Mawson, McMurdo, Palmer, Rothera, Syowa, Troll, Vostok _Description: Time zone: Please select the city or region corresponding to your time zone. @@ -49,7 +49,7 @@ Template: tzdata/Zones/Asia Type: select #
Processing of tzdata_2015g-0+deb6u1_amd64.changes
tzdata_2015g-0+deb6u1_amd64.changes uploaded successfully to localhost along with the files: tzdata_2015g-0+deb6u1.dsc tzdata_2015g.orig.tar.gz tzdata_2015g-0+deb6u1.debian.tar.gz tzdata_2015g-0+deb6u1_all.deb tzdata-java_2015g-0+deb6u1_all.deb Greetings, Your Debian queue daemon (running on host franck.debian.org)
Bug#801336: marked as done (tzdata: Not up to date in Squeeze LTS, wrong daylight savings setting in America/Montevideo.)
Your message dated Sun, 18 Oct 2015 17:04:53 + with message-idand subject line Bug#801336: fixed in tzdata 2015g-0+deb6u1 has caused the Debian Bug report #801336, regarding tzdata: Not up to date in Squeeze LTS, wrong daylight savings setting in America/Montevideo. to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 801336: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=801336 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems --- Begin Message --- Package: tzdata Version: 2015d-0+deb6u1 Severity: normal Tags: squeeze America/Montevideo says UYST with -0200 which is wrong now, the country decided not to use the daylight savings time, so we are in UYT -0300. This is on Squeeze LTS only of course. Thanks. -- System Information: Debian Release: 6.0.10 APT prefers squeeze-lts APT policy: (500, 'squeeze-lts'), (500, 'oldoldstable-updates'), (500, 'oldoldstable') Architecture: i386 (x86_64) Kernel: Linux 3.16.0-4-amd64 (SMP w/4 CPU cores) Locale: LANG=es_UY.UTF-8, LC_CTYPE=es_UY.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Versions of packages tzdata depends on: ii debconf [debconf-2.0] 1.5.36.1 Debian configuration management sy tzdata recommends no packages. tzdata suggests no packages. -- debconf information: tzdata/Zones/Australia: tzdata/Zones/Asia: tzdata/Zones/SystemV: tzdata/Zones/Pacific: tzdata/Zones/Atlantic: tzdata/Zones/US: * tzdata/Zones/Etc: UTC tzdata/Zones/Arctic: tzdata/Zones/Antarctica: tzdata/Zones/Europe: tzdata/Zones/Africa: * tzdata/Zones/America: Montevideo * tzdata/Areas: America tzdata/Zones/Indian: --- End Message --- --- Begin Message --- Source: tzdata Source-Version: 2015g-0+deb6u1 We believe that the bug you reported is fixed in the latest version of tzdata, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 801...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Aurelien Jarno (supplier of updated tzdata package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@ftp-master.debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Sun, 18 Oct 2015 18:46:00 +0200 Source: tzdata Binary: tzdata tzdata-java Architecture: source all Version: 2015g-0+deb6u1 Distribution: squeeze-lts Urgency: medium Maintainer: GNU Libc Maintainers Changed-By: Aurelien Jarno Description: tzdata - time zone and daylight-saving time data tzdata-java - time zone and daylight-saving time data for use by java runtimes Closes: 801172 801336 Changes: tzdata (2015g-0+deb6u1) squeeze-lts; urgency=medium . * New upstream version: - Fiji - Fort Nelson, British Columbia - Norfolk Island - Turkey (closes: #801172) - North Korea switches to +0830 on 2015-08-15. - Uruguay no longer observes DST (closes: #801336). - DST suspension from 2015-06-14 03:00 through 2015-07-19 02:00 in Morroco. Checksums-Sha1: 4fda9115f2d0b61d2accc2e640bccaae234b5e63 1787 tzdata_2015g-0+deb6u1.dsc 96528dcbb790ed181a47db7e4cace4eeaec5728e 300363 tzdata_2015g.orig.tar.gz 6439bd0082fcfd361f7ee60753d45efd1769d00e 266652 tzdata_2015g-0+deb6u1.debian.tar.gz b309f042ce2876340a191468daa116bab842981a 566706 tzdata_2015g-0+deb6u1_all.deb d30d46b572dad4bacf829b0fe85a6056cad1c9fe 127532 tzdata-java_2015g-0+deb6u1_all.deb Checksums-Sha256: bb44012aedd5a5326df39feddcd47ae74a62924f8d2d532e46b18b20bce6b5b6 1787 tzdata_2015g-0+deb6u1.dsc b923cdbf078491696b17bc8d069c74bce73fabc5774629da2f410c9b31576161 300363 tzdata_2015g.orig.tar.gz 33b8e96d21f7d789233103c698e6e94c567c4fb684761767fb0dd3d362540919 266652 tzdata_2015g-0+deb6u1.debian.tar.gz cd2d02fdc0e014b0c06952fb61cf759422987fec40d540f909518b0053135040 566706 tzdata_2015g-0+deb6u1_all.deb dd5cbe4c6158bf288bf16d96f988d1dce49a661f2eef3e609863cfd8ac574d27 127532 tzdata-java_2015g-0+deb6u1_all.deb Files: 9c6cf71c25b1b1213fbd6b9be0884e46 1787 libs required tzdata_2015g-0+deb6u1.dsc 8d46e8b225b9a04c75f5c39636435ad6 300363 libs required tzdata_2015g.orig.tar.gz d591b2b1ecf41f4846763abc63543c7a 266652 libs required tzdata_2015g-0+deb6u1.debian.tar.gz
Bug#801172: marked as done (Turkey delays winter time to 8th of November 04:00)
Your message dated Sun, 18 Oct 2015 17:04:53 + with message-idand subject line Bug#801172: fixed in tzdata 2015g-0+deb6u1 has caused the Debian Bug report #801172, regarding Turkey delays winter time to 8th of November 04:00 to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 801172: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=801172 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems --- Begin Message --- Package: tzdata Verson: 2015f-1 Due to elections in 1th of November, Turkey delays winter time to 8th of November (original one 25th of October). The change is upstreamed in tzdata package and can be found in "tzdata-latest.tar.gz" but Debian packages have not been updated. Here are the news articles (in Turkish) http://www.aa.com.tr/tr/turkiye/yaz-saati-uygulamasi-8-kasimda-sona-erecek/362217 http://www.hurriyet.com.tr/ekonomi/30228218.asp This bug is also filed against Ubuntu. I am attaching the reference: https://bugs.launchpad.net/ubuntu/+source/tzdata/+bug/1503560 Regards, -- Eren Türkay, System Administrator https://skyatlas.com/ | +90 850 885 0357 Yildiz Teknik Universitesi Davutpasa Kampusu Teknopark Bolgesi, D2 Blok No:107 Esenler, Istanbul Pk.34220 signature.asc Description: OpenPGP digital signature --- End Message --- --- Begin Message --- Source: tzdata Source-Version: 2015g-0+deb6u1 We believe that the bug you reported is fixed in the latest version of tzdata, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 801...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Aurelien Jarno (supplier of updated tzdata package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@ftp-master.debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Sun, 18 Oct 2015 18:46:00 +0200 Source: tzdata Binary: tzdata tzdata-java Architecture: source all Version: 2015g-0+deb6u1 Distribution: squeeze-lts Urgency: medium Maintainer: GNU Libc Maintainers Changed-By: Aurelien Jarno Description: tzdata - time zone and daylight-saving time data tzdata-java - time zone and daylight-saving time data for use by java runtimes Closes: 801172 801336 Changes: tzdata (2015g-0+deb6u1) squeeze-lts; urgency=medium . * New upstream version: - Fiji - Fort Nelson, British Columbia - Norfolk Island - Turkey (closes: #801172) - North Korea switches to +0830 on 2015-08-15. - Uruguay no longer observes DST (closes: #801336). - DST suspension from 2015-06-14 03:00 through 2015-07-19 02:00 in Morroco. Checksums-Sha1: 4fda9115f2d0b61d2accc2e640bccaae234b5e63 1787 tzdata_2015g-0+deb6u1.dsc 96528dcbb790ed181a47db7e4cace4eeaec5728e 300363 tzdata_2015g.orig.tar.gz 6439bd0082fcfd361f7ee60753d45efd1769d00e 266652 tzdata_2015g-0+deb6u1.debian.tar.gz b309f042ce2876340a191468daa116bab842981a 566706 tzdata_2015g-0+deb6u1_all.deb d30d46b572dad4bacf829b0fe85a6056cad1c9fe 127532 tzdata-java_2015g-0+deb6u1_all.deb Checksums-Sha256: bb44012aedd5a5326df39feddcd47ae74a62924f8d2d532e46b18b20bce6b5b6 1787 tzdata_2015g-0+deb6u1.dsc b923cdbf078491696b17bc8d069c74bce73fabc5774629da2f410c9b31576161 300363 tzdata_2015g.orig.tar.gz 33b8e96d21f7d789233103c698e6e94c567c4fb684761767fb0dd3d362540919 266652 tzdata_2015g-0+deb6u1.debian.tar.gz cd2d02fdc0e014b0c06952fb61cf759422987fec40d540f909518b0053135040 566706 tzdata_2015g-0+deb6u1_all.deb dd5cbe4c6158bf288bf16d96f988d1dce49a661f2eef3e609863cfd8ac574d27 127532 tzdata-java_2015g-0+deb6u1_all.deb Files: 9c6cf71c25b1b1213fbd6b9be0884e46 1787 libs required tzdata_2015g-0+deb6u1.dsc 8d46e8b225b9a04c75f5c39636435ad6 300363 libs required tzdata_2015g.orig.tar.gz d591b2b1ecf41f4846763abc63543c7a 266652 libs required tzdata_2015g-0+deb6u1.debian.tar.gz 7783975f008417218fa1feb0680c78ca 566706 libs required tzdata_2015g-0+deb6u1_all.deb 848131b7752ee56fabb53b4f843f3eb0 127532 java optional tzdata-java_2015g-0+deb6u1_all.deb -BEGIN PGP SIGNATURE- Version: GnuPG v1 iQIcBAEBAgAGBQJWI80cAAoJELqceAYd3YybEC0QAKtsbWd+EERn6t3B2V8dw9QA Qrwg+8FS2yZApbdga3E5n5yOK9Cdi2j3wQCWU5Pcwh5mCGcVYlb0fnnXFKjrkXJZ