Processed (with 5 errors): limit source to glibc, tagging 785796, tagging 798064, tagging 797831, tagging 797538, tagging 800574 ...

2015-10-18 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> limit source glibc
Limiting to bugs with field 'source' containing at least one of 'glibc'
Limit currently set to 'source':'glibc'

> tags 785796 + pending
Bug #785796 [src:glibc] glibc: kfreebsd should define F_DUPFD_CLOEXEC
Added tag(s) pending.
> tags 798064 + pending
Bug #798064 [src:glibc] glibc: please find kfreebsd-kernel-headers in multiarch 
path
Bug #672774 [src:glibc] build fix for multiarch-enabled kfreebsd-kernel-headers
Added tag(s) pending.
Added tag(s) pending.
> tags 797831 + pending
Bug #797831 [src:glibc] glibc: further problems with stage1
Added tag(s) pending.
> tags 797538 + pending
source: "eglibc, glibc"' does not match at least one of "glibc"
Failed to alter tags of Bug 797538: limit failed for bugs: 797538.

> tags 800574 + pending
source: "eglibc, glibc"' does not match at least one of "glibc"
Failed to alter tags of Bug 800574: limit failed for bugs: 800574.

> tags 800846 + pending
source: "eglibc, glibc"' does not match at least one of "glibc"
Failed to alter tags of Bug 800846: limit failed for bugs: 800846.

> tags 788799 + pending
source: "eglibc, glibc"' does not match at least one of "glibc"
Failed to alter tags of Bug 788799: limit failed for bugs: 788799.

> tags 764692 + pending
source: "eglibc, glibc"' does not match at least one of "glibc"
Failed to alter tags of Bug 764692: limit failed for bugs: 764692.

> tags 672774 + pending
Bug #672774 [src:glibc] build fix for multiarch-enabled kfreebsd-kernel-headers
Bug #798064 [src:glibc] glibc: please find kfreebsd-kernel-headers in multiarch 
path
Ignoring request to alter tags of bug #672774 to the same tags previously set
Ignoring request to alter tags of bug #798064 to the same tags previously set
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
672774: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=672774
785796: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=785796
797831: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=797831
798064: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798064
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



r6647 - in glibc-package/branches/glibc-2.21/debian: . patches patches/any

2015-10-18 Thread Aurelien Jarno
Author: aurel32
Date: 2015-10-18 20:36:25 + (Sun, 18 Oct 2015)
New Revision: 6647

Added:
   
glibc-package/branches/glibc-2.21/debian/patches/any/cvs-ld_pointer_guard.diff
Modified:
   glibc-package/branches/glibc-2.21/debian/changelog
   glibc-package/branches/glibc-2.21/debian/patches/series
Log:
patches/any/cvs-ld_pointer_guard.diff: new patch from upstream to
unconditionally disable LD_POINTER_GUARD.  Closes: #798316, #801691.

Modified: glibc-package/branches/glibc-2.21/debian/changelog
===
--- glibc-package/branches/glibc-2.21/debian/changelog  2015-10-18 20:36:20 UTC 
(rev 6646)
+++ glibc-package/branches/glibc-2.21/debian/changelog  2015-10-18 20:36:25 UTC 
(rev 6647)
@@ -66,6 +66,8 @@
 build failure.
   * debhelper.in/libc.preinst: fix up error message for too old Linux
 kernels.  Closes: #800846.
+  * patches/any/cvs-ld_pointer_guard.diff: new patch from upstream to
+unconditionally disable LD_POINTER_GUARD.  Closes: #798316, #801691.
 
   [ Steven Chamberlain ]
   * sysdeps/kfreebsd.mk: find kfreebsd-kernel-headers in multiarch path.

Added: 
glibc-package/branches/glibc-2.21/debian/patches/any/cvs-ld_pointer_guard.diff
===
--- 
glibc-package/branches/glibc-2.21/debian/patches/any/cvs-ld_pointer_guard.diff  
(rev 0)
+++ 
glibc-package/branches/glibc-2.21/debian/patches/any/cvs-ld_pointer_guard.diff  
2015-10-18 20:36:25 UTC (rev 6647)
@@ -0,0 +1,62 @@
+2015-10-15  Florian Weimer  
+
+   [BZ #18928]
+   * sysdeps/generic/ldsodefs.h (struct rtld_global_ro): Remove
+   _dl_pointer_guard member.
+   * elf/rtld.c (_rtld_global_ro): Remove _dl_pointer_guard
+   initializer.
+   (security_init): Always set up pointer guard.
+   (process_envvars): Do not process LD_POINTER_GUARD.
+
+--- a/elf/rtld.c
 b/elf/rtld.c
+@@ -162,7 +162,6 @@ struct rtld_global_ro _rtld_global_ro attribute_relro =
+ ._dl_hwcap_mask = HWCAP_IMPORTANT,
+ ._dl_lazy = 1,
+ ._dl_fpu_control = _FPU_DEFAULT,
+-._dl_pointer_guard = 1,
+ ._dl_pagesize = EXEC_PAGESIZE,
+ ._dl_inhibit_cache = 0,
+ 
+@@ -709,15 +708,12 @@ security_init (void)
+ #endif
+ 
+   /* Set up the pointer guard as well, if necessary.  */
+-  if (GLRO(dl_pointer_guard))
+-{
+-  uintptr_t pointer_chk_guard = _dl_setup_pointer_guard (_dl_random,
+-   stack_chk_guard);
++  uintptr_t pointer_chk_guard
++= _dl_setup_pointer_guard (_dl_random, stack_chk_guard);
+ #ifdef THREAD_SET_POINTER_GUARD
+-  THREAD_SET_POINTER_GUARD (pointer_chk_guard);
++  THREAD_SET_POINTER_GUARD (pointer_chk_guard);
+ #endif
+-  __pointer_chk_guard_local = pointer_chk_guard;
+-}
++  __pointer_chk_guard_local = pointer_chk_guard;
+ 
+   /* We do not need the _dl_random value anymore.  The less
+  information we leave behind, the better, so clear the
+@@ -2471,9 +2467,6 @@ process_envvars (enum mode *modep)
+ GLRO(dl_use_load_bias) = envline[14] == '1' ? -1 : 0;
+ break;
+   }
+-
+-if (memcmp (envline, "POINTER_GUARD", 13) == 0)
+-  GLRO(dl_pointer_guard) = envline[14] != '0';
+ break;
+ 
+   case 14:
+--- a/sysdeps/generic/ldsodefs.h
 b/sysdeps/generic/ldsodefs.h
+@@ -592,9 +592,6 @@ struct rtld_global_ro
+   /* List of auditing interfaces.  */
+   struct audit_ifaces *_dl_audit;
+   unsigned int _dl_naudit;
+-
+-  /* 0 if internal pointer values should not be guarded, 1 if they should.  */
+-  EXTERN int _dl_pointer_guard;
+ };
+ # define __rtld_global_attribute__
+ # if IS_IN (rtld)

Modified: glibc-package/branches/glibc-2.21/debian/patches/series
===
--- glibc-package/branches/glibc-2.21/debian/patches/series 2015-10-18 
20:36:20 UTC (rev 6646)
+++ glibc-package/branches/glibc-2.21/debian/patches/series 2015-10-18 
20:36:25 UTC (rev 6647)
@@ -267,3 +267,4 @@
 any/cvs-make-typo.diff
 any/cvs-logbl-accuracy.diff
 any/local-math-logb.diff
+any/cvs-ld_pointer_guard.diff



r6646 - in glibc-package/branches/glibc-branch-jessie/debian: . patches patches/any

2015-10-18 Thread Aurelien Jarno
Author: aurel32
Date: 2015-10-18 20:36:20 + (Sun, 18 Oct 2015)
New Revision: 6646

Added:
   
glibc-package/branches/glibc-branch-jessie/debian/patches/any/cvs-ld_pointer_guard.diff
Modified:
   glibc-package/branches/glibc-branch-jessie/debian/changelog
   glibc-package/branches/glibc-branch-jessie/debian/patches/series
Log:
patches/any/cvs-ld_pointer_guard.diff: new patch from upstream to
unconditionally disable LD_POINTER_GUARD.  Closes: #798316, #801691.

Modified: glibc-package/branches/glibc-branch-jessie/debian/changelog
===
--- glibc-package/branches/glibc-branch-jessie/debian/changelog 2015-10-18 
19:56:19 UTC (rev 6645)
+++ glibc-package/branches/glibc-branch-jessie/debian/changelog 2015-10-18 
20:36:20 UTC (rev 6646)
@@ -9,6 +9,8 @@
   * Replace patches/amd64/local-blacklist-on-TSX-Haswell.diff by 
 local-blacklist-for-Intel-TSX.diff also blacklisting some Broadwell
 models.  Closes: #800574.
+  * patches/any/cvs-ld_pointer_guard.diff: new patch from upstream to
+unconditionally disable LD_POINTER_GUARD.  Closes: #798316, #801691.
 
  -- Aurelien Jarno   Sat, 29 Aug 2015 11:19:53 +0200
 

Added: 
glibc-package/branches/glibc-branch-jessie/debian/patches/any/cvs-ld_pointer_guard.diff
===
--- 
glibc-package/branches/glibc-branch-jessie/debian/patches/any/cvs-ld_pointer_guard.diff
 (rev 0)
+++ 
glibc-package/branches/glibc-branch-jessie/debian/patches/any/cvs-ld_pointer_guard.diff
 2015-10-18 20:36:20 UTC (rev 6646)
@@ -0,0 +1,62 @@
+2015-10-15  Florian Weimer  
+
+   [BZ #18928]
+   * sysdeps/generic/ldsodefs.h (struct rtld_global_ro): Remove
+   _dl_pointer_guard member.
+   * elf/rtld.c (_rtld_global_ro): Remove _dl_pointer_guard
+   initializer.
+   (security_init): Always set up pointer guard.
+   (process_envvars): Do not process LD_POINTER_GUARD.
+
+--- a/elf/rtld.c
 b/elf/rtld.c
+@@ -162,7 +162,6 @@
+ ._dl_hwcap_mask = HWCAP_IMPORTANT,
+ ._dl_lazy = 1,
+ ._dl_fpu_control = _FPU_DEFAULT,
+-._dl_pointer_guard = 1,
+ ._dl_pagesize = EXEC_PAGESIZE,
+ ._dl_inhibit_cache = 0,
+ 
+@@ -857,15 +856,12 @@
+ #endif
+ 
+   /* Set up the pointer guard as well, if necessary.  */
+-  if (GLRO(dl_pointer_guard))
+-{
+-  uintptr_t pointer_chk_guard = _dl_setup_pointer_guard (_dl_random,
+-   stack_chk_guard);
++  uintptr_t pointer_chk_guard
++= _dl_setup_pointer_guard (_dl_random, stack_chk_guard);
+ #ifdef THREAD_SET_POINTER_GUARD
+-  THREAD_SET_POINTER_GUARD (pointer_chk_guard);
++  THREAD_SET_POINTER_GUARD (pointer_chk_guard);
+ #endif
+-  __pointer_chk_guard_local = pointer_chk_guard;
+-}
++  __pointer_chk_guard_local = pointer_chk_guard;
+ 
+   /* We do not need the _dl_random value anymore.  The less
+  information we leave behind, the better, so clear the
+@@ -2607,9 +2603,6 @@
+ GLRO(dl_use_load_bias) = envline[14] == '1' ? -1 : 0;
+ break;
+   }
+-
+-if (memcmp (envline, "POINTER_GUARD", 13) == 0)
+-  GLRO(dl_pointer_guard) = envline[14] != '0';
+ break;
+ 
+   case 14:
+--- a/sysdeps/generic/ldsodefs.h
 b/sysdeps/generic/ldsodefs.h
+@@ -591,9 +591,6 @@
+   /* List of auditing interfaces.  */
+   struct audit_ifaces *_dl_audit;
+   unsigned int _dl_naudit;
+-
+-  /* 0 if internal pointer values should not be guarded, 1 if they should.  */
+-  EXTERN int _dl_pointer_guard;
+ };
+ # define __rtld_global_attribute__
+ # ifdef IS_IN_rtld

Modified: glibc-package/branches/glibc-branch-jessie/debian/patches/series
===
--- glibc-package/branches/glibc-branch-jessie/debian/patches/series
2015-10-18 19:56:19 UTC (rev 6645)
+++ glibc-package/branches/glibc-branch-jessie/debian/patches/series
2015-10-18 20:36:20 UTC (rev 6646)
@@ -272,3 +272,4 @@
 any/cvs-vfprintf.diff
 any/cvs-wscanf.diff
 any/cvs-ldconfig-aux-cache.diff
+any/cvs-ld_pointer_guard.diff



Bug#798955: Moving glibc headers from /usr/include to /usr/include/$(DEB_HOST_MULTIARCH)

2015-10-18 Thread Aurelien Jarno
On 2015-09-23 21:38, Aurelien Jarno wrote:
> On 2015-09-14 15:13, Aurélien Gérôme wrote:
> > Source: glibc
> > Version: 2.21-0experimental1
> > Severity: wishlist
> > Tags: patch moreinfo
> > 
> > Hi,
> > 
> > On a multiarch-enabled Debian system, there is an impossibility to
> > install libc0.1-dev, libc0.3-dev, libc6-dev, and libc6.1-dev binary
> > packages at the same time, because glibc headers are all installed
> > in /usr/include.  Therefore, it does not allow us to install (in a
> > simple multiarch manner) several dependencies needed to cross-compile
> > for another target, e.g. cross-compiling for an amd64 target on a
> > hurd-i386 host.
> > 
> > This patch moves those headers from /usr/include to
> > /usr/include/$(DEB_HOST_MULTIARCH) and removes conflicts between
> > libc0.1-dev, libc0.3-dev, libc6-dev, and libc6.1-dev binary packages.
> 
> That looks fine on the principle, though that unfortunately prevent 
> sharing files between packages. I guess at some point we'll want to
> provide an arch:all libc-dev-common file to put them. That said we
> have to do the change anyway, as musl people will request it.
> 
> > So far, Helmut rebuilt ~100 packages fine with that include-moved
> > glibc.  Right now, we are waiting for a Debian access to Amazon
> > instances to rebuild the entire archive against that patched glibc
> > and to deal with possible FTBFS.  Tracking can be done on [0].
> 
> Before doing such a change, I clearly want to make sure it won't
> introduce (unknown) regressions. Doing an archive rebuild is clearly the
> way to go, thanks for doing that.

A small update from IRC:

23:52 < helmut> aurel32: quick update on #798955: 1) we know that it
breaks any package that uses multilib 2) we know that it breaks gcc's
fixincludes 3) we know that it breaks python2.7
23:53 < helmut> aurel32: i.e. sorting it out will take longer

-- 
Aurelien Jarno  GPG: 4096R/1DDD8C9B
aurel...@aurel32.net http://www.aurel32.net



Bug#800574: Final analysis for Broadwell

2015-10-18 Thread Henrique de Moraes Holschuh
On Sun, 18 Oct 2015, Aurelien Jarno wrote:
> > Broadwell-H with a very recent microcode update (rev 0x12, from
> > 2015-06-04) was confirmed to have broken TSX-NI (RTM) and to _leave it
> > enabled_ in CPUID, causing glibc with lock elision enabled to SIGSEGV. 
> > An even more recent Broadwell-H microcode update, rev 0x13 from
> > 2015-08-03, is confirmed to (finally) disable the HLE and RTM CPUID
> > bits.  This should make blacklisting signature 0x40671 uncontroversial.

FWIW, in the last few days it became clear that so far, the mobile
Broadwell-H disables Intel TSX, but no instances of the desktop
Broadwell-H with RTM disabled were found yet, not even with the latest
microcode.  And they all use the same microcode.

It has also became clear a few days ago that it is very likely that the
BIOS can disable Intel TSX-NI (RTM) and HLE, and it doesn't need very
recent microcode to do that either.  If this is true, it should be
something like MSR 0x13c (bit 1 of that MSR disables AES-NI when set,
and bit 0 locks that MSR against writting when set).  Maybe the Intel
TSX-NI (HLE and RTM) disable switches are even on this very same MSR...

I've also since became aware of Debian bug #750792, and it describes the
same SIGSEGV observed by Broadwell and Skylake Arch-linux users on
lock-elision-enabled glibc.  From that bug report, it is clear that the
SIGSEGVs in __lll_unlock_elision can easily happen due to software bugs,
so it need not be linked to any Intel-TSX processor errata.  And this
kind of defect is quite common, apparently.

However, since Intel's current public specification update states (as
errata) that Intel TSX-NI is not supposed to be usable in the Broadwell
and Broadwell-H cores, that it should not even be reported in CPUID by
these processors (but it is :p), and that this is not supposed to be
fixable or worked around, I still think we need to blacklist it.

I will keep tracking this issue, and report back any relevant
information that becomes available.  It would be _really_ nice if the
Intel team that works with Canonical were to shed a light on this,
though.

> Thanks for the patch, I have committed it to the jessie and the 2.21
> branches.

Thank you.

-- 
  "One disk to rule them all, One disk to find them. One disk to bring
  them all and in the darkness grind them. In the Land of Redmond
  where the shadows lie." -- The Silicon Valley Tarot
  Henrique Holschuh



Processed: fixed 779587 in 2.21-0experimental0

2015-10-18 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> fixed 779587 2.21-0experimental0
Bug #779587 [glibc] glibc: Three vulnerabilities
There is no source info for the package 'glibc' at version 
'2.21-0experimental0' with architecture ''
Unable to make a source version for version '2.21-0experimental0'
Marked as fixed in versions 2.21-0experimental0.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
779587: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=779587
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#800574: Final analysis for Broadwell

2015-10-18 Thread Aurelien Jarno
On 2015-10-08 22:20, Henrique de Moraes Holschuh wrote:
> tag 800574 + patch
> thanks
> 
> Attached updated version of amd64/local-blacklist-on-TSX-Haswell.diff.  
> I believe it should be renamed to
> "amd64/local-blacklist-for-Intel-TSX.diff" as it is not just about Intel
> Haswell anymore.
> 
> The updated patch has been package-compile-tested on glibc 2.19-22.
> 
> This new version of the blacklist patch had the patch header text and
> blacklist code comments updated.   It doesn't change anything for
> Haswell.  It adds to the blacklist the current Broadwell CPU models and
> steppings.
> 
> Broadwell-H with a very recent microcode update (rev 0x12, from
> 2015-06-04) was confirmed to have broken TSX-NI (RTM) and to _leave it
> enabled_ in CPUID, causing glibc with lock elision enabled to SIGSEGV. 
> An even more recent Broadwell-H microcode update, rev 0x13 from
> 2015-08-03, is confirmed to (finally) disable the HLE and RTM CPUID
> bits.  This should make blacklisting signature 0x40671 uncontroversial.
> 
> Refer to https://bugzilla.kernel.org/show_bug.cgi?id=103351 for details.
> 
> This version of the blacklist patch leaves upcoming Broadwell-E
> unblacklisted.  It also leaves Skylake unblacklisted, as I have not been
> able to confirm whether the newest Skylake-S microcode updates have
> working Intel TSX-NI, or have it disabled.
> 
> I propose that the updated blacklist patch be added to glibc in
> unstable, and after it spends a few weeks in testing, that it should
> also be the added to stable through a stable update.

Thanks for the patch, I have committed it to the jessie and the 2.21
branches.

-- 
Aurelien Jarno  GPG: 4096R/1DDD8C9B
aurel...@aurel32.net http://www.aurel32.net



r6645 - in glibc-package/branches/glibc-2.21/debian: . patches patches/amd64

2015-10-18 Thread Aurelien Jarno
Author: aurel32
Date: 2015-10-18 19:56:19 + (Sun, 18 Oct 2015)
New Revision: 6645

Added:
   
glibc-package/branches/glibc-2.21/debian/patches/amd64/local-blacklist-for-Intel-TSX.diff
Removed:
   
glibc-package/branches/glibc-2.21/debian/patches/amd64/local-blacklist-on-TSX-Haswell.diff
Modified:
   glibc-package/branches/glibc-2.21/debian/changelog
   glibc-package/branches/glibc-2.21/debian/patches/series
Log:
Replace patches/amd64/local-blacklist-on-TSX-Haswell.diff by 
local-blacklist-for-Intel-TSX.diff also blacklisting some Broadwell
models.  Closes: #800574.

Modified: glibc-package/branches/glibc-2.21/debian/changelog
===
--- glibc-package/branches/glibc-2.21/debian/changelog  2015-10-18 17:42:25 UTC 
(rev 6644)
+++ glibc-package/branches/glibc-2.21/debian/changelog  2015-10-18 19:56:19 UTC 
(rev 6645)
@@ -79,6 +79,11 @@
 support for futex_atomic_cmpxchg_inatomic to restore the  previous state
 and fix the pulsesink (and others) regression on ARM (closes: #788799)
 
+  [ Henrique de Moraes Holschuh ]
+  * Replace patches/amd64/local-blacklist-on-TSX-Haswell.diff by 
+local-blacklist-for-Intel-TSX.diff also blacklisting some Broadwell
+models.  Closes: #800574.
+
  -- Aurelien Jarno   Sat, 29 Aug 2015 00:43:44 +0200
 
 glibc (2.21-0experimental1) experimental; urgency=medium

Added: 
glibc-package/branches/glibc-2.21/debian/patches/amd64/local-blacklist-for-Intel-TSX.diff
===
--- 
glibc-package/branches/glibc-2.21/debian/patches/amd64/local-blacklist-for-Intel-TSX.diff
   (rev 0)
+++ 
glibc-package/branches/glibc-2.21/debian/patches/amd64/local-blacklist-for-Intel-TSX.diff
   2015-10-18 19:56:19 UTC (rev 6645)
@@ -0,0 +1,99 @@
+Intel TSX is broken on Haswell based processors (erratum HSD136/HSW136)
+and a microcode update is available to simply disable the corresponding
+instructions.
+
+A live microcode update will disable the TSX instructions causing
+already started binaries to segfault. This patch simply disable Intel
+TSX (HLE and RTM) on processors which might receive a microcode update,
+so that it doesn't happen.  We might expect newer steppings to fix the
+issue (e.g. as Haswell-EX did).
+
+Intel TSX-NI is also broken on Broadwell systems, and documented as
+being unavailable in their specification updates errata list.  However,
+some end-user systems were shipped with old microcode that left Intel
+TSX-NI still enabled in CPUID on these processors.  We must not allow
+RTM to be used by glibc on these systems, due to runtime system
+misbehavior and live-update of microcode hazards.
+
+Author: Henrique de Moraes Holschuh 
+
+--- a/sysdeps/x86_64/multiarch/init-arch.c
 b/sysdeps/x86_64/multiarch/init-arch.c
+@@ -26,7 +26,7 @@
+ 
+ 
+ static void
+-get_common_indeces (unsigned int *family, unsigned int *model)
++get_common_indeces (unsigned int *family, unsigned int *model, unsigned int 
*stepping)
+ {
+   __cpuid (1, __cpu_features.cpuid[COMMON_CPUID_INDEX_1].eax,
+  __cpu_features.cpuid[COMMON_CPUID_INDEX_1].ebx,
+@@ -36,6 +36,7 @@
+   unsigned int eax = __cpu_features.cpuid[COMMON_CPUID_INDEX_1].eax;
+   *family = (eax >> 8) & 0x0f;
+   *model = (eax >> 4) & 0x0f;
++  *stepping = eax & 0x0f;
+ }
+ 
+ 
+@@ -47,6 +48,7 @@
+   unsigned int edx;
+   unsigned int family = 0;
+   unsigned int model = 0;
++  unsigned int stepping = 0;
+   enum cpu_features_kind kind;
+ 
+   __cpuid (0, __cpu_features.max_cpuid, ebx, ecx, edx);
+@@ -56,7 +58,7 @@
+ {
+   kind = arch_kind_intel;
+ 
+-  get_common_indeces (, );
++  get_common_indeces (, , );
+ 
+   unsigned int eax = __cpu_features.cpuid[COMMON_CPUID_INDEX_1].eax;
+   unsigned int extended_family = (eax >> 20) & 0xff;
+@@ -135,7 +137,7 @@
+ {
+   kind = arch_kind_amd;
+ 
+-  get_common_indeces (, );
++  get_common_indeces (, , );
+ 
+   ecx = __cpu_features.cpuid[COMMON_CPUID_INDEX_1].ecx;
+ 
+@@ -188,6 +190,24 @@
+   }
+ }
+ 
++  /* Disable Intel TSX (HLE and RTM) due to erratum HSD136/HSW136
++ on all Haswell processors, except Haswell-EX/Xeon E7-v3 (306F4),
++ to work around outdated microcode that doesn't disable the
++ broken feature by default.
++
++ Disable TSX on Broadwell, due to errata BDM53/BDW51/BDD51/
++ BDE42.  The errata documentation states that RTM is unusable,
++ and that it should not be advertised by CPUID at all on any
++ such processors.  Unfortunately, it _is_ advertised in some
++ (older) microcode versions.  Exceptions: Broadwell-E (406Fx),
++ likely already fixed at launch */
++  if (kind == arch_kind_intel && family == 6 &&
++  ((model == 63 && stepping <= 2) || (model == 60 && stepping <= 3) ||
++   (model == 69 && stepping <= 1) || (model == 70 && stepping <= 1) ||
++   (model == 61 && stepping <= 4) || 

Processed: reassign 801691 to libc

2015-10-18 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> reassign 801691 libc
Bug #801691 [glibc] glibc: pointer guarding weakness
Bug reassigned from package 'glibc' to 'libc'.
Warning: Unknown package 'libc'
Warning: Unknown package 'libc'
Ignoring request to alter found versions of bug #801691 to the same values 
previously set
Warning: Unknown package 'libc'
Warning: Unknown package 'libc'
Ignoring request to alter fixed versions of bug #801691 to the same values 
previously set
Warning: Unknown package 'libc'
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
801691: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=801691
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Processed: fixed 799966 in 2.21-0experimental0

2015-10-18 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> fixed 799966 2.21-0experimental0
Bug #799966 [src:glibc] glibc: CVE-2015-5277: data corruption while reading the 
NSS files database
Marked as fixed in versions glibc/2.21-0experimental0.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
799966: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=799966
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#800574: Final analysis for Broadwell

2015-10-18 Thread Aurelien Jarno
On 2015-10-07 07:32, Henrique de Moraes Holschuh wrote:
> Meanwhile, a suggestion by Samuel Thibault to try to use hwcap did
> provide for a possible long-term plan to fine-tune the lock-elision
> blacklist (and anything else of that sort).
> 
> We would have to (finally) extend x86-64 hwcap to cpuid(1) fully, and
> also at least cpuid(7), which is anything but trivial and a lot of work.
>  This is _not_ worth the trouble if it is done just for lock elision
> blacklisting purposes.
> 
> However, it would be useful for link-time optimization in libraries
> (e.g. avx2 flavours of something that really benefits from it, etc), so
> it is likely worth pursuing... but only if we get buy-in from upstream.

Why do you believe that hwcap is better for handling that than the
current STT_GNU_IFUNC mechanism?

For me hwcap is clearly superseded by the STT_GNU_IFUNC:

1) With the hwcap mechanism the libraries need to be recompiled multiple
times, increasing build time, but also the disk space on the users
computer.

2) It makes the upgrades more complex (see the nohwcap part of the libc
preinst/postinst).

3) We need to ensure the ABI is the same for all versions of the same
library (this is not the case for upstream glibc between i586 and i686).

4) The fact that the CPU supports a feature doesn't mean it supports it
with good performances. For instance Intel Silvermont supports SSE4.2,
but SSE2/SSSE3 based version of string functions are much faster there.

5) Finally it means that we need to provide a version of the libc for
all combinations. Think on i386, we would need to provide:
 - libc6
 - libc6-i686
 - libc6-i686-tsx
 - libc6-xen
 - libc6-xen-tsx

-- 
Aurelien Jarno  GPG: 4096R/1DDD8C9B
aurel...@aurel32.net http://www.aurel32.net



Processed: reassign 801691 to libc6

2015-10-18 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> reassign 801691 libc6
Bug #801691 [libc] glibc: pointer guarding weakness
Warning: Unknown package 'libc'
Bug reassigned from package 'libc' to 'libc6'.
Ignoring request to alter found versions of bug #801691 to the same values 
previously set
Ignoring request to alter fixed versions of bug #801691 to the same values 
previously set
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
801691: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=801691
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Processed: merging 798316 801691

2015-10-18 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> merge 798316 801691
Bug #798316 [libc6] libc6: Pointer guarding bypass in dynamic Setuid binaries
Bug #801691 [libc6] glibc: pointer guarding weakness
Merged 798316 801691
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
798316: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798316
801691: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=801691
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



r6649 - in glibc-package/branches/glibc-2.21/debian: . patches patches/any

2015-10-18 Thread Aurelien Jarno
Author: aurel32
Date: 2015-10-18 22:16:32 + (Sun, 18 Oct 2015)
New Revision: 6649

Added:
   
glibc-package/branches/glibc-2.21/debian/patches/any/cvs-mangle-tls_dtor_list.diff
Modified:
   glibc-package/branches/glibc-2.21/debian/changelog
   glibc-package/branches/glibc-2.21/debian/patches/series
Log:
patches/any/cvs-mangle-tls_dtor_list.diff: new patch from upstream to
mangle function pointers in tls_dtor_list.  Closes: #802256.

Modified: glibc-package/branches/glibc-2.21/debian/changelog
===
--- glibc-package/branches/glibc-2.21/debian/changelog  2015-10-18 21:08:35 UTC 
(rev 6648)
+++ glibc-package/branches/glibc-2.21/debian/changelog  2015-10-18 22:16:32 UTC 
(rev 6649)
@@ -68,6 +68,8 @@
 kernels.  Closes: #800846.
   * patches/any/cvs-ld_pointer_guard.diff: new patch from upstream to
 unconditionally disable LD_POINTER_GUARD.  Closes: #798316, #801691.
+  * patches/any/cvs-mangle-tls_dtor_list.diff: new patch from upstream to
+mangle function pointers in tls_dtor_list.  Closes: #802256.
 
   [ Steven Chamberlain ]
   * sysdeps/kfreebsd.mk: find kfreebsd-kernel-headers in multiarch path.

Added: 
glibc-package/branches/glibc-2.21/debian/patches/any/cvs-mangle-tls_dtor_list.diff
===
--- 
glibc-package/branches/glibc-2.21/debian/patches/any/cvs-mangle-tls_dtor_list.diff
  (rev 0)
+++ 
glibc-package/branches/glibc-2.21/debian/patches/any/cvs-mangle-tls_dtor_list.diff
  2015-10-18 22:16:32 UTC (rev 6649)
@@ -0,0 +1,35 @@
+2015-10-06  Florian Weimer  
+
+   [BZ #19018]
+   * stdlib/cxa_thread_atexit_impl.c (__cxa_thread_atexit_impl):
+   Mangle function pointer before storing it.
+   (__call_tls_dtors): Demangle function pointer before calling it.
+
+--- a/stdlib/cxa_thread_atexit_impl.c
 b/stdlib/cxa_thread_atexit_impl.c
+@@ -42,6 +42,10 @@
+ int
+ __cxa_thread_atexit_impl (dtor_func func, void *obj, void *dso_symbol)
+ {
++#ifdef PTR_MANGLE
++  PTR_MANGLE (func);
++#endif
++
+   /* Prepend.  */
+   struct dtor_list *new = calloc (1, sizeof (struct dtor_list));
+   new->func = func;
+@@ -83,9 +87,13 @@
+   while (tls_dtor_list)
+ {
+   struct dtor_list *cur = tls_dtor_list;
++  dtor_func func = cur->func;
++#ifdef PTR_DEMANGLE
++  PTR_DEMANGLE (func);
++#endif
+   tls_dtor_list = tls_dtor_list->next;
+ 
+-  cur->func (cur->obj);
++  func (cur->obj);
+ 
+   __rtld_lock_lock_recursive (GL(dl_load_lock));
+ 

Modified: glibc-package/branches/glibc-2.21/debian/patches/series
===
--- glibc-package/branches/glibc-2.21/debian/patches/series 2015-10-18 
21:08:35 UTC (rev 6648)
+++ glibc-package/branches/glibc-2.21/debian/patches/series 2015-10-18 
22:16:32 UTC (rev 6649)
@@ -268,3 +268,4 @@
 any/cvs-logbl-accuracy.diff
 any/local-math-logb.diff
 any/cvs-ld_pointer_guard.diff
+any/cvs-mangle-tls_dtor_list.diff



Bug#802256: Backport tls_dtor_list hardening

2015-10-18 Thread Florian Weimer
Package: libc6
Version: 2.19-18+deb8u1

Please backport this upstream hardening patch to jessie (wheezy does
not have this feature yet):

  https://sourceware.org/bugzilla/show_bug.cgi?id=19018
  
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=f586e1328681b400078c995a0bb6ad301ef73549

Also recommended for testing purposes:

  
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=99e1dc0a688d6c25d3f422bc9f3fa29adb483339

Thanks,
Florian



r6648 - in glibc-package/branches/glibc-branch-jessie/debian: . patches

2015-10-18 Thread Aurelien Jarno
Author: aurel32
Date: 2015-10-18 21:08:35 + (Sun, 18 Oct 2015)
New Revision: 6648

Modified:
   glibc-package/branches/glibc-branch-jessie/debian/changelog
   glibc-package/branches/glibc-branch-jessie/debian/patches/git-updates.diff
Log:
Fix data corruption while reading the NSS files database
(CVE-2015-5277).  Closes: #799966.

Modified: glibc-package/branches/glibc-branch-jessie/debian/changelog
===
--- glibc-package/branches/glibc-branch-jessie/debian/changelog 2015-10-18 
20:36:25 UTC (rev 6647)
+++ glibc-package/branches/glibc-branch-jessie/debian/changelog 2015-10-18 
21:08:35 UTC (rev 6648)
@@ -4,6 +4,8 @@
   * Update from upstream stable branch:
 - Fix getaddrinfo sometimes returning uninitialized data with nscd.
   Closes: #798515.
+- Fix data corruption while reading the NSS files database
+  (CVE-2015-5277).  Closes: #799966.
 
   [ Henrique de Moraes Holschuh ]
   * Replace patches/amd64/local-blacklist-on-TSX-Haswell.diff by 

Modified: 
glibc-package/branches/glibc-branch-jessie/debian/patches/git-updates.diff
===
--- glibc-package/branches/glibc-branch-jessie/debian/patches/git-updates.diff  
2015-10-18 20:36:25 UTC (rev 6647)
+++ glibc-package/branches/glibc-branch-jessie/debian/patches/git-updates.diff  
2015-10-18 21:08:35 UTC (rev 6648)
@@ -1,10 +1,16 @@
 GIT update of git://sourceware.org/git/glibc.git/release/2.19/master from 
glibc-2.19
 
 diff --git a/ChangeLog b/ChangeLog
-index 81c393a..6aff2a2 100644
+index 81c393a..815acf0 100644
 --- a/ChangeLog
 +++ b/ChangeLog
-@@ -1,3 +1,358 @@
+@@ -1,3 +1,364 @@
++2014-06-23  Andreas Schwab  
++
++  [BZ #17079]
++  * nss/nss_files/files-XXX.c (get_contents): Store overflow marker
++  before reading the next line.
++
 +2015-10-02  Andreas Schwab  
 +
 +  * sysdeps/posix/getaddrinfo.c (gaih_inet): Advance address pointer
@@ -364,7 +370,7 @@
  
[BZ #16529]
 diff --git a/NEWS b/NEWS
-index 98b479e..fb0fa3c 100644
+index 98b479e..ed33f47 100644
 --- a/NEWS
 +++ b/NEWS
 @@ -5,6 +5,59 @@ See the end for copying conditions.
@@ -376,8 +382,8 @@
 +* The following bugs are resolved with this release:
 +
 +  15946, 16545, 16574, 16623, 16657, 16695, 16743, 16878, 16882, 16885,
-+  16916, 16932, 16943, 16958, 17048, 17069, 17137, 17153, 17213, 17263,
-+  17325, 17555, 18287.
++  16916, 16932, 16943, 16958, 17048, 17069, 17079, 17137, 17153, 17213,
++  17263, 17325, 17555, 18287.
 +
 +* A buffer overflow in gethostbyname_r and related functions performing DNS
 +  requests has been fixed.  If the NSS functions were called with a
@@ -1735,6 +1741,24 @@
  }
  
  enum nss_status (*endfct) (struct __netgrent *);
+diff --git a/nss/nss_files/files-XXX.c b/nss/nss_files/files-XXX.c
+index 36242f9..d4cd95e 100644
+--- a/nss/nss_files/files-XXX.c
 b/nss/nss_files/files-XXX.c
+@@ -198,10 +198,12 @@ get_contents (char *linebuf, size_t len, FILE *stream)
+ {
+   int curlen = ((remaining_len > (size_t) INT_MAX) ? INT_MAX
+   : remaining_len);
+-  char *p = fgets_unlocked (curbuf, curlen, stream);
+ 
++  /* Terminate the line so that we can test for overflow.  */
+   ((unsigned char *) curbuf)[curlen - 1] = 0xff;
+ 
++  char *p = fgets_unlocked (curbuf, curlen, stream);
++
+   /* EOF or read error.  */
+   if (p == NULL)
+ return gcr_error;
 diff --git a/nss/nss_files/files-netgrp.c b/nss/nss_files/files-netgrp.c
 index 34eae4c..bc0b367 100644
 --- a/nss/nss_files/files-netgrp.c



Bug#800574: Final analysis for Broadwell

2015-10-18 Thread Henrique de Moraes Holschuh
On Sun, 18 Oct 2015, Aurelien Jarno wrote:
> On 2015-10-07 07:32, Henrique de Moraes Holschuh wrote:
> > Meanwhile, a suggestion by Samuel Thibault to try to use hwcap did
> > provide for a possible long-term plan to fine-tune the lock-elision
> > blacklist (and anything else of that sort).
> > 
> > We would have to (finally) extend x86-64 hwcap to cpuid(1) fully, and
> > also at least cpuid(7), which is anything but trivial and a lot of work.
> >  This is _not_ worth the trouble if it is done just for lock elision
> > blacklisting purposes.
> > 
> > However, it would be useful for link-time optimization in libraries
> > (e.g. avx2 flavours of something that really benefits from it, etc), so
> > it is likely worth pursuing... but only if we get buy-in from upstream.
> 
> Why do you believe that hwcap is better for handling that than the
> current STT_GNU_IFUNC mechanism?

I was not aware of STT_GNU_IFUNC.  I will look into it.

> 5) Finally it means that we need to provide a version of the libc for
> all combinations. Think on i386, we would need to provide:
>  - libc6
>  - libc6-i686
>  - libc6-i686-tsx
>  - libc6-xen
>  - libc6-xen-tsx

No.  We need nothing of the sort for Intel TSX.  TSX-NI is something
already detected at runtime by glibc using the cpuid instruction, there
is no need to use the dynamic loader's hwcap object selection for this.

What I proposed was to extend the kernel-supplied hwcap area for x86-64
(and x32, I suppose) to export the full flags information returned by
CPUID.EAX=1, and also by CPUID.EAX=7 to all processes... and use _that_
instead of a direct call to the cpuid instruction to detect Intel TSX
(and anything else based on cpuid(1) and cpuid(7) in glibc).

We could do it for 32-bit too, I suppose.  But if hardware-assisted lock
elision is important enough to justify that kind of work for i686, that
just means we should deploy x32 instead, as far as I'm concerned.

Then, change glibc to use this extended hwcap information to detect such
runtime-selected features instead of calling the cpuid instruction
directly on the processor.  On an older kernel without the extended
hwcap fields, either call cpuid directly, or disable them.

However, for stuff like AVX512, you might want to have the *entire*
library compiled with a much more advanced instruction set (based on the
fact that AVX512 being available also implies that very fast SSE4.2 is
available, for example).  It would be possible to use the dynamic
linker's hwcap support to do that, if one wanted to.

-- 
  "One disk to rule them all, One disk to find them. One disk to bring
  them all and in the darkness grind them. In the Land of Redmond
  where the shadows lie." -- The Silicon Valley Tarot
  Henrique Holschuh



r6654 - glibc-package/branches/glibc-2.21/debian

2015-10-18 Thread Aurelien Jarno
Author: aurel32
Date: 2015-10-19 05:05:33 + (Mon, 19 Oct 2015)
New Revision: 6654

Modified:
   glibc-package/branches/glibc-2.21/debian/changelog
Log:
New changelog entry


Modified: glibc-package/branches/glibc-2.21/debian/changelog
===
--- glibc-package/branches/glibc-2.21/debian/changelog  2015-10-19 05:04:32 UTC 
(rev 6653)
+++ glibc-package/branches/glibc-2.21/debian/changelog  2015-10-19 05:05:33 UTC 
(rev 6654)
@@ -1,3 +1,9 @@
+glibc (2.21-0experimental3) UNRELEASED; urgency=medium
+
+  * 
+
+ -- Aurelien Jarno   Mon, 19 Oct 2015 07:05:23 +0200
+
 glibc (2.21-0experimental2) experimental; urgency=medium
 
   [ Samuel Thibault ]



glibc_2.21-0experimental2_source.changes ACCEPTED into experimental

2015-10-18 Thread Debian FTP Masters


Accepted:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.8
Date: Mon, 19 Oct 2015 00:20:34 +0200
Source: glibc
Binary: libc-bin libc-dev-bin libc-l10n glibc-doc glibc-source locales 
locales-all nscd multiarch-support libc6 libc6-dev libc6-dbg libc6-pic 
libc6-udeb libc6.1 libc6.1-dev libc6.1-dbg libc6.1-pic libc6.1-udeb libc0.3 
libc0.3-dev libc0.3-dbg libc0.3-pic libc0.3-udeb libc0.1 libc0.1-dev 
libc0.1-dbg libc0.1-pic libc0.1-udeb libc6-i386 libc6-dev-i386 libc6-sparc 
libc6-dev-sparc libc6-sparc64 libc6-dev-sparc64 libc6-s390 libc6-dev-s390 
libc6-amd64 libc6-dev-amd64 libc6-powerpc libc6-dev-powerpc libc6-ppc64 
libc6-dev-ppc64 libc6-mips32 libc6-dev-mips32 libc6-mipsn32 libc6-dev-mipsn32 
libc6-mips64 libc6-dev-mips64 libc0.1-i386 libc0.1-dev-i386 libc6-x32 
libc6-dev-x32 libc6-i686 libc6-xen libc0.1-i686 libc0.3-i686 libc0.3-xen 
libc6.1-alphaev67 libnss-dns-udeb libnss-files-udeb
Architecture: source
Version: 2.21-0experimental2
Distribution: experimental
Urgency: medium
Maintainer: GNU Libc Maintainers 
Changed-By: Aurelien Jarno 
Description:
 glibc-doc  - GNU C Library: Documentation
 glibc-source - GNU C Library: sources
 libc-bin   - GNU C Library: Binaries
 libc-dev-bin - GNU C Library: Development binaries
 libc-l10n  - GNU C Library: localization files
 libc0.1- GNU C Library: Shared libraries
 libc0.1-dbg - GNU C Library: detached debugging symbols
 libc0.1-dev - GNU C Library: Development Libraries and Header Files
 libc0.1-dev-i386 - GNU C Library: 32bit development libraries for AMD64
 libc0.1-i386 - GNU C Library: 32bit shared libraries for AMD64
 libc0.1-i686 - GNU C Library: Shared libraries [i686 optimized]
 libc0.1-pic - GNU C Library: PIC archive library
 libc0.1-udeb - GNU C Library: Shared libraries - udeb (udeb)
 libc0.3- GNU C Library: Shared libraries
 libc0.3-dbg - GNU C Library: detached debugging symbols
 libc0.3-dev - GNU C Library: Development Libraries and Header Files
 libc0.3-i686 - GNU C Library: Shared libraries [i686 optimized]
 libc0.3-pic - GNU C Library: PIC archive library
 libc0.3-udeb - GNU C Library: Shared libraries - udeb (udeb)
 libc0.3-xen - GNU C Library: Shared libraries [Xen version]
 libc6  - GNU C Library: Shared libraries
 libc6-amd64 - GNU C Library: 64bit Shared libraries for AMD64
 libc6-dbg  - GNU C Library: detached debugging symbols
 libc6-dev  - GNU C Library: Development Libraries and Header Files
 libc6-dev-amd64 - GNU C Library: 64bit Development Libraries for AMD64
 libc6-dev-i386 - GNU C Library: 32-bit development libraries for AMD64
 libc6-dev-mips32 - GNU C Library: o32 Development Libraries for MIPS
 libc6-dev-mips64 - GNU C Library: 64bit Development Libraries for MIPS64
 libc6-dev-mipsn32 - GNU C Library: n32 Development Libraries for MIPS64
 libc6-dev-powerpc - GNU C Library: 32bit powerpc development libraries for 
ppc64
 libc6-dev-ppc64 - GNU C Library: 64bit Development Libraries for PowerPC64
 libc6-dev-s390 - GNU C Library: 32bit Development Libraries for IBM zSeries
 libc6-dev-sparc - GNU C Library: 32bit Development Libraries for SPARC
 libc6-dev-sparc64 - GNU C Library: 64bit Development Libraries for UltraSPARC
 libc6-dev-x32 - GNU C Library: X32 ABI Development Libraries for AMD64
 libc6-i386 - GNU C Library: 32-bit shared libraries for AMD64
 libc6-i686 - GNU C Library: Shared libraries [i686 optimized]
 libc6-mips32 - GNU C Library: o32 Shared libraries for MIPS
 libc6-mips64 - GNU C Library: 64bit Shared libraries for MIPS64
 libc6-mipsn32 - GNU C Library: n32 Shared libraries for MIPS64
 libc6-pic  - GNU C Library: PIC archive library
 libc6-powerpc - GNU C Library: 32bit powerpc shared libraries for ppc64
 libc6-ppc64 - GNU C Library: 64bit Shared libraries for PowerPC64
 libc6-s390 - GNU C Library: 32bit Shared libraries for IBM zSeries
 libc6-sparc - GNU C Library: 32bit Shared libraries for SPARC
 libc6-sparc64 - GNU C Library: 64bit Shared libraries for UltraSPARC
 libc6-udeb - GNU C Library: Shared libraries - udeb (udeb)
 libc6-x32  - GNU C Library: X32 ABI Shared libraries for AMD64
 libc6-xen  - GNU C Library: Shared libraries [Xen version]
 libc6.1- GNU C Library: Shared libraries
 libc6.1-alphaev67 - GNU C Library: Shared libraries (EV67 optimized)
 libc6.1-dbg - GNU C Library: detached debugging symbols
 libc6.1-dev - GNU C Library: Development Libraries and Header Files
 libc6.1-pic - GNU C Library: PIC archive library
 libc6.1-udeb - GNU C Library: Shared libraries - udeb (udeb)
 libnss-dns-udeb - GNU C Library: NSS helper for DNS - udeb (udeb)
 libnss-files-udeb - GNU C Library: NSS helper for files - udeb (udeb)
 locales- GNU C Library: National Language (locale) data [support]
 locales-all - GNU C Library: Precompiled locale data
 multiarch-support - Transitional package to ensure multiarch compatibility
 nscd   - GNU C Library: Name Service Cache Daemon
Closes: 672774 764692 785796 788799 797538 797831 798064 

r6653 - glibc-package/tags/glibc-2.21

2015-10-18 Thread Aurelien Jarno
Author: aurel32
Date: 2015-10-19 05:04:32 + (Mon, 19 Oct 2015)
New Revision: 6653

Added:
   glibc-package/tags/glibc-2.21/2.21-0experimental2/
Log:
tagging package glibc version 2.21-0experimental2



r6651 - glibc-package/branches/glibc-2.21/debian

2015-10-18 Thread Aurelien Jarno
Author: aurel32
Date: 2015-10-19 05:04:23 + (Mon, 19 Oct 2015)
New Revision: 6651

Modified:
   glibc-package/branches/glibc-2.21/debian/changelog
Log:
releasing package glibc version 2.21-0experimental2

Modified: glibc-package/branches/glibc-2.21/debian/changelog
===
--- glibc-package/branches/glibc-2.21/debian/changelog  2015-10-18 22:18:25 UTC 
(rev 6650)
+++ glibc-package/branches/glibc-2.21/debian/changelog  2015-10-19 05:04:23 UTC 
(rev 6651)
@@ -1,4 +1,4 @@
-glibc (2.21-0experimental2) UNRELEASED; urgency=medium
+glibc (2.21-0experimental2) experimental; urgency=medium
 
   [ Samuel Thibault ]
   * Symbol versions which contain _DEBIAN_ are unexpected by upstream scripts.
@@ -90,7 +90,7 @@
 local-blacklist-for-Intel-TSX.diff also blacklisting some Broadwell
 models.  Closes: #800574.
 
- -- Aurelien Jarno   Sat, 29 Aug 2015 00:43:44 +0200
+ -- Aurelien Jarno   Mon, 19 Oct 2015 00:20:34 +0200
 
 glibc (2.21-0experimental1) experimental; urgency=medium
 



r6652 - glibc-package/tags

2015-10-18 Thread Aurelien Jarno
Author: aurel32
Date: 2015-10-19 05:04:29 + (Mon, 19 Oct 2015)
New Revision: 6652

Added:
   glibc-package/tags/glibc-2.21/
Log:
create tag directory



Bug#764692: marked as done (glibc: removed __FAVOR_BSD from features.h)

2015-10-18 Thread Debian Bug Tracking System
Your message dated Mon, 19 Oct 2015 05:19:14 +
with message-id 
and subject line Bug#764692: fixed in glibc 2.21-0experimental2
has caused the Debian Bug report #764692,
regarding glibc: removed __FAVOR_BSD from features.h
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
764692: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=764692
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---

Package: src:usbmuxd
Version: 1.0.8+git20140527.e72f2f7-1
Severity: serious
Justification: FTBFS (but built successfully in the past)

Hi,

usbmuxd fails to build on kfreebsd-amd64 and kfreebsd-i386 with the 
message:


make[3]: Entering directory 
'/«BUILDDIR»/usbmuxd-1.0.8+git20140527.e72f2f7/src'

  CC   usbmuxd-client.o
  CC   usbmuxd-device.o
device.c: In function 'send_anon_rst':
device.c:264:4: error: 'struct tcphdr' has no member named 'th_sport'
  th.th_sport = htons(sport);
^
device.c:265:4: error: 'struct tcphdr' has no member named 'th_dport'
  th.th_dport = htons(dport);
^
device.c:266:4: error: 'struct tcphdr' has no member named 'th_ack'
  th.th_ack = htonl(ack);
^
device.c:267:4: error: 'struct tcphdr' has no member named 'th_flags'
  th.th_flags = TH_RST;
^

(and so on, until make abandons ship.)

--
Jonathan Wiltshire  j...@debian.org
Debian Developer http://people.debian.org/~jmw

4096R: 0xD3524C51 / 0A55 B7C5 1223 3942 86EC  74C3 5394 479D D352 4C51

 i have six years of solaris sysadmin experience, from
8->10. i am well qualified to say it is made from bonghits
layered on top of bonghits
--- End Message ---
--- Begin Message ---
Source: glibc
Source-Version: 2.21-0experimental2

We believe that the bug you reported is fixed in the latest version of
glibc, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 764...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Aurelien Jarno  (supplier of updated glibc package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.8
Date: Mon, 19 Oct 2015 00:20:34 +0200
Source: glibc
Binary: libc-bin libc-dev-bin libc-l10n glibc-doc glibc-source locales 
locales-all nscd multiarch-support libc6 libc6-dev libc6-dbg libc6-pic 
libc6-udeb libc6.1 libc6.1-dev libc6.1-dbg libc6.1-pic libc6.1-udeb libc0.3 
libc0.3-dev libc0.3-dbg libc0.3-pic libc0.3-udeb libc0.1 libc0.1-dev 
libc0.1-dbg libc0.1-pic libc0.1-udeb libc6-i386 libc6-dev-i386 libc6-sparc 
libc6-dev-sparc libc6-sparc64 libc6-dev-sparc64 libc6-s390 libc6-dev-s390 
libc6-amd64 libc6-dev-amd64 libc6-powerpc libc6-dev-powerpc libc6-ppc64 
libc6-dev-ppc64 libc6-mips32 libc6-dev-mips32 libc6-mipsn32 libc6-dev-mipsn32 
libc6-mips64 libc6-dev-mips64 libc0.1-i386 libc0.1-dev-i386 libc6-x32 
libc6-dev-x32 libc6-i686 libc6-xen libc0.1-i686 libc0.3-i686 libc0.3-xen 
libc6.1-alphaev67 libnss-dns-udeb libnss-files-udeb
Architecture: source
Version: 2.21-0experimental2
Distribution: experimental
Urgency: medium
Maintainer: GNU Libc Maintainers 
Changed-By: Aurelien Jarno 
Description:
 glibc-doc  - GNU C Library: Documentation
 glibc-source - GNU C Library: sources
 libc-bin   - GNU C Library: Binaries
 libc-dev-bin - GNU C Library: Development binaries
 libc-l10n  - GNU C Library: localization files
 libc0.1- GNU C Library: Shared libraries
 libc0.1-dbg - GNU C Library: detached debugging symbols
 libc0.1-dev - GNU C Library: Development Libraries and Header Files
 libc0.1-dev-i386 - GNU C Library: 32bit development libraries for AMD64
 libc0.1-i386 - GNU C Library: 32bit shared libraries for AMD64
 libc0.1-i686 - GNU C Library: Shared libraries [i686 optimized]
 libc0.1-pic - GNU C Library: PIC archive library
 libc0.1-udeb - GNU C Library: Shared libraries - udeb (udeb)
 libc0.3- GNU C Library: Shared libraries
 libc0.3-dbg - GNU C Library: detached debugging symbols
 libc0.3-dev - GNU C Library: Development Libraries and Header Files
 libc0.3-i686 - GNU C Library: Shared libraries [i686 optimized]
 libc0.3-pic 

Bug#798064: marked as done (glibc: please find kfreebsd-kernel-headers in multiarch path)

2015-10-18 Thread Debian Bug Tracking System
Your message dated Mon, 19 Oct 2015 05:19:14 +
with message-id 
and subject line Bug#672774: fixed in glibc 2.21-0experimental2
has caused the Debian Bug report #672774,
regarding glibc: please find kfreebsd-kernel-headers in multiarch path
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
672774: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=672774
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: glibc
Version: 2.19-19
Severity: wishlist
Tags: patch

Hi,

We're hoping to move kfreebsd-kernel-headers' files to multiarch
path /usr/include/$(DEB_TARGET_MULTIARCH), so that headers of other
kernels are co-installable on a build machine (for cross-building and
bootstrapping).

gcc-5 is already fine with this.  And since gcc's default include search
path has /usr/include/$(DEB_TARGET_MULTIARCH), it is expected to not
cause many problems;  except where -nostdinc is used.

Please could glibc be patched as attached, to always look in that
directory for system includes, even for native builds (HOST==BUILD).

We hope to make this change with kfreebsd-kernel-headers (>= 10.1~7~),
unless there are objections, or if my upcoming mass rebuild reveal any
other breakage in reverse-depends.

Thanks!

-- System Information:
Debian Release: stretch/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: kfreebsd-amd64 (x86_64)

Kernel: kFreeBSD 9.0-2-amd64-xenhvm-ipsec
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
--- glibc-2.19/debian/sysdeps/kfreebsd.mk.orig	2015-07-09 12:28:06.0 +
+++ glibc-2.19/debian/sysdeps/kfreebsd.mk	2015-09-04 16:04:43.104028000 +
@@ -11,11 +11,7 @@
 libc_extra_config_options = $(extra_config_options)
 
 ifndef KFREEBSD_SOURCE
-  ifeq ($(DEB_HOST_GNU_TYPE),$(DEB_BUILD_GNU_TYPE))
-KFREEBSD_HEADERS := /usr/include
-  else
-KFREEBSD_HEADERS := /usr/$(DEB_HOST_GNU_TYPE)/include
-  endif
+  KFREEBSD_HEADERS := /usr/include/$(DEB_TARGET_MULTIARCH)
 else
   KFREEBSD_HEADERS := $(KFREEBSD_SOURCE)/sys
 endif
--- End Message ---
--- Begin Message ---
Source: glibc
Source-Version: 2.21-0experimental2

We believe that the bug you reported is fixed in the latest version of
glibc, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 672...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Aurelien Jarno  (supplier of updated glibc package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.8
Date: Mon, 19 Oct 2015 00:20:34 +0200
Source: glibc
Binary: libc-bin libc-dev-bin libc-l10n glibc-doc glibc-source locales 
locales-all nscd multiarch-support libc6 libc6-dev libc6-dbg libc6-pic 
libc6-udeb libc6.1 libc6.1-dev libc6.1-dbg libc6.1-pic libc6.1-udeb libc0.3 
libc0.3-dev libc0.3-dbg libc0.3-pic libc0.3-udeb libc0.1 libc0.1-dev 
libc0.1-dbg libc0.1-pic libc0.1-udeb libc6-i386 libc6-dev-i386 libc6-sparc 
libc6-dev-sparc libc6-sparc64 libc6-dev-sparc64 libc6-s390 libc6-dev-s390 
libc6-amd64 libc6-dev-amd64 libc6-powerpc libc6-dev-powerpc libc6-ppc64 
libc6-dev-ppc64 libc6-mips32 libc6-dev-mips32 libc6-mipsn32 libc6-dev-mipsn32 
libc6-mips64 libc6-dev-mips64 libc0.1-i386 libc0.1-dev-i386 libc6-x32 
libc6-dev-x32 libc6-i686 libc6-xen libc0.1-i686 libc0.3-i686 libc0.3-xen 
libc6.1-alphaev67 libnss-dns-udeb libnss-files-udeb
Architecture: source
Version: 2.21-0experimental2
Distribution: experimental
Urgency: medium
Maintainer: GNU Libc Maintainers 
Changed-By: Aurelien Jarno 
Description:
 glibc-doc  - GNU C Library: Documentation
 glibc-source - GNU C Library: sources
 libc-bin   - GNU C Library: Binaries
 libc-dev-bin - GNU C Library: Development binaries
 libc-l10n  - GNU C Library: localization files
 libc0.1- GNU C Library: Shared libraries
 libc0.1-dbg - GNU C Library: detached debugging symbols
 libc0.1-dev - GNU C Library: Development Libraries and Header Files
 libc0.1-dev-i386 - GNU C Library: 32bit development libraries for AMD64
 libc0.1-i386 - GNU C Library: 32bit shared libraries for 

Bug#672774: marked as done (build fix for multiarch-enabled kfreebsd-kernel-headers)

2015-10-18 Thread Debian Bug Tracking System
Your message dated Mon, 19 Oct 2015 05:19:14 +
with message-id 
and subject line Bug#672774: fixed in glibc 2.21-0experimental2
has caused the Debian Bug report #672774,
regarding build fix for multiarch-enabled kfreebsd-kernel-headers
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
672774: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=672774
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: eglibc
Version: 2.13-32
Tags: patch
User: debian-...@lists.debian.org
Usertags: kfreebsd

As eglibc needs special handling for headers provided by kfreebsd-kernel-headers
package, it will FTBFS when kfreebsd-kernel-headers switches to multiarch-style
directories (e.g. /usr/include/x86_64-kfreebsd-gnu/machine).

Please consider fixing the problem preemptively using the attached patch.  This
patch doesn't breal backward compatibility with current kfreebsd-kernel-headers
(0.79).

It's been tested on i386 and amd64, both with pristine kfreebsd-kernel-headers
and with a multiarch-enabled version.

-- System Information:
Debian Release: wheezy/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: kfreebsd-i386 (i386)

Kernel: kFreeBSD 8.1-1-amd64
Locale: LANG=ca_AD.UTF-8, LC_CTYPE=ca_AD.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Index: debian/sysdeps/kfreebsd.mk
===
--- debian/sysdeps/kfreebsd.mk	(revision 5248)
+++ debian/sysdeps/kfreebsd.mk	(working copy)
@@ -18,21 +18,31 @@
 endif
 
 # Minimum Kernel supported
-with_headers = --with-headers=$(shell pwd)/debian/include --enable-kernel=$(call xx,MIN_KERNEL_SUPPORTED)
+with_headers = --with-headers=$(shell pwd)/debian/include:$(shell pwd)/debian/include/$(DEB_HOST_MULTIARCH) --enable-kernel=$(call xx,MIN_KERNEL_SUPPORTED)
 
 KERNEL_HEADER_DIR = $(stamp)mkincludedir
 $(stamp)mkincludedir:
 	rm -rf debian/include
 	mkdir debian/include
-	for file in bsm net netatalk netipx nfs osreldate.h sys x86 vm ; do \
+	for file in bsm net netatalk netipx nfs osreldate.h sys x86 vm machine ; do \
 	if test -e $(KFREEBSD_HEADERS)/$$file ; then \
 	ln -s $(KFREEBSD_HEADERS)/$$file debian/include ; \
 	fi ; \
+	for arch in i386 x86_64 ; do \
+		if test -e $(KFREEBSD_HEADERS)/$${arch}-kfreebsd-gnu/$$file ; then \
+		mkdir -p debian/include/$${arch}-kfreebsd-gnu ; \
+		ln -s $(KFREEBSD_HEADERS)/$${arch}-kfreebsd-gnu/$$file debian/include/$${arch}-kfreebsd-gnu ; \
+		fi ; \
+	done ; \
 	done
 
 # Link all machine directories.  We can't just link machine
 # because of explicit references to  and
 	# .
+	#
+	# FIXME: This can be removed when kfreebsd-kernel-headers switches to
+	# Multiarch-style directories.
+	#
 	find $(KFREEBSD_HEADERS) -maxdepth 1 -xtype d -name machine\* \
 		-exec ln -s '{}' debian/include ';'
 
@@ -42,7 +52,7 @@
 	touch $@
 
 # Also to make configure happy.
-export CPPFLAGS = -isystem $(shell pwd)/debian/include
+CPPFLAGS = -isystem $(shell pwd)/debian/include -isystem $(shell pwd)/debian/include/$(DEB_HOST_MULTIARCH)
 
 # This round of ugliness decomposes the FreeBSD kernel version number
 # into an integer so it can be easily compared and then does so.
Index: debian/sysdeps/kfreebsd-amd64.mk
===
--- debian/sysdeps/kfreebsd-amd64.mk	(revision 5248)
+++ debian/sysdeps/kfreebsd-amd64.mk	(working copy)
@@ -8,10 +8,12 @@
 
 i386_configure_target = i686-kfreebsd-gnu
 i386_CC = $(CC) -m32
+i386_CPPFLAGS = -isystem $(shell pwd)/debian/include -isystem $(shell pwd)/debian/include/i386-kfreebsd-gnu
 i386_CXX = $(CXX) -m32
 i386_add-ons = ports linuxthreads $(add-ons)
 i386_extra_cflags = -march=pentium4 -mtune=generic
 i386_extra_config_options = $(extra_config_options) --disable-profile
+i386_with_headers = --with-headers=$(shell pwd)/debian/include:$(shell pwd)/debian/include/i386-kfreebsd-gnu --enable-kernel=$(call xx,MIN_KERNEL_SUPPORTED)
 i386_slibdir = /lib32
 i386_libdir = /usr/lib32
 
Index: debian/rules.d/build.mk
===
--- debian/rules.d/build.mk	(revision 5248)
+++ debian/rules.d/build.mk	(working copy)
@@ -23,6 +23,7 @@
 	@echo Configuring $(curpass)
 	rm -f $(DEB_BUILDDIR)/configparms
 	echo "CC = $(call xx,CC)"		>> $(DEB_BUILDDIR)/configparms
+	echo "CPPFLAGS = $(call xx,CPPFLAGS)"	>> $(DEB_BUILDDIR)/configparms
 	echo "CXX = $(call xx,CXX)"		>> $(DEB_BUILDDIR)/configparms
 	echo "BUILD_CC = $(BUILD_CC)"		>> 

Bug#785796: marked as done (glibc: kfreebsd should define F_DUPFD_CLOEXEC)

2015-10-18 Thread Debian Bug Tracking System
Your message dated Mon, 19 Oct 2015 05:19:14 +
with message-id 
and subject line Bug#785796: fixed in glibc 2.21-0experimental2
has caused the Debian Bug report #785796,
regarding glibc: kfreebsd should define F_DUPFD_CLOEXEC
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
785796: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=785796
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: util-linux
Version: 2.26.2-1
Severity: important
Tags: patch
Control: found -1 util-linux/2.26.2-2

Hi,

the new util-linux 2.26.2 FTBFSes on non-Linux architectures, because
of Linux-only symbols in libmount.

Attached there is the easy update to debian/libmount1.symbols.

Thanks,
-- 
Pino
--- a/debian/libmount1.symbols
+++ b/debian/libmount1.symbols
@@ -181,19 +181,19 @@ libmount.so.1 libmount1 #MINVER#
  mnt_mangle@MOUNT_2.19 2.19.1
  mnt_match_fstype@MOUNT_2.19 2.19.1
  mnt_match_options@MOUNT_2.19 2.19.1
- mnt_monitor_close_fd@MOUNT_2.26 2.26.2
- mnt_monitor_enable_kernel@MOUNT_2.26 2.26.2
- mnt_monitor_enable_userspace@MOUNT_2.26 2.26.2
- mnt_monitor_event_cleanup@MOUNT_2.26 2.26.2
- mnt_monitor_get_fd@MOUNT_2.26 2.26.2
- mnt_monitor_next_change@MOUNT_2.26 2.26.2
- mnt_monitor_wait@MOUNT_2.26 2.26.2
+ (arch=linux-any)mnt_monitor_close_fd@MOUNT_2.26 2.26.2
+ (arch=linux-any)mnt_monitor_enable_kernel@MOUNT_2.26 2.26.2
+ (arch=linux-any)mnt_monitor_enable_userspace@MOUNT_2.26 2.26.2
+ (arch=linux-any)mnt_monitor_event_cleanup@MOUNT_2.26 2.26.2
+ (arch=linux-any)mnt_monitor_get_fd@MOUNT_2.26 2.26.2
+ (arch=linux-any)mnt_monitor_next_change@MOUNT_2.26 2.26.2
+ (arch=linux-any)mnt_monitor_wait@MOUNT_2.26 2.26.2
  mnt_new_cache@MOUNT_2.19 2.19.1
  (arch=linux-any)mnt_new_context@MOUNT_2.19 2.19.1
  mnt_new_fs@MOUNT_2.19 2.19.1
  mnt_new_iter@MOUNT_2.19 2.19.1
  mnt_new_lock@MOUNT_2.19 2.19.1
- mnt_new_monitor@MOUNT_2.26 2.26.2
+ (arch=linux-any)mnt_new_monitor@MOUNT_2.26 2.26.2
  mnt_new_tabdiff@MOUNT_2.20 2.20.1
  mnt_new_table@MOUNT_2.19 2.19.1
  mnt_new_table_from_dir@MOUNT_2.19 2.19.1
@@ -213,7 +213,7 @@ libmount.so.1 libmount1 #MINVER#
  mnt_pretty_path@MOUNT_2.20 2.20.1
  mnt_ref_cache@MOUNT_2.24 2.24.2
  mnt_ref_fs@MOUNT_2.24 2.24.2
- mnt_ref_monitor@MOUNT_2.26 2.26.2
+ (arch=linux-any)mnt_ref_monitor@MOUNT_2.26 2.26.2
  mnt_ref_table@MOUNT_2.24 2.24.2
  (arch=linux-any)mnt_reset_context@MOUNT_2.19 2.19.1
  mnt_reset_fs@MOUNT_2.19 2.19.1
@@ -271,7 +271,7 @@ libmount.so.1 libmount1 #MINVER#
  mnt_unmangle@MOUNT_2.19 2.19.1
  mnt_unref_cache@MOUNT_2.24 2.24.2
  mnt_unref_fs@MOUNT_2.24 2.24.2
- mnt_unref_monitor@MOUNT_2.26 2.26.2
+ (arch=linux-any)mnt_unref_monitor@MOUNT_2.26 2.26.2
  mnt_unref_table@MOUNT_2.24 2.24.2
  mnt_update_force_rdonly@MOUNT_2.19 2.19.1
  mnt_update_get_filename@MOUNT_2.19 2.19.1
--- End Message ---
--- Begin Message ---
Source: glibc
Source-Version: 2.21-0experimental2

We believe that the bug you reported is fixed in the latest version of
glibc, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 785...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Aurelien Jarno  (supplier of updated glibc package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.8
Date: Mon, 19 Oct 2015 00:20:34 +0200
Source: glibc
Binary: libc-bin libc-dev-bin libc-l10n glibc-doc glibc-source locales 
locales-all nscd multiarch-support libc6 libc6-dev libc6-dbg libc6-pic 
libc6-udeb libc6.1 libc6.1-dev libc6.1-dbg libc6.1-pic libc6.1-udeb libc0.3 
libc0.3-dev libc0.3-dbg libc0.3-pic libc0.3-udeb libc0.1 libc0.1-dev 
libc0.1-dbg libc0.1-pic libc0.1-udeb libc6-i386 libc6-dev-i386 libc6-sparc 
libc6-dev-sparc libc6-sparc64 libc6-dev-sparc64 libc6-s390 libc6-dev-s390 
libc6-amd64 libc6-dev-amd64 libc6-powerpc libc6-dev-powerpc libc6-ppc64 
libc6-dev-ppc64 libc6-mips32 libc6-dev-mips32 libc6-mipsn32 libc6-dev-mipsn32 
libc6-mips64 libc6-dev-mips64 libc0.1-i386 libc0.1-dev-i386 libc6-x32 
libc6-dev-x32 libc6-i686 libc6-xen libc0.1-i686 libc0.3-i686 libc0.3-xen 
libc6.1-alphaev67 libnss-dns-udeb libnss-files-udeb
Architecture: source
Version: 2.21-0experimental2

Processing of glibc_2.21-0experimental2_source.changes

2015-10-18 Thread Debian FTP Masters
glibc_2.21-0experimental2_source.changes uploaded successfully to localhost
along with the files:
  glibc_2.21-0experimental2.dsc
  glibc_2.21-0experimental2.debian.tar.xz

Greetings,

Your Debian queue daemon (running on host franck.debian.org)



Bug#798316: marked as done (libc6: Pointer guarding bypass in dynamic Setuid binaries)

2015-10-18 Thread Debian Bug Tracking System
Your message dated Mon, 19 Oct 2015 05:19:14 +
with message-id 
and subject line Bug#798316: fixed in glibc 2.21-0experimental2
has caused the Debian Bug report #798316,
regarding libc6: Pointer guarding bypass in dynamic Setuid binaries
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
798316: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798316
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: libc6
Severity: important
Tags: security

Hi,

 Just FYI.
 security vulnerablity was found in glibc.
 http://hmarco.org/bugs/glibc_ptr_mangle_weakness.html

 Probably no CVE is not assigned yet.
 http://seclists.org/oss-sec/2015/q3/504


 One of my friend confirmed it works with stretch, so testing/unstable
 is affected (probably experimental, too).

-- 
Hideki Yamane
--- End Message ---
--- Begin Message ---
Source: glibc
Source-Version: 2.21-0experimental2

We believe that the bug you reported is fixed in the latest version of
glibc, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 798...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Aurelien Jarno  (supplier of updated glibc package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.8
Date: Mon, 19 Oct 2015 00:20:34 +0200
Source: glibc
Binary: libc-bin libc-dev-bin libc-l10n glibc-doc glibc-source locales 
locales-all nscd multiarch-support libc6 libc6-dev libc6-dbg libc6-pic 
libc6-udeb libc6.1 libc6.1-dev libc6.1-dbg libc6.1-pic libc6.1-udeb libc0.3 
libc0.3-dev libc0.3-dbg libc0.3-pic libc0.3-udeb libc0.1 libc0.1-dev 
libc0.1-dbg libc0.1-pic libc0.1-udeb libc6-i386 libc6-dev-i386 libc6-sparc 
libc6-dev-sparc libc6-sparc64 libc6-dev-sparc64 libc6-s390 libc6-dev-s390 
libc6-amd64 libc6-dev-amd64 libc6-powerpc libc6-dev-powerpc libc6-ppc64 
libc6-dev-ppc64 libc6-mips32 libc6-dev-mips32 libc6-mipsn32 libc6-dev-mipsn32 
libc6-mips64 libc6-dev-mips64 libc0.1-i386 libc0.1-dev-i386 libc6-x32 
libc6-dev-x32 libc6-i686 libc6-xen libc0.1-i686 libc0.3-i686 libc0.3-xen 
libc6.1-alphaev67 libnss-dns-udeb libnss-files-udeb
Architecture: source
Version: 2.21-0experimental2
Distribution: experimental
Urgency: medium
Maintainer: GNU Libc Maintainers 
Changed-By: Aurelien Jarno 
Description:
 glibc-doc  - GNU C Library: Documentation
 glibc-source - GNU C Library: sources
 libc-bin   - GNU C Library: Binaries
 libc-dev-bin - GNU C Library: Development binaries
 libc-l10n  - GNU C Library: localization files
 libc0.1- GNU C Library: Shared libraries
 libc0.1-dbg - GNU C Library: detached debugging symbols
 libc0.1-dev - GNU C Library: Development Libraries and Header Files
 libc0.1-dev-i386 - GNU C Library: 32bit development libraries for AMD64
 libc0.1-i386 - GNU C Library: 32bit shared libraries for AMD64
 libc0.1-i686 - GNU C Library: Shared libraries [i686 optimized]
 libc0.1-pic - GNU C Library: PIC archive library
 libc0.1-udeb - GNU C Library: Shared libraries - udeb (udeb)
 libc0.3- GNU C Library: Shared libraries
 libc0.3-dbg - GNU C Library: detached debugging symbols
 libc0.3-dev - GNU C Library: Development Libraries and Header Files
 libc0.3-i686 - GNU C Library: Shared libraries [i686 optimized]
 libc0.3-pic - GNU C Library: PIC archive library
 libc0.3-udeb - GNU C Library: Shared libraries - udeb (udeb)
 libc0.3-xen - GNU C Library: Shared libraries [Xen version]
 libc6  - GNU C Library: Shared libraries
 libc6-amd64 - GNU C Library: 64bit Shared libraries for AMD64
 libc6-dbg  - GNU C Library: detached debugging symbols
 libc6-dev  - GNU C Library: Development Libraries and Header Files
 libc6-dev-amd64 - GNU C Library: 64bit Development Libraries for AMD64
 libc6-dev-i386 - GNU C Library: 32-bit development libraries for AMD64
 libc6-dev-mips32 - GNU C Library: o32 Development Libraries for MIPS
 libc6-dev-mips64 - GNU C Library: 64bit Development Libraries for MIPS64
 libc6-dev-mipsn32 - GNU C Library: n32 Development Libraries for MIPS64
 libc6-dev-powerpc - GNU C Library: 32bit powerpc development libraries for 
ppc64
 

Bug#798316: marked as done (libc6: Pointer guarding bypass in dynamic Setuid binaries)

2015-10-18 Thread Debian Bug Tracking System
Your message dated Mon, 19 Oct 2015 05:19:14 +
with message-id 
and subject line Bug#801691: fixed in glibc 2.21-0experimental2
has caused the Debian Bug report #801691,
regarding libc6: Pointer guarding bypass in dynamic Setuid binaries
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
801691: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=801691
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: libc6
Severity: important
Tags: security

Hi,

 Just FYI.
 security vulnerablity was found in glibc.
 http://hmarco.org/bugs/glibc_ptr_mangle_weakness.html

 Probably no CVE is not assigned yet.
 http://seclists.org/oss-sec/2015/q3/504


 One of my friend confirmed it works with stretch, so testing/unstable
 is affected (probably experimental, too).

-- 
Hideki Yamane
--- End Message ---
--- Begin Message ---
Source: glibc
Source-Version: 2.21-0experimental2

We believe that the bug you reported is fixed in the latest version of
glibc, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 801...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Aurelien Jarno  (supplier of updated glibc package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.8
Date: Mon, 19 Oct 2015 00:20:34 +0200
Source: glibc
Binary: libc-bin libc-dev-bin libc-l10n glibc-doc glibc-source locales 
locales-all nscd multiarch-support libc6 libc6-dev libc6-dbg libc6-pic 
libc6-udeb libc6.1 libc6.1-dev libc6.1-dbg libc6.1-pic libc6.1-udeb libc0.3 
libc0.3-dev libc0.3-dbg libc0.3-pic libc0.3-udeb libc0.1 libc0.1-dev 
libc0.1-dbg libc0.1-pic libc0.1-udeb libc6-i386 libc6-dev-i386 libc6-sparc 
libc6-dev-sparc libc6-sparc64 libc6-dev-sparc64 libc6-s390 libc6-dev-s390 
libc6-amd64 libc6-dev-amd64 libc6-powerpc libc6-dev-powerpc libc6-ppc64 
libc6-dev-ppc64 libc6-mips32 libc6-dev-mips32 libc6-mipsn32 libc6-dev-mipsn32 
libc6-mips64 libc6-dev-mips64 libc0.1-i386 libc0.1-dev-i386 libc6-x32 
libc6-dev-x32 libc6-i686 libc6-xen libc0.1-i686 libc0.3-i686 libc0.3-xen 
libc6.1-alphaev67 libnss-dns-udeb libnss-files-udeb
Architecture: source
Version: 2.21-0experimental2
Distribution: experimental
Urgency: medium
Maintainer: GNU Libc Maintainers 
Changed-By: Aurelien Jarno 
Description:
 glibc-doc  - GNU C Library: Documentation
 glibc-source - GNU C Library: sources
 libc-bin   - GNU C Library: Binaries
 libc-dev-bin - GNU C Library: Development binaries
 libc-l10n  - GNU C Library: localization files
 libc0.1- GNU C Library: Shared libraries
 libc0.1-dbg - GNU C Library: detached debugging symbols
 libc0.1-dev - GNU C Library: Development Libraries and Header Files
 libc0.1-dev-i386 - GNU C Library: 32bit development libraries for AMD64
 libc0.1-i386 - GNU C Library: 32bit shared libraries for AMD64
 libc0.1-i686 - GNU C Library: Shared libraries [i686 optimized]
 libc0.1-pic - GNU C Library: PIC archive library
 libc0.1-udeb - GNU C Library: Shared libraries - udeb (udeb)
 libc0.3- GNU C Library: Shared libraries
 libc0.3-dbg - GNU C Library: detached debugging symbols
 libc0.3-dev - GNU C Library: Development Libraries and Header Files
 libc0.3-i686 - GNU C Library: Shared libraries [i686 optimized]
 libc0.3-pic - GNU C Library: PIC archive library
 libc0.3-udeb - GNU C Library: Shared libraries - udeb (udeb)
 libc0.3-xen - GNU C Library: Shared libraries [Xen version]
 libc6  - GNU C Library: Shared libraries
 libc6-amd64 - GNU C Library: 64bit Shared libraries for AMD64
 libc6-dbg  - GNU C Library: detached debugging symbols
 libc6-dev  - GNU C Library: Development Libraries and Header Files
 libc6-dev-amd64 - GNU C Library: 64bit Development Libraries for AMD64
 libc6-dev-i386 - GNU C Library: 32-bit development libraries for AMD64
 libc6-dev-mips32 - GNU C Library: o32 Development Libraries for MIPS
 libc6-dev-mips64 - GNU C Library: 64bit Development Libraries for MIPS64
 libc6-dev-mipsn32 - GNU C Library: n32 Development Libraries for MIPS64
 libc6-dev-powerpc - GNU C Library: 32bit powerpc development libraries for 
ppc64
 

Bug#788799: marked as done (libc6: pthread_cond_broadcast issue when surrounded by PTHREAD_PRIO_INHERIT mutex on ARM)

2015-10-18 Thread Debian Bug Tracking System
Your message dated Mon, 19 Oct 2015 05:19:14 +
with message-id 
and subject line Bug#788799: fixed in glibc 2.21-0experimental2
has caused the Debian Bug report #788799,
regarding libc6: pthread_cond_broadcast issue when surrounded by 
PTHREAD_PRIO_INHERIT mutex on ARM
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
788799: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=788799
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: libc6
Version: 2.21-0experimental0
Severity: normal
Tags: upstream fixed-upstream
Forwarded: https://sourceware.org/bugzilla/show_bug.cgi?id=18463

Hello,

the attached program fails with an error on ARM platforms. (I only tested
armhf, but I think armel is affected, too.)

The problem is that pthread_mutex_unlock() in the main thread returns
EPERM which it shouldn't. This only happens when using
pthread_cond_broadcast, at least two threads and PTHREAD_PRIO_INHERIT.

For more details refer to the upstream bug[1].

A possible solution documented in the upstream bug report is to pass
--enable-kernel=3.15 (or something bigger). 
According to
https://buildd.debian.org/status/fetch.php?pkg=glibc=armhf=2.21-0experimental0=1426842906
glibc is build using --enable-kernel=2.6.32, I guess that's from the
setting MIN_KERNEL_SUPPORTED in debian/sysdeps/linux.mk.

Given that stable has kernel 3.16 the probably easiest solution would be
to bump the dependency to >= 3.16?!

Best regards
Uwe

[1] https://sourceware.org/bugzilla/show_bug.cgi?id=18463

-- System Information:
Debian Release: 8.1
  APT prefers stable
  APT policy: (990, 'stable'), (500, 'unstable'), (500, 'testing'), (1, 
'experimental')
Architecture: armhf (armv7l)

Kernel: Linux 3.16.0-4-armmp (SMP w/1 CPU core)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)

Versions of packages libc6 depends on:
ii  libgcc1  1:4.9.2-10

libc6 recommends no packages.

Versions of packages libc6 suggests:
ii  debconf [debconf-2.0]  1.5.56
pn  glibc-doc  
ii  locales2.21-0experimental0

-- debconf information excluded
--- End Message ---
--- Begin Message ---
Source: glibc
Source-Version: 2.21-0experimental2

We believe that the bug you reported is fixed in the latest version of
glibc, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 788...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Aurelien Jarno  (supplier of updated glibc package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.8
Date: Mon, 19 Oct 2015 00:20:34 +0200
Source: glibc
Binary: libc-bin libc-dev-bin libc-l10n glibc-doc glibc-source locales 
locales-all nscd multiarch-support libc6 libc6-dev libc6-dbg libc6-pic 
libc6-udeb libc6.1 libc6.1-dev libc6.1-dbg libc6.1-pic libc6.1-udeb libc0.3 
libc0.3-dev libc0.3-dbg libc0.3-pic libc0.3-udeb libc0.1 libc0.1-dev 
libc0.1-dbg libc0.1-pic libc0.1-udeb libc6-i386 libc6-dev-i386 libc6-sparc 
libc6-dev-sparc libc6-sparc64 libc6-dev-sparc64 libc6-s390 libc6-dev-s390 
libc6-amd64 libc6-dev-amd64 libc6-powerpc libc6-dev-powerpc libc6-ppc64 
libc6-dev-ppc64 libc6-mips32 libc6-dev-mips32 libc6-mipsn32 libc6-dev-mipsn32 
libc6-mips64 libc6-dev-mips64 libc0.1-i386 libc0.1-dev-i386 libc6-x32 
libc6-dev-x32 libc6-i686 libc6-xen libc0.1-i686 libc0.3-i686 libc0.3-xen 
libc6.1-alphaev67 libnss-dns-udeb libnss-files-udeb
Architecture: source
Version: 2.21-0experimental2
Distribution: experimental
Urgency: medium
Maintainer: GNU Libc Maintainers 
Changed-By: Aurelien Jarno 
Description:
 glibc-doc  - GNU C Library: Documentation
 glibc-source - GNU C Library: sources
 libc-bin   - GNU C Library: Binaries
 libc-dev-bin - GNU C Library: Development binaries
 libc-l10n  - GNU C Library: localization files
 libc0.1- GNU C Library: Shared libraries
 libc0.1-dbg - GNU C Library: detached debugging symbols
 libc0.1-dev - GNU C Library: Development Libraries and Header Files
 libc0.1-dev-i386 - GNU C Library: 32bit development 

Bug#800846: marked as done (error message in preinst doesn't match test, checks for kernel 3.2 but tells the user it needs 2.6.32)

2015-10-18 Thread Debian Bug Tracking System
Your message dated Mon, 19 Oct 2015 05:19:14 +
with message-id 
and subject line Bug#800846: fixed in glibc 2.21-0experimental2
has caused the Debian Bug report #800846,
regarding error message in preinst doesn't match test, checks for kernel 3.2 
but tells the user it needs 2.6.32
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
800846: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=800846
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---

Package: libc6
Version: 2.21-0experimental1

I had an expermimental chroot on a system that happened to be running an 
old kernel. I got an error message about needing a 2.6.32 kernel which 
was strange as I already had a 2.6.32 kernel.


Reading the preinst revealed

# The GNU libc requires a >= 3.2 kernel, found in wheezy
if linux_compare_versions "$kernel_ver" lt 3.2
then
echo WARNING: this version of the GNU libc requires kernel 
version
echo 2.6.32 or later.  Please upgrade your kernel before 
installing

echo glibc.
kernel26_help

exit 1
fi

So it's checking for 3.2 but telling the user they need 2.6.32.
--- End Message ---
--- Begin Message ---
Source: glibc
Source-Version: 2.21-0experimental2

We believe that the bug you reported is fixed in the latest version of
glibc, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 800...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Aurelien Jarno  (supplier of updated glibc package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.8
Date: Mon, 19 Oct 2015 00:20:34 +0200
Source: glibc
Binary: libc-bin libc-dev-bin libc-l10n glibc-doc glibc-source locales 
locales-all nscd multiarch-support libc6 libc6-dev libc6-dbg libc6-pic 
libc6-udeb libc6.1 libc6.1-dev libc6.1-dbg libc6.1-pic libc6.1-udeb libc0.3 
libc0.3-dev libc0.3-dbg libc0.3-pic libc0.3-udeb libc0.1 libc0.1-dev 
libc0.1-dbg libc0.1-pic libc0.1-udeb libc6-i386 libc6-dev-i386 libc6-sparc 
libc6-dev-sparc libc6-sparc64 libc6-dev-sparc64 libc6-s390 libc6-dev-s390 
libc6-amd64 libc6-dev-amd64 libc6-powerpc libc6-dev-powerpc libc6-ppc64 
libc6-dev-ppc64 libc6-mips32 libc6-dev-mips32 libc6-mipsn32 libc6-dev-mipsn32 
libc6-mips64 libc6-dev-mips64 libc0.1-i386 libc0.1-dev-i386 libc6-x32 
libc6-dev-x32 libc6-i686 libc6-xen libc0.1-i686 libc0.3-i686 libc0.3-xen 
libc6.1-alphaev67 libnss-dns-udeb libnss-files-udeb
Architecture: source
Version: 2.21-0experimental2
Distribution: experimental
Urgency: medium
Maintainer: GNU Libc Maintainers 
Changed-By: Aurelien Jarno 
Description:
 glibc-doc  - GNU C Library: Documentation
 glibc-source - GNU C Library: sources
 libc-bin   - GNU C Library: Binaries
 libc-dev-bin - GNU C Library: Development binaries
 libc-l10n  - GNU C Library: localization files
 libc0.1- GNU C Library: Shared libraries
 libc0.1-dbg - GNU C Library: detached debugging symbols
 libc0.1-dev - GNU C Library: Development Libraries and Header Files
 libc0.1-dev-i386 - GNU C Library: 32bit development libraries for AMD64
 libc0.1-i386 - GNU C Library: 32bit shared libraries for AMD64
 libc0.1-i686 - GNU C Library: Shared libraries [i686 optimized]
 libc0.1-pic - GNU C Library: PIC archive library
 libc0.1-udeb - GNU C Library: Shared libraries - udeb (udeb)
 libc0.3- GNU C Library: Shared libraries
 libc0.3-dbg - GNU C Library: detached debugging symbols
 libc0.3-dev - GNU C Library: Development Libraries and Header Files
 libc0.3-i686 - GNU C Library: Shared libraries [i686 optimized]
 libc0.3-pic - GNU C Library: PIC archive library
 libc0.3-udeb - GNU C Library: Shared libraries - udeb (udeb)
 libc0.3-xen - GNU C Library: Shared libraries [Xen version]
 libc6  - GNU C Library: Shared libraries
 libc6-amd64 - GNU C Library: 64bit Shared libraries for AMD64
 libc6-dbg  - GNU C Library: detached debugging symbols
 libc6-dev  - GNU C Library: Development Libraries and Header Files
 libc6-dev-amd64 - GNU C Library: 64bit Development Libraries for AMD64
 

Bug#801691: marked as done (glibc: pointer guarding weakness)

2015-10-18 Thread Debian Bug Tracking System
Your message dated Mon, 19 Oct 2015 05:19:14 +
with message-id 
and subject line Bug#798316: fixed in glibc 2.21-0experimental2
has caused the Debian Bug report #798316,
regarding glibc: pointer guarding weakness
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
798316: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798316
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: glibc
Severity: important
Tags: security
Justification: user security hole

Please see http://www.openwall.com/lists/oss-security/2015/09/05/8
for details.

Cheers,
Moritz

--- End Message ---
--- Begin Message ---
Source: glibc
Source-Version: 2.21-0experimental2

We believe that the bug you reported is fixed in the latest version of
glibc, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 798...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Aurelien Jarno  (supplier of updated glibc package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.8
Date: Mon, 19 Oct 2015 00:20:34 +0200
Source: glibc
Binary: libc-bin libc-dev-bin libc-l10n glibc-doc glibc-source locales 
locales-all nscd multiarch-support libc6 libc6-dev libc6-dbg libc6-pic 
libc6-udeb libc6.1 libc6.1-dev libc6.1-dbg libc6.1-pic libc6.1-udeb libc0.3 
libc0.3-dev libc0.3-dbg libc0.3-pic libc0.3-udeb libc0.1 libc0.1-dev 
libc0.1-dbg libc0.1-pic libc0.1-udeb libc6-i386 libc6-dev-i386 libc6-sparc 
libc6-dev-sparc libc6-sparc64 libc6-dev-sparc64 libc6-s390 libc6-dev-s390 
libc6-amd64 libc6-dev-amd64 libc6-powerpc libc6-dev-powerpc libc6-ppc64 
libc6-dev-ppc64 libc6-mips32 libc6-dev-mips32 libc6-mipsn32 libc6-dev-mipsn32 
libc6-mips64 libc6-dev-mips64 libc0.1-i386 libc0.1-dev-i386 libc6-x32 
libc6-dev-x32 libc6-i686 libc6-xen libc0.1-i686 libc0.3-i686 libc0.3-xen 
libc6.1-alphaev67 libnss-dns-udeb libnss-files-udeb
Architecture: source
Version: 2.21-0experimental2
Distribution: experimental
Urgency: medium
Maintainer: GNU Libc Maintainers 
Changed-By: Aurelien Jarno 
Description:
 glibc-doc  - GNU C Library: Documentation
 glibc-source - GNU C Library: sources
 libc-bin   - GNU C Library: Binaries
 libc-dev-bin - GNU C Library: Development binaries
 libc-l10n  - GNU C Library: localization files
 libc0.1- GNU C Library: Shared libraries
 libc0.1-dbg - GNU C Library: detached debugging symbols
 libc0.1-dev - GNU C Library: Development Libraries and Header Files
 libc0.1-dev-i386 - GNU C Library: 32bit development libraries for AMD64
 libc0.1-i386 - GNU C Library: 32bit shared libraries for AMD64
 libc0.1-i686 - GNU C Library: Shared libraries [i686 optimized]
 libc0.1-pic - GNU C Library: PIC archive library
 libc0.1-udeb - GNU C Library: Shared libraries - udeb (udeb)
 libc0.3- GNU C Library: Shared libraries
 libc0.3-dbg - GNU C Library: detached debugging symbols
 libc0.3-dev - GNU C Library: Development Libraries and Header Files
 libc0.3-i686 - GNU C Library: Shared libraries [i686 optimized]
 libc0.3-pic - GNU C Library: PIC archive library
 libc0.3-udeb - GNU C Library: Shared libraries - udeb (udeb)
 libc0.3-xen - GNU C Library: Shared libraries [Xen version]
 libc6  - GNU C Library: Shared libraries
 libc6-amd64 - GNU C Library: 64bit Shared libraries for AMD64
 libc6-dbg  - GNU C Library: detached debugging symbols
 libc6-dev  - GNU C Library: Development Libraries and Header Files
 libc6-dev-amd64 - GNU C Library: 64bit Development Libraries for AMD64
 libc6-dev-i386 - GNU C Library: 32-bit development libraries for AMD64
 libc6-dev-mips32 - GNU C Library: o32 Development Libraries for MIPS
 libc6-dev-mips64 - GNU C Library: 64bit Development Libraries for MIPS64
 libc6-dev-mipsn32 - GNU C Library: n32 Development Libraries for MIPS64
 libc6-dev-powerpc - GNU C Library: 32bit powerpc development libraries for 
ppc64
 libc6-dev-ppc64 - GNU C Library: 64bit Development Libraries for PowerPC64
 libc6-dev-s390 - GNU C Library: 32bit Development Libraries for IBM zSeries
 libc6-dev-sparc - GNU C Library: 32bit Development Libraries for 

Bug#797831: marked as done (glibc: further problems with stage1)

2015-10-18 Thread Debian Bug Tracking System
Your message dated Mon, 19 Oct 2015 05:19:14 +
with message-id 
and subject line Bug#797831: fixed in glibc 2.21-0experimental2
has caused the Debian Bug report #797831,
regarding glibc: further problems with stage1
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
797831: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=797831
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: glibc
Version: 2.21-0experimental1
Tags: patch
User: helm...@debian.org
Usertags: rebootstrap

Hi Aurelien,

thank you very much for applying #766877 and uploading to experimental.
This has moved us a big step closer to a working stage1. We are not
quite there yet. At this point I estimate a remaining patch stack for
the following problems:

 * stage1 fails to build for various reasons
 * stage1 libc6-dev not installable due to dependency on libc6
 * wrong set of packages being built for stage1
 * dh_shlibdeps fails
 * linux headers cannot be found
 * various hurd things

Even though I still carry patches for these, it is not clear that all of
these problems are still reproducible. The above list is meant as an
outlook, not a cumulative bug report.

This particular bug shall address only the first of those problems
above, because I have a good understanding and can answer your
questions. I am attaching a patch and also explain the individual hunks
in what follows. All of them apply to stage1-specific code.

- *:/lib32 | *:/lib64 | *:/libx32 | *:/lib/arm-linux-gnueabi*) \
+ *:/lib32 | *:/lib64 | *:/libo32 | *:/libx32 | 
*:/lib/arm-linux-gnueabi*) \

The code fails to identify a certain mips architecture multilib build
and thus places the multilib build into the main package.

+ *:* ) \
+   templates="" \
+   ;; \

This extra case ensures that no templates are interpolated for optimized
builds (e.g. libc6-i686). These do not generate development packages
anyway, so dropping them (for stage1) is the right thing to do. Failing
to do so again overwrites the main package.

-   -e "/$$libdir.*.a /d" \
+   -e "/LIBDIR.*\.a /d" \

The immediate error resulting from this sed invocation is that the
command "u" is not understood by sed. $libdir becomes
"/usr/lib/triplet".  Thus the resulting sed command starts with "//u"
which sed does not like. Fixing the escaping is not enough however,
since LIBDIR is not yet interpolated. That only happens a few lines
later. So instead, the match needs to target non-interpolated filenames
and thus match LIBDIR.

I hope that the level of detail given is sufficient. If not, please ask.
Otherwise, please consider applying the patch. I would appreciate
another experimental upload that also includes the hurd changes staged
to SVN by Samuel Thibault already within a month from now. Thank you for
your support.

Helmut
diff -Nru glibc-2.19/debian/rules.d/debhelper.mk glibc-2.19/debian/rules.d/debhelper.mk
--- glibc-2.19/debian/rules.d/debhelper.mk
+++ glibc-2.19/debian/rules.d/debhelper.mk
@@ -197,10 +197,13 @@
 	case "$$curpass:$$slibdir" in \
 	  libc:*) \
 	;; \
-	  *:/lib32 | *:/lib64 | *:/libx32 | *:/lib/arm-linux-gnueabi*) \
+	  *:/lib32 | *:/lib64 | *:/libo32 | *:/libx32 | *:/lib/arm-linux-gnueabi*) \
 	pass="-alt" \
 	suffix="-$(curpass)" \
 	;; \
+	  *:* ) \
+   templates="" \
+	;; \
 	esac ; \
 	for t in $$templates ; do \
 	  for s in debian/$$t$$pass.* ; do \
@@ -219,7 +219,7 @@
 	  cp $$s $$t ; \
 	fi ; \
 	sed -i \
-		-e "/$$libdir.*.a /d" \
+		-e "/LIBDIR.*\.a /d" \
 		-e "s#TMPDIR#debian/tmp-$$curpass#g" \
 		-e "s#RTLDDIR#$$rtlddir#g" \
 		-e "s#SLIBDIR#$$slibdir#g" \
--- End Message ---
--- Begin Message ---
Source: glibc
Source-Version: 2.21-0experimental2

We believe that the bug you reported is fixed in the latest version of
glibc, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 797...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Aurelien Jarno  (supplier of updated glibc package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.8

Bug#799418: marked as done (glibc: [INTL:pt_BR] Brazilian Portuguese debconf templates translation)

2015-10-18 Thread Debian Bug Tracking System
Your message dated Mon, 19 Oct 2015 05:19:14 +
with message-id 
and subject line Bug#799418: fixed in glibc 2.21-0experimental2
has caused the Debian Bug report #799418,
regarding glibc: [INTL:pt_BR] Brazilian Portuguese debconf templates translation
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
799418: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=799418
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: glibc
Tags: l10n patch
Severity: wishlist

Hello,

Please, Could you update the Brazilian Portuguese Translation?

Attached you will find the file pt_BR.po. It is UTF-8 encoded and it is
tested with msgfmt and podebconf-display-po.

Kind regards.


pt_BR.po.gz
Description: application/gzip


signature.asc
Description: Digital signature
--- End Message ---
--- Begin Message ---
Source: glibc
Source-Version: 2.21-0experimental2

We believe that the bug you reported is fixed in the latest version of
glibc, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 799...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Aurelien Jarno  (supplier of updated glibc package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.8
Date: Mon, 19 Oct 2015 00:20:34 +0200
Source: glibc
Binary: libc-bin libc-dev-bin libc-l10n glibc-doc glibc-source locales 
locales-all nscd multiarch-support libc6 libc6-dev libc6-dbg libc6-pic 
libc6-udeb libc6.1 libc6.1-dev libc6.1-dbg libc6.1-pic libc6.1-udeb libc0.3 
libc0.3-dev libc0.3-dbg libc0.3-pic libc0.3-udeb libc0.1 libc0.1-dev 
libc0.1-dbg libc0.1-pic libc0.1-udeb libc6-i386 libc6-dev-i386 libc6-sparc 
libc6-dev-sparc libc6-sparc64 libc6-dev-sparc64 libc6-s390 libc6-dev-s390 
libc6-amd64 libc6-dev-amd64 libc6-powerpc libc6-dev-powerpc libc6-ppc64 
libc6-dev-ppc64 libc6-mips32 libc6-dev-mips32 libc6-mipsn32 libc6-dev-mipsn32 
libc6-mips64 libc6-dev-mips64 libc0.1-i386 libc0.1-dev-i386 libc6-x32 
libc6-dev-x32 libc6-i686 libc6-xen libc0.1-i686 libc0.3-i686 libc0.3-xen 
libc6.1-alphaev67 libnss-dns-udeb libnss-files-udeb
Architecture: source
Version: 2.21-0experimental2
Distribution: experimental
Urgency: medium
Maintainer: GNU Libc Maintainers 
Changed-By: Aurelien Jarno 
Description:
 glibc-doc  - GNU C Library: Documentation
 glibc-source - GNU C Library: sources
 libc-bin   - GNU C Library: Binaries
 libc-dev-bin - GNU C Library: Development binaries
 libc-l10n  - GNU C Library: localization files
 libc0.1- GNU C Library: Shared libraries
 libc0.1-dbg - GNU C Library: detached debugging symbols
 libc0.1-dev - GNU C Library: Development Libraries and Header Files
 libc0.1-dev-i386 - GNU C Library: 32bit development libraries for AMD64
 libc0.1-i386 - GNU C Library: 32bit shared libraries for AMD64
 libc0.1-i686 - GNU C Library: Shared libraries [i686 optimized]
 libc0.1-pic - GNU C Library: PIC archive library
 libc0.1-udeb - GNU C Library: Shared libraries - udeb (udeb)
 libc0.3- GNU C Library: Shared libraries
 libc0.3-dbg - GNU C Library: detached debugging symbols
 libc0.3-dev - GNU C Library: Development Libraries and Header Files
 libc0.3-i686 - GNU C Library: Shared libraries [i686 optimized]
 libc0.3-pic - GNU C Library: PIC archive library
 libc0.3-udeb - GNU C Library: Shared libraries - udeb (udeb)
 libc0.3-xen - GNU C Library: Shared libraries [Xen version]
 libc6  - GNU C Library: Shared libraries
 libc6-amd64 - GNU C Library: 64bit Shared libraries for AMD64
 libc6-dbg  - GNU C Library: detached debugging symbols
 libc6-dev  - GNU C Library: Development Libraries and Header Files
 libc6-dev-amd64 - GNU C Library: 64bit Development Libraries for AMD64
 libc6-dev-i386 - GNU C Library: 32-bit development libraries for AMD64
 libc6-dev-mips32 - GNU C Library: o32 Development Libraries for MIPS
 libc6-dev-mips64 - GNU C Library: 64bit Development Libraries for MIPS64
 libc6-dev-mipsn32 - GNU C Library: n32 Development Libraries for MIPS64
 libc6-dev-powerpc - GNU C Library: 32bit powerpc development libraries for 
ppc64
 libc6-dev-ppc64 - GNU C Library: 

Bug#797538: marked as done (dpkg: warning: version 'Glibc6_VERSION' has bad syntax: version number does not start with digit)

2015-10-18 Thread Debian Bug Tracking System
Your message dated Mon, 19 Oct 2015 05:19:14 +
with message-id 
and subject line Bug#797538: fixed in glibc 2.21-0experimental2
has caused the Debian Bug report #797538,
regarding dpkg: warning: version 'Glibc6_VERSION' has bad syntax: version 
number does not start with digit
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
797538: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=797538
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: libc-bin
Version: 2.21-0experimental1

Setting up libc-bin (2.21-0experimental1) ...
(Reading database ... 137239 files and directories currently installed.)
Preparing to unpack .../libc6_2.21-0experimental1_i386.deb ...
dpkg: warning: version 'Glibc6_VERSION' has bad syntax: version number does not 
start with digit
Checking for services that may need to be restarted...
Checking init scripts...
dpkg: warning: version 'Glibc6_VERSION' has bad syntax: version number does not 
start with digit
Unpacking libc6:i386 (2.21-0experimental1) over (2.21-0experimental0) ...
Setting up libc6:i386 (2.21-0experimental1) ...
dpkg: warning: version 'Glibc6_VERSION' has bad syntax: version number does not 
start with digit
--- End Message ---
--- Begin Message ---
Source: glibc
Source-Version: 2.21-0experimental2

We believe that the bug you reported is fixed in the latest version of
glibc, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 797...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Aurelien Jarno  (supplier of updated glibc package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.8
Date: Mon, 19 Oct 2015 00:20:34 +0200
Source: glibc
Binary: libc-bin libc-dev-bin libc-l10n glibc-doc glibc-source locales 
locales-all nscd multiarch-support libc6 libc6-dev libc6-dbg libc6-pic 
libc6-udeb libc6.1 libc6.1-dev libc6.1-dbg libc6.1-pic libc6.1-udeb libc0.3 
libc0.3-dev libc0.3-dbg libc0.3-pic libc0.3-udeb libc0.1 libc0.1-dev 
libc0.1-dbg libc0.1-pic libc0.1-udeb libc6-i386 libc6-dev-i386 libc6-sparc 
libc6-dev-sparc libc6-sparc64 libc6-dev-sparc64 libc6-s390 libc6-dev-s390 
libc6-amd64 libc6-dev-amd64 libc6-powerpc libc6-dev-powerpc libc6-ppc64 
libc6-dev-ppc64 libc6-mips32 libc6-dev-mips32 libc6-mipsn32 libc6-dev-mipsn32 
libc6-mips64 libc6-dev-mips64 libc0.1-i386 libc0.1-dev-i386 libc6-x32 
libc6-dev-x32 libc6-i686 libc6-xen libc0.1-i686 libc0.3-i686 libc0.3-xen 
libc6.1-alphaev67 libnss-dns-udeb libnss-files-udeb
Architecture: source
Version: 2.21-0experimental2
Distribution: experimental
Urgency: medium
Maintainer: GNU Libc Maintainers 
Changed-By: Aurelien Jarno 
Description:
 glibc-doc  - GNU C Library: Documentation
 glibc-source - GNU C Library: sources
 libc-bin   - GNU C Library: Binaries
 libc-dev-bin - GNU C Library: Development binaries
 libc-l10n  - GNU C Library: localization files
 libc0.1- GNU C Library: Shared libraries
 libc0.1-dbg - GNU C Library: detached debugging symbols
 libc0.1-dev - GNU C Library: Development Libraries and Header Files
 libc0.1-dev-i386 - GNU C Library: 32bit development libraries for AMD64
 libc0.1-i386 - GNU C Library: 32bit shared libraries for AMD64
 libc0.1-i686 - GNU C Library: Shared libraries [i686 optimized]
 libc0.1-pic - GNU C Library: PIC archive library
 libc0.1-udeb - GNU C Library: Shared libraries - udeb (udeb)
 libc0.3- GNU C Library: Shared libraries
 libc0.3-dbg - GNU C Library: detached debugging symbols
 libc0.3-dev - GNU C Library: Development Libraries and Header Files
 libc0.3-i686 - GNU C Library: Shared libraries [i686 optimized]
 libc0.3-pic - GNU C Library: PIC archive library
 libc0.3-udeb - GNU C Library: Shared libraries - udeb (udeb)
 libc0.3-xen - GNU C Library: Shared libraries [Xen version]
 libc6  - GNU C Library: Shared libraries
 libc6-amd64 - GNU C Library: 64bit Shared libraries for AMD64
 libc6-dbg  - GNU C Library: detached debugging symbols
 libc6-dev  - GNU C Library: Development Libraries and Header Files
 libc6-dev-amd64 - GNU C Library: 64bit Development Libraries for AMD64
 

Bug#672774: marked as done (build fix for multiarch-enabled kfreebsd-kernel-headers)

2015-10-18 Thread Debian Bug Tracking System
Your message dated Mon, 19 Oct 2015 05:19:14 +
with message-id 
and subject line Bug#798064: fixed in glibc 2.21-0experimental2
has caused the Debian Bug report #798064,
regarding build fix for multiarch-enabled kfreebsd-kernel-headers
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
798064: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798064
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: eglibc
Version: 2.13-32
Tags: patch
User: debian-...@lists.debian.org
Usertags: kfreebsd

As eglibc needs special handling for headers provided by kfreebsd-kernel-headers
package, it will FTBFS when kfreebsd-kernel-headers switches to multiarch-style
directories (e.g. /usr/include/x86_64-kfreebsd-gnu/machine).

Please consider fixing the problem preemptively using the attached patch.  This
patch doesn't breal backward compatibility with current kfreebsd-kernel-headers
(0.79).

It's been tested on i386 and amd64, both with pristine kfreebsd-kernel-headers
and with a multiarch-enabled version.

-- System Information:
Debian Release: wheezy/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: kfreebsd-i386 (i386)

Kernel: kFreeBSD 8.1-1-amd64
Locale: LANG=ca_AD.UTF-8, LC_CTYPE=ca_AD.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Index: debian/sysdeps/kfreebsd.mk
===
--- debian/sysdeps/kfreebsd.mk	(revision 5248)
+++ debian/sysdeps/kfreebsd.mk	(working copy)
@@ -18,21 +18,31 @@
 endif
 
 # Minimum Kernel supported
-with_headers = --with-headers=$(shell pwd)/debian/include --enable-kernel=$(call xx,MIN_KERNEL_SUPPORTED)
+with_headers = --with-headers=$(shell pwd)/debian/include:$(shell pwd)/debian/include/$(DEB_HOST_MULTIARCH) --enable-kernel=$(call xx,MIN_KERNEL_SUPPORTED)
 
 KERNEL_HEADER_DIR = $(stamp)mkincludedir
 $(stamp)mkincludedir:
 	rm -rf debian/include
 	mkdir debian/include
-	for file in bsm net netatalk netipx nfs osreldate.h sys x86 vm ; do \
+	for file in bsm net netatalk netipx nfs osreldate.h sys x86 vm machine ; do \
 	if test -e $(KFREEBSD_HEADERS)/$$file ; then \
 	ln -s $(KFREEBSD_HEADERS)/$$file debian/include ; \
 	fi ; \
+	for arch in i386 x86_64 ; do \
+		if test -e $(KFREEBSD_HEADERS)/$${arch}-kfreebsd-gnu/$$file ; then \
+		mkdir -p debian/include/$${arch}-kfreebsd-gnu ; \
+		ln -s $(KFREEBSD_HEADERS)/$${arch}-kfreebsd-gnu/$$file debian/include/$${arch}-kfreebsd-gnu ; \
+		fi ; \
+	done ; \
 	done
 
 # Link all machine directories.  We can't just link machine
 # because of explicit references to  and
 	# .
+	#
+	# FIXME: This can be removed when kfreebsd-kernel-headers switches to
+	# Multiarch-style directories.
+	#
 	find $(KFREEBSD_HEADERS) -maxdepth 1 -xtype d -name machine\* \
 		-exec ln -s '{}' debian/include ';'
 
@@ -42,7 +52,7 @@
 	touch $@
 
 # Also to make configure happy.
-export CPPFLAGS = -isystem $(shell pwd)/debian/include
+CPPFLAGS = -isystem $(shell pwd)/debian/include -isystem $(shell pwd)/debian/include/$(DEB_HOST_MULTIARCH)
 
 # This round of ugliness decomposes the FreeBSD kernel version number
 # into an integer so it can be easily compared and then does so.
Index: debian/sysdeps/kfreebsd-amd64.mk
===
--- debian/sysdeps/kfreebsd-amd64.mk	(revision 5248)
+++ debian/sysdeps/kfreebsd-amd64.mk	(working copy)
@@ -8,10 +8,12 @@
 
 i386_configure_target = i686-kfreebsd-gnu
 i386_CC = $(CC) -m32
+i386_CPPFLAGS = -isystem $(shell pwd)/debian/include -isystem $(shell pwd)/debian/include/i386-kfreebsd-gnu
 i386_CXX = $(CXX) -m32
 i386_add-ons = ports linuxthreads $(add-ons)
 i386_extra_cflags = -march=pentium4 -mtune=generic
 i386_extra_config_options = $(extra_config_options) --disable-profile
+i386_with_headers = --with-headers=$(shell pwd)/debian/include:$(shell pwd)/debian/include/i386-kfreebsd-gnu --enable-kernel=$(call xx,MIN_KERNEL_SUPPORTED)
 i386_slibdir = /lib32
 i386_libdir = /usr/lib32
 
Index: debian/rules.d/build.mk
===
--- debian/rules.d/build.mk	(revision 5248)
+++ debian/rules.d/build.mk	(working copy)
@@ -23,6 +23,7 @@
 	@echo Configuring $(curpass)
 	rm -f $(DEB_BUILDDIR)/configparms
 	echo "CC = $(call xx,CC)"		>> $(DEB_BUILDDIR)/configparms
+	echo "CPPFLAGS = $(call xx,CPPFLAGS)"	>> $(DEB_BUILDDIR)/configparms
 	echo "CXX = $(call xx,CXX)"		>> $(DEB_BUILDDIR)/configparms
 	echo "BUILD_CC = $(BUILD_CC)"		>> 

Bug#802256: marked as done (Backport tls_dtor_list hardening)

2015-10-18 Thread Debian Bug Tracking System
Your message dated Mon, 19 Oct 2015 05:19:14 +
with message-id 
and subject line Bug#802256: fixed in glibc 2.21-0experimental2
has caused the Debian Bug report #802256,
regarding Backport tls_dtor_list hardening
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
802256: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=802256
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: libc6
Version: 2.19-18+deb8u1

Please backport this upstream hardening patch to jessie (wheezy does
not have this feature yet):

  https://sourceware.org/bugzilla/show_bug.cgi?id=19018
  
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=f586e1328681b400078c995a0bb6ad301ef73549

Also recommended for testing purposes:

  
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=99e1dc0a688d6c25d3f422bc9f3fa29adb483339

Thanks,
Florian
--- End Message ---
--- Begin Message ---
Source: glibc
Source-Version: 2.21-0experimental2

We believe that the bug you reported is fixed in the latest version of
glibc, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 802...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Aurelien Jarno  (supplier of updated glibc package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.8
Date: Mon, 19 Oct 2015 00:20:34 +0200
Source: glibc
Binary: libc-bin libc-dev-bin libc-l10n glibc-doc glibc-source locales 
locales-all nscd multiarch-support libc6 libc6-dev libc6-dbg libc6-pic 
libc6-udeb libc6.1 libc6.1-dev libc6.1-dbg libc6.1-pic libc6.1-udeb libc0.3 
libc0.3-dev libc0.3-dbg libc0.3-pic libc0.3-udeb libc0.1 libc0.1-dev 
libc0.1-dbg libc0.1-pic libc0.1-udeb libc6-i386 libc6-dev-i386 libc6-sparc 
libc6-dev-sparc libc6-sparc64 libc6-dev-sparc64 libc6-s390 libc6-dev-s390 
libc6-amd64 libc6-dev-amd64 libc6-powerpc libc6-dev-powerpc libc6-ppc64 
libc6-dev-ppc64 libc6-mips32 libc6-dev-mips32 libc6-mipsn32 libc6-dev-mipsn32 
libc6-mips64 libc6-dev-mips64 libc0.1-i386 libc0.1-dev-i386 libc6-x32 
libc6-dev-x32 libc6-i686 libc6-xen libc0.1-i686 libc0.3-i686 libc0.3-xen 
libc6.1-alphaev67 libnss-dns-udeb libnss-files-udeb
Architecture: source
Version: 2.21-0experimental2
Distribution: experimental
Urgency: medium
Maintainer: GNU Libc Maintainers 
Changed-By: Aurelien Jarno 
Description:
 glibc-doc  - GNU C Library: Documentation
 glibc-source - GNU C Library: sources
 libc-bin   - GNU C Library: Binaries
 libc-dev-bin - GNU C Library: Development binaries
 libc-l10n  - GNU C Library: localization files
 libc0.1- GNU C Library: Shared libraries
 libc0.1-dbg - GNU C Library: detached debugging symbols
 libc0.1-dev - GNU C Library: Development Libraries and Header Files
 libc0.1-dev-i386 - GNU C Library: 32bit development libraries for AMD64
 libc0.1-i386 - GNU C Library: 32bit shared libraries for AMD64
 libc0.1-i686 - GNU C Library: Shared libraries [i686 optimized]
 libc0.1-pic - GNU C Library: PIC archive library
 libc0.1-udeb - GNU C Library: Shared libraries - udeb (udeb)
 libc0.3- GNU C Library: Shared libraries
 libc0.3-dbg - GNU C Library: detached debugging symbols
 libc0.3-dev - GNU C Library: Development Libraries and Header Files
 libc0.3-i686 - GNU C Library: Shared libraries [i686 optimized]
 libc0.3-pic - GNU C Library: PIC archive library
 libc0.3-udeb - GNU C Library: Shared libraries - udeb (udeb)
 libc0.3-xen - GNU C Library: Shared libraries [Xen version]
 libc6  - GNU C Library: Shared libraries
 libc6-amd64 - GNU C Library: 64bit Shared libraries for AMD64
 libc6-dbg  - GNU C Library: detached debugging symbols
 libc6-dev  - GNU C Library: Development Libraries and Header Files
 libc6-dev-amd64 - GNU C Library: 64bit Development Libraries for AMD64
 libc6-dev-i386 - GNU C Library: 32-bit development libraries for AMD64
 libc6-dev-mips32 - GNU C Library: o32 Development Libraries for MIPS
 libc6-dev-mips64 - GNU C Library: 64bit Development Libraries for MIPS64
 libc6-dev-mipsn32 - GNU C Library: n32 Development Libraries for MIPS64
 libc6-dev-powerpc - GNU C Library: 32bit powerpc 

Bug#800574: marked as done (libc6: lock elision hazard on Intel Broadwell and Skylake)

2015-10-18 Thread Debian Bug Tracking System
Your message dated Mon, 19 Oct 2015 05:19:14 +
with message-id 
and subject line Bug#800574: fixed in glibc 2.21-0experimental2
has caused the Debian Bug report #800574,
regarding libc6: lock elision hazard on Intel Broadwell and Skylake
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
800574: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=800574
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: libc6
Version: 2.19-4
Severity: grave
Justification: causes non-serious data loss

Intel Broadwell-H and Skylake-S/H have critical errata that causes HLE
to be extremely dangerous to use on those processors, resulting in
unpredictable behavior (i.e. process crashes when you are lucky, data
corruption when you are not) when hardware lock-elision is enabled in
glibc/libpthread.

Broadwell errata BBD50 (desktop/mobile), BDW50 (server):

An HLE (Hardware Lock Elision) transactional region begins with
an instruction with the XACQUIRE prefix.  Due to this erratum,
reads from within the transactional region of the memory
destination of that instruction may return the value that was
in memory before the transactional region began

According to the Intel errata list, a firmware fix is possible, but I
have no idea whether it is done by toggling a boot-locked MSR that
disables HLE, or through a microcode update.  The MSR is more likely,
but if it is a microcode update, it is going to be as much of a hazard
as the Haswell one that disabled TSX+HLE.

I recommend that we extend the HLE blacklist in glibc to also include
CPU signature 0x40671.  This will disable HLE on Xeon E3-1200v4, and
5th-generation Core i5/i7.  These processors are supposed to already
have TSX disabled (errata BBD51/BDW51).

Skylake's latest public specification update still doesn't list any HLE
errata, but it is not really recent.  OTOH, there is a Gentoo user's
report that Skylake is also unstable when HLE is enabled in glibc and
that the crashes stop when glibc is compiled without lock elision.

For that reason, it might be a good idea to also blacklist HLE on CPU
signatures 0x506e1, 0x506e2 and 0x506e3, which would disable HLE on
Skylake-S and Skylake-H (6th gen Core i5/i7).  This won't cover the
Skylake Xeon E3-1200v5, for which there are no reports of breakage (nor
a public specification update I could find).

References: 
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=762195
https://bbs.archlinux.org/viewtopic.php?id=202545

In hindsight, it looks like we would have been better off by disabling
lock elision entirely for Debian jessie when we fixed #762195.
Something to consider when the time comes to fix this bug in stable
through a stable update...

-- 
  "One disk to rule them all, One disk to find them. One disk to bring
  them all and in the darkness grind them. In the Land of Redmond
  where the shadows lie." -- The Silicon Valley Tarot
  Henrique Holschuh
--- End Message ---
--- Begin Message ---
Source: glibc
Source-Version: 2.21-0experimental2

We believe that the bug you reported is fixed in the latest version of
glibc, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 800...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Aurelien Jarno  (supplier of updated glibc package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.8
Date: Mon, 19 Oct 2015 00:20:34 +0200
Source: glibc
Binary: libc-bin libc-dev-bin libc-l10n glibc-doc glibc-source locales 
locales-all nscd multiarch-support libc6 libc6-dev libc6-dbg libc6-pic 
libc6-udeb libc6.1 libc6.1-dev libc6.1-dbg libc6.1-pic libc6.1-udeb libc0.3 
libc0.3-dev libc0.3-dbg libc0.3-pic libc0.3-udeb libc0.1 libc0.1-dev 
libc0.1-dbg libc0.1-pic libc0.1-udeb libc6-i386 libc6-dev-i386 libc6-sparc 
libc6-dev-sparc libc6-sparc64 libc6-dev-sparc64 libc6-s390 libc6-dev-s390 
libc6-amd64 libc6-dev-amd64 libc6-powerpc libc6-dev-powerpc libc6-ppc64 
libc6-dev-ppc64 libc6-mips32 libc6-dev-mips32 libc6-mipsn32 libc6-dev-mipsn32 
libc6-mips64 libc6-dev-mips64 libc0.1-i386 libc0.1-dev-i386 libc6-x32 

Bug#798064: marked as done (glibc: please find kfreebsd-kernel-headers in multiarch path)

2015-10-18 Thread Debian Bug Tracking System
Your message dated Mon, 19 Oct 2015 05:19:14 +
with message-id 
and subject line Bug#798064: fixed in glibc 2.21-0experimental2
has caused the Debian Bug report #798064,
regarding glibc: please find kfreebsd-kernel-headers in multiarch path
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
798064: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798064
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: glibc
Version: 2.19-19
Severity: wishlist
Tags: patch

Hi,

We're hoping to move kfreebsd-kernel-headers' files to multiarch
path /usr/include/$(DEB_TARGET_MULTIARCH), so that headers of other
kernels are co-installable on a build machine (for cross-building and
bootstrapping).

gcc-5 is already fine with this.  And since gcc's default include search
path has /usr/include/$(DEB_TARGET_MULTIARCH), it is expected to not
cause many problems;  except where -nostdinc is used.

Please could glibc be patched as attached, to always look in that
directory for system includes, even for native builds (HOST==BUILD).

We hope to make this change with kfreebsd-kernel-headers (>= 10.1~7~),
unless there are objections, or if my upcoming mass rebuild reveal any
other breakage in reverse-depends.

Thanks!

-- System Information:
Debian Release: stretch/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: kfreebsd-amd64 (x86_64)

Kernel: kFreeBSD 9.0-2-amd64-xenhvm-ipsec
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
--- glibc-2.19/debian/sysdeps/kfreebsd.mk.orig	2015-07-09 12:28:06.0 +
+++ glibc-2.19/debian/sysdeps/kfreebsd.mk	2015-09-04 16:04:43.104028000 +
@@ -11,11 +11,7 @@
 libc_extra_config_options = $(extra_config_options)
 
 ifndef KFREEBSD_SOURCE
-  ifeq ($(DEB_HOST_GNU_TYPE),$(DEB_BUILD_GNU_TYPE))
-KFREEBSD_HEADERS := /usr/include
-  else
-KFREEBSD_HEADERS := /usr/$(DEB_HOST_GNU_TYPE)/include
-  endif
+  KFREEBSD_HEADERS := /usr/include/$(DEB_TARGET_MULTIARCH)
 else
   KFREEBSD_HEADERS := $(KFREEBSD_SOURCE)/sys
 endif
--- End Message ---
--- Begin Message ---
Source: glibc
Source-Version: 2.21-0experimental2

We believe that the bug you reported is fixed in the latest version of
glibc, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 798...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Aurelien Jarno  (supplier of updated glibc package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.8
Date: Mon, 19 Oct 2015 00:20:34 +0200
Source: glibc
Binary: libc-bin libc-dev-bin libc-l10n glibc-doc glibc-source locales 
locales-all nscd multiarch-support libc6 libc6-dev libc6-dbg libc6-pic 
libc6-udeb libc6.1 libc6.1-dev libc6.1-dbg libc6.1-pic libc6.1-udeb libc0.3 
libc0.3-dev libc0.3-dbg libc0.3-pic libc0.3-udeb libc0.1 libc0.1-dev 
libc0.1-dbg libc0.1-pic libc0.1-udeb libc6-i386 libc6-dev-i386 libc6-sparc 
libc6-dev-sparc libc6-sparc64 libc6-dev-sparc64 libc6-s390 libc6-dev-s390 
libc6-amd64 libc6-dev-amd64 libc6-powerpc libc6-dev-powerpc libc6-ppc64 
libc6-dev-ppc64 libc6-mips32 libc6-dev-mips32 libc6-mipsn32 libc6-dev-mipsn32 
libc6-mips64 libc6-dev-mips64 libc0.1-i386 libc0.1-dev-i386 libc6-x32 
libc6-dev-x32 libc6-i686 libc6-xen libc0.1-i686 libc0.3-i686 libc0.3-xen 
libc6.1-alphaev67 libnss-dns-udeb libnss-files-udeb
Architecture: source
Version: 2.21-0experimental2
Distribution: experimental
Urgency: medium
Maintainer: GNU Libc Maintainers 
Changed-By: Aurelien Jarno 
Description:
 glibc-doc  - GNU C Library: Documentation
 glibc-source - GNU C Library: sources
 libc-bin   - GNU C Library: Binaries
 libc-dev-bin - GNU C Library: Development binaries
 libc-l10n  - GNU C Library: localization files
 libc0.1- GNU C Library: Shared libraries
 libc0.1-dbg - GNU C Library: detached debugging symbols
 libc0.1-dev - GNU C Library: Development Libraries and Header Files
 libc0.1-dev-i386 - GNU C Library: 32bit development libraries for AMD64
 libc0.1-i386 - GNU C Library: 32bit shared libraries for 

Bug#801691: marked as done (glibc: pointer guarding weakness)

2015-10-18 Thread Debian Bug Tracking System
Your message dated Mon, 19 Oct 2015 05:19:14 +
with message-id 
and subject line Bug#801691: fixed in glibc 2.21-0experimental2
has caused the Debian Bug report #801691,
regarding glibc: pointer guarding weakness
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
801691: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=801691
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: glibc
Severity: important
Tags: security
Justification: user security hole

Please see http://www.openwall.com/lists/oss-security/2015/09/05/8
for details.

Cheers,
Moritz

--- End Message ---
--- Begin Message ---
Source: glibc
Source-Version: 2.21-0experimental2

We believe that the bug you reported is fixed in the latest version of
glibc, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 801...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Aurelien Jarno  (supplier of updated glibc package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.8
Date: Mon, 19 Oct 2015 00:20:34 +0200
Source: glibc
Binary: libc-bin libc-dev-bin libc-l10n glibc-doc glibc-source locales 
locales-all nscd multiarch-support libc6 libc6-dev libc6-dbg libc6-pic 
libc6-udeb libc6.1 libc6.1-dev libc6.1-dbg libc6.1-pic libc6.1-udeb libc0.3 
libc0.3-dev libc0.3-dbg libc0.3-pic libc0.3-udeb libc0.1 libc0.1-dev 
libc0.1-dbg libc0.1-pic libc0.1-udeb libc6-i386 libc6-dev-i386 libc6-sparc 
libc6-dev-sparc libc6-sparc64 libc6-dev-sparc64 libc6-s390 libc6-dev-s390 
libc6-amd64 libc6-dev-amd64 libc6-powerpc libc6-dev-powerpc libc6-ppc64 
libc6-dev-ppc64 libc6-mips32 libc6-dev-mips32 libc6-mipsn32 libc6-dev-mipsn32 
libc6-mips64 libc6-dev-mips64 libc0.1-i386 libc0.1-dev-i386 libc6-x32 
libc6-dev-x32 libc6-i686 libc6-xen libc0.1-i686 libc0.3-i686 libc0.3-xen 
libc6.1-alphaev67 libnss-dns-udeb libnss-files-udeb
Architecture: source
Version: 2.21-0experimental2
Distribution: experimental
Urgency: medium
Maintainer: GNU Libc Maintainers 
Changed-By: Aurelien Jarno 
Description:
 glibc-doc  - GNU C Library: Documentation
 glibc-source - GNU C Library: sources
 libc-bin   - GNU C Library: Binaries
 libc-dev-bin - GNU C Library: Development binaries
 libc-l10n  - GNU C Library: localization files
 libc0.1- GNU C Library: Shared libraries
 libc0.1-dbg - GNU C Library: detached debugging symbols
 libc0.1-dev - GNU C Library: Development Libraries and Header Files
 libc0.1-dev-i386 - GNU C Library: 32bit development libraries for AMD64
 libc0.1-i386 - GNU C Library: 32bit shared libraries for AMD64
 libc0.1-i686 - GNU C Library: Shared libraries [i686 optimized]
 libc0.1-pic - GNU C Library: PIC archive library
 libc0.1-udeb - GNU C Library: Shared libraries - udeb (udeb)
 libc0.3- GNU C Library: Shared libraries
 libc0.3-dbg - GNU C Library: detached debugging symbols
 libc0.3-dev - GNU C Library: Development Libraries and Header Files
 libc0.3-i686 - GNU C Library: Shared libraries [i686 optimized]
 libc0.3-pic - GNU C Library: PIC archive library
 libc0.3-udeb - GNU C Library: Shared libraries - udeb (udeb)
 libc0.3-xen - GNU C Library: Shared libraries [Xen version]
 libc6  - GNU C Library: Shared libraries
 libc6-amd64 - GNU C Library: 64bit Shared libraries for AMD64
 libc6-dbg  - GNU C Library: detached debugging symbols
 libc6-dev  - GNU C Library: Development Libraries and Header Files
 libc6-dev-amd64 - GNU C Library: 64bit Development Libraries for AMD64
 libc6-dev-i386 - GNU C Library: 32-bit development libraries for AMD64
 libc6-dev-mips32 - GNU C Library: o32 Development Libraries for MIPS
 libc6-dev-mips64 - GNU C Library: 64bit Development Libraries for MIPS64
 libc6-dev-mipsn32 - GNU C Library: n32 Development Libraries for MIPS64
 libc6-dev-powerpc - GNU C Library: 32bit powerpc development libraries for 
ppc64
 libc6-dev-ppc64 - GNU C Library: 64bit Development Libraries for PowerPC64
 libc6-dev-s390 - GNU C Library: 32bit Development Libraries for IBM zSeries
 libc6-dev-sparc - GNU C Library: 32bit Development Libraries for 

Processed: unmerging 802256

2015-10-18 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> unmerge 802256
Bug #802256 [libc6] Backport tls_dtor_list hardening
Ignoring request to unmerge a bug which is not merged with any others.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
802256: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=802256
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Processed (with 1 error): merging 798316 802256

2015-10-18 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> merge 798316 802256
Bug #798316 [libc6] libc6: Pointer guarding bypass in dynamic Setuid binaries
Unable to merge bugs because:
severity of #802256 is 'normal' not 'important'
Failed to merge 798316: Did not alter merged bugs.

> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
798316: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798316
802256: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=802256
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Processed (with 1 error): merging 798316 801691

2015-10-18 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> merge 798316 801691
Bug #798316 [libc6] libc6: Pointer guarding bypass in dynamic Setuid binaries
Unable to merge bugs because:
package of #801691 is 'glibc' not 'libc6'
Failed to merge 798316: Did not alter merged bugs.

> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
798316: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798316
801691: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=801691
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



r6650 - in glibc-package/branches/glibc-2.21/debian: . po

2015-10-18 Thread Aurelien Jarno
Author: aurel32
Date: 2015-10-18 22:18:25 + (Sun, 18 Oct 2015)
New Revision: 6650

Modified:
   glibc-package/branches/glibc-2.21/debian/changelog
   glibc-package/branches/glibc-2.21/debian/po/pt_BR.po
Log:
Update Brazilian Portuguese debconf translation, by Adriano Rafael
Gomes.  Closes: #799418.

Modified: glibc-package/branches/glibc-2.21/debian/changelog
===
--- glibc-package/branches/glibc-2.21/debian/changelog  2015-10-18 22:16:32 UTC 
(rev 6649)
+++ glibc-package/branches/glibc-2.21/debian/changelog  2015-10-18 22:18:25 UTC 
(rev 6650)
@@ -70,6 +70,8 @@
 unconditionally disable LD_POINTER_GUARD.  Closes: #798316, #801691.
   * patches/any/cvs-mangle-tls_dtor_list.diff: new patch from upstream to
 mangle function pointers in tls_dtor_list.  Closes: #802256.
+  * Update Brazilian Portuguese debconf translation, by Adriano Rafael
+Gomes.  Closes: #799418.
 
   [ Steven Chamberlain ]
   * sysdeps/kfreebsd.mk: find kfreebsd-kernel-headers in multiarch path.

Modified: glibc-package/branches/glibc-2.21/debian/po/pt_BR.po
===
--- glibc-package/branches/glibc-2.21/debian/po/pt_BR.po2015-10-18 
22:16:32 UTC (rev 6649)
+++ glibc-package/branches/glibc-2.21/debian/po/pt_BR.po2015-10-18 
22:18:25 UTC (rev 6650)
@@ -2,21 +2,22 @@
 # Copyright (C) 2007 THE glibc'S COPYRIGHT HOLDER
 # This file is distributed under the same license as the glibc package.
 # Felipe Augusto van de Wiel (faw) , 2007-2008.
+# Fernando Ike de Oliveira (fike) , 2013.
+# Adriano Rafael Gomes , 2014-2015.
 #
 msgid ""
 msgstr ""
-"Project-Id-Version: libc6\n"
+"Project-Id-Version: glibc\n"
 "Report-Msgid-Bugs-To: gl...@packages.debian.org\n"
 "POT-Creation-Date: 2014-05-21 00:04+0200\n"
-"PO-Revision-Date: 2008-06-09 01:17-0300\n"
-"Last-Translator: Felipe Augusto van de Wiel (faw) \n"
+"PO-Revision-Date: 2015-09-18 20:29-0300\n"
+"Last-Translator: Adriano Rafael Gomes \n"
 "Language-Team: Brazilian Portuguese \n"
 "Language: pt_BR\n"
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"pt_BR utf-8\n"
 
 #. Type: multiselect
 #. Choices
@@ -37,9 +38,9 @@
 "Locales are a framework to switch between multiple languages and allow users "
 "to use their language, country, characters, collation order, etc."
 msgstr ""
-"Locales são uma infra-estrutura para alternar entre múltiplos idiomas e "
-"permite aos usuários utilizar o seu idioma, país, caracteres, ordem de "
-"colação, etc."
+"Locales são uma infraestrutura para alternar entre múltiplos idiomas e "
+"permitem aos usuários utilizar o seu idioma, país, caracteres, ordenação, "
+"etc."
 
 #. Type: multiselect
 #. Description
@@ -88,7 +89,7 @@
 msgstr ""
 "Isto selecionará o idioma padrão para o sistema inteiro. Se este sistema é "
 "um sistema multiusuário no qual nem todos os usuários são capazes de falar o "
-"idioma padrão, eles vão enfrentar dificuldades."
+"idioma padrão, eles enfrentarão dificuldades."
 
 #. Type: boolean
 #. Description
@@ -108,12 +109,13 @@
 "yourself is xdm - because automatic restart might disconnect your active X11 "
 "sessions."
 msgstr ""
-"Serviços em execução e programas que usam NSS precisam ser reiniciados, caso "
-"contrário eles podem não ser capazes de realizar consultas ou autenticação. "
+"Serviços e programas em execução que usam NSS precisam ser reiniciados, caso "
+"contrário, eles podem não ser capazes de realizar consultas ou autenticação. "
 "O processo de instalação é capaz de reiniciar alguns desses serviços (como "
-"ssh, isto pode afetar sua habilidade de fazer login). Por favor, reveja a "
-"seguinte lista separada por espaços de scripts init.d que serão reiniciados "
-"agora, e corrija-a se necessário."
+"ssh ou telnetd), mas outros programas não podem ser reiniciados "
+"automaticamente. Um programa que precisa ser parado e reiniciado manualmente "
+"por você depois da atualização da glibc é o xdm - porque reiniciar "
+"automaticamente pode desconectar suas sessões ativas do X11."
 
 #. Type: boolean
 #. Description
@@ -139,8 +141,7 @@
 #. Description
 #: ../debhelper.in/libc.templates:2001
 msgid "Services to restart for GNU libc library upgrade:"
-msgstr ""
-"Serviços para reiniciar por causa da atualização da biblioteca GNU libc:"
+msgstr "Serviços a serem reiniciados para atualização da biblioteca GNU libc:"
 
 #. Type: string
 #. Description
@@ -152,11 +153,11 @@
 "review the following space-separated list of init.d scripts for services to "
 "be restarted now, and correct it if needed."
 msgstr ""
-"Serviços em execução e programas que usam NSS precisam ser reiniciados, caso "
-"contrário eles podem não ser capazes de realizar consultas ou autenticação "
+"Serviços e programas em 

Bug#801638: marked as done (libc-2.19.so: segfault at 0 ip 00000000f763946c sp 00000000ffe955e8 error 4 in libc-2.19.so[f74fb000+1a4000])

2015-10-18 Thread Debian Bug Tracking System
Your message dated Sun, 18 Oct 2015 21:08:46 +0200
with message-id <20151018190846.ga29...@aurel32.net>
and subject line Re: Bug#801638: libc-2.19.so: segfault at 0 ip 
f763946c sp ffe955e8 error 4 in libc-2.19.so[f74fb000+1a4000]
has caused the Debian Bug report #801638,
regarding libc-2.19.so: segfault at 0 ip f763946c sp ffe955e8 
error 4 in libc-2.19.so[f74fb000+1a4000]
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
801638: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=801638
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: libc6
Version: 2.19-18+deb8u1
Severity: normal
File: libc-2.19.so

Dear Maintainer,

*** Reporter, please consider answering these questions, where appropriate ***

   * What led up to the situation?
   * What exactly did you do (or not do) that was effective (or
 ineffective)?
   * What was the outcome of this action?
   * What outcome did you expect instead?

*** End of the template - remove these template lines ***


-- System Information:
Debian Release: 8.2
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'oldoldstable'), (500, 'stable')
Architecture: amd64 (x86_64)

Kernel: Linux 3.16.0-4-amd64 (SMP w/4 CPU cores)
Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968)
Shell: /bin/sh linked to /bin/bash
Init: systemd (via /run/systemd/system)

Versions of packages libc6:amd64 depends on:
ii  libgcc1  1:4.9.2-10

libc6:amd64 recommends no packages.

Versions of packages libc6:amd64 suggests:
ii  debconf [debconf-2.0]  1.5.56
pn  glibc-doc  
ii  locales2.19-18+deb8u1

-- debconf information:
  glibc/restart-services:
  glibc/disable-screensaver:
  glibc/restart-failed:
  glibc/upgrade: true
  libraries/restart-without-asking: false
--- End Message ---
--- Begin Message ---
On 2015-10-18 19:44, Aurelien Jarno wrote:
> On 2015-10-13 00:27, Segmentation fault wrote:
> > Package: libc6
> > Version: 2.19-18+deb8u1
> > Severity: normal
> > File: libc-2.19.so
> > 
> > Dear Maintainer,
> > 
> > *** Reporter, please consider answering these questions, where appropriate 
> > ***
> > 
> >* What led up to the situation?
> >* What exactly did you do (or not do) that was effective (or
> >  ineffective)?
> >* What was the outcome of this action?
> >* What outcome did you expect instead?
> 
> The error message you report likely means that one of the libc functions
> was wrongly passed a NULL pointer. As such it's a bug in the application
> you used and not in the libc. Can you please consider answering the
> above question, so that we can identify the broken application and
> reassign the bug to it? In the contrary we'll simply close this bug in
> the next days.

I got the following error message when sending the mail.

| This message was created automatically by mail delivery software.
| 
| A message that you sent could not be delivered to one or more of its
| recipients. This is a permanent error. The following address(es) failed:
| 
|   volg...@list.ru
| SMTP error from remote mail server after end of data:
| host mxs.mail.ru [217.69.139.150]: 550 Message was not accepted -- 
invalid mailbox.  Local mailbox volg...@list.ru is unavailable:
| account is disabled

I am therefore closing the bug. Please reopen it if more details if the
bug can be reproduced.

Aurelien

-- 
Aurelien Jarno  GPG: 4096R/1DDD8C9B
aurel...@aurel32.net http://www.aurel32.net--- End Message ---


r6636 - in tzdata/branches/glibc-branch-jessie/debian: . po

2015-10-18 Thread Aurelien Jarno
Author: aurel32
Date: 2015-10-18 16:31:10 + (Sun, 18 Oct 2015)
New Revision: 6636

Modified:
   tzdata/branches/glibc-branch-jessie/debian/po/be.po
   tzdata/branches/glibc-branch-jessie/debian/po/bg.po
   tzdata/branches/glibc-branch-jessie/debian/po/ca.po
   tzdata/branches/glibc-branch-jessie/debian/po/cs.po
   tzdata/branches/glibc-branch-jessie/debian/po/da.po
   tzdata/branches/glibc-branch-jessie/debian/po/de.po
   tzdata/branches/glibc-branch-jessie/debian/po/en.po
   tzdata/branches/glibc-branch-jessie/debian/po/es.po
   tzdata/branches/glibc-branch-jessie/debian/po/eu.po
   tzdata/branches/glibc-branch-jessie/debian/po/fi.po
   tzdata/branches/glibc-branch-jessie/debian/po/fr.po
   tzdata/branches/glibc-branch-jessie/debian/po/gl.po
   tzdata/branches/glibc-branch-jessie/debian/po/gu.po
   tzdata/branches/glibc-branch-jessie/debian/po/he.po
   tzdata/branches/glibc-branch-jessie/debian/po/hr.po
   tzdata/branches/glibc-branch-jessie/debian/po/hu.po
   tzdata/branches/glibc-branch-jessie/debian/po/id.po
   tzdata/branches/glibc-branch-jessie/debian/po/it.po
   tzdata/branches/glibc-branch-jessie/debian/po/ja.po
   tzdata/branches/glibc-branch-jessie/debian/po/ku.po
   tzdata/branches/glibc-branch-jessie/debian/po/lt.po
   tzdata/branches/glibc-branch-jessie/debian/po/ml.po
   tzdata/branches/glibc-branch-jessie/debian/po/nl.po
   tzdata/branches/glibc-branch-jessie/debian/po/pl.po
   tzdata/branches/glibc-branch-jessie/debian/po/pt.po
   tzdata/branches/glibc-branch-jessie/debian/po/pt_BR.po
   tzdata/branches/glibc-branch-jessie/debian/po/ru.po
   tzdata/branches/glibc-branch-jessie/debian/po/sk.po
   tzdata/branches/glibc-branch-jessie/debian/po/sq.po
   tzdata/branches/glibc-branch-jessie/debian/po/sv.po
   tzdata/branches/glibc-branch-jessie/debian/po/templates.pot
   tzdata/branches/glibc-branch-jessie/debian/po/th.po
   tzdata/branches/glibc-branch-jessie/debian/po/tr.po
   tzdata/branches/glibc-branch-jessie/debian/po/vi.po
   tzdata/branches/glibc-branch-jessie/debian/po/wo.po
   tzdata/branches/glibc-branch-jessie/debian/tzdata.templates
Log:
Import autogenerated templates and corresponding po files


Modified: tzdata/branches/glibc-branch-jessie/debian/po/be.po
===
--- tzdata/branches/glibc-branch-jessie/debian/po/be.po 2015-10-14 22:05:48 UTC 
(rev 6635)
+++ tzdata/branches/glibc-branch-jessie/debian/po/be.po 2015-10-18 16:31:10 UTC 
(rev 6636)
@@ -21,7 +21,7 @@
 msgstr ""
 "Project-Id-Version: tzdata_2008i-2_be\n"
 "Report-Msgid-Bugs-To: tzd...@packages.debian.org\n"
-"POT-Creation-Date: 2013-12-24 23:07+0100\n"
+"POT-Creation-Date: 2015-10-08 14:48+\n"
 "PO-Revision-Date: 2013-12-24 23:13+0100\n"
 "Last-Translator: Pavel Piatruk \n"
 "Language-Team: Belarusian (Official spelling) \n"
@@ -1016,6 +1016,13 @@
 #. Choices
 #. Translators: do not translate underscores. You can use spaces instead.
 #: ../tzdata.templates:3001
+msgid "Fort_Nelson"
+msgstr ""
+
+#. Type: select
+#. Choices
+#. Translators: do not translate underscores. You can use spaces instead.
+#: ../tzdata.templates:3001
 msgid "Fortaleza"
 msgstr "Фарталеза"
 
@@ -1785,6 +1792,13 @@
 #. Choices
 #. Translators: do not translate underscores. You can use spaces instead.
 #: ../tzdata.templates:4001
+msgid "Troll"
+msgstr ""
+
+#. Type: select
+#. Choices
+#. Translators: do not translate underscores. You can use spaces instead.
+#: ../tzdata.templates:4001
 msgid "Vostok"
 msgstr "Васток"
 
@@ -1995,6 +2009,13 @@
 #. Choices
 #. Translators: do not translate underscores. You can use spaces instead.
 #: ../tzdata.templates:7001
+msgid "Chita"
+msgstr ""
+
+#. Type: select
+#. Choices
+#. Translators: do not translate underscores. You can use spaces instead.
+#: ../tzdata.templates:7001
 msgid "Choibalsan"
 msgstr "Чойбалсан"
 
@@ -2365,6 +2386,13 @@
 #. Choices
 #. Translators: do not translate underscores. You can use spaces instead.
 #: ../tzdata.templates:7001
+msgid "Srednekolymsk"
+msgstr ""
+
+#. Type: select
+#. Choices
+#. Translators: do not translate underscores. You can use spaces instead.
+#: ../tzdata.templates:7001
 msgid "Taipei"
 msgstr "Тайпэй"
 
@@ -3044,6 +3072,15 @@
 #. Choices
 #. Translators: do not translate underscores. You can use spaces instead.
 #: ../tzdata.templates:11001
+#, fuzzy
+#| msgid "Brazzaville"
+msgid "Bougainville"
+msgstr "Бразавіль"
+
+#. Type: select
+#. Choices
+#. Translators: do not translate underscores. You can use spaces instead.
+#: ../tzdata.templates:11001
 msgid "Chatham"
 msgstr "Чатам"
 

Modified: tzdata/branches/glibc-branch-jessie/debian/po/bg.po
===
--- tzdata/branches/glibc-branch-jessie/debian/po/bg.po 2015-10-14 22:05:48 UTC 
(rev 6635)
+++ tzdata/branches/glibc-branch-jessie/debian/po/bg.po 2015-10-18 16:31:10 UTC 
(rev 6636)
@@ -17,7 +17,7 @@
 msgstr ""
 "Project-Id-Version: bg\n"
 

r6638 - tzdata/branches/glibc-branch-squeeze/debian

2015-10-18 Thread Aurelien Jarno
Author: aurel32
Date: 2015-10-18 16:39:45 + (Sun, 18 Oct 2015)
New Revision: 6638

Modified:
   tzdata/branches/glibc-branch-squeeze/debian/changelog
Log:
* New upstream version:
  - Fiji
  - Fort Nelson, British Columbia
  - Norfolk Island
  - Turkey (closes: #801172)
  - North Korea switches to +0830 on 2015-08-15.
  - Uruguay no longer observes DST (closes: #801336).
  - DST suspension from 2015-06-14 03:00 through 2015-07-19 02:00 in
Morroco.

Modified: tzdata/branches/glibc-branch-squeeze/debian/changelog
===
--- tzdata/branches/glibc-branch-squeeze/debian/changelog   2015-10-18 
16:32:54 UTC (rev 6637)
+++ tzdata/branches/glibc-branch-squeeze/debian/changelog   2015-10-18 
16:39:45 UTC (rev 6638)
@@ -1,3 +1,17 @@
+tzdata (2015g-0+deb6u1) UNRELEASED; urgency=medium
+
+  * New upstream version:
+- Fiji
+- Fort Nelson, British Columbia
+- Norfolk Island
+- Turkey (closes: #801172)
+- North Korea switches to +0830 on 2015-08-15.
+- Uruguay no longer observes DST (closes: #801336).
+- DST suspension from 2015-06-14 03:00 through 2015-07-19 02:00 in
+  Morroco.
+
+ -- Aurelien Jarno   Sun, 18 Oct 2015 18:39:20 +0200
+
 tzdata (2015d-0+deb6u1) squeeze-lts; urgency=medium
 
   * New upstream version:



r6640 - tzdata/branches/glibc-branch-squeeze/debian

2015-10-18 Thread Aurelien Jarno
Author: aurel32
Date: 2015-10-18 16:45:54 + (Sun, 18 Oct 2015)
New Revision: 6640

Modified:
   tzdata/branches/glibc-branch-squeeze/debian/templates
Log:
Import templates


Modified: tzdata/branches/glibc-branch-squeeze/debian/templates
===
--- tzdata/branches/glibc-branch-squeeze/debian/templates   2015-10-18 
16:43:30 UTC (rev 6639)
+++ tzdata/branches/glibc-branch-squeeze/debian/templates   2015-10-18 
16:45:54 UTC (rev 6640)
@@ -5,93 +5,100 @@
 #of "GMT+xx" or "GMT-xx" timezones
 # - SystemV will give the choice between zone named as per SystemV conventions:
 #   EST5, MST7, etc.
-__Choices: Africa, America, Antarctica, Australia, Arctic, Asia, Atlantic, 
Europe, Indian, Pacific, SystemV, Etc
+__Choices: Africa, America, Antarctica, Australia, Arctic, Asia, Atlantic, 
Europe, Indian, Pacific, SystemV, US, Etc
 _Description: Geographic area:
- Please select the geographic area you live in. Subsequent
+ Please select the geographic area in which you live. Subsequent
  configuration questions will narrow this down by presenting a list of
  cities, representing the time zones in which they are located.
 
 Template: tzdata/Zones/Africa
 Type: select
 # Translators: do not translate underscores. You can use spaces instead.
-__Choices: Abidjan, Accra, Addis_Ababa, Algiers, Asmara, Bamako, Bangui, 
Banjul, Bissau, Blantyre, Brazzaville, Bujumbura, Cairo, Casablanca, Ceuta, 
Conakry, Dakar, Dar_es_Salaam, Djibouti, Douala, El_Aaiun, Freetown, Gaborone, 
Harare, Johannesburg, Kampala, Khartoum, Kigali, Kinshasa, Lagos, Libreville, 
Lome, Luanda, Lubumbashi, Lusaka, Malabo, Maputo, Maseru, Mbabane, Mogadishu, 
Monrovia, Nairobi, Ndjamena, Niamey, Nouakchott, Ouagadougou, Porto-Novo, 
Sao_Tome, Timbuktu, Tripoli, Tunis, Windhoek
+__Choices: Abidjan, Accra, Addis_Ababa, Algiers, Asmara, Bamako, Bangui, 
Banjul, Bissau, Blantyre, Brazzaville, Bujumbura, Cairo, Casablanca, Ceuta, 
Conakry, Dakar, Dar_es_Salaam, Djibouti, Douala, El_Aaiun, Freetown, Gaborone, 
Harare, Johannesburg, Juba, Kampala, Khartoum, Kigali, Kinshasa, Lagos, 
Libreville, Lome, Luanda, Lubumbashi, Lusaka, Malabo, Maputo, Maseru, Mbabane, 
Mogadishu, Monrovia, Nairobi, Ndjamena, Niamey, Nouakchott, Ouagadougou, 
Porto-Novo, Sao_Tome, Timbuktu, Tripoli, Tunis, Windhoek
 _Description: Time zone:
- Please select the time zone corresponding to your location.
+ Please select the city or region corresponding to your time zone.
 
 Template: tzdata/Zones/America
 Type: select
 # Translators: do not translate underscores. You can use spaces instead.
-__Choices: Adak, Anchorage, Anguilla, Antigua, Araguaina, 
Argentina/Buenos_Aires, Argentina/Catamarca, Argentina/Cordoba, 
Argentina/Jujuy, Argentina/La_Rioja, Argentina/Mendoza, Argentina/Rio_Gallegos, 
Argentina/Salta, Argentina/San_Juan, Argentina/San_Luis, Argentina/Tucuman, 
Argentina/Ushuaia, Aruba, Asuncion, Atikokan, Atka, Bahia, Barbados, Belem, 
Belize, Blanc-Sablon, Boa_Vista, Bogota, Boise, Cambridge_Bay, Campo_Grande, 
Cancun, Caracas, Cayenne, Cayman, Chicago, Chihuahua, Coral_Harbour, 
Costa_Rica, Cuiaba, Curacao, Danmarkshavn, Dawson, Dawson_Creek, Denver, 
Detroit, Dominica, Edmonton, Eirunepe, El_Salvador, Ensenada, Fortaleza, 
Glace_Bay, Godthab, Goose_Bay, Grand_Turk, Grenada, Guadeloupe, Guatemala, 
Guayaquil, Guyana, Halifax, Havana, Hermosillo, Indiana/Indianapolis, 
Indiana/Knox, Indiana/Marengo, Indiana/Petersburg, Indiana/Tell_City, 
Indiana/Vevay, Indiana/Vincennes, Indiana/Winamac, Inuvik, Iqaluit, Jamaica, 
Juneau, Kentucky/Louisville, Kentucky/Monticello, La_Paz, L
 ima, Los_Angeles, Maceio, Managua, Manaus, Marigot, Martinique, Mazatlan, 
Menominee, Merida, Mexico_City, Miquelon, Moncton, Monterrey, Montevideo, 
Montreal, Montserrat, Nassau, New_York, Nipigon, Nome, Noronha, 
North_Dakota/Center, North_Dakota/New_Salem, Panama, Pangnirtung, Paramaribo, 
Phoenix, Port-au-Prince, Port_of_Spain, Porto_Acre, Porto_Velho, Puerto_Rico, 
Rainy_River, Rankin_Inlet, Recife, Regina, Resolute, Rio_Branco, Santarem, 
Santiago, Santo_Domingo, Sao_Paulo, Scoresbysund, Shiprock, St_Barthelemy, 
St_Johns, St_Kitts, St_Lucia, St_Thomas, St_Vincent, Swift_Current, 
Tegucigalpa, Thule, Thunder_Bay, Tijuana, Toronto, Tortola, Vancouver, Virgin, 
Whitehorse, Winnipeg, Yakutat, Yellowknife
+__Choices: Adak, Anchorage, Anguilla, Antigua, Araguaina, 
Argentina/Buenos_Aires, Argentina/Catamarca, Argentina/Cordoba, 
Argentina/Jujuy, Argentina/La_Rioja, Argentina/Mendoza, Argentina/Rio_Gallegos, 
Argentina/Salta, Argentina/San_Juan, Argentina/San_Luis, Argentina/Tucuman, 
Argentina/Ushuaia, Aruba, Asuncion, Atikokan, Atka, Bahia, Bahia_Banderas, 
Barbados, Belem, Belize, Blanc-Sablon, Boa_Vista, Bogota, Boise, Cambridge_Bay, 
Campo_Grande, Cancun, Caracas, Cayenne, Cayman, Chicago, Chihuahua, 
Coral_Harbour, Costa_Rica, Creston, Cuiaba, Curacao, Danmarkshavn, Dawson, 
Dawson_Creek, Denver, Detroit, Dominica, Edmonton, 

r6642 - tzdata/tags

2015-10-18 Thread Aurelien Jarno
Author: aurel32
Date: 2015-10-18 16:46:32 + (Sun, 18 Oct 2015)
New Revision: 6642

Added:
   tzdata/tags/glibc-branch-squeeze/
Log:
create tag directory



r6641 - tzdata/branches/glibc-branch-squeeze/debian

2015-10-18 Thread Aurelien Jarno
Author: aurel32
Date: 2015-10-18 16:46:13 + (Sun, 18 Oct 2015)
New Revision: 6641

Modified:
   tzdata/branches/glibc-branch-squeeze/debian/changelog
Log:
releasing package tzdata version 2015g-0+deb6u1

Modified: tzdata/branches/glibc-branch-squeeze/debian/changelog
===
--- tzdata/branches/glibc-branch-squeeze/debian/changelog   2015-10-18 
16:45:54 UTC (rev 6640)
+++ tzdata/branches/glibc-branch-squeeze/debian/changelog   2015-10-18 
16:46:13 UTC (rev 6641)
@@ -1,4 +1,4 @@
-tzdata (2015g-0+deb6u1) UNRELEASED; urgency=medium
+tzdata (2015g-0+deb6u1) squeeze-lts; urgency=medium
 
   * New upstream version:
 - Fiji
@@ -10,7 +10,7 @@
 - DST suspension from 2015-06-14 03:00 through 2015-07-19 02:00 in
   Morroco.
 
- -- Aurelien Jarno   Sun, 18 Oct 2015 18:39:20 +0200
+ -- Aurelien Jarno   Sun, 18 Oct 2015 18:46:00 +0200
 
 tzdata (2015d-0+deb6u1) squeeze-lts; urgency=medium
 



tzdata_2015g-0+deb6u1_amd64.changes ACCEPTED into squeeze-lts

2015-10-18 Thread Debian FTP Masters


Accepted:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.8
Date: Sun, 18 Oct 2015 18:46:00 +0200
Source: tzdata
Binary: tzdata tzdata-java
Architecture: source all
Version: 2015g-0+deb6u1
Distribution: squeeze-lts
Urgency: medium
Maintainer: GNU Libc Maintainers 
Changed-By: Aurelien Jarno 
Description: 
 tzdata - time zone and daylight-saving time data
 tzdata-java - time zone and daylight-saving time data for use by java runtimes
Closes: 801172 801336
Changes: 
 tzdata (2015g-0+deb6u1) squeeze-lts; urgency=medium
 .
   * New upstream version:
 - Fiji
 - Fort Nelson, British Columbia
 - Norfolk Island
 - Turkey (closes: #801172)
 - North Korea switches to +0830 on 2015-08-15.
 - Uruguay no longer observes DST (closes: #801336).
 - DST suspension from 2015-06-14 03:00 through 2015-07-19 02:00 in
   Morroco.
Checksums-Sha1: 
 4fda9115f2d0b61d2accc2e640bccaae234b5e63 1787 tzdata_2015g-0+deb6u1.dsc
 96528dcbb790ed181a47db7e4cace4eeaec5728e 300363 tzdata_2015g.orig.tar.gz
 6439bd0082fcfd361f7ee60753d45efd1769d00e 266652 
tzdata_2015g-0+deb6u1.debian.tar.gz
 b309f042ce2876340a191468daa116bab842981a 566706 tzdata_2015g-0+deb6u1_all.deb
 d30d46b572dad4bacf829b0fe85a6056cad1c9fe 127532 
tzdata-java_2015g-0+deb6u1_all.deb
Checksums-Sha256: 
 bb44012aedd5a5326df39feddcd47ae74a62924f8d2d532e46b18b20bce6b5b6 1787 
tzdata_2015g-0+deb6u1.dsc
 b923cdbf078491696b17bc8d069c74bce73fabc5774629da2f410c9b31576161 300363 
tzdata_2015g.orig.tar.gz
 33b8e96d21f7d789233103c698e6e94c567c4fb684761767fb0dd3d362540919 266652 
tzdata_2015g-0+deb6u1.debian.tar.gz
 cd2d02fdc0e014b0c06952fb61cf759422987fec40d540f909518b0053135040 566706 
tzdata_2015g-0+deb6u1_all.deb
 dd5cbe4c6158bf288bf16d96f988d1dce49a661f2eef3e609863cfd8ac574d27 127532 
tzdata-java_2015g-0+deb6u1_all.deb
Files: 
 9c6cf71c25b1b1213fbd6b9be0884e46 1787 libs required tzdata_2015g-0+deb6u1.dsc
 8d46e8b225b9a04c75f5c39636435ad6 300363 libs required tzdata_2015g.orig.tar.gz
 d591b2b1ecf41f4846763abc63543c7a 266652 libs required 
tzdata_2015g-0+deb6u1.debian.tar.gz
 7783975f008417218fa1feb0680c78ca 566706 libs required 
tzdata_2015g-0+deb6u1_all.deb
 848131b7752ee56fabb53b4f843f3eb0 127532 java optional 
tzdata-java_2015g-0+deb6u1_all.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1
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=yLdO
-END PGP SIGNATURE-


Thank you for your contribution to Debian.



Bug#801638: libc-2.19.so: segfault at 0 ip 00000000f763946c sp 00000000ffe955e8 error 4 in libc-2.19.so[f74fb000+1a4000]

2015-10-18 Thread Aurelien Jarno
On 2015-10-13 00:27, Segmentation fault wrote:
> Package: libc6
> Version: 2.19-18+deb8u1
> Severity: normal
> File: libc-2.19.so
> 
> Dear Maintainer,
> 
> *** Reporter, please consider answering these questions, where appropriate ***
> 
>* What led up to the situation?
>* What exactly did you do (or not do) that was effective (or
>  ineffective)?
>* What was the outcome of this action?
>* What outcome did you expect instead?

The error message you report likely means that one of the libc functions
was wrongly passed a NULL pointer. As such it's a bug in the application
you used and not in the libc. Can you please consider answering the
above question, so that we can identify the broken application and
reassign the bug to it? In the contrary we'll simply close this bug in
the next days.

Aurelien

-- 
Aurelien Jarno  GPG: 4096R/1DDD8C9B
aurel...@aurel32.net http://www.aurel32.net



r6644 - in glibc-package/branches/glibc-branch-jessie/debian: . patches patches/amd64

2015-10-18 Thread Aurelien Jarno
Author: aurel32
Date: 2015-10-18 17:42:25 + (Sun, 18 Oct 2015)
New Revision: 6644

Added:
   
glibc-package/branches/glibc-branch-jessie/debian/patches/amd64/local-blacklist-for-Intel-TSX.diff
Removed:
   
glibc-package/branches/glibc-branch-jessie/debian/patches/amd64/local-blacklist-on-TSX-Haswell.diff
Modified:
   glibc-package/branches/glibc-branch-jessie/debian/changelog
   glibc-package/branches/glibc-branch-jessie/debian/patches/series
Log:
Replace patches/amd64/local-blacklist-on-TSX-Haswell.diff by 
local-blacklist-for-Intel-TSX.diff also blacklisting some Broadwell
models.  Closes: #800574.

Modified: glibc-package/branches/glibc-branch-jessie/debian/changelog
===
--- glibc-package/branches/glibc-branch-jessie/debian/changelog 2015-10-18 
16:49:35 UTC (rev 6643)
+++ glibc-package/branches/glibc-branch-jessie/debian/changelog 2015-10-18 
17:42:25 UTC (rev 6644)
@@ -5,6 +5,11 @@
 - Fix getaddrinfo sometimes returning uninitialized data with nscd.
   Closes: #798515.
 
+  [ Henrique de Moraes Holschuh ]
+  * Replace patches/amd64/local-blacklist-on-TSX-Haswell.diff by 
+local-blacklist-for-Intel-TSX.diff also blacklisting some Broadwell
+models.  Closes: #800574.
+
  -- Aurelien Jarno   Sat, 29 Aug 2015 11:19:53 +0200
 
 glibc (2.19-18+deb8u1) stable; urgency=medium

Added: 
glibc-package/branches/glibc-branch-jessie/debian/patches/amd64/local-blacklist-for-Intel-TSX.diff
===
--- 
glibc-package/branches/glibc-branch-jessie/debian/patches/amd64/local-blacklist-for-Intel-TSX.diff
  (rev 0)
+++ 
glibc-package/branches/glibc-branch-jessie/debian/patches/amd64/local-blacklist-for-Intel-TSX.diff
  2015-10-18 17:42:25 UTC (rev 6644)
@@ -0,0 +1,99 @@
+Intel TSX is broken on Haswell based processors (erratum HSD136/HSW136)
+and a microcode update is available to simply disable the corresponding
+instructions.
+
+A live microcode update will disable the TSX instructions causing
+already started binaries to segfault. This patch simply disable Intel
+TSX (HLE and RTM) on processors which might receive a microcode update,
+so that it doesn't happen.  We might expect newer steppings to fix the
+issue (e.g. as Haswell-EX did).
+
+Intel TSX-NI is also broken on Broadwell systems, and documented as
+being unavailable in their specification updates errata list.  However,
+some end-user systems were shipped with old microcode that left Intel
+TSX-NI still enabled in CPUID on these processors.  We must not allow
+RTM to be used by glibc on these systems, due to runtime system
+misbehavior and live-update of microcode hazards.
+
+Author: Henrique de Moraes Holschuh 
+
+--- a/sysdeps/x86_64/multiarch/init-arch.c
 b/sysdeps/x86_64/multiarch/init-arch.c
+@@ -26,7 +26,7 @@
+ 
+ 
+ static void
+-get_common_indeces (unsigned int *family, unsigned int *model)
++get_common_indeces (unsigned int *family, unsigned int *model, unsigned int 
*stepping)
+ {
+   __cpuid (1, __cpu_features.cpuid[COMMON_CPUID_INDEX_1].eax,
+  __cpu_features.cpuid[COMMON_CPUID_INDEX_1].ebx,
+@@ -36,6 +36,7 @@
+   unsigned int eax = __cpu_features.cpuid[COMMON_CPUID_INDEX_1].eax;
+   *family = (eax >> 8) & 0x0f;
+   *model = (eax >> 4) & 0x0f;
++  *stepping = eax & 0x0f;
+ }
+ 
+ 
+@@ -47,6 +48,7 @@
+   unsigned int edx;
+   unsigned int family = 0;
+   unsigned int model = 0;
++  unsigned int stepping = 0;
+   enum cpu_features_kind kind;
+ 
+   __cpuid (0, __cpu_features.max_cpuid, ebx, ecx, edx);
+@@ -56,7 +58,7 @@
+ {
+   kind = arch_kind_intel;
+ 
+-  get_common_indeces (, );
++  get_common_indeces (, , );
+ 
+   unsigned int eax = __cpu_features.cpuid[COMMON_CPUID_INDEX_1].eax;
+   unsigned int extended_family = (eax >> 20) & 0xff;
+@@ -131,7 +133,7 @@
+ {
+   kind = arch_kind_amd;
+ 
+-  get_common_indeces (, );
++  get_common_indeces (, , );
+ 
+   ecx = __cpu_features.cpuid[COMMON_CPUID_INDEX_1].ecx;
+ 
+@@ -176,6 +178,24 @@
+   }
+ }
+ 
++  /* Disable Intel TSX (HLE and RTM) due to erratum HSD136/HSW136
++ on all Haswell processors, except Haswell-EX/Xeon E7-v3 (306F4),
++ to work around outdated microcode that doesn't disable the
++ broken feature by default.
++
++ Disable TSX on Broadwell, due to errata BDM53/BDW51/BDD51/
++ BDE42.  The errata documentation states that RTM is unusable,
++ and that it should not be advertised by CPUID at all on any
++ such processors.  Unfortunately, it _is_ advertised in some
++ (older) microcode versions.  Exceptions: Broadwell-E (406Fx),
++ likely already fixed at launch */
++  if (kind == arch_kind_intel && family == 6 &&
++  ((model == 63 && stepping <= 2) || (model == 60 && stepping <= 3) ||
++   (model == 69 && stepping <= 1) || (model == 70 && stepping <= 1) ||
++   (model == 61 && 

r6643 - tzdata/branches/glibc-branch-wheezy/debian

2015-10-18 Thread Aurelien Jarno
Author: aurel32
Date: 2015-10-18 16:49:35 + (Sun, 18 Oct 2015)
New Revision: 6643

Modified:
   tzdata/branches/glibc-branch-wheezy/debian/tzdata.templates
Log:
Also import tzdata.templates

Modified: tzdata/branches/glibc-branch-wheezy/debian/tzdata.templates
===
--- tzdata/branches/glibc-branch-wheezy/debian/tzdata.templates 2015-10-18 
16:46:32 UTC (rev 6642)
+++ tzdata/branches/glibc-branch-wheezy/debian/tzdata.templates 2015-10-18 
16:49:35 UTC (rev 6643)
@@ -21,14 +21,14 @@
 Template: tzdata/Zones/America
 Type: select
 # Translators: do not translate underscores. You can use spaces instead.
-__Choices: Adak, Anchorage, Anguilla, Antigua, Araguaina, 
Argentina/Buenos_Aires, Argentina/Catamarca, Argentina/Cordoba, 
Argentina/Jujuy, Argentina/La_Rioja, Argentina/Mendoza, Argentina/Rio_Gallegos, 
Argentina/Salta, Argentina/San_Juan, Argentina/San_Luis, Argentina/Tucuman, 
Argentina/Ushuaia, Aruba, Asuncion, Atikokan, Atka, Bahia, Bahia_Banderas, 
Barbados, Belem, Belize, Blanc-Sablon, Boa_Vista, Bogota, Boise, Cambridge_Bay, 
Campo_Grande, Cancun, Caracas, Cayenne, Cayman, Chicago, Chihuahua, 
Coral_Harbour, Costa_Rica, Creston, Cuiaba, Curacao, Danmarkshavn, Dawson, 
Dawson_Creek, Denver, Detroit, Dominica, Edmonton, Eirunepe, El_Salvador, 
Ensenada, Fortaleza, Glace_Bay, Godthab, Goose_Bay, Grand_Turk, Grenada, 
Guadeloupe, Guatemala, Guayaquil, Guyana, Halifax, Havana, Hermosillo, 
Indiana/Indianapolis, Indiana/Knox, Indiana/Marengo, Indiana/Petersburg, 
Indiana/Tell_City, Indiana/Vevay, Indiana/Vincennes, Indiana/Winamac, Inuvik, 
Iqaluit, Jamaica, Juneau, Kentucky/Louisville, Kentu
 cky/Monticello, Kralendijk, La_Paz, Lima, Los_Angeles, Lower_Princes, Maceio, 
Managua, Manaus, Marigot, Martinique, Matamoros, Mazatlan, Menominee, Merida, 
Metlakatla, Mexico_City, Miquelon, Moncton, Monterrey, Montevideo, Montreal, 
Montserrat, Nassau, New_York, Nipigon, Nome, Noronha, North_Dakota/Beulah, 
North_Dakota/Center, North_Dakota/New_Salem, Ojinaga, Panama, Pangnirtung, 
Paramaribo, Phoenix, Port-au-Prince, Port_of_Spain, Porto_Acre, Porto_Velho, 
Puerto_Rico, Rainy_River, Rankin_Inlet, Recife, Regina, Resolute, Rio_Branco, 
Santa_Isabel, Santarem, Santiago, Santo_Domingo, Sao_Paulo, Scoresbysund, 
Shiprock, Sitka, St_Barthelemy, St_Johns, St_Kitts, St_Lucia, St_Thomas, 
St_Vincent, Swift_Current, Tegucigalpa, Thule, Thunder_Bay, Tijuana, Toronto, 
Tortola, Vancouver, Virgin, Whitehorse, Winnipeg, Yakutat, Yellowknife
+__Choices: Adak, Anchorage, Anguilla, Antigua, Araguaina, 
Argentina/Buenos_Aires, Argentina/Catamarca, Argentina/Cordoba, 
Argentina/Jujuy, Argentina/La_Rioja, Argentina/Mendoza, Argentina/Rio_Gallegos, 
Argentina/Salta, Argentina/San_Juan, Argentina/San_Luis, Argentina/Tucuman, 
Argentina/Ushuaia, Aruba, Asuncion, Atikokan, Atka, Bahia, Bahia_Banderas, 
Barbados, Belem, Belize, Blanc-Sablon, Boa_Vista, Bogota, Boise, Cambridge_Bay, 
Campo_Grande, Cancun, Caracas, Cayenne, Cayman, Chicago, Chihuahua, 
Coral_Harbour, Costa_Rica, Creston, Cuiaba, Curacao, Danmarkshavn, Dawson, 
Dawson_Creek, Denver, Detroit, Dominica, Edmonton, Eirunepe, El_Salvador, 
Ensenada, Fort_Nelson, Fortaleza, Glace_Bay, Godthab, Goose_Bay, Grand_Turk, 
Grenada, Guadeloupe, Guatemala, Guayaquil, Guyana, Halifax, Havana, Hermosillo, 
Indiana/Indianapolis, Indiana/Knox, Indiana/Marengo, Indiana/Petersburg, 
Indiana/Tell_City, Indiana/Vevay, Indiana/Vincennes, Indiana/Winamac, Inuvik, 
Iqaluit, Jamaica, Juneau, Kentucky/Loui
 sville, Kentucky/Monticello, Kralendijk, La_Paz, Lima, Los_Angeles, 
Lower_Princes, Maceio, Managua, Manaus, Marigot, Martinique, Matamoros, 
Mazatlan, Menominee, Merida, Metlakatla, Mexico_City, Miquelon, Moncton, 
Monterrey, Montevideo, Montreal, Montserrat, Nassau, New_York, Nipigon, Nome, 
Noronha, North_Dakota/Beulah, North_Dakota/Center, North_Dakota/New_Salem, 
Ojinaga, Panama, Pangnirtung, Paramaribo, Phoenix, Port-au-Prince, 
Port_of_Spain, Porto_Acre, Porto_Velho, Puerto_Rico, Rainy_River, Rankin_Inlet, 
Recife, Regina, Resolute, Rio_Branco, Santa_Isabel, Santarem, Santiago, 
Santo_Domingo, Sao_Paulo, Scoresbysund, Shiprock, Sitka, St_Barthelemy, 
St_Johns, St_Kitts, St_Lucia, St_Thomas, St_Vincent, Swift_Current, 
Tegucigalpa, Thule, Thunder_Bay, Tijuana, Toronto, Tortola, Vancouver, Virgin, 
Whitehorse, Winnipeg, Yakutat, Yellowknife
 _Description: Time zone:
  Please select the city or region corresponding to your time zone.
 
 Template: tzdata/Zones/Antarctica
 Type: select
 # Translators: do not translate underscores. You can use spaces instead.
-__Choices: Casey, Davis, DumontDUrville, Macquarie, Mawson, McMurdo, Palmer, 
Rothera, Syowa, Vostok
+__Choices: Casey, Davis, DumontDUrville, Macquarie, Mawson, McMurdo, Palmer, 
Rothera, Syowa, Troll, Vostok
 _Description: Time zone:
  Please select the city or region corresponding to your time zone.
 
@@ -49,7 +49,7 @@
 Template: tzdata/Zones/Asia
 Type: select
 # 

Processing of tzdata_2015g-0+deb6u1_amd64.changes

2015-10-18 Thread Debian FTP Masters
tzdata_2015g-0+deb6u1_amd64.changes uploaded successfully to localhost
along with the files:
  tzdata_2015g-0+deb6u1.dsc
  tzdata_2015g.orig.tar.gz
  tzdata_2015g-0+deb6u1.debian.tar.gz
  tzdata_2015g-0+deb6u1_all.deb
  tzdata-java_2015g-0+deb6u1_all.deb

Greetings,

Your Debian queue daemon (running on host franck.debian.org)



Bug#801336: marked as done (tzdata: Not up to date in Squeeze LTS, wrong daylight savings setting in America/Montevideo.)

2015-10-18 Thread Debian Bug Tracking System
Your message dated Sun, 18 Oct 2015 17:04:53 +
with message-id 
and subject line Bug#801336: fixed in tzdata 2015g-0+deb6u1
has caused the Debian Bug report #801336,
regarding tzdata: Not up to date in Squeeze LTS, wrong daylight savings setting 
in America/Montevideo.
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
801336: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=801336
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: tzdata
Version: 2015d-0+deb6u1
Severity: normal
Tags: squeeze

America/Montevideo says UYST with -0200 which is wrong now, the country decided 
not to use the
daylight savings time, so we are in UYT -0300.
This is on Squeeze LTS only of course.
Thanks.

-- System Information:
Debian Release: 6.0.10
  APT prefers squeeze-lts
  APT policy: (500, 'squeeze-lts'), (500, 'oldoldstable-updates'), (500, 
'oldoldstable')
Architecture: i386 (x86_64)

Kernel: Linux 3.16.0-4-amd64 (SMP w/4 CPU cores)
Locale: LANG=es_UY.UTF-8, LC_CTYPE=es_UY.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages tzdata depends on:
ii  debconf [debconf-2.0] 1.5.36.1   Debian configuration management sy

tzdata recommends no packages.

tzdata suggests no packages.

-- debconf information:
  tzdata/Zones/Australia:
  tzdata/Zones/Asia:
  tzdata/Zones/SystemV:
  tzdata/Zones/Pacific:
  tzdata/Zones/Atlantic:
  tzdata/Zones/US:
* tzdata/Zones/Etc: UTC
  tzdata/Zones/Arctic:
  tzdata/Zones/Antarctica:
  tzdata/Zones/Europe:
  tzdata/Zones/Africa:
* tzdata/Zones/America: Montevideo
* tzdata/Areas: America
  tzdata/Zones/Indian:
--- End Message ---
--- Begin Message ---
Source: tzdata
Source-Version: 2015g-0+deb6u1

We believe that the bug you reported is fixed in the latest version of
tzdata, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 801...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Aurelien Jarno  (supplier of updated tzdata package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.8
Date: Sun, 18 Oct 2015 18:46:00 +0200
Source: tzdata
Binary: tzdata tzdata-java
Architecture: source all
Version: 2015g-0+deb6u1
Distribution: squeeze-lts
Urgency: medium
Maintainer: GNU Libc Maintainers 
Changed-By: Aurelien Jarno 
Description: 
 tzdata - time zone and daylight-saving time data
 tzdata-java - time zone and daylight-saving time data for use by java runtimes
Closes: 801172 801336
Changes: 
 tzdata (2015g-0+deb6u1) squeeze-lts; urgency=medium
 .
   * New upstream version:
 - Fiji
 - Fort Nelson, British Columbia
 - Norfolk Island
 - Turkey (closes: #801172)
 - North Korea switches to +0830 on 2015-08-15.
 - Uruguay no longer observes DST (closes: #801336).
 - DST suspension from 2015-06-14 03:00 through 2015-07-19 02:00 in
   Morroco.
Checksums-Sha1: 
 4fda9115f2d0b61d2accc2e640bccaae234b5e63 1787 tzdata_2015g-0+deb6u1.dsc
 96528dcbb790ed181a47db7e4cace4eeaec5728e 300363 tzdata_2015g.orig.tar.gz
 6439bd0082fcfd361f7ee60753d45efd1769d00e 266652 
tzdata_2015g-0+deb6u1.debian.tar.gz
 b309f042ce2876340a191468daa116bab842981a 566706 tzdata_2015g-0+deb6u1_all.deb
 d30d46b572dad4bacf829b0fe85a6056cad1c9fe 127532 
tzdata-java_2015g-0+deb6u1_all.deb
Checksums-Sha256: 
 bb44012aedd5a5326df39feddcd47ae74a62924f8d2d532e46b18b20bce6b5b6 1787 
tzdata_2015g-0+deb6u1.dsc
 b923cdbf078491696b17bc8d069c74bce73fabc5774629da2f410c9b31576161 300363 
tzdata_2015g.orig.tar.gz
 33b8e96d21f7d789233103c698e6e94c567c4fb684761767fb0dd3d362540919 266652 
tzdata_2015g-0+deb6u1.debian.tar.gz
 cd2d02fdc0e014b0c06952fb61cf759422987fec40d540f909518b0053135040 566706 
tzdata_2015g-0+deb6u1_all.deb
 dd5cbe4c6158bf288bf16d96f988d1dce49a661f2eef3e609863cfd8ac574d27 127532 
tzdata-java_2015g-0+deb6u1_all.deb
Files: 
 9c6cf71c25b1b1213fbd6b9be0884e46 1787 libs required tzdata_2015g-0+deb6u1.dsc
 8d46e8b225b9a04c75f5c39636435ad6 300363 libs required tzdata_2015g.orig.tar.gz
 d591b2b1ecf41f4846763abc63543c7a 266652 libs required 
tzdata_2015g-0+deb6u1.debian.tar.gz
 

Bug#801172: marked as done (Turkey delays winter time to 8th of November 04:00)

2015-10-18 Thread Debian Bug Tracking System
Your message dated Sun, 18 Oct 2015 17:04:53 +
with message-id 
and subject line Bug#801172: fixed in tzdata 2015g-0+deb6u1
has caused the Debian Bug report #801172,
regarding Turkey delays winter time to 8th of November 04:00
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
801172: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=801172
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: tzdata
Verson: 2015f-1

Due to elections in 1th of November, Turkey delays winter time to 8th of
November (original one 25th of October). The change is upstreamed in tzdata
package and can be found in "tzdata-latest.tar.gz" but Debian packages have not
been updated.

Here are the news articles (in Turkish)

http://www.aa.com.tr/tr/turkiye/yaz-saati-uygulamasi-8-kasimda-sona-erecek/362217

http://www.hurriyet.com.tr/ekonomi/30228218.asp


This bug is also filed against Ubuntu. I am attaching the reference:
https://bugs.launchpad.net/ubuntu/+source/tzdata/+bug/1503560

Regards,


-- 
Eren Türkay, System Administrator
https://skyatlas.com/ | +90 850 885 0357

Yildiz Teknik Universitesi Davutpasa Kampusu
Teknopark Bolgesi, D2 Blok No:107
Esenler, Istanbul Pk.34220



signature.asc
Description: OpenPGP digital signature
--- End Message ---
--- Begin Message ---
Source: tzdata
Source-Version: 2015g-0+deb6u1

We believe that the bug you reported is fixed in the latest version of
tzdata, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 801...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Aurelien Jarno  (supplier of updated tzdata package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.8
Date: Sun, 18 Oct 2015 18:46:00 +0200
Source: tzdata
Binary: tzdata tzdata-java
Architecture: source all
Version: 2015g-0+deb6u1
Distribution: squeeze-lts
Urgency: medium
Maintainer: GNU Libc Maintainers 
Changed-By: Aurelien Jarno 
Description: 
 tzdata - time zone and daylight-saving time data
 tzdata-java - time zone and daylight-saving time data for use by java runtimes
Closes: 801172 801336
Changes: 
 tzdata (2015g-0+deb6u1) squeeze-lts; urgency=medium
 .
   * New upstream version:
 - Fiji
 - Fort Nelson, British Columbia
 - Norfolk Island
 - Turkey (closes: #801172)
 - North Korea switches to +0830 on 2015-08-15.
 - Uruguay no longer observes DST (closes: #801336).
 - DST suspension from 2015-06-14 03:00 through 2015-07-19 02:00 in
   Morroco.
Checksums-Sha1: 
 4fda9115f2d0b61d2accc2e640bccaae234b5e63 1787 tzdata_2015g-0+deb6u1.dsc
 96528dcbb790ed181a47db7e4cace4eeaec5728e 300363 tzdata_2015g.orig.tar.gz
 6439bd0082fcfd361f7ee60753d45efd1769d00e 266652 
tzdata_2015g-0+deb6u1.debian.tar.gz
 b309f042ce2876340a191468daa116bab842981a 566706 tzdata_2015g-0+deb6u1_all.deb
 d30d46b572dad4bacf829b0fe85a6056cad1c9fe 127532 
tzdata-java_2015g-0+deb6u1_all.deb
Checksums-Sha256: 
 bb44012aedd5a5326df39feddcd47ae74a62924f8d2d532e46b18b20bce6b5b6 1787 
tzdata_2015g-0+deb6u1.dsc
 b923cdbf078491696b17bc8d069c74bce73fabc5774629da2f410c9b31576161 300363 
tzdata_2015g.orig.tar.gz
 33b8e96d21f7d789233103c698e6e94c567c4fb684761767fb0dd3d362540919 266652 
tzdata_2015g-0+deb6u1.debian.tar.gz
 cd2d02fdc0e014b0c06952fb61cf759422987fec40d540f909518b0053135040 566706 
tzdata_2015g-0+deb6u1_all.deb
 dd5cbe4c6158bf288bf16d96f988d1dce49a661f2eef3e609863cfd8ac574d27 127532 
tzdata-java_2015g-0+deb6u1_all.deb
Files: 
 9c6cf71c25b1b1213fbd6b9be0884e46 1787 libs required tzdata_2015g-0+deb6u1.dsc
 8d46e8b225b9a04c75f5c39636435ad6 300363 libs required tzdata_2015g.orig.tar.gz
 d591b2b1ecf41f4846763abc63543c7a 266652 libs required 
tzdata_2015g-0+deb6u1.debian.tar.gz
 7783975f008417218fa1feb0680c78ca 566706 libs required 
tzdata_2015g-0+deb6u1_all.deb
 848131b7752ee56fabb53b4f843f3eb0 127532 java optional 
tzdata-java_2015g-0+deb6u1_all.deb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQIcBAEBAgAGBQJWI80cAAoJELqceAYd3YybEC0QAKtsbWd+EERn6t3B2V8dw9QA
Qrwg+8FS2yZApbdga3E5n5yOK9Cdi2j3wQCWU5Pcwh5mCGcVYlb0fnnXFKjrkXJZ