Hi David,
On Sat, May 5, 2012 at 02:16:18 +0200, David Kalnischkies wrote:
[Raising severity and therefore blocking transition as depending on dangling
pointers isn't a great idea, even if it seems to work for all but not-yet
release architectures… Upload next week or so]
Any chance this
On Sat, May 05, 2012 at 02:16:18AM +0200, David Kalnischkies wrote:
package apt
forcemerge 669427 669243
severity 669427 serious
tag 669427 + patch
thanks
On Wed, May 2, 2012 at 5:23 PM, David Kalnischkies
kalnischkies+deb...@gmail.com wrote:
We are missing a bit of error checking
On Wed, May 02, 2012 at 05:28:16PM +0200, Philipp Kern wrote:
On Wed, May 02, 2012 at 05:23:30PM +0200, David Kalnischkies wrote:
2129.4.17 Â kalnisc | Â Â /* Record the Description (it is not
translated) */
         |   MD5SumValue CurMd5 =
package apt
forcemerge 669427 669243
severity 669427 serious
tag 669427 + patch
thanks
On Wed, May 2, 2012 at 5:23 PM, David Kalnischkies
kalnischkies+deb...@gmail.com wrote:
We are missing a bit of error checking here (callers of NewDescription() do
not check if return is != 0 and
On Tue, May 1, 2012 at 4:53 PM, Philipp Kern pk...@debian.org wrote:
On Fri, Apr 20, 2012 at 11:26:57PM +0200, Philipp Kern wrote:
On Fri, Apr 20, 2012 at 10:04:28PM +0200, Philipp Kern wrote:
On Thu, Apr 19, 2012 at 09:12:09PM +0200, Mehdi Dogguy wrote:
On 19/04/12 20:21, Faidon Liambotis
On Wed, May 02, 2012 at 05:23:30PM +0200, David Kalnischkies wrote:
2129.4.17 kalnisc | /* Record the Description (it is not translated) */
| MD5SumValue CurMd5 = List.Description_md5();
| if (CurMd5.Value().empty() == true)
|
On Fri, Apr 20, 2012 at 11:26:57PM +0200, Philipp Kern wrote:
On Fri, Apr 20, 2012 at 10:04:28PM +0200, Philipp Kern wrote:
On Thu, Apr 19, 2012 at 09:12:09PM +0200, Mehdi Dogguy wrote:
On 19/04/12 20:21, Faidon Liambotis wrote:
Package: apt
Version: 0.9.1
Severity: serious
apt
On Thu, Apr 19, 2012 at 09:12:09PM +0200, Mehdi Dogguy wrote:
On 19/04/12 20:21, Faidon Liambotis wrote:
Package: apt
Version: 0.9.1
Severity: serious
apt 0.9.1 currently segfaults on the zelenka (our s390/s390x porterbox)
sid_s390x chroot. Downgrading apt to 0.8.15.10 makes it work again.
On Fri, Apr 20, 2012 at 10:04:28PM +0200, Philipp Kern wrote:
On Thu, Apr 19, 2012 at 09:12:09PM +0200, Mehdi Dogguy wrote:
On 19/04/12 20:21, Faidon Liambotis wrote:
Package: apt
Version: 0.9.1
Severity: serious
apt 0.9.1 currently segfaults on the zelenka (our s390/s390x porterbox)
Package: apt
Version: 0.9.1
Severity: serious
apt 0.9.1 currently segfaults on the zelenka (our s390/s390x porterbox)
sid_s390x chroot. Downgrading apt to 0.8.15.10 makes it work again.
Backtrace follows, even though it probably isn't that helpful, since apt
doesn't have a debugging symbols
On 19/04/12 20:21, Faidon Liambotis wrote:
Package: apt
Version: 0.9.1
Severity: serious
apt 0.9.1 currently segfaults on the zelenka (our s390/s390x porterbox)
sid_s390x chroot. Downgrading apt to 0.8.15.10 makes it work again.
Does it also segfault on s390? (s390x is not a release arch yet
severity 669427 important
thanks
On Thu, Apr 19, 2012 at 09:12:09PM +0200, Mehdi Dogguy wrote:
apt 0.9.1 currently segfaults on the zelenka (our s390/s390x porterbox)
sid_s390x chroot. Downgrading apt to 0.8.15.10 makes it work again.
Does it also segfault on s390? (s390x is not a release
12 matches
Mail list logo