Aurelien Jarno pushed to branch sid at GNU Libc Maintainers / glibc
Commits:
6ade97b3 by Aurelien Jarno at 2022-08-08T08:03:07+02:00
debian/patches/git-updates.diff: update from upstream stable branch.
- - - - -
2 changed files:
- debian/changelog
- debian/patches/git-updates.diff
View
Package: libc6-udeb
Version: 2.34-1
Severity: grave
Justification: renders package unusable
X-Debbugs-Cc: debian-b...@lists.debian.org
Hi,
Checking fil's report regarding runtime issues related to libc6-udeb,
which I thought to be a major version mismatch (d-i built against
unstable from a few
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Mon, 08 Aug 2022 15:24:00 +0200
Source: glibc
Architecture: source
Version: 2.34-2
Distribution: unstable
Urgency: medium
Maintainer: GNU Libc Maintainers
Changed-By: Aurelien Jarno
Closes: 1010233
Changes:
glibc
Aurelien Jarno pushed to branch sid at GNU Libc Maintainers / glibc
Commits:
388935e0 by Aurelien Jarno at 2022-08-08T14:31:18+02:00
debian/rules.d/debhelper.mk: Do not exclude libc.so and ld.so from dh_fixperms,
explicitly change the permissions afterwards. Closes: #1010233.
- - - - -
2
Aurelien Jarno pushed to branch sid at GNU Libc Maintainers / glibc
Commits:
7bf928c6 by Aurelien Jarno at 2022-08-08T12:36:11+02:00
debian/control.in/libc: provides libc-dev as versioned.
- - - - -
8a526046 by Aurelien Jarno at 2022-08-08T12:55:45+02:00
debian/control.in/libc: Add breaks in
Processing control commands:
> tag -1 pending
Bug #1010233 [src:glibc] glibc: reproducible builds: different file permissions
on ld.so.conf* and others
Added tag(s) pending.
--
1010233: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010233
Debian Bug Tracking System
Contact
Samuel Thibault pushed to branch sid at GNU Libc Maintainers / glibc
Commits:
45c7222c by Samuel Thibault at 2022-08-08T14:46:04+02:00
debian/testsuite-xfail-debian.mk: Update hurd-i386 xfails
- - - - -
2 changed files:
- debian/changelog
- debian/testsuite-xfail-debian.mk
View it on
Your message dated Mon, 8 Aug 2022 12:42:08 +0200
with message-id
and subject line Re: Bug#1016137: glibc: several binary packages Suggests:
libnss-nis package which has been removed from Debian
has caused the Debian Bug report #1016137,
regarding glibc: several binary packages Suggests:
Your message dated Mon, 08 Aug 2022 13:51:05 +
with message-id
and subject line Bug#1010233: fixed in glibc 2.34-2
has caused the Debian Bug report #1010233,
regarding glibc: reproducible builds: different file permissions on ld.so.conf*
and others
to be marked as done.
This means that you
Aurelien Jarno pushed to branch sid at GNU Libc Maintainers / glibc
Commits:
1ab5703a by Aurelien Jarno at 2022-08-08T14:33:22+02:00
debian/control.in/libc: temporary remove the breaks against heimdal-multidev to
break the build-dependency loop between heimdal and openldap.
- - - - -
3
Aurelien Jarno pushed new tag debian/2.34-2 at GNU Libc Maintainers / glibc
--
View it on GitLab:
https://salsa.debian.org/glibc-team/glibc/-/tree/debian/2.34-2
You're receiving this email because of your account on salsa.debian.org.
Aurelien Jarno pushed to branch sid at GNU Libc Maintainers / glibc
Commits:
c82ef5bb by Aurelien Jarno at 2022-08-08T15:24:04+02:00
releasing package glibc version 2.34-2
- - - - -
1 changed file:
- debian/changelog
View it on GitLab:
glibc_2.34-2_source.changes uploaded successfully to localhost
along with the files:
glibc_2.34-2.dsc
glibc_2.34-2.debian.tar.xz
glibc_2.34-2_source.buildinfo
Greetings,
Your Debian queue daemon (running on host usper.debian.org)
Aurelien Jarno pushed to branch sid at GNU Libc Maintainers / glibc
Commits:
253a7fa7 by Aurelien Jarno at 2022-08-08T15:23:37+02:00
debian/debhelper.in/libc-udeb.install: ship the dynamic linker in libc6-udeb.
- - - - -
2 changed files:
- debian/changelog
-
Your message dated Mon, 08 Aug 2022 17:50:16 +
with message-id
and subject line Bug#1016868: fixed in glibc 2.34-3
has caused the Debian Bug report #1016868,
regarding libc6-udeb: dangling ld-linux symlink
to be marked as done.
This means that you claim that the problem has been dealt with.
Processing control commands:
> tag -1 pending
Bug #1016868 [libc6-udeb] libc6-udeb: dangling ld-linux symlink
Added tag(s) pending.
--
1016868: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1016868
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Mon, 08 Aug 2022 19:38:30 +0200
Source: glibc
Architecture: source
Version: 2.34-3
Distribution: unstable
Urgency: medium
Maintainer: GNU Libc Maintainers
Changed-By: Aurelien Jarno
Closes: 1016868
Changes:
glibc
Aurelien Jarno pushed to branch sid at GNU Libc Maintainers / glibc
Commits:
5a55ada4 by Aurelien Jarno at 2022-08-08T19:37:40+02:00
debian/rules.d/debhelper.mk: make libc.so and ld.so executable also for
libc6-udeb. Closes: #1016868.
- - - - -
29b889ba by Aurelien Jarno at
Aurelien Jarno pushed new tag debian/2.34-3 at GNU Libc Maintainers / glibc
--
View it on GitLab:
https://salsa.debian.org/glibc-team/glibc/-/tree/debian/2.34-3
You're receiving this email because of your account on salsa.debian.org.
glibc_2.34-3_source.changes uploaded successfully to localhost
along with the files:
glibc_2.34-3.dsc
glibc_2.34-3.debian.tar.xz
glibc_2.34-3_source.buildinfo
Greetings,
Your Debian queue daemon (running on host usper.debian.org)
Samuel Thibault pushed to branch sid at GNU Libc Maintainers / glibc
Commits:
6bd7c054 by Samuel Thibault at 2022-08-08T21:28:53+02:00
tst-canon-bz26341 is actually fixed in glibc 2.35
- - - - -
1 changed file:
- debian/testsuite-xfail-debian.mk
View it on GitLab:
Source: heimdal
Version: 1.6~rc2+dfsg-9+deb8u1
Severity: serious
Justification: FTBFS
Hello,
Now that glibc provides a closefrom function, heimdal doesn't build its
own rk_closefrom function any more, and thus the
libroken18-heimdal.symbols check complains:
- rk_closefrom@HEIMDAL_ROKEN_1.0
Package: libc6
Version: 2.28-10+deb10u1
Severity: normal
Tags: patch
The CVE-2020-1752 was reported to glibc bugzilla[1].
CVE-2020-1752 description from NVD.
A use-after-free vulnerability introduced in glibc upstream version 2.14 was
found in the way the tilde expansion was carried out.
23 matches
Mail list logo