Processing of glibc_2.21-5_amd64.changes

2015-12-23 Thread Debian FTP Masters
glibc_2.21-5_amd64.changes uploaded successfully to ftp-master.debian.org along with the files: glibc_2.21-5.dsc glibc_2.21-5.debian.tar.xz glibc-doc_2.21-5_all.deb glibc-source_2.21-5_all.deb libc-bin-dbgsym_2.21-5_amd64.deb libc-bin_2.21-5_amd64.deb

Processing of glibc_2.21-5_amd64.changes

2015-12-23 Thread Debian FTP Masters
glibc_2.21-5_amd64.changes uploaded successfully to localhost along with the files: glibc_2.21-5.dsc glibc_2.21-5.debian.tar.xz glibc-doc_2.21-5_all.deb glibc-source_2.21-5_all.deb libc-bin-dbgsym_2.21-5_amd64.deb libc-bin_2.21-5_amd64.deb libc-dev-bin-dbgsym_2.21-5_amd64.deb

r6837 - in glibc-package/trunk/debian: . debhelper.in

2015-12-23 Thread Samuel Thibault
Author: sthibault Date: 2015-12-23 09:43:36 + (Wed, 23 Dec 2015) New Revision: 6837 Modified: glibc-package/trunk/debian/changelog glibc-package/trunk/debian/debhelper.in/libc-alt.lintian-overrides glibc-package/trunk/debian/debhelper.in/libc-otherbuild.lintian-overrides

r6838 - glibc-package/tags

2015-12-23 Thread Samuel Thibault
Author: sthibault Date: 2015-12-23 09:43:56 + (Wed, 23 Dec 2015) New Revision: 6838 Added: glibc-package/tags/2.21-5/ Log: upload

Bug#808819: libio/wstrops.c: arbitrary code execution vulnerability

2015-12-23 Thread Aurelien Jarno
control: forcemerge 779587 808819 On 2015-12-23 12:14, Aeschbacher, Fabrice wrote: > Source: glibc > Version: 2.19-18+deb8u1 > Severity: important > Tags: patch security > > Dear Maintainer, > > GNU C Library (glibc) contains integer overflows in the enlarge_userbuf() and > _IO_wstr_overflow()

Processed (with 1 error): Re: Bug#808819: libio/wstrops.c: arbitrary code execution vulnerability

2015-12-23 Thread Debian Bug Tracking System
Processing control commands: > forcemerge 779587 808819 Bug #779587 {Done: Aurelien Jarno } [glibc] glibc: Three vulnerabilities Unable to merge bugs because: package of #808819 is 'src:glibc' not 'glibc' Failed to forcibly merge 779587: Did not alter merged bugs. --

Bug#806911: [Reproducible-builds] Bug#806911: Second build on failures

2015-12-23 Thread Aurelien Jarno
On 2015-12-23 11:59, Holger Levsen wrote: > Hi Aurelien, > > On Dienstag, 22. Dezember 2015, Aurelien Jarno wrote: > > > nice! but this is not available yet in sid+testing yet, or is it? (or > > > maybe rather: what does "2.6.32 support" mean here???) > > I meant 2.6.32 kernel support, and it's

Processed: forcibly merging 779587 808819

2015-12-23 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > forcemerge 779587 808819 Bug #779587 {Done: Aurelien Jarno } [src:glibc] glibc: Three vulnerabilities Bug #779587 {Done: Aurelien Jarno } [src:glibc] glibc: Three vulnerabilities Marked as found in

Processed: reassign 779587 to src:glibc

2015-12-23 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > reassign 779587 src:glibc Bug #779587 {Done: Aurelien Jarno } [glibc] glibc: Three vulnerabilities Bug reassigned from package 'glibc' to 'src:glibc'. No longer marked as found in versions 2.19-18. No longer marked as fixed

glibc 2.21-5 ftbfs

2015-12-23 Thread Samuel Thibault
Hello, The latest glibc upload, 2.21-5 failed to build: # Link to any headers found in the old locations first find /usr/include/sys -mindepth 1 \ -exec ln -sf '{}' debian/include/sys ';' find: `/usr/include/sys': No such file or directory So it looks like there are no /usr/include/sys

Re: glibc 2.21-5 ftbfs

2015-12-23 Thread Aurelien Jarno
On 2015-12-23 17:30, Samuel Thibault wrote: > Hello, > > The latest glibc upload, 2.21-5 failed to build: > > # Link to any headers found in the old locations first > find /usr/include/sys -mindepth 1 \ > -exec ln -sf '{}' debian/include/sys ';' > find: `/usr/include/sys': No such file

Bug#806911: [Reproducible-builds] Bug#806911: Bug#806911: Second build on failures

2015-12-23 Thread Holger Levsen
Hi, On Mittwoch, 23. Dezember 2015, Aurelien Jarno wrote: > > I have to admit, I cannot follow: > > - if this is fixed, why is 806911 still open? > The "bug" is still there, just not triggerable anymore on amd64 and > i386. ok > I use "bug" as when faking the kernel version to change the

Bug#808819: libio/wstrops.c: arbitrary code execution vulnerability

2015-12-23 Thread Aeschbacher, Fabrice
Source: glibc Version: 2.19-18+deb8u1 Severity: important Tags: patch security Dear Maintainer, GNU C Library (glibc) contains integer overflows in the enlarge_userbuf() and _IO_wstr_overflow() functions in libio/wstrops.c. These issues are triggered as user-supplied input is not properly

glibc_2.21-5_amd64.changes ACCEPTED into unstable

2015-12-23 Thread Debian FTP Masters
Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Tue, 22 Dec 2015 15:23:35 +0100 Source: glibc Binary: libc-bin libc-dev-bin libc-l10n glibc-doc glibc-source locales locales-all nscd multiarch-support libc6 libc6-dev libc6-dbg libc6-pic libc6-udeb libc6.1

Bug#806911: [Reproducible-builds] Bug#806911: Second build on failures

2015-12-23 Thread Holger Levsen
Hi Aurelien, On Dienstag, 22. Dezember 2015, Aurelien Jarno wrote: > > nice! but this is not available yet in sid+testing yet, or is it? (or > > maybe rather: what does "2.6.32 support" mean here???) > I meant 2.6.32 kernel support, and it's already in testing and sid. I have to admit, I cannot