Your message dated Tue, 05 Sep 2017 19:34:17 +0000
with message-id <[email protected]>
and subject line Bug#845339: fixed in blhc 0.07+20170817+gita232d32-0.1
has caused the Debian Bug report #845339,
regarding blhc: checks for PIE can be incompatible with recent dpkg versions
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
845339: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=845339
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: blhc
Version: 0.07
Severity: important
Tags: upstream

Control: forwarded 796560 [email protected]

Hi,

The blhc --all is saying about PIE absence in some packages. However, the
current dpkg version changed the usage policy for PIE.

>From dpkg changelog:

------------------------------------------------------

dpkg (1.18.15) unstable; urgency=medium

  [ Guillem Jover ]
  * Improve PIE flags support:
    - Do not enable PIE when linking static programs. glibc-based systems
      do not support this combination and produce very bogus output.
      Proposed by Szabolcs Nagy <[email protected]>. Closes: #843714

[...]

 -- Guillem Jover <[email protected]>  Wed, 16 Nov 2016 03:28:05 +0100

dpkg (1.18.14) unstable; urgency=medium

  [ Guillem Jover ]
  * Improve PIE flags support:
    - Rename the spec name cc1_options to self_spec.
      Suggested by James Clarke <[email protected]>
    - Do not set PIE options if they have been negated, and do not reset
      them if they have been requested.
    Closes: #843791, #843826

[...]

 -- Guillem Jover <[email protected]>  Fri, 11 Nov 2016 02:26:08 +0100

dpkg (1.18.13) unstable; urgency=medium

  * Improve PIE flags support:
    - Retroactively document in the changelog that PIE is enabled by default
      on all supported architectures regardless of gcc doing so itself on a
      subset of them.
    - When emitting PIE flags on architectures where gcc does not inject
      those itself, do it via a specs file too, so that maintainers can
      use them unconditionally regardless of the object being compiled
      or linked.
    - When injecting -no-pie for linking via the gcc specs file also
      inject -fno-PIE.
    - Update the documentation.

[...]

 -- Guillem Jover <[email protected]>  Mon, 07 Nov 2016 03:28:42 +0100

------------------------------------------------------

Simon, can you fix this issue?

Thanks in advance.

Regards,

Eriberto

--- End Message ---
--- Begin Message ---
Source: blhc
Source-Version: 0.07+20170817+gita232d32-0.1

We believe that the bug you reported is fixed in the latest version of
blhc, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Joao Eriberto Mota Filho <[email protected]> (supplier of updated blhc 
package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Tue, 05 Sep 2017 10:16:33 -0300
Source: blhc
Binary: blhc
Architecture: source
Version: 0.07+20170817+gita232d32-0.1
Distribution: unstable
Urgency: medium
Maintainer: Jari Aalto <[email protected]>
Changed-By: Joao Eriberto Mota Filho <[email protected]>
Description:
 blhc       - build log hardening check
Closes: 845339
Changes:
 blhc (0.07+20170817+gita232d32-0.1) unstable; urgency=medium
 .
   * Non-maintainer upload.
   * New upstream release.
       - The upstream added --debian as new option to fix PIE check in Debian.
         Thanks to Simon Ruderich <[email protected]>. (Closes: #845339)
   * debian/control: bumped Standards-Version to 4.0.0.
   * debian/copyright: updated some rights and dates.
   * debian/watch:
       - Bumped to version 4.
       - Updated to ignore VCS tags.
Checksums-Sha1:
 bdc9d74aaa8fa9da5ab190221a053381ebcfc50d 1958 
blhc_0.07+20170817+gita232d32-0.1.dsc
 edc8e1eefec140cc64395ddbadd98a77f2a3b6be 53147 
blhc_0.07+20170817+gita232d32.orig.tar.gz
 57ce0eb98e0d5ab612e33e9b534a4ccc1cddf16f 3680 
blhc_0.07+20170817+gita232d32-0.1.debian.tar.xz
 bf659637baa1d9902203e67283bc6f099edc345b 5138 
blhc_0.07+20170817+gita232d32-0.1_source.buildinfo
Checksums-Sha256:
 3b57d2a3f3dadafea7cba61a9c65b135c7df06252df378158b178ce7bec34f64 1958 
blhc_0.07+20170817+gita232d32-0.1.dsc
 dae70072ca32e378a3578e846e7a88aff141e46ae31ec55c5e4ca7b811d1e2c4 53147 
blhc_0.07+20170817+gita232d32.orig.tar.gz
 30887323be20e363309f07acfb26b20681eeecbac9289d960d4d26a1b055d419 3680 
blhc_0.07+20170817+gita232d32-0.1.debian.tar.xz
 6895eb7e7a15e4f2f31d3589e6cc86c525cafe761252d6e5a909e715cc2ac363 5138 
blhc_0.07+20170817+gita232d32-0.1_source.buildinfo
Files:
 cd61f054e79962e3ab6e16e9c9a825b0 1958 utils optional 
blhc_0.07+20170817+gita232d32-0.1.dsc
 a45b1163a18daeddafb7368085036f22 53147 utils optional 
blhc_0.07+20170817+gita232d32.orig.tar.gz
 fae8607c27c8cd344b1be3355d356526 3680 utils optional 
blhc_0.07+20170817+gita232d32-0.1.debian.tar.xz
 de20584f1b99e4b3c4c7b9ec0dd6314c 5138 utils optional 
blhc_0.07+20170817+gita232d32-0.1_source.buildinfo

-----BEGIN PGP SIGNATURE-----

iQIzBAEBCAAdFiEENX3LDuyVoBrrofDS3mO5xwTr6e8FAlmu+I8ACgkQ3mO5xwTr
6e+kMQ/+PqjAet1SGs25VFZ88YUdpMJyemjqTeCWSm8m0MjNREpulJlVqtj+DX+R
FdzV6rhldnExk+CLjjXGgT6qRNAXCjtnO2FLGqNTyttCpLHNH5NyT2yY4DBnaKNj
jJRdsMiJ/taT6afsd3boo+mG7a+DJC69iyFvQiPsMi6tim3FW+xm0Ek8o/2p/fGP
CxWrSToxBTAG6omYFaXDm/CYic13O6WMwPTqTSHwzGsVE+9sbZdsUiL2QJ0djhTM
xRU4yJXcy2booA5sCaSnFQEEB2AooF9gxtMi/wH2EW5cDw3CYgzQ0KP+2IaZC4CN
LsoOovMvqGnNAzjgGDdIH+ZB0d6C2GL6hjRUCt4bIoJ8JfERKP3b2mP6POOoZFo6
16tZWmkDt3UT+HkRr/MNwzsFozzsxcyEhQMc+jNMlRWoXStdKTxTzJ4EdWwFE0X2
awkbzoSRTSfDwa1mhU5HZfHnJpt7LbTsgBPC0vxnq1WpGf6ZPomgnGz+XRX4wQP0
O3u19FKhbxzG7pI4AB/LhPg9YNH0+4QYJ6FwEq4rd3q2Rd6k7/tpLQYcNsIVu9OU
pgOIJgNCQDyBBh4uLqaC15WsJDXPCzd++vmWjt2ZNe4u8Am+uIPQmneCB0SxA7nQ
IamFQoEkVemF/UbrbBBQRvLLJWpXuARInIYH2MYU+tKpnE3Z0+o=
=hnK3
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to