Your message dated Fri, 22 Aug 2025 15:32:30 +0000
with message-id <[email protected]>
and subject line Bug#1100509: fixed in libsoup3 3.2.3-0+deb12u1
has caused the Debian Bug report #1100509,
regarding gnome-calculator: "Calculator" is not responding
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
1100509: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1100509
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: gnome-calculator
Version: 1:43.0.1-2
Severity: important


GNOME Calculator starts up but does not respond to keystrokes.  The
desktop notices that the application is unresponsive and offers the
choice between force-quit and wait.  Waiting does not seem to do
anything.

Here's what I have on the console:

<snip>

$ gnome-calculator 

(gnome-calculator:1863520): Adwaita-WARNING **: 11:37:42.424: Using 
GtkSettings:gtk-application-prefer-dark-theme with libadwaita is unsupported. 
Please use AdwStyleManager:color-scheme instead.

** (gnome-calculator:1863520): WARNING **: 11:37:43.318: 
currency-provider.vala:161: Couldn't download IMF currency rate file: HTTP/2 
Error: INTERNAL_ERROR

(gnome-calculator:1863520): libsoup-WARNING **: 11:37:43.318: 
(../libsoup/soup-session.c:334):soup_session_dispose: runtime check failed: 
(soup_connection_manager_get_num_conns (priv->conn_manager) == 0)

(gnome-calculator:1863520): libsoup-WARNING **: 11:37:43.318: 
(../libsoup/soup-connection-manager.c:78):soup_host_free: runtime check failed: 
(host->conns == NULL)

</snip>

-- System Information:
Debian Release: 12.9
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'stable-security'), (500, 'stable')
Architecture: amd64 (x86_64)

Kernel: Linux 6.1.0-31-amd64 (SMP w/4 CPU threads; PREEMPT)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages gnome-calculator depends on:
ii  dconf-gsettings-backend [gsettings-backend]  0.40.0-4
ii  libadwaita-1-0                               1.2.2-1
ii  libc6                                        2.36-9+deb12u9
ii  libgee-0.8-2                                 0.20.6-1
ii  libglib2.0-0                                 2.74.6-2+deb12u5
ii  libgtk-4-1                                   4.8.3+ds-2+deb12u1
ii  libgtksourceview-5-0                         5.6.2-1
ii  libmpc3                                      1.3.1-1
ii  libmpfr6                                     4.2.0-1
ii  libsoup-3.0-0                                3.2.2-2
ii  libxml2                                      2.9.14+dfsg-1.3~deb12u1

Versions of packages gnome-calculator recommends:
ii  gvfs  1.50.3-1
ii  yelp  42.2-1

gnome-calculator suggests no packages.

-- no debconf information

-- 
"the lyf so short, the craft so long to lerne."
                 -- Chaucer.

--- End Message ---
--- Begin Message ---
Source: libsoup3
Source-Version: 3.2.3-0+deb12u1
Done: Simon McVittie <[email protected]>

We believe that the bug you reported is fixed in the latest version of
libsoup3, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Simon McVittie <[email protected]> (supplier of updated libsoup3 package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Sat, 12 Jul 2025 14:39:06 +0100
Source: libsoup3
Architecture: source
Version: 3.2.3-0+deb12u1
Distribution: bookworm
Urgency: medium
Maintainer: Debian GNOME Maintainers 
<[email protected]>
Changed-By: Simon McVittie <[email protected]>
Closes: 1052551 1054962 1059773 1064744 1077962 1087416 1087417 1098315 1099119 
1100509 1100541 1101922 1102471 1104456
Changes:
 libsoup3 (3.2.3-0+deb12u1) bookworm; urgency=medium
 .
   * Team upload
 .
   [ Jeremy BĂ­cha ]
   * d/control{,.in}: Add Build-Depends: ca-certificates for build-time tests
     (Closes: #1064744, #1054962)
 .
   [ Simon McVittie ]
   * Re-export patch series (no functional changes)
   * New upstream old-stable release 3.2.3
     - Fix a buffer overrun if asked to parse non-UTF-8 headers. It is
       believed that this cannot happen on the client side, but it can
       happen in SoupServer. (CVE-2024-52531, Closes: #1087417)
     - Avoid an infinite loop in WebSocket processing which can cause a denial
       of service via resource exhaustion (CVE-2024-52532, Closes: #1087416)
     - Fix denial of service (crash) when parsing invalid data URLs
       (CVE-2025-32051)
     - Fix heap overflows during content sniffing
       (CVE-2025-32052, libsoup3 equivalent of #1102214)
       (CVE-2025-32053, libsoup3 equivalent of #1102215)
     - Fix an integer overflow during parameter serialization
       (CVE-2025-32050, libsoup3 equivalent of #1102212)
   * Fix a regression introduced in 3.2.3 by backporting its fixes from
     3.6.5:
     - d/p/sniffer-Fix-potential-overflow.patch,
       d/p/sniffer-Add-better-coverage-of-skip_insignificant_space.patch:
       Fix more heap buffer overflows during content sniffing
       (CVE-2025-2784; libsoup3 equivalent of #1102208)
     - d/source/include-binaries: Configure dpkg to accept non-text diffs
       in test data for CVE-2025-2784
   * d/p/server-Add-note-about-recommended-usage.patch:
     Update documentation to indicate the level of security support for
     the server side.
     Upstream clarified the documentation in 3.6.1 to state that SoupServer
     is not intended to be exposed to untrusted clients.
     (Related to CVE-2024-52531, CVE-2024-52532)
   * d/p/tests-Add-test-for-passing-invalid-UTF-8-to-soup_header_p.patch:
     Add test coverage related to CVE-2024-52531
   * Backport additional CVE fixes from upstream release 3.5.2:
     - d/p/headers-Strictly-don-t-allow-NUL-bytes.patch:
       Reject HTTP headers if they contain NUL bytes
       (CVE-2024-52530, libsoup3 equivalent of #1088812)
   * Backport additional CVE fixes from upstream release 3.6.2:
     - d/p/content-sniffer-Handle-sniffing-resource-shorter-than-4-b.patch:
       Fix denial of service when sniffing type of a short resource
       (CVE-2025-32909, libsoup3 equivalent of #1103517)
     - d/p/auth-digest-Handle-missing-realm-in-authenticate-header.patch,
       d/p/auth-digest-Handle-missing-nonce.patch,
       d/p/auth-digest-Fix-leak.patch:
       Fix denial of service (crash) during client-side authentication
       (CVE-2025-32910, libsoup3 equivalent of #1103516)
     - d/p/soup_message_headers_get_content_disposition-Fix-NULL-der.patch,
       d/p/soup_message_headers_get_content_disposition-strdup-trunc.patch:
       Fix memory management of message headers.
       (CVE-2025-32911, CVE-2025-32913; libsoup3 equivalent of #1103515)
     - d/p/soup_header_parse_quality_list-Fix-leak.patch:
       Fix a memory leak (slow denial of service) in quality list parsing
       (CVE-2025-46420, libsoup3 equivalent of #1104055)
   * Backport additional CVE fixes from upstream release 3.6.5:
     - d/p/auth-digest-Handle-missing-nonce-1.patch,
       d/p/digest-auth-Handle-NULL-nonce.patch:
       Fix additional denial of service issues related to CVE-2025-32910
       (CVE-2025-32912, libsoup3 equivalent of #1103516)
     - d/p/headers-Handle-parsing-edge-case.patch,
       d/p/headers-Handle-parsing-only-newlines.patch:
       Fix denial of service (crash) in http server header parsing
       (CVE-2025-32906, libsoup3 equivalent of #1103521)
     - d/p/session-Strip-authentication-credentails-on-cross-origin-.patch:
       Fix credentials disclosure on cross-origin redirect
       (CVE-2025-46421, libsoup3 equivalent of #110405)
   * d/control: libsoup-3.0-tests Depends on ca-certificates
     (Equivalent of #1054962, #1064744 for autopkgtests)
   * d/p/connection-manager-don-t-crash-if-connection-outlives-its.patch:
     Add patch from upstream fixing a use-after-free during disconnection.
     In particular this resolves a hang during gnome-calculator startup,
     when it downloads currency conversion data.
     (Closes: #1077962, #1052551, #1098315, #1099119, #1100509, #1104456,
     #1100541, #1101922, #1102471, #1059773)
   * d/p/connection-auth-don-t-crash-if-connection-outlives-the-au.patch:
     Add patch from upstream fixing another use-after-free during disconnect.
     (Related to #1077962, etc.)
Checksums-Sha1:
 3cd4cbe62114d1591ac7ed133219be3096f5ebee 3362 libsoup3_3.2.3-0+deb12u1.dsc
 104cbce77f3d620c9b6660f03c6c8076a2c99711 1530552 libsoup3_3.2.3.orig.tar.xz
 0ee17a274d37bd4967b3d8941c13c766520a52c5 37636 
libsoup3_3.2.3-0+deb12u1.debian.tar.xz
 cdd653b893d75895662f4fdf3c380b53edb10ee7 18435 
libsoup3_3.2.3-0+deb12u1_source.buildinfo
Checksums-Sha256:
 f68bd3c65f208bacfc99d54fe24012a9ce0aef217f89ff0e4ae354f5f029852b 3362 
libsoup3_3.2.3-0+deb12u1.dsc
 3f50c2a883d7e984e31ecbaa35326b4e6bc6357bd3eed9bb4eb49154ebadd2fd 1530552 
libsoup3_3.2.3.orig.tar.xz
 5afa608a041cf3b0f08386f97e9ec6adaa8971598876e03cbd30812a19ab97c8 37636 
libsoup3_3.2.3-0+deb12u1.debian.tar.xz
 9a0bd6df19b611dc6b0f17e16406112bcc8d18f5fcd7da57efefa486d22e0f6c 18435 
libsoup3_3.2.3-0+deb12u1_source.buildinfo
Files:
 9e780002f7ff4ffbc7098ba3a46e45da 3362 devel optional 
libsoup3_3.2.3-0+deb12u1.dsc
 c609e3028296f559786fa581c418f4da 1530552 devel optional 
libsoup3_3.2.3.orig.tar.xz
 a155ad6386cde3560239fddd97e02581 37636 devel optional 
libsoup3_3.2.3-0+deb12u1.debian.tar.xz
 4f3fec537be1c450b78572bf5ff4fb43 18435 devel optional 
libsoup3_3.2.3-0+deb12u1_source.buildinfo

-----BEGIN PGP SIGNATURE-----
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=wM44
-----END PGP SIGNATURE-----

Attachment: pgpsfeVntvBNE.pgp
Description: PGP signature


--- End Message ---

Reply via email to