Bug#886146: stretch-pu: package sqlcipher/3.2.0-2+deb9u1

2018-09-01 Thread Philipp Berger
It now has been more than four months since the last reply by anyone.

PLEASE, is there anything I can to to push this through? It can not be
that hard!


Problem: The package is completely broken and unusable.

History:

  * 2017/11/15: First mention of this issue in my post to
    https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863530
  * 2017/12/01: I submitted a patch for the problem to #863530
  * 2018/01/02: This issue was opened to fix the problem against
    release.debian.org

It now has been EIGHT months since the patch was initially submitted.



Bug#886146: stretch-pu: package sqlcipher/3.2.0-2+deb9u1

2018-06-19 Thread Philipp Berger
It now has been more than two months since the last reply by anyone.

PLEASE, is there anything I can to to push this through? It can not be
that hard!


Problem: The package is completely broken and unusable.

History:

  * 2017/11/15: First mention of this issue in my post to
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863530
  * 2017/12/01: I submitted a patch for the problem to #863530
  * 2018/01/02: This issue was opened to fix the problem against
release.debian.org

It now has been 6 and 1/2 months since the patch was initially submitted.



Bug#886146: Testing and Issues

2018-04-12 Thread Philipp Berger
Dear Julien, dear Maintainers,

the OpenSSL 1.1.x compatibility patch that was applied for #828555
breaks the package and leads to segfaults.
This breaks for example "skrooge" and other applications depending on
libsqlcipher0. I have no idea why this was not caught before the
release, but on a fresh install of Debian 9.4, all default settings, I
installed "skrooge". After opening the program, click "New", then "Save
As", enter a valid name, e.g. "test" and save - the program immediately
crashes with the described problem in LibSQLCipher.

So this is definitely an existing issue, even in the most current
version of Debian 9!

For the path:
I diffed src/crypto_openssl.c against the most current version (3.4.1)
and noticed the switch to the non-deprecated API function around
EVP_CipherInit_ex instead of EVP_CipherInit.
I ported these differences to 3.2.0-2, recompiled the package from
Debian sources including my patch. The resulting binaries no longer
produce segfaults and work as expected.
This is in line with release 3.4.1-1 on sid.



Bug#863530: [sqlcipher] Current version not compatible with OpenSSL 1.1

2017-12-02 Thread Philipp Berger
Dear Gianfranco,

I can confirm that the binaries you attached fix the problem and work as
expected!
How do I open the bug against release.debian.org or will you be doing that?

Kind regards,
Philipp

Am 02.12.2017 um 13:54 schrieb Gianfranco Costamagna:
> Hello Philipp,
> On Fri, 01 Dec 2017 14:58:28 +0100 Philipp Berger <deb...@philippberger.de> 
> wrote:
>> Package: libsqlcipher0
>> Version: 3.2.0-2
>> Followup-For: Bug #863530
>>
>> Dear Maintainer,
>>
>> the OpenSSL 1.1.x compatability patch that was applied for #828555 breaks 
>> the package and leads to segfaults.
>> This breaks skrooge and other applications depending on libsqlcipher0.
> can you please test the binaries I'm attaching to this email? (unfortunately 
> the build server seems to be misconfigured)
>
> I'm also attaching the patch (debdiff) against the current release in stable.
>
> If your testing is good, we will have to open a bug against release.debian.org
> with this patch :)
>
> G.



Bug#863530: [sqlcipher] Current version not compatible with OpenSSL 1.1

2017-12-01 Thread Philipp Berger
Package: libsqlcipher0
Version: 3.2.0-2
Followup-For: Bug #863530

Dear Maintainer,

the OpenSSL 1.1.x compatability patch that was applied for #828555 breaks the 
package and leads to segfaults.
This breaks skrooge and other applications depending on libsqlcipher0.

I diffed src/crypto_openssl.c against the most current version (3.4.1) and 
noticed the switch to the non-deprecated API function around EVP_CipherInit_ex 
instead of EVP_CipherInit.
I ported these differences to 3.2.0-2, recompiled the package from Debian 
sources including my patch. The resulting binaries no longer produce segfaults 
and work as expected.
This is in line with release 3.4.1-1 on sid.

You can find the patch at http://paste.debian.net/998532/

Please review the patch and include it in stable.

Kind regards,
Philipp


-- System Information:
Debian Release: 9.1
  APT prefers stable
  APT policy: (890, 'stable'), (500, 'stable-updates'), (200, 'testing')
Architecture: amd64 (x86_64)

Kernel: Linux 4.9.0-4-amd64 (SMP w/8 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)

Versions of packages libsqlcipher0 depends on:
ii  libc6  2.24-11+deb9u1
ii  libssl1.1  1.1.0f-3+deb9u1

libsqlcipher0 recommends no packages.

libsqlcipher0 suggests no packages.

-- no debconf information



Bug#863530: Segmentation Fault

2017-11-15 Thread Philipp Berger
Dear Dirk, dear Hans-Christoph,

this dependency on OpenSSL 1.0 may lead to unexpected Segmentation
Faults, one of which I stumbled on when using SqlCipher with Qt5 (which
links OpenSSL 1.1). Is there any planned update for stretch to sqlcipher
3.4.1? Is it possible to pull sqlcipher 3.4.1 to stretch-backports (and
what can I do to help)?

This blocks my users from installing/using software requiring sqlcipher.
It would be very nice when we could resolve this without having to ship
and compile the entire sqlcipher stack at the client.

Cheers,

Philipp




smime.p7s
Description: S/MIME Cryptographic Signature


Bug#861746: linux-image-4.9.0-2-amd64: Infinity `soft lockup` at kernel 4.9.0-1+ on HP ProLiant DL360G5

2017-08-25 Thread Philipp Berger
Dear Maintainers,

we have the same issues on our ProLiant DL360 G5 systems.

How can we help triage this issue? This is a showstopper for us and
preventing the upgrade to Stretch.

Cheers,
Philipp

-- 
Philipp Berger  
https://moves.rwth-aachen.de/people/berger/
Software Modeling and Verification Group
RWTH Aachen University  Phone 
+49/241/80-21206
Ahornstraße 55, 52056 Aachen, Germany




smime.p7s
Description: S/MIME Cryptographic Signature