Your message dated Sun, 30 Jun 2024 07:19:08 +0000 with message-id <e1snoq4-00cvvg...@fasolo.debian.org> and subject line Bug#674678: fixed in nwall 1.32+debian-8 has caused the Debian Bug report #674678, regarding [nwall] segfault when stderr isn't attached to a tty to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 674678: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=674678 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems
--- Begin Message --------BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Package: nwall Version: 1.32+debian-4.1 Severity: normal - --- Please enter the report below this line. --- In main(), the return value of ttyname(2) isn't checked which results in a segfault if fd 2 isn't attached to a tty: strace -f perl -e 'open STDERR, ">", "/dev/null"; `nwall -n`' - --- System information. --- Architecture: amd64 Kernel: Linux 3.2.0-2-amd64 Debian Release: wheezy/sid 500 unstable ftp.us.debian.org - --- Package information. --- Depends (Version) | Installed ============================-+-============ libc6 (>= 2.2.5) | 2.13-32 libncurses5 (>= 5.5-5~) | 5.9-7 libreadline6 (>= 6.0) | 6.2-8 Package's Recommends field is empty. Package's Suggests field is empty. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/ iEYEARECAAYFAk/BBb4ACgkQBYeybkXz+/ldOwCgx+2yHM93yJJhbz6FstRBEbc3 9eAAn2c0+0VBCIOIitvirX/jVPn6FmKM =lgVE -----END PGP SIGNATURE-----
--- End Message ---
--- Begin Message ---Source: nwall Source-Version: 1.32+debian-8 Done: Petter Reinholdtsen <p...@debian.org> We believe that the bug you reported is fixed in the latest version of nwall, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 674...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Petter Reinholdtsen <p...@debian.org> (supplier of updated nwall package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@ftp-master.debian.org) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Format: 1.8 Date: Sun, 30 Jun 2024 08:51:39 +0200 Source: nwall Architecture: source Version: 1.32+debian-8 Distribution: unstable Urgency: medium Maintainer: Debian QA Group <packa...@qa.debian.org> Changed-By: Petter Reinholdtsen <p...@debian.org> Closes: 674678 Changes: nwall (1.32+debian-8) unstable; urgency=medium . * QA upload. . * Added 02-free-include.patch to fix build problem with recent gcc. * Added 03-no-stderr-segfault.patch to fix segfault when stderr is /dev/null (Closes: #674678). Checksums-Sha1: 47db7a1ea76c9fb1d29675c0ac5a1ce9a8363280 1841 nwall_1.32+debian-8.dsc 32ef4039b04d1e12597ec9e6fb74826ae3bb23c3 4920 nwall_1.32+debian-8.debian.tar.xz 8bbb256e1dafd7e01f22983f5e3869b3cbc5790f 6479 nwall_1.32+debian-8_source.buildinfo Checksums-Sha256: 7460fcaa0121bc380f767d222bdb185e4494daa00d44f8f763d41a3f029d84f8 1841 nwall_1.32+debian-8.dsc a132379d8e1a669327b71e3aa1fe12d4eb380844d043d3e6e0992d91202ad347 4920 nwall_1.32+debian-8.debian.tar.xz 1e380d82b1862a82687b09f3de8cd5b7db146eb1a18a9614767f65859524bfa1 6479 nwall_1.32+debian-8_source.buildinfo Files: 1ca7e7d60b9ee1b46a02c91a103d0647 1841 misc optional nwall_1.32+debian-8.dsc 57f8cf60b1e086a8ca6f3fb02b7b1d42 4920 misc optional nwall_1.32+debian-8.debian.tar.xz 31731831f7f867f86e603a183d49f495 6479 misc optional nwall_1.32+debian-8_source.buildinfo -----BEGIN PGP SIGNATURE----- iQIzBAEBCAAdFiEERqLf4owIeylOb9kkgSgKoIe6+w4FAmaBAqYACgkQgSgKoIe6 +w5nVg//cV1M1WhK46zUF+ZIF9smPNRnVU4tTVCcHf/knATGKz+iIWOCoG9blYZl Nhgh5IPaiqdcLG0veV7bD/hgijspw25wuaawr/++mBg7KiZoZ1bhzen9HLMM4ZbX a0qugC6Rlo7bHWck2wwmE6Cxn3p3PUij63etV4BPFHcOxu83LR1V7v9HSH+7cpFK 6GZIHI/sT1y6Ptwf5kVAVHQRohQROH0kTi513Y/FIy1+3OZcnCqbJD8LorISjtah 0uKc1t60jqz/GU98BrUjkpWWxSdcZb5GZp680wm1vF/3ZIzX7QeZRJ8lIvLzK2MU XSzcSvEbPavTDMWQUuYntrssU8YJyxs4BWmpbDxZhwhj673OmOZyqmqhJq6nGJMn BYYUvNUMzb8oWi2XNIS8SOxdTecUEGYa0B/fR7lBy4QqXPUWPMRVxCy19mQjJyIr WsEdI0X+nHSA4KiY96DBriXox/ShnAku6Du8ztuA1w/2PCXOLTImIq+qbyH4kDPP 02qCQt6E5wFfw0ztRFgjciPMuYrn702k5E27AazhOqHsq9LtPD5E8FxQwJVzknpZ F7fQZap8a1RwsMa6ayBtrD8Aaxl0LTvXCdedvlZ8PZf10EGKNRv/9oI9dLCFstrj gnAEnKAAdHj0N5SQXIZtIcIV7OdfVnVZWkEZQj3KM5ZZNviKQ9k= =k9jJ -----END PGP SIGNATURE-----pgpW2Pu72nqdr.pgp
Description: PGP signature
--- End Message ---