Devuan bug report logs - #501
grub-pc: Security update can break grub - grub_calloc not found

version graph

Package: grub-pc; Maintainer for grub-pc is (unknown); Source for grub-pc is src:grub2.

Reported by: Geoff <g.gibbs42@ntlworld.com>

Date: Fri, 31 Jul 2020 10:33:02 UTC

Severity: normal

Tags: debian

Found in version 2.02+dfsg1-20+deb10u1

Fixed in version 2.04-10

Done: Mark Hindley <mark@hindley.org.uk>

Forwarded to https://bugs.debian.org/966575

Full log


Message #12 received at 501@bugs.devuan.org (full text, mbox, reply):

Received: (at 501) by bugs.devuan.org; 31 Jul 2020 10:50:17 +0000
Return-Path: <mark@hindley.org.uk>
Delivered-To: devuanbugs@dyne.org
Received: from tupac3.dyne.org [195.169.149.119]
	by doc.devuan.org with IMAP (fetchmail-6.4.0.beta4)
	for <debbugs@localhost> (single-drop); Fri, 31 Jul 2020 10:50:17 +0000 (UTC)
Received: from mx.hindley.org.uk (mohindley.plus.com [81.174.245.179])
	(using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits))
	(No client certificate requested)
	by vm6.ganeti.dyne.org (Postfix) with ESMTPS id CE291F608DE
	for <501@bugs.devuan.org>; Fri, 31 Jul 2020 12:48:22 +0200 (CEST)
Received: from apollo.hindleynet ([192.168.1.3] helo=hindley.org.uk)
	by mx.hindley.org.uk with smtp (Exim 4.84_2)
	(envelope-from <mark@hindley.org.uk>)
	id 1k1SaL-0000n4-OH; Fri, 31 Jul 2020 11:48:21 +0100
Received: (nullmailer pid 14999 invoked by uid 1000);
	Fri, 31 Jul 2020 10:48:21 -0000
Date: Fri, 31 Jul 2020 11:48:21 +0100
From: Mark Hindley <mark@hindley.org.uk>
To: Geoff <g.gibbs42@ntlworld.com>, 501@bugs.devuan.org
Subject: Re: [devuan-dev] bug#501: grub-pc: Security update can break grub -
 grub_calloc not found
Message-ID: <20200731104821.GN3011@hindley.org.uk>
References: <159619030904.4287.14010145509750778884.reportbug@fluorine.ggibbs42.lan>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <159619030904.4287.14010145509750778884.reportbug@fluorine.ggibbs42.lan>
X-Debbugs-No-Ack: No Thanks
User-Agent: Mutt/1.10.1 (2018-07-13)
X-Spam-Status: No, score=-0.0 required=5.0 tests=SPF_PASS autolearn=disabled
	version=3.4.2
X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on tupac3.dyne.org
Control: tags -1 debian
Control: forwarded -1 https://bugs.debian.org/966575

On Fri, Jul 31, 2020 at 11:11:49AM +0100, Geoff wrote:
> Package: grub-pc
> Version: 2.02+dfsg1-20+deb10u1
> Severity: normal

Geoff,

Thanks for reporting this.

Devuan uses Debian's grub2 packages without recompilation so this should be
reported to Debian's BTS. A quick look shows a similar bug reported yesterday
against Debian unstable[1]. However, it may be worth adding to that report the
fact that stable security updates is also affected. Would you do that?

Thanks

Mark

[1]  https://bugs.debian.org/966575


Send a report that this bug log contains spam.


Devuan BTS -- Powered by Debian bug tracking system
Copyright (C) 1999 Darren O. Benham,
1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson,
2005-2017 Don Armstrong, and many other contributors.

Devuan Bugs Owner <owner@bugs.devuan.org>.
Last modified: Fri Mar 29 11:22:18 2024;