Devuan bug report logs - #501
grub-pc: Security update can break grub - grub_calloc not found

version graph

Package: grub-pc; Maintainer for grub-pc is (unknown); Source for grub-pc is src:grub2.

Reported by: Geoff <g.gibbs42@ntlworld.com>

Date: Fri, 31 Jul 2020 10:33:02 UTC

Severity: normal

Tags: debian

Found in version 2.02+dfsg1-20+deb10u1

Fixed in version 2.04-10

Done: Mark Hindley <mark@hindley.org.uk>

Forwarded to https://bugs.debian.org/966575

Full log


🔗 View this message in rfc822 format

X-Loop: owner@bugs.devuan.org
Subject: bug#501: [devuan-dev] bug#501: grub-pc: Security update can break grub - grub_calloc not found
Reply-To: Mark Hindley <mark@hindley.org.uk>, 501@bugs.devuan.org
Resent-From: Mark Hindley <mark@hindley.org.uk>
Resent-To: devuan-bugs@lists.dyne.org
Resent-CC: devuan-dev@lists.dyne.org
X-Loop: owner@bugs.devuan.org
Resent-Date: Fri, 31 Jul 2020 11:03:01 +0000
Resent-Message-ID: <handler.501.B501.159619261713358@bugs.devuan.org>
Resent-Sender: owner@bugs.devuan.org
X-Devuan-PR-Message: followup 501
X-Devuan-PR-Package: grub-pc
X-Devuan-PR-Keywords: 
References: <159619030904.4287.14010145509750778884.reportbug@fluorine.ggibbs42.lan> <159619030904.4287.14010145509750778884.reportbug@fluorine.ggibbs42.lan>
Received: via spool by 501-submit@bugs.devuan.org id=B501.159619261713358
          (code B ref 501); Fri, 31 Jul 2020 11:03:01 +0000
Received: (at 501) by bugs.devuan.org; 31 Jul 2020 10:50:17 +0000
Delivered-To: devuanbugs@dyne.org
Received: from tupac3.dyne.org [195.169.149.119]
	by doc.devuan.org with IMAP (fetchmail-6.4.0.beta4)
	for <debbugs@localhost> (single-drop); Fri, 31 Jul 2020 10:50:17 +0000 (UTC)
Received: from mx.hindley.org.uk (mohindley.plus.com [81.174.245.179])
	(using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits))
	(No client certificate requested)
	by vm6.ganeti.dyne.org (Postfix) with ESMTPS id CE291F608DE
	for <501@bugs.devuan.org>; Fri, 31 Jul 2020 12:48:22 +0200 (CEST)
Received: from apollo.hindleynet ([192.168.1.3] helo=hindley.org.uk)
	by mx.hindley.org.uk with smtp (Exim 4.84_2)
	(envelope-from <mark@hindley.org.uk>)
	id 1k1SaL-0000n4-OH; Fri, 31 Jul 2020 11:48:21 +0100
Received: (nullmailer pid 14999 invoked by uid 1000);
	Fri, 31 Jul 2020 10:48:21 -0000
Date: Fri, 31 Jul 2020 11:48:21 +0100
From: Mark Hindley <mark@hindley.org.uk>
To: Geoff <g.gibbs42@ntlworld.com>, 501@bugs.devuan.org
Message-ID: <20200731104821.GN3011@hindley.org.uk>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <159619030904.4287.14010145509750778884.reportbug@fluorine.ggibbs42.lan>
User-Agent: Mutt/1.10.1 (2018-07-13)
X-Spam-Status: No, score=-0.0 required=5.0 tests=SPF_PASS autolearn=disabled
	version=3.4.2
X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on tupac3.dyne.org
Control: tags -1 debian
Control: forwarded -1 https://bugs.debian.org/966575

On Fri, Jul 31, 2020 at 11:11:49AM +0100, Geoff wrote:
> Package: grub-pc
> Version: 2.02+dfsg1-20+deb10u1
> Severity: normal

Geoff,

Thanks for reporting this.

Devuan uses Debian's grub2 packages without recompilation so this should be
reported to Debian's BTS. A quick look shows a similar bug reported yesterday
against Debian unstable[1]. However, it may be worth adding to that report the
fact that stable security updates is also affected. Would you do that?

Thanks

Mark

[1]  https://bugs.debian.org/966575

Send a report that this bug log contains spam.


Devuan BTS -- Powered by Debian bug tracking system
Copyright (C) 1999 Darren O. Benham,
1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson,
2005-2017 Don Armstrong, and many other contributors.

Devuan Bugs Owner <owner@bugs.devuan.org>.
Last modified: Thu Apr 25 17:01:21 2024;