Your message dated Tue, 15 Nov 2022 20:34:11 +0000
with message-id <e1ov2dh-0002fs...@fasolo.debian.org>
and subject line Bug#1023789: fixed in thunderbird 1:102.5.0-1
has caused the Debian Bug report #1023789,
regarding thunderbird: FTBFS: error: no matching function for call to
'arc4random_buf'
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)
--
1023789: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1023789
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: thunderbird
Version: 1:102.4.1-1
Severity: serious
Tags: ftbfs
Justification: fails to build from source (but built successfully in the past)
X-Debbugs-Cc: sramac...@debian.org
https://buildd.debian.org/status/fetch.php?pkg=thunderbird&arch=amd64&ver=1%3A102.4.1-1%2Bb1&stamp=1668054836&raw=0
/usr/bin/clang++ -std=gnu++17 -o exploitability_win.o -c
-I/<<PKGBUILDDIR>>/obj-thunderbird/dist/system_wrappers -include
/<<PKGBUILDDIR>>/config/gcc_hidden.h -U_FORTIFY_SOURCE -D_FORTIFY_SOURCE=2
-fstack-protector-strong -fstack-clash-protection -DNDEBUG=1 -DTRIMMED=1
-DBPLOG_MINIMUM_SEVERITY=SEVERITY_CRITICAL -DNO_STABS_SUPPORT
-I/<<PKGBUILDDIR>>/toolkit/crashreporter/google-breakpad/src/processor
-I/<<PKGBUILDDIR>>/obj-thunderbird/toolkit/crashreporter/google-breakpad/src/processor
-I/<<PKGBUILDDIR>>/toolkit/crashreporter/breakpad-client
-I/<<PKGBUILDDIR>>/toolkit/crashreporter/google-breakpad/src
-I/<<PKGBUILDDIR>>/obj-thunderbird/dist/include -I/usr/include/nspr
-I/usr/include/nss -I/usr/include/nspr
-I/<<PKGBUILDDIR>>/obj-thunderbird/dist/include/nss -DMOZILLA_CLIENT -include
/<<PKGBUILDDIR>>/obj-thunderbird/mozilla-config.h -Qunused-arguments
-Wdate-time -D_FORTIFY_SOURCE=2 -Qunused-arguments -Wall
-Wbitfield-enum-conversion -Wdeprecated-this-capture -Wempty-body
-Wformat-type-confusion -Wignored-qualifiers -Wpointer-arith
-Wshadow-field-in-constructor-modified -Wsign-compare -Wtype-limits
-Wno-error=tautological-type-limit-compare -Wunreachable-code
-Wunreachable-code-return -Wunused-but-set-parameter -Wno-invalid-offsetof
-Wclass-varargs -Wempty-init-stmt -Wfloat-overflow-conversion
-Wfloat-zero-conversion -Wloop-analysis -Wno-range-loop-analysis -Wc++2a-compat
-Wcomma -Wenum-compare-conditional -Wimplicit-fallthrough -Wstring-conversion
-Wno-inline-new-delete -Wno-error=deprecated-declarations
-Wno-error=array-bounds -Wno-error=backend-plugin
-Wno-error=free-nonheap-object -Wno-error=return-std-move
-Wno-error=atomic-alignment -Wno-error=deprecated-copy -Wformat
-Wformat-security -Wno-gnu-zero-variadic-macro-arguments -Wno-psabi
-Wthread-safety -Wno-unknown-warning-option -fno-sized-deallocation
-fno-aligned-new -O2 -ffile-prefix-map=/<<PKGBUILDDIR>>=.
-fstack-protector-strong -Wformat -Werror=format-security -fno-exceptions -fPIC
-fno-rtti -ffunction-sections -fdata-sections -fno-exceptions -fno-math-errno
-pthread -pipe -gdwarf-4 -O2 -fomit-frame-pointer -funwind-tables
-Wno-unused-local-typedefs -Wno-deprecated-declarations -Wno-bool-compare
-Wno-unused-but-set-variable -Wno-c++11-narrowing -Wno-implicit-fallthrough
-fno-strict-aliasing -ffp-contract=off -MD -MP -MF
.deps/exploitability_win.o.pp
/<<PKGBUILDDIR>>/toolkit/crashreporter/google-breakpad/src/processor/exploitability_win.cc
toolkit/crashreporter/google-breakpad/src/processor/Unified_cpp_src_processor0.o
In file included from Unified_cpp_client0.cpp:47:
/<<PKGBUILDDIR>>/toolkit/crashreporter/client/ping.cpp:56:3: error: no matching
function for call to 'arc4random_buf'
arc4random_buf(id, sizeof(UUID));
^~~~~~~~~~~~~~
/usr/include/stdlib.h:542:13: note: candidate function not viable: no known
conversion from 'CrashReporter::UUID' to 'void *' for 1st argument; take the
address of the argument with &
extern void arc4random_buf (void *__buf, size_t __size)
^
1 error generated.
make[5]: *** [/<<PKGBUILDDIR>>/config/rules.mk:669: Unified_cpp_client0.o]
Error 1
make[5]: Leaving directory
'/<<PKGBUILDDIR>>/obj-thunderbird/toolkit/crashreporter/client'
make[4]: *** [/<<PKGBUILDDIR>>/config/recurse.mk:72:
toolkit/crashreporter/client/target-objects] Error 2
make[4]: *** Waiting for unfinished jobs....
Cheers
--
Sebastian Ramacher
--- End Message ---
--- Begin Message ---
Source: thunderbird
Source-Version: 1:102.5.0-1
Done: Carsten Schoenert <c.schoen...@t-online.de>
We believe that the bug you reported is fixed in the latest version of
thunderbird, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to 1023...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Carsten Schoenert <c.schoen...@t-online.de> (supplier of updated thunderbird
package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Sat, 15 Nov 2022 19:34:55 +0100
Source: thunderbird
Architecture: source
Version: 1:102.5.0-1
Distribution: unstable
Urgency: medium
Maintainer: Carsten Schoenert <c.schoen...@t-online.de>
Changed-By: Carsten Schoenert <c.schoen...@t-online.de>
Closes: 1023789
Changes:
thunderbird (1:102.5.0-1) unstable; urgency=medium
.
* [2f04265] New upstream version 102.5.0
Fixed CVE issues in upstream version 102.5 (MFSA 2022-49):
CVE-2022-45403: Service Workers might have learned size of cross-origin
media files
CVE-2022-45404: Fullscreen notification bypass
CVE-2022-45405: Use-after-free in InputStream implementation
CVE-2022-45406: Use-after-free of a JavaScript Realm
CVE-2022-45408: Fullscreen notification bypass via windowName
CVE-2022-45409: Use-after-free in Garbage Collection
CVE-2022-45410: ServiceWorker-intercepted requests bypassed SameSite
cookie policy
CVE-2022-45411: Cross-Site Tracing was possible via non-standard
override headers
CVE-2022-45412: Symlinks may resolve to partially uninitialized buffers
CVE-2022-45416: Keystroke Side-Channel Leakage
CVE-2022-45418: Custom mouse cursor could have been drawn over
browser UI
CVE-2022-45420: Iframe contents could be rendered outside the iframe
CVE-2022-45421: Memory safety bugs fixed in Thunderbird 102.5
* [57e94ac] Rebuild patch queue from patch-queue branch
Added patches:
fixes/Bug-1782988-Avoid-build-bustage-when-building-against-gli.patch
fixes/Bug-1782988-Fix-use-of-arc4random_buf-use-in-ping.cpp.-r-.patch
(Closes: #1023789)
Checksums-Sha1:
89349c1f378166181f3a96af91a167f210d6b7b9 8494 thunderbird_102.5.0-1.dsc
a154b8d6e96b9449c2f3d7c8153676b7b8692b98 12288628
thunderbird_102.5.0.orig-thunderbird-l10n.tar.xz
0dd6f058be5fe468e05600f7b5583e854fcfe62a 523883664
thunderbird_102.5.0.orig.tar.xz
8ee56e0b945f735028583978c74c8dac1d541163 546940
thunderbird_102.5.0-1.debian.tar.xz
2ae5a9358c0be09d67366d7cde77f30360e2f7f1 37484
thunderbird_102.5.0-1_amd64.buildinfo
Checksums-Sha256:
f6705b5275d0b7de9f356a0096f27411fbf6bfc8ebf1fa3c1a65f71886a5b367 8494
thunderbird_102.5.0-1.dsc
9fce769c70b198b568feaffc4be9e6ad64311338c1bb0ee250dd19d233548096 12288628
thunderbird_102.5.0.orig-thunderbird-l10n.tar.xz
f16d428c88f3e05ffec834eaa0d359a93edd0367a283c3d111bef382fad2e191 523883664
thunderbird_102.5.0.orig.tar.xz
70fd662df8c343b41a5501f413d6adce831904e86107b85fc2ebfbb4b00a0414 546940
thunderbird_102.5.0-1.debian.tar.xz
c8a42ed02b4141404b3d02f553b3c5020486454b4a54dda301df3f9db463c52d 37484
thunderbird_102.5.0-1_amd64.buildinfo
Files:
d91a258b41e218d54cba893235c4bcdd 8494 mail optional thunderbird_102.5.0-1.dsc
8cbd2ee4e9173277fcec58001f679f8a 12288628 mail optional
thunderbird_102.5.0.orig-thunderbird-l10n.tar.xz
7ee2ef2bc9bb11e27d4c882ed4dcfc32 523883664 mail optional
thunderbird_102.5.0.orig.tar.xz
4498536f2ddff0e9ed8672d89be10504 546940 mail optional
thunderbird_102.5.0-1.debian.tar.xz
77d139f901c43e35f6f57a0cc225fb5d 37484 mail optional
thunderbird_102.5.0-1_amd64.buildinfo
-----BEGIN PGP SIGNATURE-----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=05DS
-----END PGP SIGNATURE-----
--- End Message ---