Your message dated Tue, 27 Feb 2024 02:58:25 +0000
with message-id <e1renfl-00gvf9...@fasolo.debian.org>
and subject line Bug#1060459: fixed in scalpel 1.60+git20240110.6960eb2-1
has caused the Debian Bug report #1060459,
regarding scalpel: Scalpel not working on Apple Silicon
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1060459: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1060459
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: scalpel
Version: 1.60-10
Severity: grave
Tags: patch
Justification: renders package unusable
X-Debbugs-Cc: goldenrich...@gmail.com

Dear Maintainer,

   * What led up to the situation?

I am the author of Scalpel.  Execution of Scalpel 1.60 (the version
that is currently in the scalpel package on Debian et al) fails
completely on VMs hosted on Apple Silicon because of some
long-standing memory corruption bugs.  It may also work incorrectly on
other platforms.

   * What exactly did you do (or not do) that was effective (or
     ineffective)?

I have placed updated source distros for Scalpel 1.60 as well as the
newer (and more powerful) Scalpel 2.02 on GitHub via
https://github.com/nolaforensix/scalpel-1.60 and
https://github.com/nolaforensix/scalpel-2.02.  My recommendation is to
rebuild the 1.60 package from the updated source and also consdering
adding 2.02.

   * What was the outcome of this action?

Scalpel is broken and I fixed it :)

   * What outcome did you expect instead?

N/A?


-- System Information:
Distributor ID: Kali
Description:    Kali GNU/Linux Rolling
Release:        2023.4
Codename:       kali-rolling
Architecture: x86_64

Kernel: Linux 6.5.0-kali3-amd64 (SMP w/4 CPU threads; PREEMPT)
Locale: LANG=C.UTF-8, LC_CTYPE=C.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages scalpel depends on:
ii  libc6  2.37-12

scalpel recommends no packages.

scalpel suggests no packages.

-- no debconf information

--- End Message ---
--- Begin Message ---
Source: scalpel
Source-Version: 1.60+git20240110.6960eb2-1
Done: Arnaud Rebillout <arna...@kali.org>

We believe that the bug you reported is fixed in the latest version of
scalpel, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1060...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Arnaud Rebillout <arna...@kali.org> (supplier of updated scalpel package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Tue, 27 Feb 2024 08:40:12 +0700
Source: scalpel
Architecture: source
Version: 1.60+git20240110.6960eb2-1
Distribution: unstable
Urgency: medium
Maintainer: Debian Security Tools <team+pkg-secur...@tracker.debian.org>
Changed-By: Arnaud Rebillout <arna...@kali.org>
Closes: 1060459
Changes:
 scalpel (1.60+git20240110.6960eb2-1) unstable; urgency=medium
 .
   * Update upstream URLs
   * New upstream version 1.60+git20240110.6960eb2 (Closes: #1060459)
   * Drop patches applied upstream
   * Misc updates: README was renamed, update author email address
Checksums-Sha1:
 97968e23da18a2e82e1befdd5e933613056d52ed 2051 
scalpel_1.60+git20240110.6960eb2-1.dsc
 e421896c4c5ff1ae2f0ba53d7a4be08be807aac3 60680 
scalpel_1.60+git20240110.6960eb2.orig.tar.xz
 7d05b5c7b03dfa43378810daaa474e96cfb737a2 20412 
scalpel_1.60+git20240110.6960eb2-1.debian.tar.xz
 8a3098b6f878f26e2fa6d8e0df17c13be227b2d8 6512 
scalpel_1.60+git20240110.6960eb2-1_source.buildinfo
Checksums-Sha256:
 e5c3ba48c3004e43fcf1fed5b2b97f61b2e2099ef243c10233917d2e41504cdb 2051 
scalpel_1.60+git20240110.6960eb2-1.dsc
 f5f272367e9409feb6a2a5429683a00c00f888e4bd4314ffad35b09f61bdf6d8 60680 
scalpel_1.60+git20240110.6960eb2.orig.tar.xz
 de0048ea47c303d3fc5f22aac276cdce8bb74b3f8f9f633c750b0370240aa7d7 20412 
scalpel_1.60+git20240110.6960eb2-1.debian.tar.xz
 4afa6b928163f07db4975142863591b69f1ccdc62b76706a65cec5c7e0cc4d7b 6512 
scalpel_1.60+git20240110.6960eb2-1_source.buildinfo
Files:
 125bedadbeb8b17aa5b311c2a7fba64e 2051 utils optional 
scalpel_1.60+git20240110.6960eb2-1.dsc
 e7f8c093dde48855247e0c78109e2403 60680 utils optional 
scalpel_1.60+git20240110.6960eb2.orig.tar.xz
 caa8159fde7ef6d7f75606839f30599c 20412 utils optional 
scalpel_1.60+git20240110.6960eb2-1.debian.tar.xz
 c5013b82497a040cfaa5bbadbf08f84e 6512 utils optional 
scalpel_1.60+git20240110.6960eb2-1_source.buildinfo

-----BEGIN PGP SIGNATURE-----
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=4cFA
-----END PGP SIGNATURE-----

Attachment: pgpU2klZ22WCg.pgp
Description: PGP signature


--- End Message ---

Reply via email to