[SRU] Segfault (double free or corruption) in siege

Bug #74668 reported by ville palo
4
Affects Status Importance Assigned to Milestone
siege (Ubuntu)
Fix Released
Undecided
Tollef Fog Heen

Bug Description

Original bug report: bug #67553 double free or corruption in siege
Debian bug report: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=385295

Always when you tried to use siege for example:
'siege -u launchpad.net' siege segfaulted immediately. So currently, user
cannot not use siege at all on edgy.

Fix attached, is already included in current feisty package (2.65-4), but
in order to give users a possibility to use siege on edgy, is should also
be included in edgy package (2.65-2).

ville palo (vi64pa)
Changed in siege:
assignee: nobody → vi64pa
Revision history for this message
ville palo (vi64pa) wrote :

debdiff attached.

Revision history for this message
Colin Watson (cjwatson) wrote :

Approved for edgy-proposed. By the way, 2.65-2ubuntu0.1 is over-cautious as a version number; 2.65-2ubuntu1 would be fine, since that version has never otherwise existed and the version in feisty is already newer.

Changed in siege:
status: Unconfirmed → Confirmed
Revision history for this message
ville palo (vi64pa) wrote :

subscribed ubuntu-main-sponsors

Revision history for this message
Daniel T Chen (crimsun) wrote :

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Wed, 6 Dec 2006 19:10:08 +0200
Source: siege
Binary: siege
Architecture: source
Version: 2.65-2ubuntu1~proposed1
Distribution: edgy-proposed
Urgency: low
Maintainer: Ryszard Lach <email address hidden>
Changed-By: ville palo <email address hidden>
Description:
 siege - Http regression testing and benchmarking utility
Changes:
 siege (2.65-2ubuntu1~proposed1) edgy-proposed; urgency=low
 .
   * Applied patch from debian 2.65-3 package
     - Closes Malone #67553 and #74668 (double free corruption in siege)
     - Patch was created by Margarita Manterola
Files:
 cdba1f5e57c2e93a45f2ced628968a15 609 web optional siege_2.65-2ubuntu1~proposed1.dsc
 d34c597e9eb1cf3c1bbe1efc3ba01bab 9553 web optional siege_2.65-2ubuntu1~proposed1.diff.gz

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFFhtele9GwFciKvaMRAtOcAJ0TQq2NO0UL2L4vjqyv3Dq20yj0VgCeKgvA
q/hL9gS7JMv6RiiEEoFvjzE=
=pMMB
-----END PGP SIGNATURE-----

Uploading to ubuntu (via ftp to upload.ubuntu.com):
  siege_2.65-2ubuntu1~proposed1.dsc: done.
  siege_2.65-2ubuntu1~proposed1.diff.gz: done.
  siege_2.65-2ubuntu1~proposed1_source.changes: done.
Successfully uploaded packages.

Revision history for this message
Tollef Fog Heen (tfheen) wrote :

Accepted into edgy-proposed.

Changed in siege:
assignee: vi64pa → tfheen
status: Confirmed → Fix Released
Revision history for this message
Tollef Fog Heen (tfheen) wrote :

Ooops, correct status

Changed in siege:
status: Fix Released → Fix Committed
description: updated
Revision history for this message
Paolo Sammicheli (xdatap1) wrote :

fixed siege version (2.65-2ubuntu1~proposed1) work for me.

thanks

Revision history for this message
Michael Vogt (mvo) wrote :

Thanks for the upload.

I did the verification for this and it is fine. I was able to reproduce the crash with the edgy version and it works fine with the edgy-proposed version.

I set this to verification-done now and its fine to upload to edgy-updates.

Cheers,
 Michael

Revision history for this message
Tollef Fog Heen (tfheen) wrote :

I took the liberty of uploading this into -updates.

Revision history for this message
Martin Pitt (pitti) wrote :

Accepted into edgy-updates.

Changed in siege:
status: Fix Committed → Fix Released
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.