apt-clone crashed with OverflowError in pulse(): Python int too large to convert to C long

Bug #795853 reported by Bala Venkata Krishna P
10
This bug affects 1 person
Affects Status Importance Assigned to Milestone
apt-clone (Ubuntu)
Invalid
Undecided
Unassigned

Bug Description

Binary package hint: apt-clone

Came when I made up gradation.

ProblemType: Crash
DistroRelease: Ubuntu 11.04
Package: apt-clone 0.1.6
ProcVersionSignature: Ubuntu 2.6.38-8.42-generic 2.6.38.2
Uname: Linux 2.6.38-8-generic i686
NonfreeKernelModules: wl
Architecture: i386
Date: Sat Jun 11 13:09:13 2011
ExecutablePath: /usr/bin/apt-clone
InterpreterPath: /usr/bin/python2.7
LiveMediaBuild: Ubuntu 11.04 "Natty Narwhal" - Release i386 (20110427.1)
PackageArchitecture: all
ProcCmdline: /usr/bin/python /usr/bin/apt-clone restore-new-distro /target/ubiquity-apt-clone/apt-clone-state-hostname.tar.gz natty --destination /target
ProcEnviron:
 LANGUAGE=en_US:en
 PATH=(custom, no user)
 LANG=en_US.UTF-8
 SHELL=/bin/bash
 LC_COLLATE=C
PythonArgs: ['/usr/bin/apt-clone', 'restore-new-distro', '/target/ubiquity-apt-clone/apt-clone-state-hostname.tar.gz', 'natty', '--destination', '/target']
SourcePackage: apt-clone
Title: apt-clone crashed with OverflowError in pulse(): Python int too large to convert to C long
Traceback:
 Traceback (most recent call last):
   File "/usr/lib/python2.7/dist-packages/apt/progress/text.py", line 166, in pulse
     apt_pkg.time_to_str(eta))
 OverflowError: Python int too large to convert to C long
UpgradeStatus: No upgrade log present (probably fresh install)
UserGroups:

Revision history for this message
Bala Venkata Krishna P (pbvkrishna) wrote :
tags: removed: need-duplicate-check
Revision history for this message
RedSingularity (redsingularity) wrote :

Thanks for taking the time to report this bug and helping to make Ubuntu better. We appreciate the difficulties you are facing, but this appears to be a "regular" (non-security) bug. I have unmarked it as a security issue since this bug does not show evidence of allowing attackers to cross privilege boundaries nor directly cause loss of data/privacy.
---
Ubuntu Bug Squad volunteer triager
http://wiki.ubuntu.com/BugSquad

visibility: private → public
security vulnerability: yes → no
Revision history for this message
dino99 (9d9) wrote :

This version has expired long ago; no more supported

Changed in apt-clone (Ubuntu):
status: New → Invalid
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.