DKIM-Filter: OpenDKIM Filter v2.11.0 delorie.com 44SFFonp1270829 Authentication-Results: delorie.com; dkim=pass (1024-bit key, unprotected) header.d=cygwin.com header.i=@cygwin.com header.a=rsa-sha256 header.s=default header.b=WhSHD02+ X-Recipient: archive-cygwin AT delorie DOT com DKIM-Filter: OpenDKIM Filter v2.11.0 sourceware.org 98140384AB4C DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cygwin.com; s=default; t=1716909349; bh=PLk59oL2rEoTsGtvno5io5jmHArx5MOuBSfuqIZ035I=; h=To:Subject:In-Reply-To:References:Date:List-Id:List-Unsubscribe: List-Archive:List-Post:List-Help:List-Subscribe:From:Reply-To: From; b=WhSHD02+pP9xhfmaqNAiYcKMOUawEMWhxaELq2wLsTg7lVjR3VDo9VU5ocoHayZWb Fy0KnsEZzZ4adgM5W0A7Zq8nh70zjMbP28Vi6tUzXA/Wt2XVccehjpKt7HCI9GMzIB IH798fQ0nkmraKjado4rj6bGkjykVYRn29Rklzvc= X-Original-To: cygwin AT cygwin DOT com Delivered-To: cygwin AT cygwin DOT com DMARC-Filter: OpenDMARC Filter v1.4.2 sourceware.org DAE193858408 ARC-Filter: OpenARC Filter v1.0.0 sourceware.org DAE193858408 ARC-Seal: i=1; a=rsa-sha256; d=sourceware.org; s=key; t=1716909327; cv=none; b=hi6J/gn5tuQZtROmAn4q3gMjNBOwiH4pr0iiep6PSYgutSQTQvRpDHk9fnDxoOKiwMmeLgPypNY7+C5ApRU5sp7L+d5561VZ6IT3V/YKsxl2BzeieddZlOcdp8zBvmiaD21Kg2r3U5JS7yymu47zT3qnLtdPNddeH1qoqeVI0z8= ARC-Message-Signature: i=1; a=rsa-sha256; d=sourceware.org; s=key; t=1716909327; c=relaxed/simple; bh=sdVb9aCUnzVnx3glMXpIqNB1/6xAxP/KUL3wDjYsYAs=; h=DKIM-Signature:From:To:Subject:Date:Message-ID:MIME-Version; b=pwVPa/SNm79qBFSZsfAnvwS3fmxVZLq+S10aZQsUcsrlG4D6A7QUs6TCzxydu6MFcOxL99pJ7FCf1v/tjeImZtHN4SujgWrJ9gvLrGfaJuMzTnAktg4svGtakl+lhGO88dHjY+yVegGAM7ze4pgptJF954tgDyE9dUK0dFktDLE= ARC-Authentication-Results: i=1; server2.sourceware.org To: cygwin AT cygwin DOT com Subject: Re: new git update fails with fatal: fetch-pack: invalid index-pack output In-Reply-To: (Adam Dinwoodie via Cygwin's message of "Sun, 26 May 2024 13:03:27 +0100") References: Date: Tue, 28 May 2024 17:15:13 +0200 Message-ID: <87v82ynf26.fsf@Gerda.invalid> User-Agent: Gnus/5.13 (Gnus v5.13) MIME-Version: 1.0 X-purgate-type: clean X-purgate: clean X-purgate-size: 802 X-purgate-ID: 155817::1716909320-907EFB9B-4E375612/0/0 X-Spam-Status: No, score=-3028.4 required=5.0 tests=BAYES_00, DKIM_SIGNED, DKIM_VALID, DKIM_VALID_AU, DKIM_VALID_EF, RCVD_IN_BARRACUDACENTRAL, RCVD_IN_DNSWL_LOW, SPF_HELO_NONE, SPF_PASS, TXREP, T_SCC_BODY_TEXT_LINE autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on server2.sourceware.org X-BeenThere: cygwin AT cygwin DOT com X-Mailman-Version: 2.1.30 Precedence: list List-Id: General Cygwin discussions and problem reports List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , From: ASSI via Cygwin Reply-To: ASSI Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Errors-To: cygwin-bounces+archive-cygwin=delorie DOT com AT cygwin DOT com Sender: "Cygwin" Adam Dinwoodie via Cygwin writes: > Thanks for the report. This is working fine for me locally. Can you > please upgrade, check the problem is still recurring, and provide the > output from `cygcheck -srv >cygcheck.out`? This issue is most likely an upstream regression that was either introduced among some security fixes that were less widely checked due to disclosure embargo in 2.45 or else an earlier regression in 2.42 that disabled the use of some deprecated OpenSSL3 functions (and missing one or two instances of code that still need the functionality in certain cases). Regards, Achim. -- +<[Q+ Matrix-12 WAVE#46+305 Neuron microQkb Andromeda XTk Blofeld]>+ SD adaptations for Waldorf Q V3.00R3 and Q+ V3.54R2: http://Synth.Stromeko.net/Downloads.html#WaldorfSDada -- Problem reports: https://cygwin.com/problems.html FAQ: https://cygwin.com/faq/ Documentation: https://cygwin.com/docs.html Unsubscribe info: https://cygwin.com/ml/#unsubscribe-simple