Mathieu Malaterre writes: > Control: reopen -1 > Control: found -1 refdb/1.0.1-1 > > The bug is still there in release 1.0.1: > > https://buildd.debian.org/status/fetch.php?pkg=refdb&arch=i386&ver=1.0.1-1&stamp=1391636439 > > gcc -DPACKAGE_NAME=\"refdb\" -DPACKAGE_TARNAME=\"refdb\" > -DPACKAGE_VERSION=\"1.0.1\" -DPACKAGE_STRING=\"refdb\ 1.0.1\" > -DPACKAGE_BUGREPORT=\"\" -DPACKAGE_URL=\"\" -DPACKAGE=\"refdb\" > -DVERSION=\"1.0.1\" -D_GNU_SOURCE=1 -DREADLINE42=1 -DHAVE_ICONV=1 > -DSTDC_HEADERS=1 -DHAVE_SYS_TYPES_H=1 -DHAVE_SYS_STAT_H=1 > -DHAVE_STDLIB_H=1 -DHAVE_STRING_H=1 -DHAVE_MEMORY_H=1 > -DHAVE_STRINGS_H=1 -DHAVE_INTTYPES_H=1 -DHAVE_STDINT_H=1 > -DHAVE_UNISTD_H=1 -DHAVE_SOCKLEN_T=1 -DSTDC_HEADERS=1 -DHAVE_FCNTL_H=1 > -DHAVE_LIMITS_H=1 -DHAVE_SYS_FILE_H=1 -DHAVE_SYS_TIME_H=1 > -DHAVE_SYS_IOCTL_H=1 -DHAVE_SYSLOG_H=1 -DHAVE_UNISTD_H=1 > -DTIME_WITH_SYS_TIME=1 -DRETSIGTYPE=void -DHAVE_STRFTIME=1 > -DHAVE_MKFIFO=1 -DHAVE_GETHOSTNAME=1 -DHAVE_SELECT=1 -DHAVE_SOCKET=1 > -DHAVE_STRCSPN=1 -DHAVE_STRSTR=1 -DHAVE_STRTOLL=1 -DHAVE_ATOLL=1 -I. > -DSYSCONFDIR=\"/etc/refdb\" -DULLSPEC=\"%llu\" -D_FORTIFY_SOURCE=2 -g > -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat > -Werror=format-security -O2 -c -o risxhandler.o risxhandler.c > risxhandler.c: In function 'risx_end_handler': > risxhandler.c:794:7: warning: passing argument 2 of 'iconv' from > incompatible pointer type [enabled by default] > if (iconv(ptr_ardata->conv_descriptor, &my_instring, &inlength, > &my_elvalue, &outlength) == (size_t)(-1)) { > ^ > In file included from risxhandler.c:43:0: > /usr/include/iconv.h:42:15: note: expected 'char ** __restrict__' but > argument is of type 'const char **' > extern size_t iconv (iconv_t __cd, char **__restrict __inbuf, > ^ > In file included from /usr/include/string.h:638:0, > from risxhandler.c:39: > In function 'strcpy', > inlined from 'risx_end_handler' at risxhandler.c:1393:12: > /usr/include/i386-linux-gnu/bits/string3.h:104:3: warning: call to > __builtin___memcpy_chk will always overflow destination buffer > [enabled by default] > return __builtin___strcpy_chk (__dest, __src, __bos (__dest)); > ^ > In function 'strcpy', > inlined from 'risx_end_handler' at risxhandler.c:1396:12: > /usr/include/i386-linux-gnu/bits/string3.h:104:3: warning: call to > __builtin___memcpy_chk will always overflow destination buffer > [enabled by default] > return __builtin___strcpy_chk (__dest, __src, __bos (__dest)); > ^ >
I've fixed that bug in svn, see revision 781. I've also uploaded an updated tarball (refdb-1.0.2.tar.gz) to SF. regards, Markus -- Markus Hoenicka http://www.mhoenicka.de AQ score 38 -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org