Synced 2.71-1
** Changed in: nickle (Ubuntu)
Status: Incomplete => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/721636
Title:
nickle crashes on amd64 natty
To manage notificat
** Changed in: nickle (Debian)
Status: New => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/721636
Title:
nickle crashes on amd64 natty
To manage notifications about this bug go
Notes from the Debian bug:
On Sat, 2011-11-26 at 10:14 -0800, Keith Packard wrote:
Package: nickle
> Version: 2.71-1
>
> On Sat, 26 Nov 2011 08:46:20 -0800, Kamal Mostafa wrote:
> > Michael Terry's strncpy patch is still probably a good idea though, so
> > leaving this bug open for maintainer re
I confirm that nickle 2.71-1 from Debian unstable fixes the problem (it
runs properly even with _FORTIFY_SOURCE).
A no-change build of nickle 2.71-1 is available in my PPA:
https://launchpad.net/~kamalmostafa/+archive/nickle
@Michael, I suggest dropping your patch and sync'ing 2.71-1 into
Precise
Update: Keith has uploaded nickle-2.71-1 to Debian to address this
issue.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/721636
Title:
nickle crashes on amd64 natty
To manage notifications about thi
Hi Michael-
I discussed the problem with the author of nickle (Keith Packard) in
2011-09 and he determined that there were other places in the code that
would trigger the same type of failure at runtime, if presented with
certain inputs. The NewStrString instance is most obvious since it
happened
** Changed in: nickle (Debian)
Status: Unknown => New
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/721636
Title:
nickle crashes on amd64 natty
To manage notifications about this bug go to:
** Branch linked: lp:ubuntu/nickle
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/721636
Title:
nickle crashes on amd64 natty
To manage notifications about this bug go to:
https://bugs.launchpad.net
This bug was fixed in the package nickle - 2.70-1ubuntu1
---
nickle (2.70-1ubuntu1) precise; urgency=low
* string.c:
- Use strncpy instead of strcpy to avoid 'overflow detected' crashes.
LP: #721636
-- Michael TerryMon, 21 Nov 2011 11:23:12 -0600
** Changed in: nickl
** Bug watch added: Debian Bug tracker #649506
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=649506
** Also affects: nickle (Debian) via
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=649506
Importance: Unknown
Status: Unknown
--
You received this bug notification because yo
Karmal, I'd prefer not to just disable FORTIFY_SOURCE. It is a useful
flag. Wouldn't it be better to use strncpy instead of strcpy and such
as indicated on https://wiki.ubuntu.com/ToolChain/CompilerFlags ?
I'm looking into a patch that does that. But you mention multiple
similar constructs? I
This patch just disables _FORTIFY_SOURCE, which will resolve other
instances of the same problematic construct which appear in other places
in nickle. This patch fixes nickle's crash(es) and is sufficient to
close this bug.
** Patch added: "nickle-disable-fortify.patch"
https://bugs.launchpa
A fixed installable nickle package (built with _FORTIFY_SOURCE disabled) is now
available in my PPA:
https://launchpad.net/~kamalmostafa/+archive/nickle
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/7
The attachment "fix-buffer-overflow-detected-crash.patch" of this bug
report has been identified as being a patch. The ubuntu-reviewers team
has been subscribed to the bug report so that they can review the patch.
In the event that this is in fact not a patch you can resolve this
situation by remo
Note: similar constructs appear elsewhere in the code. A more general
fix is now in the works by the author. In the meantime building with
-U_FORTIFY_SOURCE might be the best solution.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
Attached patch fixes the problem, described in more detail here:
https://wiki.ubuntu.com/CompilerFlags (see "*** buffer overflow
detected ***").
** Patch removed: "fix-buffer-overflow-detected-crash.patch"
https://bugs.launchpad.net/ubuntu/+source/nickle/+bug/721636/+attachment/2478323/+file
Attached patch fixes the crash.
** Changed in: nickle (Ubuntu)
Assignee: (unassigned) => Kamal Mostafa (kamalmostafa)
** Patch added: "fix-buffer-overflow-detected-crash.patch"
https://bugs.launchpad.net/ubuntu/+source/nickle/+bug/721636/+attachment/2478323/+files/fix-buffer-overflow-det
** Changed in: nickle (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/721636
Title:
nickle crashes on amd64 natty
--
ubuntu-bugs mailing list
ubuntu-bugs@lis
** Attachment added: "nickle output"
https://bugs.launchpad.net/bugs/721636/+attachment/1859132/+files/nickle-crash.txt
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/721636
Title:
nickle crashes
19 matches
Mail list logo