Your message dated Sun, 06 Dec 2009 18:50:49 +0000
with message-id <[email protected]>
and subject line Bug#554448: fixed in cppcheck 1.39-1
has caused the Debian Bug report #554448,
regarding cppcheck: false positive and false negative in resource leak check
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
554448: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=554448
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: cppcheck
Version: 1.38-1

Hi,

The attached example demonstrates a false positive and false negative I found 
in cppcheck.

Cheers,
-- 
Raphael Geissert - Debian Developer
www.debian.org - get.debian.net
void c_open(void)
{
        int f, fd = -1;

        for (f = 0; f < 5; f++) {
                if ((fd = open("/dev/null", O_RDONLY)) >= 0) break;
        }
}

--- End Message ---
--- Begin Message ---
Source: cppcheck
Source-Version: 1.39-1

We believe that the bug you reported is fixed in the latest version of
cppcheck, which is due to be installed in the Debian FTP archive:

cppcheck_1.39-1.diff.gz
  to main/c/cppcheck/cppcheck_1.39-1.diff.gz
cppcheck_1.39-1.dsc
  to main/c/cppcheck/cppcheck_1.39-1.dsc
cppcheck_1.39-1_i386.deb
  to main/c/cppcheck/cppcheck_1.39-1_i386.deb
cppcheck_1.39.orig.tar.gz
  to main/c/cppcheck/cppcheck_1.39.orig.tar.gz



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Reijo Tomperi <[email protected]> (supplier of updated cppcheck 
package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.8
Date: Sun, 06 Dec 2009 16:20:47 +0200
Source: cppcheck
Binary: cppcheck
Architecture: source i386
Version: 1.39-1
Distribution: unstable
Urgency: low
Maintainer: Reijo Tomperi <[email protected]>
Changed-By: Reijo Tomperi <[email protected]>
Description: 
 cppcheck   - Tool for static C/C++ code analysis
Closes: 554448
Changes: 
 cppcheck (1.39-1) unstable; urgency=low
 .
   * New upstream release
   * False positive with resource leak fixed. Closes: #554448
Checksums-Sha1: 
 e99afc856267de6b231fe8eaf0b5a791a64aac06 1677 cppcheck_1.39-1.dsc
 c24ce0202bf91b31dfc83750d40da3395f80d14f 478836 cppcheck_1.39.orig.tar.gz
 f9d39f5de43a97f0208ea876a91e0cb83d4cddd0 3839 cppcheck_1.39-1.diff.gz
 8d9dc22b0dd012df5e9b52eff748f5a92cac8e99 314822 cppcheck_1.39-1_i386.deb
Checksums-Sha256: 
 9efd13a01f3704ddf86b44244da29858b608d87e712c4b7cc69a3afbda63eb1d 1677 
cppcheck_1.39-1.dsc
 d44376587d532f4236224f6da2617e047d3850f5b165c5d829af304f14b594db 478836 
cppcheck_1.39.orig.tar.gz
 19956800a436efab8bc7a245441eb726f29f322e8f906e8260bf9fa146edcd63 3839 
cppcheck_1.39-1.diff.gz
 d19536992c4fdcd16ebf1ec2ac6dea6eb6a98a3ac545b7f88b842877fcab870b 314822 
cppcheck_1.39-1_i386.deb
Files: 
 97fb5d5d458cdc2e1e7aa80c194931e0 1677 devel optional cppcheck_1.39-1.dsc
 d59b76739189a18b5e839729676abf6c 478836 devel optional 
cppcheck_1.39.orig.tar.gz
 22d08a38c21df1bacb08dfc943927fe6 3839 devel optional cppcheck_1.39-1.diff.gz
 8b58502f0eba524008993fe5f2c7dae0 314822 devel optional cppcheck_1.39-1_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)

iQIcBAEBAgAGBQJLG/EbAAoJEBxXDIkOS9CrwbQP/jfBbnFRdeYRkzp/L+781uga
n8+8h0qONtHHX0HA2AWc0Ey5DWSKaz63Yh/nzRvJRFaNV4D+nt3BtcbEUrO6VM8R
+5sEYYEFuVJ7/LvGIqThr/avF9UkNQMj1SpFvNk3bfgLiwCG6V/LU1dNzwNy9+2b
csjw65jhXGmU/MnCFtrBwruEe38dfFBufI97n1TzEGa4uqpLkCCst0fy/g+HmGHE
RSj63cDPxESGYGl27k29hAb/DQT2v3Trp00oi2SbO6X7G5k7Xj+fQVsanXFz2xUa
6X/WKA7puBHY7v9/Fcq+ulS+yXPatpG8HnD0VoSGZgZab4iwbZ9Ppi7/zR23zAJs
Qk9gUdPkHr1+UEhIxKKbKdTiJ6s3vz9ukPFgvR5PeK4MtBa4HgXG3816CoA7eY3x
5ZkvhebON2Gwv5UE96Nd1RUCr1NZ4XLDNQ0efWaX23Mn/dFHwk8Nq9J26c8KrKP4
03vEo8u+F0S7NZLn03/zuv1VXZGxP/qbInKcfMZDf/f+ooxhjeQ1XQEJbUzCdwlt
bwiX5djPm3bDFygZeXoyb/hdLFAa+pMq5VoNGLFaJLOXmTppNuRDJzp+LJ4iTl/c
m8NkMhVZUrPDXZqaT92TfIew9vqc6OF8cCoHcMLXOEcY8BhTImW2axtOlpxgLoeP
Q1bPawiGAKvVhWrHmwXP
=jMyE
-----END PGP SIGNATURE-----



--- End Message ---

Reply via email to