Your message dated Mon, 17 Aug 2015 17:05:02 +0000 with message-id <e1zrnqi-00032v...@franck.debian.org> and subject line Bug#795879: fixed in curlftpfs 0.9.2-9 has caused the Debian Bug report #795879, regarding curlftpfs misbuilds on 64-bit architectures (missing getpass prototype) to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 795879: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=795879 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems
--- Begin Message ---Package: curlftpfs Version: 0.9.2-8 Severity: serious The latest version of curlftpfs is misbuilding on 64-bit architectures, due to a missing prototype for the getpass() function: ftpfs.c: In function 'checkpasswd': ftpfs.c:1691:5: warning: implicit declaration of function 'getpass' [-Wimplicit-function-declaration] passwd = getpass(prompt); ^ ftpfs.c:1691:12: warning: assignment makes pointer from integer without a cast [enabled by default] passwd = getpass(prompt); ^ (https://buildd.debian.org/status/fetch.php?pkg=curlftpfs&arch=s390x&ver=0.9.2-8&stamp=1400148134) This error was detected by the Ubuntu buildds, where such wrong casts are treated as fatal errors, but the problem is present on Debian as well. I'm not sure why this problem was not seen in version 0.9.2-7, but it's definitely a new issue between -7 and -8. So either this is a regression in the curlftpfs source or a regression caused by a change in behavior of the system headers. I'm filing this bug at severity: serious because this is a latent crasher bug (truncating a pointer and then dereferencing it will give a segfault, and this will happen on at least some 64-bit architectures). However, it's possible that the particular crash is in an uncommon code path in which case you may prefer to downgrade the bug severity. -- Steve Langasek Give me a lever long enough and a Free OS Debian Developer to set it on, and I can move the world. Ubuntu Developer http://www.debian.org/ slanga...@ubuntu.com vor...@debian.org
signature.asc
Description: Digital signature
--- End Message ---
--- Begin Message ---Source: curlftpfs Source-Version: 0.9.2-9 We believe that the bug you reported is fixed in the latest version of curlftpfs, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 795...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Vincent Bernat <ber...@debian.org> (supplier of updated curlftpfs package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@ftp-master.debian.org) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Format: 1.8 Date: Mon, 17 Aug 2015 18:51:14 +0200 Source: curlftpfs Binary: curlftpfs Architecture: source amd64 Version: 0.9.2-9 Distribution: unstable Urgency: medium Maintainer: Vincent Bernat <ber...@debian.org> Changed-By: Vincent Bernat <ber...@debian.org> Description: curlftpfs - filesystem to access FTP hosts based on FUSE and cURL Closes: 795879 Changes: curlftpfs (0.9.2-9) unstable; urgency=medium . * Avoid unsafe cast for getpass() on 64-bit archs. Closes: #795879. * Bump Standards-Version to 3.9.6. Checksums-Sha1: 5b52d1817d139af57d85393a48283f908001b589 1986 curlftpfs_0.9.2-9.dsc 9d42b36a9a438b5cbab9e50140f97f6d0026930c 5000 curlftpfs_0.9.2-9.debian.tar.xz 8daa14d2d6c2297ea97da6f825e3fd436924dbec 30724 curlftpfs_0.9.2-9_amd64.deb Checksums-Sha256: 2926eeeb10d5d2492f66d76fe8ac72c1bbe4d98a2a3f37b99ea797eee5161df6 1986 curlftpfs_0.9.2-9.dsc 7c5bdfd026eda6d156445964553bf9e7cf9315be4a5aa54125e1fe653236da1a 5000 curlftpfs_0.9.2-9.debian.tar.xz 51c0dbdca6ee471fc04c1230380d273a09131b6c524d2ea3a9cc11911104eea1 30724 curlftpfs_0.9.2-9_amd64.deb Files: b940149b7a9765ae25610e0b2cf52998 1986 utils optional curlftpfs_0.9.2-9.dsc 9cb02c6b981362d3b1e11219221bb6ff 5000 utils optional curlftpfs_0.9.2-9.debian.tar.xz f62d8660ad5a8e0ae4744475591e0e92 30724 utils optional curlftpfs_0.9.2-9_amd64.deb -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBCAAGBQJV0hHnAAoJEJWkL+g1NSX59+IP/3c3qgsQ9tI3x8Bt+gcn33rY u/sxM+xj8Bzr/B4ji5tuE6Bp/QeoIMFkkIimqClU5jDRBmSVwvDHTfvLqAaKSME8 8kp06VQV7IkSo64hPd4m/6EqhbLB3Bz3OLX8BjkdDuuYMaD17iPQQdUpRo1JCthP SL1G72y5vIurPdXy5jOoniLYfBQYMep5z6mEV8qkZ7vpk/bwjbp8JEKJQNYIOL97 43JR0HyhtbHdDMSTj9hBVTcQjPoqMOc4Jn3jQrMpeNx6YRniJwZ00oVVPgnFpdNQ NZ4B9K42+Khy9pBn/sGndPH0XiPBUylRxHO5H1bJ5aYeaScHt20tgboa11NeE7Y9 uYyw6GlqYdhdutad0ON/mJI0YjDB1AqtDoJzVqr8eo/JnkqOMxKYxSdfi0W71CUj wtOx9/6VDNoaHU3bCRK5/7PobMF3sWfJCMlqwwq1mB0XZDRKOhk6kt875HIVDS1n CuIi8kQT13njVi8REQU2HwMob6VS4vEyoY0P1vVuyv/i5/jJm+Qq9ymlxP2TZYdB b/eOShW4lO+NSwa0P9Zvs0MCHAHnm8tq79az8Wp2lyxE1JRulCX7pa1BGhBrrGlI j0MDCeSlK0avztpZdS9JH9ZF62pNceWssIDl+bGrIRtIQiEWXuLodkDZl8tiYokx zV6I/UV6iTlnBoDxRpW1 =8Cp8 -----END PGP SIGNATURE-----
--- End Message ---