Your message dated Mon, 17 Aug 2015 17:05:02 +0000
with message-id <e1zrnqi-00032v...@franck.debian.org>
and subject line Bug#795879: fixed in curlftpfs 0.9.2-9
has caused the Debian Bug report #795879,
regarding curlftpfs misbuilds on 64-bit architectures (missing getpass 
prototype)
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
795879: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=795879
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: curlftpfs
Version: 0.9.2-8
Severity: serious

The latest version of curlftpfs is misbuilding on 64-bit architectures, due
to a missing prototype for the getpass() function:

ftpfs.c: In function 'checkpasswd':
ftpfs.c:1691:5: warning: implicit declaration of function 'getpass' 
[-Wimplicit-function-declaration]
     passwd = getpass(prompt);
     ^
ftpfs.c:1691:12: warning: assignment makes pointer from integer without a cast 
[enabled by default]
     passwd = getpass(prompt);
            ^

(https://buildd.debian.org/status/fetch.php?pkg=curlftpfs&arch=s390x&ver=0.9.2-8&stamp=1400148134)

This error was detected by the Ubuntu buildds, where such wrong casts are
treated as fatal errors, but the problem is present on Debian as well.

I'm not sure why this problem was not seen in version 0.9.2-7, but it's
definitely a new issue between -7 and -8.  So either this is a regression
in the curlftpfs source or a regression caused by a change in behavior of
the system headers.

I'm filing this bug at severity: serious because this is a latent crasher
bug (truncating a pointer and then dereferencing it will give a segfault,
and this will happen on at least some 64-bit architectures).  However, it's
possible that the particular crash is in an uncommon code path in which case
you may prefer to downgrade the bug severity.

-- 
Steve Langasek                   Give me a lever long enough and a Free OS
Debian Developer                   to set it on, and I can move the world.
Ubuntu Developer                                    http://www.debian.org/
slanga...@ubuntu.com                                     vor...@debian.org

Attachment: signature.asc
Description: Digital signature


--- End Message ---
--- Begin Message ---
Source: curlftpfs
Source-Version: 0.9.2-9

We believe that the bug you reported is fixed in the latest version of
curlftpfs, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 795...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Vincent Bernat <ber...@debian.org> (supplier of updated curlftpfs package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Mon, 17 Aug 2015 18:51:14 +0200
Source: curlftpfs
Binary: curlftpfs
Architecture: source amd64
Version: 0.9.2-9
Distribution: unstable
Urgency: medium
Maintainer: Vincent Bernat <ber...@debian.org>
Changed-By: Vincent Bernat <ber...@debian.org>
Description:
 curlftpfs  - filesystem to access FTP hosts based on FUSE and cURL
Closes: 795879
Changes:
 curlftpfs (0.9.2-9) unstable; urgency=medium
 .
   * Avoid unsafe cast for getpass() on 64-bit archs. Closes: #795879.
   * Bump Standards-Version to 3.9.6.
Checksums-Sha1:
 5b52d1817d139af57d85393a48283f908001b589 1986 curlftpfs_0.9.2-9.dsc
 9d42b36a9a438b5cbab9e50140f97f6d0026930c 5000 curlftpfs_0.9.2-9.debian.tar.xz
 8daa14d2d6c2297ea97da6f825e3fd436924dbec 30724 curlftpfs_0.9.2-9_amd64.deb
Checksums-Sha256:
 2926eeeb10d5d2492f66d76fe8ac72c1bbe4d98a2a3f37b99ea797eee5161df6 1986 
curlftpfs_0.9.2-9.dsc
 7c5bdfd026eda6d156445964553bf9e7cf9315be4a5aa54125e1fe653236da1a 5000 
curlftpfs_0.9.2-9.debian.tar.xz
 51c0dbdca6ee471fc04c1230380d273a09131b6c524d2ea3a9cc11911104eea1 30724 
curlftpfs_0.9.2-9_amd64.deb
Files:
 b940149b7a9765ae25610e0b2cf52998 1986 utils optional curlftpfs_0.9.2-9.dsc
 9cb02c6b981362d3b1e11219221bb6ff 5000 utils optional 
curlftpfs_0.9.2-9.debian.tar.xz
 f62d8660ad5a8e0ae4744475591e0e92 30724 utils optional 
curlftpfs_0.9.2-9_amd64.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=8Cp8
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to