[xml/sgml-pkgs] Bug#733330: still there

Mathieu Malaterre malat at debian.org
Thu Feb 6 08:24:50 UTC 2014


Control: reopen -1
Control: found -1 refdb/1.0.1-1

The bug is still there in release 1.0.1:

https://buildd.debian.org/status/fetch.php?pkg=refdb&arch=i386&ver=1.0.1-1&stamp=1391636439

gcc -DPACKAGE_NAME=\"refdb\" -DPACKAGE_TARNAME=\"refdb\"
-DPACKAGE_VERSION=\"1.0.1\" -DPACKAGE_STRING=\"refdb\ 1.0.1\"
-DPACKAGE_BUGREPORT=\"\" -DPACKAGE_URL=\"\" -DPACKAGE=\"refdb\"
-DVERSION=\"1.0.1\" -D_GNU_SOURCE=1 -DREADLINE42=1 -DHAVE_ICONV=1
-DSTDC_HEADERS=1 -DHAVE_SYS_TYPES_H=1 -DHAVE_SYS_STAT_H=1
-DHAVE_STDLIB_H=1 -DHAVE_STRING_H=1 -DHAVE_MEMORY_H=1
-DHAVE_STRINGS_H=1 -DHAVE_INTTYPES_H=1 -DHAVE_STDINT_H=1
-DHAVE_UNISTD_H=1 -DHAVE_SOCKLEN_T=1 -DSTDC_HEADERS=1 -DHAVE_FCNTL_H=1
-DHAVE_LIMITS_H=1 -DHAVE_SYS_FILE_H=1 -DHAVE_SYS_TIME_H=1
-DHAVE_SYS_IOCTL_H=1 -DHAVE_SYSLOG_H=1 -DHAVE_UNISTD_H=1
-DTIME_WITH_SYS_TIME=1 -DRETSIGTYPE=void -DHAVE_STRFTIME=1
-DHAVE_MKFIFO=1 -DHAVE_GETHOSTNAME=1 -DHAVE_SELECT=1 -DHAVE_SOCKET=1
-DHAVE_STRCSPN=1 -DHAVE_STRSTR=1 -DHAVE_STRTOLL=1 -DHAVE_ATOLL=1 -I.
-DSYSCONFDIR=\"/etc/refdb\" -DULLSPEC=\"%llu\" -D_FORTIFY_SOURCE=2  -g
-O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat
-Werror=format-security -O2 -c -o risxhandler.o risxhandler.c
risxhandler.c: In function 'risx_end_handler':
risxhandler.c:794:7: warning: passing argument 2 of 'iconv' from
incompatible pointer type [enabled by default]
       if (iconv(ptr_ardata->conv_descriptor, &my_instring, &inlength,
&my_elvalue, &outlength) == (size_t)(-1)) {
       ^
In file included from risxhandler.c:43:0:
/usr/include/iconv.h:42:15: note: expected 'char ** __restrict__' but
argument is of type 'const char **'
 extern size_t iconv (iconv_t __cd, char **__restrict __inbuf,
               ^
In file included from /usr/include/string.h:638:0,
                 from risxhandler.c:39:
In function 'strcpy',
    inlined from 'risx_end_handler' at risxhandler.c:1393:12:
/usr/include/i386-linux-gnu/bits/string3.h:104:3: warning: call to
__builtin___memcpy_chk will always overflow destination buffer
[enabled by default]
   return __builtin___strcpy_chk (__dest, __src, __bos (__dest));
   ^
In function 'strcpy',
    inlined from 'risx_end_handler' at risxhandler.c:1396:12:
/usr/include/i386-linux-gnu/bits/string3.h:104:3: warning: call to
__builtin___memcpy_chk will always overflow destination buffer
[enabled by default]
   return __builtin___strcpy_chk (__dest, __src, __bos (__dest));
   ^



More information about the debian-xml-sgml-pkgs mailing list