Package: mono
Version: 1.2.6+dfsg-1
Severity: important
Tags: patch
Usertags: implicit-pointer-conversion

Our automated buildd log filter[1] detected a problem that is likely to
cause your package to segfault on architectures where the size of a
pointer is greater than the size of an integer, such as ia64 and amd64.

This is often due to a missing function prototype definition.
For more information, see [2].

[1] http://people.debian.org/~dannf/check-implicit-pointer-functions
[2] http://wiki.debian.org/ImplicitPointerConversions

Function `mono_assembly_open' implicitly converted to pointer at security.c:995
Function `mono_assembly_get_image' implicitly converted to pointer at 
security.c:998

diff -urpN mono-1.2.6+dfsg.orig/mono/metadata/security.c 
mono-1.2.6+dfsg/mono/metadata/security.c
--- mono-1.2.6+dfsg.orig/mono/metadata/security.c       2007-11-08 
15:07:19.000000000 -0700
+++ mono-1.2.6+dfsg/mono/metadata/security.c    2007-12-25 10:18:38.000000000 
-0700
@@ -17,6 +17,7 @@
 #include <mono/metadata/object-internals.h>
 #include <mono/metadata/metadata-internals.h>
 #include <mono/metadata/security.h>
+#include <mono/metadata/assembly.h>
 #include <mono/io-layer/io-layer.h>
 #include <mono/utils/strenc.h>
 



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to