Package: mono Version: 1.2.6+dfsg-1 Severity: important Tags: patch Usertags: implicit-pointer-conversion
Our automated buildd log filter[1] detected a problem that is likely to cause your package to segfault on architectures where the size of a pointer is greater than the size of an integer, such as ia64 and amd64. This is often due to a missing function prototype definition. For more information, see [2]. [1] http://people.debian.org/~dannf/check-implicit-pointer-functions [2] http://wiki.debian.org/ImplicitPointerConversions Function `mono_assembly_open' implicitly converted to pointer at security.c:995 Function `mono_assembly_get_image' implicitly converted to pointer at security.c:998 diff -urpN mono-1.2.6+dfsg.orig/mono/metadata/security.c mono-1.2.6+dfsg/mono/metadata/security.c --- mono-1.2.6+dfsg.orig/mono/metadata/security.c 2007-11-08 15:07:19.000000000 -0700 +++ mono-1.2.6+dfsg/mono/metadata/security.c 2007-12-25 10:18:38.000000000 -0700 @@ -17,6 +17,7 @@ #include <mono/metadata/object-internals.h> #include <mono/metadata/metadata-internals.h> #include <mono/metadata/security.h> +#include <mono/metadata/assembly.h> #include <mono/io-layer/io-layer.h> #include <mono/utils/strenc.h> -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]