Your message dated Sat, 23 Feb 2013 12:06:53 +0000
with message-id <20130223120653.gf4...@riva.dynamic.greenend.org.uk>
has caused the   report #701425,
regarding putty: ftbfs with eglibc-2.17
to be marked as having been forwarded to the upstream software
author(s) pu...@projects.tartarus.org

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
701425: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=701425
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
On Sat, Feb 23, 2013 at 11:35:26AM +0000, Matthias Klose wrote:
> The package fails to build in a test rebuild on at least amd64 with
> eglibc-2.17, but succeeds to build with eglibc-2.13. The
> severity of this report may be raised before the jessie release.
> 
> The test rebuild was done together with GCC-4.8, so some issues
> might be caused by the updated GCC as well.
[...]
> cc  -O2 -Wall -Werror -g -I.././ -I../charset/ -I../windows/ -I../unix/ 
> -I../macosx/ -pthread -I/usr/include/gtk-2.0 
> -I/usr/lib/x86_64-linux-gnu/gtk-2.0/include -I/usr/include/atk-1.0 
> -I/usr/include/cairo -I/usr/include/gdk-pixbuf-2.0 -I/usr/include/pango-1.0 
> -I/usr/include/gio-unix-2.0/ -I/usr/include/glib-2.0 
> -I/usr/lib/x86_64-linux-gnu/glib-2.0/include -I/usr/include/pixman-1 
> -I/usr/include/freetype2 -I/usr/include/libpng12   -D _FILE_OFFSET_BITS=64 
> -D_FORTIFY_SOURCE=2 -g -O2 -fstack-protector --param=ssp-buffer-size=4 
> -Wformat -Werror=format-security -c ../unix/uxpty.c
> ../unix/uxpty.c: In function 'pty_pre_init':
> ../unix/uxpty.c:518:11: error: ignoring return value of 'setresgid', declared 
> with attribute warn_unused_result [-Werror=unused-result]
>   setresgid(gid, gid, gid);
>            ^
> ../unix/uxpty.c:519:11: error: ignoring return value of 'setresuid', declared 
> with attribute warn_unused_result [-Werror=unused-result]
>   setresuid(uid, uid, uid);
>            ^
> ../unix/uxpty.c: In function 'fatal_sig_handler':
> ../unix/uxpty.c:273:11: error: ignoring return value of 'setuid', declared 
> with attribute warn_unused_result [-Werror=unused-result]
>      setuid(getuid());
>            ^

Hi Simon et al,

The set*id functions apparently now trigger warn_unused_result.  This
seems to be a real bug - AIUI those functions can fail even when
dropping privileges from root if doing so would exceed a resource limit,
so perhaps PuTTY should bail out in that case?

Thanks,

-- 
Colin Watson                                       [cjwat...@debian.org]

--- End Message ---

Reply via email to