Your message dated Sat, 23 Feb 2013 12:06:53 +0000 with message-id <20130223120653.gf4...@riva.dynamic.greenend.org.uk> has caused the report #701425, regarding putty: ftbfs with eglibc-2.17 to be marked as having been forwarded to the upstream software author(s) pu...@projects.tartarus.org
(NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 701425: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=701425 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems
--- Begin Message ---On Sat, Feb 23, 2013 at 11:35:26AM +0000, Matthias Klose wrote: > The package fails to build in a test rebuild on at least amd64 with > eglibc-2.17, but succeeds to build with eglibc-2.13. The > severity of this report may be raised before the jessie release. > > The test rebuild was done together with GCC-4.8, so some issues > might be caused by the updated GCC as well. [...] > cc -O2 -Wall -Werror -g -I.././ -I../charset/ -I../windows/ -I../unix/ > -I../macosx/ -pthread -I/usr/include/gtk-2.0 > -I/usr/lib/x86_64-linux-gnu/gtk-2.0/include -I/usr/include/atk-1.0 > -I/usr/include/cairo -I/usr/include/gdk-pixbuf-2.0 -I/usr/include/pango-1.0 > -I/usr/include/gio-unix-2.0/ -I/usr/include/glib-2.0 > -I/usr/lib/x86_64-linux-gnu/glib-2.0/include -I/usr/include/pixman-1 > -I/usr/include/freetype2 -I/usr/include/libpng12 -D _FILE_OFFSET_BITS=64 > -D_FORTIFY_SOURCE=2 -g -O2 -fstack-protector --param=ssp-buffer-size=4 > -Wformat -Werror=format-security -c ../unix/uxpty.c > ../unix/uxpty.c: In function 'pty_pre_init': > ../unix/uxpty.c:518:11: error: ignoring return value of 'setresgid', declared > with attribute warn_unused_result [-Werror=unused-result] > setresgid(gid, gid, gid); > ^ > ../unix/uxpty.c:519:11: error: ignoring return value of 'setresuid', declared > with attribute warn_unused_result [-Werror=unused-result] > setresuid(uid, uid, uid); > ^ > ../unix/uxpty.c: In function 'fatal_sig_handler': > ../unix/uxpty.c:273:11: error: ignoring return value of 'setuid', declared > with attribute warn_unused_result [-Werror=unused-result] > setuid(getuid()); > ^ Hi Simon et al, The set*id functions apparently now trigger warn_unused_result. This seems to be a real bug - AIUI those functions can fail even when dropping privileges from root if doing so would exceed a resource limit, so perhaps PuTTY should bail out in that case? Thanks, -- Colin Watson [cjwat...@debian.org]
--- End Message ---