Your message dated Thu, 17 Nov 2011 17:32:11 +0000
with message-id <e1rr5op-00026g...@franck.debian.org>
and subject line Bug#643369: fixed in crack-attack 1.1.14-9.1
has caused the Debian Bug report #643369,
regarding crack-attack: FTBFS: callbacks.cxx:116:38: error: format not a string
literal and no format arguments [-Werror=format-security]
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)
--
643369: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=643369
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: crack-attack
Version: 1.1.14-9
Severity: serious
Tags: wheezy sid
User: debian...@lists.debian.org
Usertags: qa-ftbfs-20110923 qa-ftbfs hardening-format-security hardening
Justification: FTBFS on amd64
Hi,
During a rebuild of all packages in sid, your package failed to build on
amd64.
Relevant part:
> g++ -DHAVE_CONFIG_H -I. -I. -I../../src -pthread -I/usr/include/gtk-2.0
> -I/usr/lib/x86_64-linux-gnu/gtk-2.0/include -I/usr/include/atk-1.0
> -I/usr/include/gdk-pixbuf-2.0 -I/usr/include/pango-1.0
> -I/usr/include/pixman-1 -I/usr/include/freetype2 -I/usr/include/libpng12
> -I/usr/include/cairo -I/usr/include/gio-unix-2.0/ -I/usr/include/glib-2.0
> -I/usr/lib/glib-2.0/include -DNDEBUG
> -DDATA_DIRECTORY='"/usr/share/games/crack-attack/"'
> -DPACKAGE_DATA_DIR=\""/usr/share/games"\"
> -DPACKAGE_LOCALE_DIR=\""/usr//locale"\" -DBINARY_DIRECTORY='"/usr/games"'
> -g -O2 -fstack-protector --param=ssp-buffer-size=4 -D_FORTIFY_SOURCE=2
> -Wformat -Wformat-security -Werror=format-security -Wall -c -o callbacks.o
> callbacks.cxx
> callbacks.cxx: In function 'void ca_error_dialog(const char*)':
> callbacks.cxx:116:38: error: format not a string literal and no format
> arguments [-Werror=format-security]
> callbacks.cxx: In function 'gboolean networking_output(GIOChannel*,
> GIOCondition, gpointer)':
> callbacks.cxx:163:13: error: format not a string literal and no format
> arguments [-Werror=format-security]
> cc1plus: some warnings being treated as errors
>
> make[4]: *** [callbacks.o] Error 1
The full build log is available from:
http://people.debian.org/~lucas/logs/2011/09/23/crack-attack_1.1.14-9_lsid64.buildlog
This happened because since dpkg 1.16.0 [0], hardening flags are enabled
under various conditions.
[0] http://lists.debian.org/debian-devel-announce/2011/09/msg00001.html
A list of current common problems and possible solutions is available at
http://wiki.debian.org/qa.debian.org/FTBFS . You're welcome to contribute!
About the archive rebuild: The rebuild was done on about 50 AMD64 nodes
of the Grid'5000 platform, using a clean chroot. Internet was not
accessible from the build systems.
--- End Message ---
--- Begin Message ---
Source: crack-attack
Source-Version: 1.1.14-9.1
We believe that the bug you reported is fixed in the latest version of
crack-attack, which is due to be installed in the Debian FTP archive:
crack-attack_1.1.14-9.1.diff.gz
to main/c/crack-attack/crack-attack_1.1.14-9.1.diff.gz
crack-attack_1.1.14-9.1.dsc
to main/c/crack-attack/crack-attack_1.1.14-9.1.dsc
crack-attack_1.1.14-9.1_i386.deb
to main/c/crack-attack/crack-attack_1.1.14-9.1_i386.deb
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to 643...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
gregor herrmann <gre...@debian.org> (supplier of updated crack-attack package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@debian.org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Format: 1.8
Date: Tue, 15 Nov 2011 18:03:51 +0100
Source: crack-attack
Binary: crack-attack
Architecture: source i386
Version: 1.1.14-9.1
Distribution: unstable
Urgency: low
Maintainer: Chris Boyle <c...@debian.org>
Changed-By: gregor herrmann <gre...@debian.org>
Description:
crack-attack - multiplayer OpenGL puzzle game like "Tetris Attack"
Closes: 643369
Changes:
crack-attack (1.1.14-9.1) unstable; urgency=low
.
* Non-maintainer upload.
* Fix "FTBFS: callbacks.cxx:116:38: error: format not a string literal
and no format arguments [-Werror=format-security]": add new patch
fix-string-format-error.patch from Eric Alexander that adds a format
argument (closes: #643369).
Checksums-Sha1:
dd0e5a52aa683d20651d8e0466735a2b0521973c 1888 crack-attack_1.1.14-9.1.dsc
0caca7b621f4894e92a919fff2b60403baecf000 10922 crack-attack_1.1.14-9.1.diff.gz
5f1b32235cd7b14131e7506298868791e1ae2d60 783648
crack-attack_1.1.14-9.1_i386.deb
Checksums-Sha256:
ec192ac9eeb31cc70b39f7d72f8c3afea39e584168965de65fae9977dc2bc6ef 1888
crack-attack_1.1.14-9.1.dsc
4ae7cf4cfb47102158008361f33f328a9493fd3d7a1c501a2c483058110af614 10922
crack-attack_1.1.14-9.1.diff.gz
5b310c991dbaf3b875a185ac29777466e38929ae58946b2a32bc94f3937eed48 783648
crack-attack_1.1.14-9.1_i386.deb
Files:
3a80bea0096f0639cbd5261754e17a53 1888 games optional
crack-attack_1.1.14-9.1.dsc
c837a2a262e43c2106eaa6b9216bb664 10922 games optional
crack-attack_1.1.14-9.1.diff.gz
722a7b0baf4f10f160e2e2935fd6b645 783648 games optional
crack-attack_1.1.14-9.1_i386.deb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)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=wPgg
-----END PGP SIGNATURE-----
--- End Message ---