Your message dated Wed, 26 Feb 2020 00:35:02 +0000
with message-id <e1j6kfg-0001ks...@fasolo.debian.org>
and subject line Bug#951951: fixed in gzip 1.10-1
has caused the Debian Bug report #951951,
regarding gzip: FTBFS: stdio.h:366: undefined reference to `__chk_fail'
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)
--
951951: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=951951
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: gzip
Version: 1.9-3
Severity: serious
Justification: FTBFS on amd64
Tags: buster sid
Usertags: ftbfs-20200222 ftbfs-buster
Hi,
During a rebuild of all packages in sid, your package failed to build
on amd64.
Relevant part (hopefully):
> make[3]: Entering directory '/<<PKGBUILDDIR>>/builddir-indep'
> CC bits.o
> CC deflate.o
> CC gzip.o
> CC inflate.o
> CC lzw.o
> CC trees.o
> CC unlzh.o
> CC unlzw.o
> CC unpack.o
> CC unzip.o
> CC util.o
> CC zip.o
> CC version.o
> AR libver.a
> CCLD gzip.exe
> /usr/bin/i686-w64-mingw32-ld: gzip.o: in function `strcpy':
> /usr/share/mingw-w64/include/string.h:228: undefined reference to
> `__memcpy_chk'
> /usr/bin/i686-w64-mingw32-ld: /usr/share/mingw-w64/include/string.h:228:
> undefined reference to `__strcpy_chk'
> /usr/bin/i686-w64-mingw32-ld: /usr/share/mingw-w64/include/string.h:228:
> undefined reference to `__memcpy_chk'
> /usr/bin/i686-w64-mingw32-ld: /usr/share/mingw-w64/include/string.h:228:
> undefined reference to `__stpcpy_chk'
> /usr/bin/i686-w64-mingw32-ld: gzip.o: in function `strcat':
> /usr/share/mingw-w64/include/string.h:234: undefined reference to
> `__memcpy_chk'
> /usr/bin/i686-w64-mingw32-ld: gzip.o: in function `strcpy':
> /usr/share/mingw-w64/include/string.h:228: undefined reference to
> `__strcpy_chk'
> /usr/bin/i686-w64-mingw32-ld: /usr/share/mingw-w64/include/string.h:228:
> undefined reference to `__stpcpy_chk'
> /usr/bin/i686-w64-mingw32-ld: gzip.o: in function `strcat':
> /usr/share/mingw-w64/include/string.h:234: undefined reference to
> `__strcpy_chk'
> /usr/bin/i686-w64-mingw32-ld: /usr/share/mingw-w64/include/string.h:234:
> undefined reference to `__strcpy_chk'
> /usr/bin/i686-w64-mingw32-ld: gzip.o: in function `strcpy':
> /usr/share/mingw-w64/include/string.h:228: undefined reference to
> `__memcpy_chk'
> /usr/bin/i686-w64-mingw32-ld: lib/libgzip.a(openat-proc.o): in function
> `sprintf':
> /usr/share/mingw-w64/include/stdio.h:366: undefined reference to `__chk_fail'
> /usr/bin/i686-w64-mingw32-ld: lib/libgzip.a(vasnprintf.o): in function
> `sprintf':
> /usr/share/mingw-w64/include/stdio.h:366: undefined reference to `__chk_fail'
> collect2: error: ld returned 1 exit status
The full build log is available from:
http://qa-logs.debian.net/2020/02/22/gzip_1.9-3_unstable.log
A list of current common problems and possible solutions is available at
http://wiki.debian.org/qa.debian.org/FTBFS . You're welcome to contribute!
About the archive rebuild: The rebuild was done on EC2 VM instances from
Amazon Web Services, using a clean, minimal and up-to-date chroot. Every
failed build was retried once to eliminate random failures.
--- End Message ---
--- Begin Message ---
Source: gzip
Source-Version: 1.10-1
Done: Bdale Garbee <bd...@gag.com>
We believe that the bug you reported is fixed in the latest version of
gzip, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to 951...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Bdale Garbee <bd...@gag.com> (supplier of updated gzip package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Tue, 25 Feb 2020 14:56:28 -0700
Source: gzip
Architecture: source
Version: 1.10-1
Distribution: unstable
Urgency: medium
Maintainer: Bdale Garbee <bd...@gag.com>
Changed-By: Bdale Garbee <bd...@gag.com>
Closes: 881895 925554 951951
Changes:
gzip (1.10-1) unstable; urgency=medium
.
* new upstream version, closes: #925554
* explicitly link -lssp when building with mingw, closes: #951951
* apply suggestions from lintian and Nicolas Boulenguez, closes: #881895
Checksums-Sha1:
ff054414fbd37820ed3a6656ebff3b1eee80a1b4 1967 gzip_1.10-1.dsc
88ef05b5415b7124fdad9976cac8dd29cd915f69 1201421 gzip_1.10.orig.tar.gz
9c12cee962a9d3531fff0ab5e5700f75d3ac5204 18504 gzip_1.10-1.debian.tar.xz
28e5814e443942d9992cc0d1b01d6ebc57dd0ef3 6937 gzip_1.10-1_amd64.buildinfo
Checksums-Sha256:
261a01ff50ef54623bd52eeda5bece2ecbe45f81fa4f488b4e64c22d33e81a6d 1967
gzip_1.10-1.dsc
c91f74430bf7bc20402e1f657d0b252cb80aa66ba333a25704512af346633c68 1201421
gzip_1.10.orig.tar.gz
08df2b0d8f9bc6e793506109afe9ab636da00bfa1c6659e6b0b2d6e8a3ca6d8d 18504
gzip_1.10-1.debian.tar.xz
e83f45790b88279cf0e79f74dfa9f70823deb22a4991a834125f2491309871d4 6937
gzip_1.10-1_amd64.buildinfo
Files:
202a9d03f7abe81a335a8e6d575dc0d6 1967 utils required gzip_1.10-1.dsc
cf9ee51aff167ff69844d5d7d71c8b20 1201421 utils required gzip_1.10.orig.tar.gz
46838810465b0405949b16522c3754a0 18504 utils required gzip_1.10-1.debian.tar.xz
88b29ced53cf53d683b120c5b329568f 6937 utils required
gzip_1.10-1_amd64.buildinfo
-----BEGIN PGP SIGNATURE-----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=F57Q
-----END PGP SIGNATURE-----
--- End Message ---