Bug#733330: marked as done (call to __builtin___strncpy_chk will always overflow destination buffer [enabled by default])

2014-02-27 Thread Debian Bug Tracking System
Your message dated Thu, 27 Feb 2014 09:20:27 + with message-id and subject line Bug#70: fixed in refdb 1.0.2-1 has caused the Debian Bug report #70, regarding call to __builtin___strncpy_chk will always overflow destination buffer [enabled by default] to be marked as done. This

Bug#733330: still there

2014-02-26 Thread markus . hoenicka
Mathieu Malaterre writes: > Control: reopen -1 > Control: found -1 refdb/1.0.1-1 > > The bug is still there in release 1.0.1: > > https://buildd.debian.org/status/fetch.php?pkg=refdb&arch=i386&ver=1.0.1-1&stamp=1391636439 > > gcc -DPACKAGE_NAME=\"refdb\" -DPACKAGE_TARNAME=\"refdb\" > -D

Bug#733330: still there

2014-02-06 Thread Mathieu Malaterre
Control: reopen -1 Control: found -1 refdb/1.0.1-1 The bug is still there in release 1.0.1: https://buildd.debian.org/status/fetch.php?pkg=refdb&arch=i386&ver=1.0.1-1&stamp=1391636439 gcc -DPACKAGE_NAME=\"refdb\" -DPACKAGE_TARNAME=\"refdb\" -DPACKAGE_VERSION=\"1.0.1\" -DPACKAGE_STRING=\"refdb\ 1

Bug#733330: marked as done (call to __builtin___strncpy_chk will always overflow destination buffer [enabled by default])

2014-02-05 Thread Debian Bug Tracking System
Your message dated Wed, 05 Feb 2014 21:23:40 + with message-id and subject line Bug#70: fixed in refdb 1.0.1-1 has caused the Debian Bug report #70, regarding call to __builtin___strncpy_chk will always overflow destination buffer [enabled by default] to be marked as done. This

Bug#733330:

2014-01-26 Thread Markus Hoenicka
At 2014-01-26 14:08 Mathieu Malaterre was heard to say: bug is still present in current 1.0.0 release: https://buildd.debian.org/status/fetch.php?pkg=refdb&arch=i386&ver=1.0.0-1&stamp=1390671194 eg: gcc -DPACKAGE_NAME=\"refdb\" -DPACKAGE_TARNAME=\"refdb\" -DPACKAGE_VERSION=\"1.0.0\" -DPACKAGE_

Bug#733330:

2014-01-26 Thread Mathieu Malaterre
bug is still present in current 1.0.0 release: https://buildd.debian.org/status/fetch.php?pkg=refdb&arch=i386&ver=1.0.0-1&stamp=1390671194 eg: gcc -DPACKAGE_NAME=\"refdb\" -DPACKAGE_TARNAME=\"refdb\" -DPACKAGE_VERSION=\"1.0.0\" -DPACKAGE_STRING=\"refdb\ 1.0.0\" -DPACKAGE_BUGREPORT=\"\" -DPACKAGE

Bug#733330: marked as done (call to __builtin___strncpy_chk will always overflow destination buffer [enabled by default])

2014-01-25 Thread Debian Bug Tracking System
Your message dated Sat, 25 Jan 2014 17:19:38 + with message-id and subject line Bug#70: fixed in refdb 1.0.0-1 has caused the Debian Bug report #70, regarding call to __builtin___strncpy_chk will always overflow destination buffer [enabled by default] to be marked as done. This

Bug#733330: call to __builtin___strncpy_chk will always overflow destination buffer [enabled by default]

2013-12-30 Thread Mathieu Malaterre
Control: tag -1 fixed-upstream -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Processed: Re: Bug#733330: call to __builtin___strncpy_chk will always overflow destination buffer [enabled by default]

2013-12-30 Thread Debian Bug Tracking System
Processing control commands: > tag -1 fixed-upstream Bug #733330 [refdb] call to __builtin___strncpy_chk will always overflow destination buffer [enabled by default] Added tag(s) fixed-upstream. -- 70: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=733330 Debian Bug Tracking Sys

Bug#733330: call to __builtin___strncpy_chk will always overflow destination buffer [enabled by default]

2013-12-30 Thread Markus Hoenicka
Am 2013-12-28 17:10, schrieb Mathieu Malaterre: Package: refdb Severity: serious In function 'strncpy', inlined from 'main' at refdbd.c:1335:15: /usr/include/x86_64-kfreebsd-gnu/bits/string3.h:120:3: warning: call to __builtin___strncpy_chk will always overflow destination buffer [enabled by

Bug#733330: call to __builtin___strncpy_chk will always overflow destination buffer [enabled by default]

2013-12-28 Thread Mathieu Malaterre
Package: refdb Severity: serious In function 'strncpy', inlined from 'main' at refdbd.c:1335:15: /usr/include/x86_64-kfreebsd-gnu/bits/string3.h:120:3: warning: call to __builtin___strncpy_chk will always overflow destination buffer [enabled by default] return __builtin___strncpy_chk (__des