Your message dated Fri, 20 Jan 2006 03:32:13 -0800
with message-id <[EMAIL PROTECTED]>
and subject line Bug#345969: fixed in nepenthes 0.1.6-1
has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere. Please contact me immediately.)
Debian bug tracking system administrator
(administrator, Debian Bugs database)
--------------------------------------
Received: (at submit) by bugs.debian.org; 4 Jan 2006 15:06:39 +0000
>From [EMAIL PROTECTED] Wed Jan 04 07:06:39 2006
Return-path: <[EMAIL PROTECTED]>
Received: from hoboe2bl1.telenet-ops.be ([195.130.137.73])
by spohr.debian.org with esmtp (Exim 4.50)
id 1EuADn-0007yF-BO
for [EMAIL PROTECTED]; Wed, 04 Jan 2006 07:06:39 -0800
Received: from localhost (localhost.localdomain [127.0.0.1])
by hoboe2bl1.telenet-ops.be (Postfix) with SMTP id 9D39138045
for <[EMAIL PROTECTED]>; Wed, 4 Jan 2006 16:06:38 +0100 (CET)
Received: from Q.roeckx.be (dD5775F4A.access.telenet.be [213.119.95.74])
by hoboe2bl1.telenet-ops.be (Postfix) with ESMTP id 8C7403802F
for <[EMAIL PROTECTED]>; Wed, 4 Jan 2006 16:06:38 +0100 (CET)
Received: by Q.roeckx.be (Postfix, from userid 501)
id 6D3FB26137; Wed, 04 Jan 2006 16:06:38 +0100 (CET)
Date: Wed, 4 Jan 2006 16:06:38 +0100
From: Kurt Roeckx <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
Subject: nepenthes: FTBFS on 64 bit arches: cast from 'void*' to 'int32_t'
loses precision
Message-ID: <[EMAIL PROTECTED]>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
User-Agent: Mutt/1.4.2.1i
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level:
X-Spam-Status: No, hits=-7.4 required=4.0 tests=BAYES_00,HAS_PACKAGE,
RCVD_IN_SORBS,RCVD_IN_SORBS_MISC autolearn=no
version=2.60-bugs.debian.org_2005_01_02
Package: nepenthes
Version: 0.1.5-1
Severity: important
Hi,
Your package is failing to build on 64 bit arches with the
following error:
if x86_64-linux-gnu-g++ -DHAVE_CONFIG_H -I. -I. -I../.. -I../include -I ../..
-D_FILE_OFFSET_BITS=64 -D_LARGEFILE_SOURCE -D_LARGE_FILES -g -O2 -MT Buffer.o
-MD -MP -MF ".deps/Buffer.Tpo" -c -o Buffer.o Buffer.cpp; \
then mv -f ".deps/Buffer.Tpo" ".deps/Buffer.Po"; else rm -f
".deps/Buffer.Tpo"; exit 1; fi
Buffer.cpp: In member function 'virtual void nepenthes::Buffer::add(void*,
uint32_t)':
Buffer.cpp:152: error: cast from 'void*' to 'int32_t' loses precision
Buffer.cpp: In member function 'virtual void nepenthes::Buffer::cut(int32_t)':
Buffer.cpp:183: error: cast from 'void*' to 'int32_t' loses precision
Buffer.cpp: In member function 'virtual void nepenthes::Buffer::debug()':
Buffer.cpp:217: error: cast from 'void*' to 'int32_t' loses precision
make[4]: *** [Buffer.o] Error 1
A pointer is 64 bit, and can't be stored in a 32 bit int.
You should avoid casting pointers to integers if you can.
If that doesn't work, please use the intptr_t type instead
which should be able to store a pointer.
Kurt
---------------------------------------
Received: (at 345969-close) by bugs.debian.org; 20 Jan 2006 11:41:51 +0000
>From [EMAIL PROTECTED] Fri Jan 20 03:41:51 2006
Return-path: <[EMAIL PROTECTED]>
Received: from katie by spohr.debian.org with local (Exim 4.50)
id 1EzuV3-0004dt-FC; Fri, 20 Jan 2006 03:32:13 -0800
From: Luciano Bello <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
X-Katie: $Revision: 1.65 $
Subject: Bug#345969: fixed in nepenthes 0.1.6-1
Message-Id: <[EMAIL PROTECTED]>
Sender: Archive Administrator <[EMAIL PROTECTED]>
Date: Fri, 20 Jan 2006 03:32:13 -0800
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level:
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER
autolearn=no version=2.60-bugs.debian.org_2005_01_02
Source: nepenthes
Source-Version: 0.1.6-1
We believe that the bug you reported is fixed in the latest version of
nepenthes, which is due to be installed in the Debian FTP archive:
nepenthes_0.1.6-1.diff.gz
to pool/main/n/nepenthes/nepenthes_0.1.6-1.diff.gz
nepenthes_0.1.6-1.dsc
to pool/main/n/nepenthes/nepenthes_0.1.6-1.dsc
nepenthes_0.1.6-1_i386.deb
to pool/main/n/nepenthes/nepenthes_0.1.6-1_i386.deb
nepenthes_0.1.6.orig.tar.gz
to pool/main/n/nepenthes/nepenthes_0.1.6.orig.tar.gz
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Luciano Bello <[EMAIL PROTECTED]> (supplier of updated nepenthes package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Format: 1.7
Date: Mon, 16 Jan 2006 23:32:45 -0300
Source: nepenthes
Binary: nepenthes
Architecture: source i386
Version: 0.1.6-1
Distribution: unstable
Urgency: low
Maintainer: Luciano Bello <[EMAIL PROTECTED]>
Changed-By: Luciano Bello <[EMAIL PROTECTED]>
Description:
nepenthes - versatile tool to collect malware by emulating widespread vulnera
Closes: 345969
Changes:
nepenthes (0.1.6-1) unstable; urgency=low
.
* New upstream release
- added a new download handler for the broken by design rcp protocol.
- new shellcode handlers
* Many 32 bits specific cast was suppressed (closes: Bug#345969).
Files:
4e3b2b0028145064fb79c9b593f5b691 617 net optional nepenthes_0.1.6-1.dsc
317afd3dc86d57a22570632bdf839ef2 794938 net optional
nepenthes_0.1.6.orig.tar.gz
7d69281af85e37ee9add2fedd30f22d7 6184 net optional nepenthes_0.1.6-1.diff.gz
31f2382aaad441beca28b0bc8db7bea7 4768184 net optional
nepenthes_0.1.6-1_i386.deb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2 (GNU/Linux)
iD8DBQFD0LvZ5UTeB5t8Mo0RAtwlAKDFJhrQu4xC2JDeLzajqUTzQJk/UACgo3AM
ZcU9oOi4xR8Gz3r/EJRKQYk=
=hw3g
-----END PGP SIGNATURE-----
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]