[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#328372: [Fwd: Log for successful build of openssh_1:4.2p1-2 (dist=unstable)]



Package: openssh
Version: 1:4.2p1-2
Severity: important
Tags: patch

Our automated buildd log filter[1] detected a problem that will cause
your package to segfault on architectures where the size of a pointer is
greater than the size of an integer, such as ia64.

[1]http://people.debian.org/~dannf/check-implicit-pointer-functions

diff -urN openssh-4.2p1.orig/ssh-gss.h openssh-4.2p1/ssh-gss.h
--- openssh-4.2p1.orig/ssh-gss.h	2005-09-14 15:47:51.000000000 -0600
+++ openssh-4.2p1/ssh-gss.h	2005-09-14 15:56:04.000000000 -0600
@@ -135,6 +135,7 @@
 int ssh_gssapi_check_mechanism(gss_OID, void *);
 gss_OID ssh_gssapi_id_kex(Gssctxt *, char *);
 
+char *ssh_gssapi_server_mechanisms();
 int ssh_gssapi_server_check_mech(gss_OID, void *);
 int ssh_gssapi_userok(char *name);
 OM_uint32 ssh_gssapi_checkmic(Gssctxt *, gss_buffer_t, gss_buffer_t);

--- Begin Message ---
Function `ssh_gssapi_server_mechanisms' implicitly converted to pointer at ../sshd.c:2032

--- End Message ---

Reply to: