[Debian-med-packaging] Bug#506009: maq: gzopen64 implicitly converted to pointer

dann frazier dannf at debian.org
Mon Nov 17 18:28:00 UTC 2008


Package: maq
Version: 0.7.1-1
Severity: serious
Usertags: implicit-pointer-conversion

Our automated buildd log filter[1] detected a problem that is likely to
cause your package to segfault on architectures where the size of a
pointer is greater than the size of an integer, such as ia64 and amd64.

  Function `gzopen64' implicitly converted to pointer at fastq2bfq.c:30
  Function `gzopen64' implicitly converted to pointer at maqmap_conv.c:57
  Function `gzopen64' implicitly converted to pointer at simulate.c:83
  Function `gzopen64' implicitly converted to pointer at break_pair.c:16

This is often due to a missing function prototype definition.
For more information, see [2].

Though it is guaranteed that this codepath will cause a segfault on certain
architectures, it is not guaranteed that this codepath would ever be executed
(e.g., if the returned pointer is never dereferenced). However, this bug
does prevent the ia64 buildd from successfully building this package, resulting
in a practical FTBFS issue and warranting the serious severity.

[1] http://people.debian.org/~dannf/check-implicit-pointer-functions
[2] http://wiki.debian.org/ImplicitPointerConversions





More information about the Debian-med-packaging mailing list