Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 515966 - www-client/phantomjs-1.9.7 insecure RUNPATHs
Summary: www-client/phantomjs-1.9.7 insecure RUNPATHs
Status: RESOLVED TEST-REQUEST
Alias: None
Product: Gentoo Linux
Classification: Unclassified
Component: Current packages (show other bugs)
Hardware: All Linux
: Normal normal (vote)
Assignee: Tony Vroon (RETIRED)
URL:
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2014-07-01 07:16 UTC by Patrick Lauer
Modified: 2017-09-19 15:44 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Patrick Lauer gentoo-dev 2014-07-01 07:16:25 UTC
>>> Completed installing phantomjs-1.9.7 into /var/tmp/portage/www-client/phantomjs-1.9.7/image/

strip: x86_64-pc-linux-gnu-strip --strip-unneeded -R .comment -R .GCC.command.line -R .note.gnu.gold-version
   usr/bin/phantomjs
ecompressdir: bzip2 -9 /usr/share/doc
Auto fixing rpaths for /var/tmp/portage/www-client/phantomjs-1.9.7/image/usr/bin/phantomjs

 * QA Notice: The following files contain insecure RUNPATHs
 *  Please file a bug about this at http://bugs.gentoo.org/
 *  with the maintaining herd of the package.
 *   /var/tmp/portage/www-client/phantomjs-1.9.7/image/usr/bin/phantomjs
 * 


 * QA Notice: Package triggers severe warnings which indicate that it
 *            may exhibit random runtime failures.
 * mongoose/mongoose.c:1988:3: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing]
 * mongoose/mongoose.c:1989:3: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing]
 * breakpad/src/common/md5.cc:141:23: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing]
 * breakpad/src/common/md5.cc:142:23: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing]


 * QA Notice: Package triggers severe warnings which indicate that it
 *            may exhibit random runtime failures.
 * tools/../../3rdparty/md5/md5.cpp:139:23: warning: argument to ‘sizeof’ in ‘void* memset(void*, int, size_t)’ call is the same expression as the destination; did you mean to dereference it? [-Wsizeof-pointer-memaccess]

 * Please do not file a Gentoo bug and instead report the above QA
 * issues directly to the upstream developers of this software.
 * Homepage: http://phantomjs.org/
>>> Done.
Comment 1 SpanKY gentoo-dev 2014-07-28 05:18:45 UTC
i'm not dealing w/the versions w/bundled qt
Comment 2 Pacho Ramos gentoo-dev 2017-09-19 15:44:33 UTC
Can you retry with 2.1.1 version? Thanks