Summary: | dev-util/cmake _FORTIFY_SOURCE indicates presence of overflow | ||
---|---|---|---|
Product: | Gentoo Linux | Reporter: | Diego Elio Pettenò (RETIRED) <flameeyes> |
Component: | New packages | Assignee: | Gentoo KDE team <kde> |
Status: | RESOLVED DUPLICATE | ||
Severity: | major | CC: | hardened |
Priority: | High | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Package list: | Runtime testing required: | --- | |
Bug Depends on: | |||
Bug Blocks: | 259417 | ||
Attachments: |
Build log
Build log |
Description
Diego Elio Pettenò (RETIRED)
![]() Created attachment 249926 [details]
Build log
Created attachment 250861 [details]
Build log
QA: other │ │QA Notice: Package has poor programming practices which may compile │ │ fine but exhibit random runtime failures. │ │/usr/include/bits/stdio2.h:35:43: warning: call to int │ │__builtin___sprintf_chk(char*, int, long unsigned int, const char*, ...) will always overflow destination buffer │ │/usr/include/bits/stdio2.h:35:43: warning: call to int │ │__builtin___sprintf_chk(char*, int, long unsigned int, const char*, ...) will │ │always overflow destination buffer │ │/usr/include/bits/stdio2.h:35:43: warning: call to int │ │__builtin___sprintf_chk(char*, int, long unsigned int, const char*, ...) will │ │always overflow destination buffer │ │/usr/include/bits/string3.h:123:3: warning: call to __builtin___strncpy_chk will always overflow destination buffer *** This bug has been marked as a duplicate of bug 329043 *** |