Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!

Bug 432702

Summary: media-libs/plib-1.8.5 : _FORTIFY_SOURCE reports presence of overflows
Product: Gentoo Linux Reporter: Agostino Sarubbo <ago>
Component: Current packagesAssignee: Gentoo Games <games>
Severity: normal    
Priority: Normal    
Version: unspecified   
Hardware: All   
OS: Linux   
Package list:
Runtime testing required: ---
Bug Depends on:    
Bug Blocks: 259417    
Attachments: build.log

Description Agostino Sarubbo gentoo-dev 2012-08-25 12:20:40 UTC
Created attachment 322178 [details]

if x86_64-pc-linux-gnu-g++ -DPACKAGE_NAME=\"\" -DPACKAGE_TARNAME=\"\" -DPACKAGE_VERSION=\"\" -DPACKAGE_STRING=\"\" -DPACKAGE_BUGREPORT=\"\" -DPACKAGE=\"plib\" -DVERSION=\"1.8.5\" -
-DHAVE_INTTYPES_H=1 -DHAVE_STDINT_H=1 -DHAVE_UNISTD_H=1 -I. -I. -I../../src/sg -I../../src/util    -march=native -O2 -fPIC -Wall -MT ssgLoadMDL.o -MD -MP -MF ".deps/ssgLoadMDL.Tpo"
 -c -o ssgLoadMDL.o ssgLoadMDL.cxx; \
then mv -f ".deps/ssgLoadMDL.Tpo" ".deps/ssgLoadMDL.Po"; else rm -f ".deps/ssgLoadMDL.Tpo"; exit 1; fi
In file included from /usr/include/string.h:642:0,
                 from ../../src/util/ul.h:43,
                 from ../../src/sg/sg.h:29,
                 from ssg.h:29,
                 from ssgLocal.h:27,
                 from ssgLoadOBJ.cxx:62:
In function ‘char* strncat(char*, const char*, size_t)’,
    inlined from ‘void load_materials(const char*)’ at ssgLoadOBJ.cxx:224:37,
    inlined from ‘int obj_read(FILE*)’ at ssgLoadOBJ.cxx:609:33:
/usr/include/bits/string3.h:152:71: warning: call to char* __builtin___strncat_chk(char*, const char*, long unsigned int, long unsigned int) might overflow destination buffer
Comment 1 Tupone Alfredo gentoo-dev 2012-08-27 17:15:04 UTC
The warning refer to a variable that is used to host a path name. That is 1024 byte long. It could overflow, but I doubt really does. 

At suse they fixed as per

I prefer not to fix it and leave the way it is.