Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!

Bug 477586

Summary: sci-visualization/spyview : _FORTIFY_SOURCE reports presence of overflow
Product: Gentoo Linux Reporter: Agostino Sarubbo <ago>
Component: Current packagesAssignee: Andreas K. Hüttel <dilfridge>
Status: RESOLVED DUPLICATE    
Severity: normal    
Priority: Normal    
Version: unspecified   
Hardware: All   
OS: Linux   
Whiteboard:
Package list:
Runtime testing required: ---
Bug Depends on:    
Bug Blocks: 259417    

Description Agostino Sarubbo gentoo-dev 2013-07-21 09:51:01 UTC
In file included from /usr/include/string.h:642:0,
                 from /usr/include/fltk-1/FL/fl_utf8.h:43,
                 from /usr/include/fltk-1/FL/Fl.H:39,
                 from ImageWindow.H:6,
                 from ImageWindow.C:5:
In function 'char* strncpy(char*, const char*, size_t)',
    inlined from 'void ImageWindow::exportLinecut()' at ImageWindow.C:2087:33:
/usr/include/bits/string3.h:121:71: warning: call to char* __builtin___strncpy_chk(char*, const char*, long unsigned int, long unsigned int) will always overflow destination buffer [enabled by default]
In function 'char* strncpy(char*, const char*, size_t)',
    inlined from 'void ImageWindow::exportLinecut()' at ImageWindow.C:2089:34:
/usr/include/bits/string3.h:121:71: warning: call to char* __builtin___strncpy_chk(char*, const char*, long unsigned int, long unsigned int) will always overflow destination buffer [enabled by default]
Comment 1 Andreas K. Hüttel archtester gentoo-dev 2013-12-20 22:51:18 UTC
Yes I know.

*** This bug has been marked as a duplicate of bug 431114 ***