Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 343341 - net-mail/vpopmail _FORTIFY_SOURCE indicates presence of overflow
Summary: net-mail/vpopmail _FORTIFY_SOURCE indicates presence of overflow
Alias: None
Product: Gentoo Linux
Classification: Unclassified
Component: Current packages (show other bugs)
Hardware: All Linux
: High major (vote)
Assignee: Qmail Team (OBSOLETE)
Depends on:
Blocks: fortify-source
  Show dependency tree
Reported: 2010-10-30 09:32 UTC by Diego Elio Pettenò (RETIRED)
Modified: 2013-05-30 23:21 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---

Build log (vpopmail-5.4.30-r2:20101029-232809.log,51.33 KB, text/plain)
2010-10-30 09:33 UTC, Diego Elio Pettenò (RETIRED)

Note You need to log in before you can comment on or make changes to this bug.
Description Diego Elio Pettenò (RETIRED) gentoo-dev 2010-10-30 09:32:49 UTC
You're receiving this bug because the package in Summary has produced _FORTIFY_SOURCE related warnings indicating the presence of a sure overflow in a static buffer.

Even though this is not always an indication of a security problem it might even be. So please check this out ASAP.

By the way, _FORTIFY_SOURCE is disabled when you disable optimisation, so don't try finding out the cause using -O0.

Your friendly neighborhood tinderboxer
Comment 1 Diego Elio Pettenò (RETIRED) gentoo-dev 2010-10-30 09:33:01 UTC
Created attachment 252563 [details]
Build log
Comment 2 Kevin Pyle 2010-10-31 00:06:48 UTC
This is a typical case of using a magic constant as the snprintf length argument instead of using sizeof to let the compiler insert the proper length.  The offending calls in vlistlib.c can be fixed by doing:

sed -e 's/\(snprintf(\s*\(LI->[a-zA-Z_]\+\),\s*\)[a-zA-Z_]\+,/\1 sizeof(\2),/'
Comment 3 Robin Johnson archtester Gentoo Infrastructure gentoo-dev Security 2013-05-30 23:21:21 UTC