Created attachment 268747 [details]
You're receiving this bug because the package in Summary has produced _FORTIFY_SOURCE related warnings indicating the presence of a sure overflow in a static buffer.
Even though this is not always an indication of a security problem it might even be. So please check this out ASAP.
By the way, _FORTIFY_SOURCE is disabled when you disable optimisation, so don't try finding out the cause using -O0.
Your friendly neighborhood tinderboxer
from his build log net-misc/connman-0.71
I ran cppcheck against the static sources of 0.71 and several memory leaks are fixed in git. Doubt this is related though.
I did not confirm Diego's report I trust his build log. I have installed connman 0.72 with
david@random ~ $ less /etc/make.conf | grep CFLAGS
CFLAGS="-march=native -O2 -ggdb -D_FORTIFY_SOURCE=2 -pipe"
david@random ~ $ less /etc/make.conf | grep qa
PORTAGE_ELOG_CLASSES="warn qa error info log"
There was no report of the mentioned overflow for 0.72. This is not a hardened or 686 as his may/seems to be though but x86_64 Assuming I passed the flag properly
net-misc/connman-0.72 was built with the following:
USE="caps doc ethernet examples (multilib) policykit threads tools wifi -bluetooth -debug -google -ntpd -ofono -openvpn -vpnc -wimax"
I do not see this on 0.72 with tuxmobl which is x86 and stable with -D_FORTIFY_SOURCE=1 added to CFLAGS
Do note that gcc version and architecture do influence the constant propagation, and thus the warnings.
(In reply to comment #3)
> Do note that gcc version and architecture do influence the constant
> propagation, and thus the warnings.
Noted. However you do not have emerge --info and so I was unable to say exactly what your CFLAGS were though I did miss the x86 USE flag ;-) that was in the build log.
I was just trying to get the same message with 0.72 so I could report it on the mailing list. Or install 0.71 get the same message you did with 0.72 showing it fixed report it fixed here in that version
Diego, I am unable to reproduce this with 0.78; can you confirm it is fixed please?
(In reply to comment #5)
> Diego, I am unable to reproduce this with 0.78; can you confirm it is fixed