Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 432702 - media-libs/plib-1.8.5 : _FORTIFY_SOURCE reports presence of overflows
Summary: media-libs/plib-1.8.5 : _FORTIFY_SOURCE reports presence of overflows
Alias: None
Product: Gentoo Linux
Classification: Unclassified
Component: Current packages (show other bugs)
Hardware: All Linux
: Normal normal (vote)
Assignee: Gentoo Games
Depends on:
Blocks: fortify-source
  Show dependency tree
Reported: 2012-08-25 12:20 UTC by Agostino Sarubbo
Modified: 2012-08-27 17:15 UTC (History)
0 users

See Also:
Package list:
Runtime testing required: ---

build.log (plib-1.8.5:20120824-163243.log,176.83 KB, text/plain)
2012-08-25 12:20 UTC, Agostino Sarubbo

Note You need to log in before you can comment on or make changes to this bug.
Description Agostino Sarubbo gentoo-dev 2012-08-25 12:20:40 UTC
Created attachment 322178 [details]

if x86_64-pc-linux-gnu-g++ -DPACKAGE_NAME=\"\" -DPACKAGE_TARNAME=\"\" -DPACKAGE_VERSION=\"\" -DPACKAGE_STRING=\"\" -DPACKAGE_BUGREPORT=\"\" -DPACKAGE=\"plib\" -DVERSION=\"1.8.5\" -
-DHAVE_INTTYPES_H=1 -DHAVE_STDINT_H=1 -DHAVE_UNISTD_H=1 -I. -I. -I../../src/sg -I../../src/util    -march=native -O2 -fPIC -Wall -MT ssgLoadMDL.o -MD -MP -MF ".deps/ssgLoadMDL.Tpo"
 -c -o ssgLoadMDL.o ssgLoadMDL.cxx; \
then mv -f ".deps/ssgLoadMDL.Tpo" ".deps/ssgLoadMDL.Po"; else rm -f ".deps/ssgLoadMDL.Tpo"; exit 1; fi
In file included from /usr/include/string.h:642:0,
                 from ../../src/util/ul.h:43,
                 from ../../src/sg/sg.h:29,
                 from ssg.h:29,
                 from ssgLocal.h:27,
                 from ssgLoadOBJ.cxx:62:
In function ‘char* strncat(char*, const char*, size_t)’,
    inlined from ‘void load_materials(const char*)’ at ssgLoadOBJ.cxx:224:37,
    inlined from ‘int obj_read(FILE*)’ at ssgLoadOBJ.cxx:609:33:
/usr/include/bits/string3.h:152:71: warning: call to char* __builtin___strncat_chk(char*, const char*, long unsigned int, long unsigned int) might overflow destination buffer
Comment 1 Tupone Alfredo gentoo-dev 2012-08-27 17:15:04 UTC
The warning refer to a variable that is used to host a path name. That is 1024 byte long. It could overflow, but I doubt really does. 

At suse they fixed as per

I prefer not to fix it and leave the way it is.