Displaying 1 result from an estimated 1 matches for "__glibc_objsize0".
2023 Jun 06
1
Possible overflow bug?
...cit_bzero',
     inlined from 'kex_free_newkeys' at kex.c:743:2:
/usr/include/bits/string_fortified.h:72:3: warning: 
'__explicit_bzero_chk' writing 48 bytes into a region of size 8 
overflows the destination [-Wstringop-overflow=]
    72 |   __explicit_bzero_chk (__dest, __len, __glibc_objsize0 (__dest));
       |   ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
In file included from kex.c:53:
kex.h: In function 'kex_free_newkeys':
kex.h:116:18: note: destination object 'name' of size 8
   116 |         char    *name;
       |                  ^~~~
/usr/in...