search for: string_fortifi

Displaying 6 results from an estimated 6 matches for "string_fortifi".

Did you mean: string_fortified
2020 May 22
2
GCC warning
...mit a package on CRAN, and everything passes ok on all platforms but Debian, where CRAN responds with an automatic "significant" warning: * checking whether package ?QCA? can be installed ... [35s/35s] WARNING Found the following significant warnings: /usr/include/x86_64-linux-gnu/bits/string_fortified.h:106:10: warning: ?__builtin_strncpy? output may be truncated copying 12 bytes from a string of length 79 [-Wstringop-truncation] See ?/srv/hornik/tmp/CRAN/QCA.Rcheck/00install.out? for details. I know the cause of this: using a cursomized version of some external C library, coupled with <S...
2023 Jun 06
1
Possible overflow bug?
...me related work I built openssh 9.3p1 with -fsanitize=address and this came up during compilation. In file included from /usr/include/string.h:535, from kex.c:34: In function 'explicit_bzero', inlined from 'kex_free_newkeys' at kex.c:743:2: /usr/include/bits/string_fortified.h:72:3: warning: '__explicit_bzero_chk' writing 48 bytes into a region of size 8 overflows the destination [-Wstringop-overflow=] 72 | __explicit_bzero_chk (__dest, __len, __glibc_objsize0 (__dest)); | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ In fil...
2020 May 23
0
GCC warning
...AN, and everything passes ok on all platforms but Debian, where CRAN responds with an automatic "significant" warning: > > * checking whether package ?QCA? can be installed ... [35s/35s] WARNING > Found the following significant warnings: > /usr/include/x86_64-linux-gnu/bits/string_fortified.h:106:10: warning: ?__builtin_strncpy? output may be truncated copying 12 bytes from a string of length 79 [-Wstringop-truncation] > See ?/srv/hornik/tmp/CRAN/QCA.Rcheck/00install.out? for details. > > > I know the cause of this: using a cursomized version of some external C library...
2023 May 16
1
xfer_sum_len type bug
...from /home/demartin/BuildClients/cobrasync-8.80-alsi11-lib32/cobrasync/rsync-3.2.7/match.c:22: In function 'memset', inlined from 'match_sums' at /home/demartin/BuildClients/cobrasync-8.80-alsi11-lib32/cobrasync/rsync-3.2.7/match.c:431:3: /usr/include/i386-linux-gnu/bits/string_fortified.h:71:10: error: '__builtin___memset_chk' specified size between 2147483648 and 4294967295 exceeds maximum object size 2147483647 [-Werror=stringop-overflow=] 71 | return __builtin___memset_chk (__dest, __ch, __len, __bos0 (__dest)); | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~...
2025 Apr 30
3
[Bug 3819] New: safe_path may pass overlapping source and destination pointers on some systems
...caused by Debian patches), I noticed this in valgrind output: sshd[22181]: ==22181== Source and destination overlap in strlcpy(0x1ffeffd7e3, 0x1ffeffd7e3, 4096) sshd[22181]: ==22181== at 0x484E64D: strlcpy (vg_replace_strmem.c:667) sshd[22181]: ==22181== by 0x189ED5: UnknownInlinedFun (string_fortified.h:169) sshd[22181]: ==22181== by 0x189ED5: safe_path (misc.c:2335) sshd[22181]: ==22181== by 0x18A09D: safe_path_fd (misc.c:2376) sshd[22181]: ==22181== by 0x138C47: auth_openfile (auth2-pubkeyfile.c:477) sshd[22181]: ==22181== by 0x13783A: user_key_allowed2 (auth2-pubkey.c:63...
2020 May 23
1
GCC warning
...ng passes ok on all platforms but Debian, where CRAN responds with an automatic "significant" warning: >> >> * checking whether package ?QCA? can be installed ... [35s/35s] WARNING >> Found the following significant warnings: >> /usr/include/x86_64-linux-gnu/bits/string_fortified.h:106:10: warning: ?__builtin_strncpy? output may be truncated copying 12 bytes from a string of length 79 [-Wstringop-truncation] >> See ?/srv/hornik/tmp/CRAN/QCA.Rcheck/00install.out? for details. >> >> >> I know the cause of this: using a cursomized version of some exte...