Version 1.6.0

Ondrej Zajicek santiago at crfreenet.org
Mon May 2 12:12:06 CEST 2016


On Mon, May 02, 2016 at 10:44:28AM +0200, Jan Matejka wrote:
> > In function 'strncpy',
> >     inlined from 'rip_fill_authentication.isra.9' at ../../../proto/rip/packets.c:215:5:
> > /usr/include/bits/string3.h:126:10: error: call to __builtin___strncpy_chk will always overflow destination buffer
> >    return __builtin___strncpy_chk (__dest, __src, __len, __bos (__dest));
> >           ^
> > make[1]: *** [packets.o] Error 1
> 
> Thanks for your report, we will address it, it seems to be a real bug in
> auth.

Well, IMHO it is not a bug but a false positive, see:

http://bird.network.cz/pipermail/bird-users/2015-October/009966.html

Although we could use there some less tricky construct.

-- 
Elen sila lumenn' omentielvo

Ondrej 'Santiago' Zajicek (email: santiago at crfreenet.org)
OpenPGP encrypted e-mails preferred (KeyID 0x11DEADC3, wwwkeys.pgp.net)
"To err is human -- to blame it on a computer is even more so."
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 181 bytes
Desc: Digital signature
URL: <http://trubka.network.cz/pipermail/bird-users/attachments/20160502/580295de/attachment.asc>


More information about the Bird-users mailing list