[Bug 156840] (gcc4 O1+) perl-DBD-pg Placeholders no longer functioning
bugzilla at redhat.com
bugzilla at redhat.com
Tue May 24 00:50:28 UTC 2005
Please do not reply directly to this email. All additional
comments should be made in the comments box of this bug report.
Summary: (gcc4 O1+) perl-DBD-pg Placeholders no longer functioning
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=156840
------- Additional Comments From jpo at di.uminho.pt 2005-05-23 20:50 EST -------
The gcc4/glibc/_FORTIFY_SOURCE buffer overflow protection appears to
documented in this Jakub's email:
[PATCH] Object size checking to prevent (some) buffer overflows
http://gcc.gnu.org/ml/gcc-patches/2004-09/msg02055.html
---------------------------------------------------------------
...
The intended use in glibc is that by default no protection is
done, when the above GCC 4.0+ and -D_FORTIFY_SOURCE=1 is used
at optimization level 1 and above, security measures that
shouldn't change behaviour of conforming programs are taken.
With -D_FORTIFY_SOURCE=2 some more checking is added, but
some conforming programs might fail.
...
---------------------------------------------------------------
The last sentence in the above paragraph worries me. How many false positives
were found? Does anyone know examples of some false positives?
--
Configure bugmail: https://bugzilla.redhat.com/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are on the CC list for the bug, or are watching someone who is.
More information about the Fedora-perl-devel-list
mailing list