[Bug 156840] (gcc4 O1+) perl-DBD-pg Placeholders no longer functioning

bugzilla at redhat.com bugzilla at redhat.com
Tue May 24 00:50:28 UTC 2005


Please do not reply directly to this email. All additional
comments should be made in the comments box of this bug report.

Summary: (gcc4 O1+) perl-DBD-pg Placeholders no longer functioning


https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=156840





------- Additional Comments From jpo at di.uminho.pt  2005-05-23 20:50 EST -------
The gcc4/glibc/_FORTIFY_SOURCE buffer overflow protection appears to
documented in this Jakub's email: 

  [PATCH] Object size checking to prevent (some) buffer overflows
  http://gcc.gnu.org/ml/gcc-patches/2004-09/msg02055.html
  ---------------------------------------------------------------
  ...
  The intended use in glibc is that by default no protection is
  done, when the above GCC 4.0+ and -D_FORTIFY_SOURCE=1 is used
  at optimization level 1 and above, security measures that
  shouldn't change behaviour of conforming programs are taken.
  With -D_FORTIFY_SOURCE=2 some more checking is added, but
  some conforming programs might fail.
  ...
  ---------------------------------------------------------------

The last sentence in the above paragraph worries me.  How many false positives
were found?  Does anyone know examples of some false positives?

-- 
Configure bugmail: https://bugzilla.redhat.com/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are on the CC list for the bug, or are watching someone who is.




More information about the Fedora-perl-devel-list mailing list