On 04/30/2016 01:08 PM, Vladimir Lettiev wrote: > On Fri, Apr 29, 2016 at 06:35:33PM +0200, Ondrej Filip wrote: >> Dear Bird users, >> the long expected version is out: >> >> Version 1.6.0 (2016-04-29) >> o Major RIP protocol redesign > > Looks like the same issue with -D_FORTIFY_SOURCE=2 raised again > > http://bird.network.cz/pipermail/bird-users/2015-October/009965.html > > In function 'strncpy', > inlined from 'rip_fill_authentication.isra.9' at > ../../../proto/rip/packets.c:215:5: > /usr/include/bits/string3.h:126:10: error: call to __builtin___strncpy_chk > will always overflow destination buffer > return __builtin___strncpy_chk (__dest, __src, __len, __bos (__dest)); > ^ > make[1]: *** [packets.o] Error 1
Thanks for your report, we will address it, it seems to be a real bug in auth. MQ
