I wonder if it's worth adding a delta with debian for this strncmp()
fix, though.

The upstream patch switches to strcmp(), arguing that these buffers are
always null terminated. In that case, even the incorrect size_t
parameter for strncmp() (source of the warning) won't matter, as the
comparison will always stop at the \0.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1951834

Title:
  [MIR]: frr

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/frr/+bug/1951834/+subscriptions


-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to