17 Aug
2023
17 Aug
'23
09:26
https://bugzilla.suse.com/show_bug.cgi?id=1214249 https://bugzilla.suse.com/show_bug.cgi?id=1214249#c7 --- Comment #7 from Richard Biener <rguenther@suse.com> --- I'll note again that __strlcpy_chk does if (__glibc_unlikely (s1len < n)) __chk_fail (); return __strlcpy (s1, s2, n); so it doesn't check whether 's2' might be shorter than s1len and thus the call is actually safe (it might be safe to call strnlen (s2, n)). -- You are receiving this mail because: You are on the CC list for the bug.