http://bugzilla.novell.com/show_bug.cgi?id=586112
http://bugzilla.novell.com/show_bug.cgi?id=586112#c2
--- Comment #2 from Stefan Dirsch 2010-03-18 06:50:17 UTC ---
Looks like this happens in sysp (part of sax2).
# sudo sysp -s xstuff
*** buffer overflow detected ***: sysp terminated
======= Backtrace: =========
/lib64/libc.so.6(__fortify_fail+0x37)[0x7fdebafe5a37]
/lib64/libc.so.6(+0xe5850)[0x7fdebafe3850]
/lib64/libc.so.6(+0xe4e5b)[0x7fdebafe2e5b]
/lib64/libc.so.6(__snprintf_chk+0x7a)[0x7fdebafe2d2a]
sysp[0x4505ed]
sysp[0x43d09c]
sysp[0x40c96c]
sysp[0x40d170]
/lib64/libc.so.6(__libc_start_main+0xfd)[0x7fdebaf1cbdd]
sysp[0x404b69]
======= Memory map: ========
[...]
Maybe this is related to the runtime malloc check we've now enabled by default.
--
Configure bugmail: http://bugzilla.novell.com/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are on the CC list for the bug.