Please do not reply directly to this email. All additional comments should be made in the comments box of this bug report. Summary: (gcc4 O1+) perl-DBD-pg Placeholders no longer functioning https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=156840 ------- Additional Comments From jpo@xxxxxxxxxxxx 2005-05-23 20:50 EST ------- The gcc4/glibc/_FORTIFY_SOURCE buffer overflow protection appears to documented in this Jakub's email: [PATCH] Object size checking to prevent (some) buffer overflows http://gcc.gnu.org/ml/gcc-patches/2004-09/msg02055.html --------------------------------------------------------------- ... The intended use in glibc is that by default no protection is done, when the above GCC 4.0+ and -D_FORTIFY_SOURCE=1 is used at optimization level 1 and above, security measures that shouldn't change behaviour of conforming programs are taken. With -D_FORTIFY_SOURCE=2 some more checking is added, but some conforming programs might fail. ... --------------------------------------------------------------- The last sentence in the above paragraph worries me. How many false positives were found? Does anyone know examples of some false positives? -- Configure bugmail: https://bugzilla.redhat.com/bugzilla/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are on the CC list for the bug, or are watching someone who is.