liblzma_util.c:28: bad call to sprintf ?

Bug #1191249 reported by dcb
6
This bug affects 1 person
Affects Status Importance Assigned to Milestone
PylibLZMA
New
Undecided
Unassigned

Bug Description

I just got the GNU C compiler to say

In function 'sprintf',
    inlined from 'Util_CatchLZMAError' at src/liblzma_util.c:28:12:
/usr/include/bits/stdio2.h:33:3: warning: call to __builtin___sprintf_chk will always overflow destination buffer [enabled by default]
   return __builtin___sprintf_chk (__s, __USE_FORTIFY_LEVEL - 1,

Source code is

                char warning[50];
                sprintf(warning, "check type '%d' is unsupported, check will not be validated",
                        lzma_get_check(lzus));

Suggest increase size of warning buffer.

To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.