|
glibc-2.42 added __inet_ntop_chk fortification, which started to fail:
*** buffer overflow detected ***: terminated
Program received signal SIGABRT, Aborted.
0x00007ffff629b0dc in __pthread_kill_implementation () from /lib64/libc.so.6
(gdb) bt
#0 in __pthread_kill_implementation () from /lib64/libc.so.6
#1 in raise () from /lib64/libc.so.6
#2 in abort () from /lib64/libc.so.6
#3 in __libc_message_impl.cold () from /lib64/libc.so.6
#4 in __fortify_fail () from /lib64/libc.so.6
#5 in __chk_fail () from /lib64/libc.so.6
#6 in __inet_ntop_chk () from /lib64/libc.so.6
#7 in inet_ntop (..) at /usr/include/bits/inet-fortified.h>
#8 ipv6tuple_to_string[abi:cxx11](ipv6tuple*, bool) (..)
Use INET6_ADDRSTRLEN as destination buffer size.
Also add a minor build system fix and ebuild cleanups.
Revbump directly to stable since this has always been an issue and
should be fixed even with glibc <2.42.
Closes: https://bugs.gentoo.org/961046
Signed-off-by: Holger Hoffstätte <holger@applied-asynchrony.com>
Part-of: https://github.com/gentoo/gentoo/pull/43311
Signed-off-by: Sam James <sam@gentoo.org>
|