https://bugs.kde.org/show_bug.cgi?id=402833
Ewgeni Gawrilow <ewgenij.gawri...@o2online.de> changed: What |Removed |Added ---------------------------------------------------------------------------- Version|unspecified |3.14.0 Platform|Other |Ubuntu Packages CC| |ewgenij.gawrilow@o2online.d | |e --- Comment #4 from Ewgeni Gawrilow <ewgenij.gawri...@o2online.de> --- I get a false positive: a call to memmove (which should cope with overlapping memory areas) is erroneously checked as if it were memcpy: ==3546== Source and destination overlap in memcpy_chk(0x1ffeffc460, 0x1ffeffc462, 9) ==3546== at 0x4C383D0: __memcpy_chk (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so) ==3546== by 0x6DC9481: memmove (string_fortified.h:40) Comparing this with previous comments in this ticket, it seems like the redirects for memmove and memcpy are simply swapped. -- You are receiving this mail because: You are watching all bug changes.