https://bugs.kde.org/show_bug.cgi?id=402833

Ewgeni Gawrilow <ewgenij.gawri...@o2online.de> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
            Version|unspecified                 |3.14.0
           Platform|Other                       |Ubuntu Packages
                 CC|                            |ewgenij.gawrilow@o2online.d
                   |                            |e

--- Comment #4 from Ewgeni Gawrilow <ewgenij.gawri...@o2online.de> ---
I get a false positive: a call to memmove (which should cope with overlapping
memory areas) is erroneously checked as if it were memcpy:

==3546== Source and destination overlap in memcpy_chk(0x1ffeffc460,
0x1ffeffc462, 9)
==3546==    at 0x4C383D0: __memcpy_chk (in
/usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==3546==    by 0x6DC9481: memmove (string_fortified.h:40)

Comparing this with previous comments in this ticket, it seems like the
redirects for memmove and memcpy are simply swapped.

-- 
You are receiving this mail because:
You are watching all bug changes.

Reply via email to