>From a quick glimpse, the code should be correct. What's happening here is that FORITFY_SOURCE will replace strcpy with a function similar to strncpy(.., .., target buffer size). Target buffer size is taken from the structure definition, and hence is 1 (buffer is uchar[1]). That's wrong, since the calloc on line 8593 has already allocated enough space.
-- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/688730 Title: Buffer Overflow happens over it's own documentation when compiled with -O2 -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs