On 2012-05-18 22:34 +0200, Russ Allbery wrote:

> Ralf Jung <p...@ralfj.de> writes:
>
>> I'd like to extend this to hardening-no-fortify-functions: My package
>> definitely has -D_FORTIFY_SOURCE=2 set (an excerpt from the build flags:
>> "-fstack-protector --param=ssp-buffer-size=4 -Wformat
>> -Werror=format-security -D_FORTIFY_SOURCE=2"), but I get a
>> hardening-no-stackprotector and hardening- no-fortify-functions for its
>> only binary.
>
> False positives for _FORTIFY_SOURCE are somewhat rarer, and that one is
> much easier to miss applying due to the CPPFLAGS vs. CFLAGS distinction.
> My immediate inclination would be to ask people to add an override for
> false positives for it, since it's more likely that the tag is valid.

Easier said then done, how should I override this warning:

,----
| W: libncurses5: hardening-no-fortify-functions 
usr/lib/i386-linux-gnu/libmenu.so.5.9
`----

Using the output verbatim only works for one architecture and generates
an additional problem (unused-override) for all others, substituting
${DEB_HOST_MULTIARCH} at build time instead leads to
/usr/share/lintian/overrides/libncurses5 having architecture-dependent
content, breaking multiarch coinstallability.

Cheers,
       Sven



-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to