https://gcc.gnu.org/bugzilla/show_bug.cgi?id=121283

--- Comment #2 from Sam James <sjames at gcc dot gnu.org> ---

commit e3a6e85d67f1a48dec3e2557a83d6ce1544a58cb
Author:     Aaron Merey <ame...@redhat.com>
AuthorDate: Thu Mar 20 13:13:33 2025 -0400
Commit:     Aaron Merey <ame...@redhat.com>
CommitDate: Mon Mar 24 14:43:03 2025 -0400

    Add _FORTIFY_SOURCE support for inet_pton

    Add function __inet_pton_chk which calls __chk_fail when the size of
    argument dst is too small.   inet_pton is redirected to __inet_pton_chk
    or __inet_pton_warn when _FORTIFY_SOURCE is > 0.

    Also add tests to debug/tst-fortify.c, update the abilist with
    __inet_pton_chk and mention inet_pton fortification in maint.texi.

    Co-authored-by: Frédéric Bérat <fbe...@redhat.com>
    Reviewed-by: Florian Weimer <fwei...@redhat.com>

commit a71db81ed1353edd00ca2901d2fefd98c53209d3
Author:     Aaron Merey <ame...@redhat.com>
AuthorDate: Thu Mar 20 11:07:05 2025 -0400
Commit:     Aaron Merey <ame...@redhat.com>
CommitDate: Mon Mar 24 14:43:03 2025 -0400

    Prepare inet_pton to be fortified

    Split inet_pton internals such as __inet_pton_length from the
    inet_pton entry point.

    This allows the internals to be built with fortification while
    leaving the inet_pton entry point unchanged.

    Co-authored-by: Frédéric Bérat <fbe...@redhat.com>
    Reviewed-by: Florian Weimer <fwei...@redhat.com>

Reply via email to