https://gcc.gnu.org/bugzilla/show_bug.cgi?id=121283
--- Comment #2 from Sam James <sjames at gcc dot gnu.org> --- commit e3a6e85d67f1a48dec3e2557a83d6ce1544a58cb Author: Aaron Merey <ame...@redhat.com> AuthorDate: Thu Mar 20 13:13:33 2025 -0400 Commit: Aaron Merey <ame...@redhat.com> CommitDate: Mon Mar 24 14:43:03 2025 -0400 Add _FORTIFY_SOURCE support for inet_pton Add function __inet_pton_chk which calls __chk_fail when the size of argument dst is too small. inet_pton is redirected to __inet_pton_chk or __inet_pton_warn when _FORTIFY_SOURCE is > 0. Also add tests to debug/tst-fortify.c, update the abilist with __inet_pton_chk and mention inet_pton fortification in maint.texi. Co-authored-by: Frédéric Bérat <fbe...@redhat.com> Reviewed-by: Florian Weimer <fwei...@redhat.com> commit a71db81ed1353edd00ca2901d2fefd98c53209d3 Author: Aaron Merey <ame...@redhat.com> AuthorDate: Thu Mar 20 11:07:05 2025 -0400 Commit: Aaron Merey <ame...@redhat.com> CommitDate: Mon Mar 24 14:43:03 2025 -0400 Prepare inet_pton to be fortified Split inet_pton internals such as __inet_pton_length from the inet_pton entry point. This allows the internals to be built with fortification while leaving the inet_pton entry point unchanged. Co-authored-by: Frédéric Bérat <fbe...@redhat.com> Reviewed-by: Florian Weimer <fwei...@redhat.com>