Open MPI logo

Open MPI Development Mailing List Archives

  |   Home   |   Support   |   FAQ   |   all Development mailing list

Subject: [OMPI devel] Fwd: [Bug 1037231] New: openmpi FTBFS if "-Werror=format-security" flag is used
From: Orion Poplawski (orion_at_[hidden])
Date: 2013-12-04 12:32:53

The attached patch fixes this issue.

-------- Original Message --------
Subject: [Bug 1037231] New: openmpi FTBFS if "-Werror=format-security" flag is
Date: Tue, 03 Dec 2013 03:26:30 +0000
From: bugzilla_at_[hidden]
To: orion_at_[hidden]

             Bug ID: 1037231
            Summary: openmpi FTBFS if "-Werror=format-security" flag is
            Product: Fedora
            Version: rawhide
          Component: openmpi
           Assignee: dledford_at_[hidden]
           Reporter: dkholia_at_[hidden]
         QA Contact: extras-qa_at_[hidden]
                 CC: dakingun_at_[hidden], dledford_at_[hidden],
                     fenlason_at_[hidden], orion_at_[hidden]

Description of problem

openmpi fails to build if "-Werror=format-security" flag is used.


btl_usnic_module.c:829:5: error: format not a string literal and no format
arguments [-Werror=format-security]


We are working on a proposal to enable "-Werror=format-security" for all
packages. Once this flag is enabled, GCC will refuse to compile code that could
be vulnerable to a string format security flaw. For more details, please see page.

To understand why it is important to fix this, please see page.

How to fix this

The fix for these errors is quite simple. It's a matter of changing a
line like,


to read,

    printf("%s", foo);

That's it.

Please fix this issue in rawhide with a patch (which you should submit
to upstream to merge moving forward). Please do a new build with the
fix in rawhide. Other releases do not need to be directly fixed, but
there should be no harm in pushing out this fix/patch with other needed
changes to those branches.

In the event you don't fix this bug before the next mass rebuild,
provenpackagers may step in and update your package(s) to fix this

How reproducible

Build openmpi-1.7.3-1.fc21.src.rpm with "-Werror=format-security" flag to
reproduce the problem.

To make this process easier, you can use a modified "redhat-rpm-config" package
from URL.

$ sha256sum redhat-rpm-config-9.1.0-56.fc20.*

You are receiving this mail because:
You are on the CC list for the bug.
Unsubscribe from this bug