debian-rules-should-not-use-sanitize-all-buildflag
This package's debian/rules
file contains a
DEB_BUILD_MAINT_OPTIONS
assignment that enables the
sanitize=+all
build flag.
This option instructs the compiler to enable options designed to protect the binary against memory corruptions, memory leaks, use after free, threading data races, and undefined behavior bugs.
However, this options should not be used for production Debian binaries as they can reduce reliability for conformant code, reduce security or even functionality.
Please remove the reference to sanitize=+all
.
For more information please consult:
- the dpkg-buildflags(1) manual page
- Bug#895811
The tag is present in Lintian version 2.114.163
.
That is the most recent version we know about.
We use semantic versions.
The patch number is a commit step indicator relative to the
2.114.0
release tag in our Git
repository.
You can find the detection logic for this version at commit fac7222. For merge requests, please use the latest version in the Lintian check debian/rules.
Visibility: error