New comment by loreb on void-packages repository https://github.com/void-linux/void-packages/pull/34451#issuecomment-990259190 Comment: Btw, in case anyone wants to take a look, there were a couple of compilation warnings: ``` net.c: In function 'read_remote.part.0': net.c:159:6: warning: 'strncpy' specified bound 1024 equals destination size [-Wstringop-truncation] 159 | strncpy(neterr, strerror(errno), sizeof(neterr)); | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ net.c:154:6: warning: 'strncpy' specified bound 1024 equals destination size [-Wstringop-truncation] 154 | strncpy(neterr, ssl_errstr(), sizeof(neterr)); | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ net.c:168:4: warning: 'strncat' output may be truncated copying between 0 and 1023 bytes from a string of length 2047 [-Wstringop-truncation] 168 | strncat(neterr, buff, copysize); | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ net.c: In function 'send_remote_command': net.c:104:5: warning: 'strncpy' specified bound 1024 equals destination size [-Wstringop-truncation] 104 | strncpy(neterr, ssl_errstr(), sizeof(neterr)); | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ``` They were fixed upstream in February 2020 (strncpy=>strlcpy), except that it looks to me that the 2047=>1023 is still there (strncat) and replacing it with strlcat would silence the warning without actually fixing the issue.