Octave и Asymptote вываливаются при сборке с сообщением типа dlsym vsnprintf error:(null):
В этом как-то замешаны nvidia, libsafe и /etc/ld.so.preload
make[3]: Leaving directory `/tmp/octave-hg200904101211/doc/refcard' ../../run-octave -f -q -H -p . --eval "sparseimages ('spmatrix', 'txt');" dlsym vsprintf error:(null) make[3]: *** [spmatrix.txt] Ошибка 1 make[3]: *** Ожидание завершения заданий... dlsym vsprintf error:(null) make[3]: *** [gplot.txt] Ошибка 1 dlsym vsprintf error:(null) make[3]: *** [grid.txt] Ошибка 1 make[3]: Leaving directory `/tmp/octave-hg200904101211/doc/interpreter' make[2]: *** [interpreter] Ошибка 2 make[2]: Leaving directory `/tmp/octave-hg200904101211/doc' make[1]: *** [doc] Ошибка 2 make[1]: Leaving directory `/tmp/octave-hg200904101211' make: *** [all] Ошибка 2
# make all cd doc; make man make[1]: Entering directory `/tmp/asymptote-svn20090407015508/doc' ../asy -dir ../base -config "" -render=0 -f pdf -noprc axis3.asy dlsym vsnprintf error:(null) make[1]: *** [axis3.pdf] Ошибка 1 make[1]: Leaving directory `/tmp/asymptote-svn20090407015508/doc' make: *** [man] Ошибка 2
The exploitation of buffer overflow and format string vulnerabilities in process stacks are a significant portion of security attacks. 'libsafe' is based on a middleware software layer that intercepts all function calls made to library functions known to be vulnerable. A substitute version of the corresponding function implements the original function in a way that ensures that any buffer overflows are contained within the current stack frame, which prevents attackers from overwriting the return address and hijacking the control flow of a running program.