The buffer overflow detection for multi-char stores uses the size of a source array even when what's actually being accessed (read and stored) is a pointer to the array. That leads to incorrect warnings in some cases. The attached patch corrects the function that computes the size of the access to set it to that of a pointer instead if the source is an address expression. Tested on x86_64-linux. Martin