http://gcc.gnu.org/bugzilla/show_bug.cgi?id=59750

Jakub Jelinek <jakub at gcc dot gnu.org> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
             Status|UNCONFIRMED                 |RESOLVED
                 CC|                            |jakub at gcc dot gnu.org
         Resolution|---                         |INVALID

--- Comment #1 from Jakub Jelinek <jakub at gcc dot gnu.org> ---
Why do you think this should be caught, that is not what -fstack-protector is
meant to protect.  After 10 bytes long buffer there is likely to be padding, so
1 byte overflow will unlikely clobber the stack canary.  SSP only is about
prevention of overwriting function return address and caller's stack frames.
Use -D_FORTIFY_SOURCE=2, -fsanitize=address, -fmudflap etc. if you want this to
be caught.

Reply via email to