http://gcc.gnu.org/bugzilla/show_bug.cgi?id=59750
Jakub Jelinek <jakub at gcc dot gnu.org> changed: What |Removed |Added ---------------------------------------------------------------------------- Status|UNCONFIRMED |RESOLVED CC| |jakub at gcc dot gnu.org Resolution|--- |INVALID --- Comment #1 from Jakub Jelinek <jakub at gcc dot gnu.org> --- Why do you think this should be caught, that is not what -fstack-protector is meant to protect. After 10 bytes long buffer there is likely to be padding, so 1 byte overflow will unlikely clobber the stack canary. SSP only is about prevention of overwriting function return address and caller's stack frames. Use -D_FORTIFY_SOURCE=2, -fsanitize=address, -fmudflap etc. if you want this to be caught.