http://gcc.gnu.org/bugzilla/show_bug.cgi?id=59750
Jakub Jelinek <jakub at gcc dot gnu.org> changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|UNCONFIRMED |RESOLVED
CC| |jakub at gcc dot gnu.org
Resolution|--- |INVALID
--- Comment #1 from Jakub Jelinek <jakub at gcc dot gnu.org> ---
Why do you think this should be caught, that is not what -fstack-protector is
meant to protect. After 10 bytes long buffer there is likely to be padding, so
1 byte overflow will unlikely clobber the stack canary. SSP only is about
prevention of overwriting function return address and caller's stack frames.
Use -D_FORTIFY_SOURCE=2, -fsanitize=address, -fmudflap etc. if you want this to
be caught.