On Tue, 8 Aug 2023, David Malcolm via Gcc-patches wrote: > However, consider a situation in which someone attempted to, say, embed > libgccjit inside a web browser to generate machine code from > JavaScript, where the JavaScript is potentially controlled by an > attacker. I think we want to explicitly say that that if you're going > to do that, you need to put some other layer of defense in, so that > you're not blithely accepting the inputs to the compilation (sources > and options) from a potentially hostile source, where a crafted input > sources could potentially hit an ICE in the compiler and thus crash the > web browser.
A binutils analogue of sorts: you might well want to use objdump etc. on untrusted input, e.g. as part of analysis of a captured malware sample. But if you are using binutils tools in malware analysis, you really, really need to do so in a heavily sandboxed environment, as the malware could well try to exploit any system investigating it. -- Joseph S. Myers jos...@codesourcery.com