-w with an arbitrary size.
Thank you for the kind and detailed explanation.
2025년 6월 25일 (수) 오전 4:40, Paul Eggert 님이 작성:
> On 2025-06-24 06:03, Jaehoon Jang wrote:
>
> > The issue here is not that "od" performs a large task,
> > but that it allows unbounded, unche
> "Dangerous" in the sense that if you give "od" a large task it needs a
> lot of RAM? If so, most nontrivial programs are "dangerous".
While it’s true that many programs may allocate large memory for large
inputs, well-designed software validates user input to prevent pathological
or abusive case
Potential Out-of-Memory Risk in coreutils od Due to Inadequate Argument
Validation for -w Option
*Description*
```
$ src/od -w0 /bin/ls
Aborted
```
```
1835if (s_err != LONGINT_OK || w_tmp <= 0)
1836xstrtol_fatal (s_err, oi, c, long_options, optarg);
```
We confirmed that when the arg