This is the mail archive of the glibc-bugs@sourceware.org mailing list for the glibc project.


Index Nav: [Date Index] [Subject Index] [Author Index] [Thread Index]
Message Nav: [Date Prev] [Date Next] [Thread Prev] [Thread Next]
Other format: [Raw text]

[Bug libc/7066] Probable buffer overrun in strtold()


------- Additional Comments From nix at esperi dot org dot uk  2008-12-05 00:17 -------
It's using the same compile line that glibc's 'make check' uses, which 
passes -std=gnu99 (IIRC: I don't have a build tree at the right point to verify 
this right now).

The original testcase in glibc calls strtold() with many different inputs: only 
this one crashes under -fstack-protector-all, and the corrupted stack is not in 
the testing function but within glibc itself. So I don't see how e.g. pointer 
width differences (not applicable on x86-32 anyway as far as I can see) could 
cause a problem. It's not as if this is a varargs function on AIX or something.

-- 


http://sourceware.org/bugzilla/show_bug.cgi?id=7066

------- You are receiving this mail because: -------
You are on the CC list for the bug, or are watching someone who is.


Index Nav: [Date Index] [Subject Index] [Author Index] [Thread Index]
Message Nav: [Date Prev] [Date Next] [Thread Prev] [Thread Next]