URL:
  <https://savannah.gnu.org/bugs/?67002>

                 Summary: [Patch] Fix Stack overflow
                   Group: Denemo
               Submitter: pranavkaruvally
               Submitted: Wed 09 Apr 2025 04:03:03 PM UTC
                Category: None
                Severity: 3 - Normal
              Item Group: None
                  Status: None
                 Privacy: Public
             Assigned to: None
         Originator Name:
             Open/Closed: Open
         Discussion Lock: Any


    _______________________________________________________

Follow-up Comments:


-------------------------------------------------------
Date: Wed 09 Apr 2025 04:03:03 PM UTC By: Pranav P <pranavkaruvally>
When compiled with -fstack-protector-strong and -O2 flags I encountered a
'detected stack smash'. Debian's packaging process adds these flags when run
through their dh_auto_configure. With -fsanitize=address I was able to detect
an overflow. I am attaching the patch with this bug report.

Thanks,
Pranav






    _______________________________________________________
File Attachments:


-------------------------------------------------------
Name: fix-buffer-overflow.patch  Size: 741B
<https://file.savannah.gnu.org/file/fix-buffer-overflow.patch?file_id=57121>

    AGPL NOTICE

These attachments are served by Savane. You can download the corresponding
source code of Savane at
https://savannah.gnu.org/source/savane-92d986ecf03026fc805a21e29f0f8463ae8fbd0f.tar.gz

    _______________________________________________________

Reply to this item at:

  <https://savannah.gnu.org/bugs/?67002>

_______________________________________________
Message sent via Savannah
https://savannah.gnu.org/

Attachment: signature.asc
Description: PGP signature

Reply via email to