Hi lee

On 2015-12-29, lee wrote:

> When you perform a strcpy() and overflow the destination buffer, you are
> supposed to experience a segmentation fault.  It shouldn't matter
> whether you run a hardened profile or not for detecting these.

Ok. Thanks for the explanation.

> I imagine it was discovered that a segmentation fault did occur, and
> that it inevitably would occur --- since gcc tells you that one will
> occur when using __builtin___strcpy_chk() --- and the application was
> terminated.  Otherwise, the test would have been unsuccessful.

Ok.

> Whether this is a bug or not depends on what you're supposed to expect,
> which I don't know.  If someone would run the test suite on a
> non-hardened profile and got the same warning from gcc, but vim wouldn't
> be terminated when the segmentation fault occurs, then I'd be worried.

Ok. Well, I don't know either what to expect. I haven't got 
enough knowledge to analyse this. I posted it here because I 
was told so ;-)

-- 
Greetings
Elias



Reply via email to