https://gcc.gnu.org/bugzilla/show_bug.cgi?id=105405

--- Comment #3 from Jakub Jelinek <jakub at gcc dot gnu.org> ---
I think that is just misunderstanding on how ASan works and what it can
protect. It adds red zone around vars, so that access right after end of var or
before start of var is reported. But the red zone is quite small and needs to
be if we don't want to blow the whole stack, so if the overflow is farther away
and you are unlucky enough to reaching another var, it won't be diagnosed.
-fsanitize=undefined

Reply via email to