[Bug tools/33004] Stack Buffer Underflow in eu-unstrip's sections_match Function

2025-06-02 Thread xdcao.cs at gmail dot com
https://sourceware.org/bugzilla/show_bug.cgi?id=33004 --- Comment #5 from Xudong Cao --- ASan rightly flags the cross-object pointer subtraction in sections_match()—disallowed under C11 §6.5.6—because its red-zone poisoning detects the out-of-object access even though the same UB silently passes

[Bug tools/33004] Stack Buffer Underflow in eu-unstrip's sections_match Function

2025-06-02 Thread mark at klomp dot org
https://sourceware.org/bugzilla/show_bug.cgi?id=33004 --- Comment #4 from Mark Wielaard --- (In reply to Xudong Cao from comment #3) > Thanks for the quick fix! > I agree the files are malformed, but any out-of-bounds access caught by ASan > is still considered a memory-safety defect from the sec

[Bug tools/33004] Stack Buffer Underflow in eu-unstrip's sections_match Function

2025-06-02 Thread xdcao.cs at gmail dot com
https://sourceware.org/bugzilla/show_bug.cgi?id=33004 --- Comment #3 from Xudong Cao --- (In reply to Mark Wielaard from comment #2) > Checked in the early exit patch so we don't produce an obscure error message > later. But there is no real bug here. Hi Mark, Thanks for the quick fix! I agree t

[Bug tools/33004] Stack Buffer Underflow in eu-unstrip's sections_match Function

2025-06-01 Thread mark at klomp dot org
https://sourceware.org/bugzilla/show_bug.cgi?id=33004 Mark Wielaard changed: What|Removed |Added Resolution|--- |NOTABUG Status|UNCONFIRME

[Bug tools/33004] Stack Buffer Underflow in eu-unstrip's sections_match Function

2025-06-01 Thread mark at klomp dot org
https://sourceware.org/bugzilla/show_bug.cgi?id=33004 Mark Wielaard changed: What|Removed |Added CC||mark at klomp dot org --- Comment #1