-
Notifications
You must be signed in to change notification settings - Fork 20
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Stack smashing in AtsEntryOverflow test #102
Labels
Comments
Is this still the case after the following? |
jphickey
added a commit
to jphickey/SC
that referenced
this issue
Sep 15, 2023
Significant buffer management issues existed in many/all of these test cases and was causing stack corruption. Rewriting the test cases to better follow current recommended practices, and reduce repetition.
jphickey
added a commit
to jphickey/SC
that referenced
this issue
Sep 15, 2023
Major buffer overrun issues were already fixed, but this further cleans up the test cases to avoid repetition and better follow current recommended practices.
jphickey
added a commit
to jphickey/SC
that referenced
this issue
Sep 20, 2023
Major buffer overrun issues were already fixed, but this further cleans up the test cases to avoid repetition and better follow current recommended practices.
jphickey
added a commit
to jphickey/SC
that referenced
this issue
Oct 9, 2023
Major buffer overrun issues were already fixed, but this further cleans up the test cases to avoid repetition and better follow current recommended practices.
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Checklist (Please check before submitting)
Describe the bug
It appears this test case takes things a bit too literally - it creates an ATS buffer on the stack, then writes past the end of it.
To Reproduce
Execute the SC "loads" coverage test with stack protection enabled. This will abort due to stack corruption.
Expected behavior
Should execute successfully.
System observed on:
Debian
Additional context
The test case cannot literally overrun the buffer. It should just initialize the ATS so it looks like it will overrun the buffer - that is, set the length field too large - without writing those bytes.
Reporter Info
Joseph Hickey, Vantage Systems, Inc.
The text was updated successfully, but these errors were encountered: