Open
Description
Originally reported on Google Code with ID 247
Right now we disable source fortification by defining _FORTIFY_SOURCE=0
This may hide a number of bugs that could otherwise be detected by various _chk functions
(__printf_chk, __strcpy_chk etc.)
A better approach would be to wrap all the _chk functions and let the users enable
source fortification.
A suggestion from Jakub Jelinek:
>Well, -D_FORTIFY_SOURCE=2 does things that asan doesn't and can't do, so
>disabling fortification if you build with -fsanitize=address sounds like
>a very bad idea to me.
>IMHO libasan should intercept also the __*_chk calls, test + branch to
>__chk_fail if they should fail, otherwise fall through to the
>intercepted original function.
>For *printf* family __printf_chk etc. also fail on %n if it isn't in >read-only string
literal.
Reported by ramosian.glider
on 2013-11-22 13:48:10