[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Bug binutils/29099] Buffer overflow can happen at libiberty/argv.c
From: |
amodra at gmail dot com |
Subject: |
[Bug binutils/29099] Buffer overflow can happen at libiberty/argv.c |
Date: |
Thu, 28 Apr 2022 10:01:48 +0000 |
https://sourceware.org/bugzilla/show_bug.cgi?id=29099
--- Comment #3 from Alan Modra <amodra at gmail dot com> ---
"pos * sizeof (char)" might look to be a useless multiplication by 1, but it
also converts the expression to size_t. size_t is an unsigned integer type.
There is no signed integer overflow here, unless size_t is a smaller type than
long. Even though the C standard allows that, I doubt there are any systems
around that might be running this code where that is the case.
--
You are receiving this mail because:
You are on the CC list for the bug.