Updates:
Status: Duplicate
Mergedinto: 138
Comment #3 on issue 347 by [email protected]: asan does not detect
stack buffer overflow for alloca(const)
https://code.google.com/p/address-sanitizer/issues/detail?id=347
Today clang's asan does not instrument variable sized allocas.
This can be done and would be a nice thing to have, by is a low priority
for us at this point. Maybe once we start instrumenting glibc with clang's
asan this will become more interesting.
Patches are welcome, as always. :)
Dupping against issue 138
--
You received this message because this project is configured to send all
issue notifications to this address.
You may adjust your notification preferences at:
https://code.google.com/hosting/settings
--
You received this message because you are subscribed to the Google Groups
"address-sanitizer" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to [email protected].
For more options, visit https://groups.google.com/d/optout.