Hi David,

I've tried a different x86_64 system with Ubuntu 11.10 and gcc 4.6.1, and the buffer overflow also occurs there (but only without --enable-debug), so I don't think gcc is to blame. Nevertheless, thanks for your efforts.

Regards,
Andreas

Hi Andreas,
Thanks for trying that. I've tried again but I still can't reproduce it. I did
find a problem with the hardening option to produce a position-independent
executable but that caused a segfault during start-up.

I was really concerned in case there was a sprintf that was writing beyond its
buffer and, of course, it's possible there is. It may also be a false positive
which has been fixed in a later version of GCC. For the moment I'm inclined to
leave it especially as you've found a work-around. I'd be interested if anyone
else has this problem.

Regards,
David

On 15/11/2011 07:24, Andreas Lochbihler wrote:
Hi David,

when I add the --enable-debug to ./configure, the buffer overflow error
disappears. ./configure --disable-shared leads to the same buffer
overflow, but no more details. Is there anything else I could try?

Best regards,
Andreas

Am 14.11.2011 18:05, schrieb David Matthews:
I've attempted to reproduce this without success. I'm running Ubuntu
11.10 and
had to install the hardening packages manually do there may be some
difference.
I can't tell much from the backtrace because the function names within
the poly
library aren't being shown. Could you try rebuilding poly with
./configure --enable-debug --disable-shared
That might provide some more useful information.

Regards,
David

On 11/11/2011 12:03, Andreas Lochbihler wrote:
Hi,

I tried to build Isabelle 2011-1 with the repository version 1352 of
PolyML on Ubuntu 10.04 and x86_64. g++ seems to include its fortify
checks automatically in the compiled code. When I build Isabelle's Pure
session, it detects a buffer overrun and aborts PolyML. Is this a bug in
PolyML? Or does PolyML not work with Fortify? Or is it just a
misconfiguration on my side? If I disable fortify with
-D_FORTIFY_SOURCE=0 when compiling PolyML, everything works fine again.

At the end of this mail, I have included the stack trace and memory map
for the buffer overflow.

Best regards,
Andreas


--
Karlsruher Institut für Technologie
IPD Snelting

Andreas Lochbihler
wissenschaftlicher Mitarbeiter
Adenauerring 20a, Geb. 50.41, Raum 031
76131 Karlsruhe

Telefon: +49 721 608-47399
Fax: +49 721 608-48457
E-Mail: [email protected]
http://pp.info.uni-karlsruhe.de
KIT - Universität des Landes Baden-Württemberg und nationales Forschungszentrum in der Helmholtz-Gemeinschaft
_______________________________________________
polyml mailing list
[email protected]
http://lists.inf.ed.ac.uk/mailman/listinfo/polyml

Reply via email to