Package: valgrind Version: 1:3.3.1-2 Severity: normal When valgrind loads a PIE executable, it maps the executable at address 0x0 in the address space.
For example, doing: $ valgrind /lib/ld-2.7.so /bin/cat /proc/self/maps shows that valgrind is mapping /lib/ld-2.7.so at address 0x0: 00000000-0001a000 r-xp 00000000 03:03 8654965 /lib/ld-2.7.so 0001a000-0001c000 rw-p 0001a000 03:03 8654965 /lib/ld-2.7.so This prevents NULL pointer derefences from being detected. -- System Information: Debian Release: lenny/sid APT prefers unstable APT policy: (500, 'unstable') Architecture: i386 (i686) Kernel: Linux 2.6.25-2-686 (SMP w/2 CPU cores) Locale: LANG=en_US, LC_CTYPE=en_US (charmap=ISO-8859-1) Shell: /bin/sh linked to /bin/bash Versions of packages valgrind depends on: ii libc6 2.7-13 GNU C Library: Shared libraries Versions of packages valgrind recommends: ii gdb 6.8-3 The GNU Debugger Versions of packages valgrind suggests: pn alleyoop <none> (no description available) pn kcachegrind <none> (no description available) ii libc6-dbg 2.7-13 GNU C Library: Libraries with debu -- no debconf information -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

