[Bug gprofng/29102] New: gprofng: assertion in gprofng/src/Expression.cc:139

2022-04-28 Thread vladimir.mezentsev at oracle dot com
https://sourceware.org/bugzilla/show_bug.cgi?id=29102 Bug ID: 29102 Summary: gprofng: assertion in gprofng/src/Expression.cc:139 Product: binutils Version: 2.39 (HEAD) Status: NEW Severity: normal Priority: P2

[Bug ld/29087] "non-canonical reference to canonical protected function" with protected visibility, -mno-direct-extern-access and virtual functions

2022-04-28 Thread hjl.tools at gmail dot com
https://sourceware.org/bugzilla/show_bug.cgi?id=29087 H.J. Lu changed: What|Removed |Added Target Milestone|--- |2.39 Status|NEW

[Bug ld/29087] "non-canonical reference to canonical protected function" with protected visibility, -mno-direct-extern-access and virtual functions

2022-04-28 Thread cvs-commit at gcc dot gnu.org
https://sourceware.org/bugzilla/show_bug.cgi?id=29087 --- Comment #7 from cvs-commit at gcc dot gnu.org --- The binutils-2_38-branch branch has been updated by H.J. Lu : https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=9c67f6382ac2c90fbde5729feaf7d59ce662147a commit

[Bug ld/29087] "non-canonical reference to canonical protected function" with protected visibility, -mno-direct-extern-access and virtual functions

2022-04-28 Thread cvs-commit at gcc dot gnu.org
https://sourceware.org/bugzilla/show_bug.cgi?id=29087 --- Comment #6 from cvs-commit at gcc dot gnu.org --- The master branch has been updated by H.J. Lu : https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=68c4956b1401de70173848a6bdf620cb42fa9358 commit

[Bug ld/22263] -fpie -pie generates dynamic relocations in text section

2022-04-28 Thread cvs-commit at gcc dot gnu.org
https://sourceware.org/bugzilla/show_bug.cgi?id=22263 --- Comment #26 from cvs-commit at gcc dot gnu.org --- The binutils-2_37-branch branch has been updated by Andreas Krebbel : https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=e20961e9f9d058fab00ce511b429570a901396e6 commit

[Bug ld/22263] -fpie -pie generates dynamic relocations in text section

2022-04-28 Thread cvs-commit at gcc dot gnu.org
https://sourceware.org/bugzilla/show_bug.cgi?id=22263 --- Comment #25 from cvs-commit at gcc dot gnu.org --- The binutils-2_38-branch branch has been updated by Andreas Krebbel : https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=82a5bb730a16f8c7962568030268e784b4fb42c8 commit

[Bug ld/22263] -fpie -pie generates dynamic relocations in text section

2022-04-28 Thread cvs-commit at gcc dot gnu.org
https://sourceware.org/bugzilla/show_bug.cgi?id=22263 --- Comment #24 from cvs-commit at gcc dot gnu.org --- The master branch has been updated by Andreas Krebbel : https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=26b1426577b5dcb32d149c64cca3e603b81948a9 commit

[Bug binutils/29099] Buffer overflow can happen at libiberty/argv.c

2022-04-28 Thread nickc at redhat dot com
https://sourceware.org/bugzilla/show_bug.cgi?id=29099 Nick Clifton changed: What|Removed |Added CC||nickc at redhat dot com

[Bug binutils/29099] Buffer overflow can happen at libiberty/argv.c

2022-04-28 Thread amodra at gmail dot com
https://sourceware.org/bugzilla/show_bug.cgi?id=29099 --- Comment #3 from Alan Modra --- "pos * sizeof (char)" might look to be a useless multiplication by 1, but it also converts the expression to size_t. size_t is an unsigned integer type. There is no signed integer overflow here, unless

[Bug ld/29101] New: [Bug] User input is not sanitized in libdep_plugin.c and cause trouble on 32bit machine

2022-04-28 Thread yguoaz at gmail dot com
https://sourceware.org/bugzilla/show_bug.cgi?id=29101 Bug ID: 29101 Summary: [Bug] User input is not sanitized in libdep_plugin.c and cause trouble on 32bit machine Product: binutils Version: 2.38 Status: UNCONFIRMED

[Bug ld/29101] [Bug] User input is not sanitized in libdep_plugin.c and cause trouble on 32bit machine

2022-04-28 Thread yguoaz at gmail dot com
https://sourceware.org/bugzilla/show_bug.cgi?id=29101 yguoaz at gmail dot com changed: What|Removed |Added CC||hyc at symas dot com --

[Bug binutils/29099] Buffer overflow can happen at libiberty/argv.c

2022-04-28 Thread yguoaz at gmail dot com
https://sourceware.org/bugzilla/show_bug.cgi?id=29099 --- Comment #2 from yguoaz at gmail dot com --- (In reply to Andreas Schwab from comment #1) > I don't think it is possible to create a file that large. In 32bit machine, long only takes 4 bytes. Therefore, maybe a 4GB sized-file is not very

[Bug binutils/29099] Buffer overflow can happen at libiberty/argv.c

2022-04-28 Thread sch...@linux-m68k.org
https://sourceware.org/bugzilla/show_bug.cgi?id=29099 --- Comment #1 from Andreas Schwab --- I don't think it is possible to create a file that large. -- You are receiving this mail because: You are on the CC list for the bug.

[Bug gprof/29100] Buffer overflow when read function mapping file

2022-04-28 Thread yguoaz at gmail dot com
https://sourceware.org/bugzilla/show_bug.cgi?id=29100 yguoaz at gmail dot com changed: What|Removed |Added CC||rth at sourceware dot org

[Bug gprof/29100] Buffer overflow when read function mapping file

2022-04-28 Thread yguoaz at gmail dot com
https://sourceware.org/bugzilla/show_bug.cgi?id=29100 yguoaz at gmail dot com changed: What|Removed |Added CC||rth at sources dot

[Bug gprof/29100] New: Buffer overflow when read function mapping file

2022-04-28 Thread yguoaz at gmail dot com
https://sourceware.org/bugzilla/show_bug.cgi?id=29100 Bug ID: 29100 Summary: Buffer overflow when read function mapping file Product: binutils Version: 2.38 Status: UNCONFIRMED Severity: normal Priority: P2