[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Bug binutils/22895] integer overflow in read_attribute_value
From: |
nickc at redhat dot com |
Subject: |
[Bug binutils/22895] integer overflow in read_attribute_value |
Date: |
Wed, 28 Feb 2018 10:27:39 +0000 |
https://sourceware.org/bugzilla/show_bug.cgi?id=22895
Nick Clifton <nickc at redhat dot com> changed:
What |Removed |Added
----------------------------------------------------------------------------
Attachment #10857|0 |1
is obsolete| |
--- Comment #5 from Nick Clifton <nickc at redhat dot com> ---
Created attachment 10859
--> https://sourceware.org/bugzilla/attachment.cgi?id=10859&action=edit
Proposed patch
Hi Skysider,
Ah - you are right, I had not considered underflow. Please could you
try out this revised patch instead ?
Cheers
Nick
PS. I have discovered that I am unable to build 32-bit toolchains with
sanitization enabled as there is a kernel/asan bug which stops sanitization
from working. :-(
--
You are receiving this mail because:
You are on the CC list for the bug.
- [Bug binutils/22895] New: integer overflow in read_attribute_value, luanjunchao at 163 dot com, 2018/02/25
- [Bug binutils/22895] integer overflow in read_attribute_value, luanjunchao at 163 dot com, 2018/02/27
- [Bug binutils/22895] integer overflow in read_attribute_value, nickc at redhat dot com, 2018/02/27
- [Bug binutils/22895] integer overflow in read_attribute_value, luanjunchao at 163 dot com, 2018/02/27
- [Bug binutils/22895] integer overflow in read_attribute_value, luanjunchao at 163 dot com, 2018/02/27
- [Bug binutils/22895] integer overflow in read_attribute_value,
nickc at redhat dot com <=
- [Bug binutils/22895] integer overflow in read_attribute_value, luanjunchao at 163 dot com, 2018/02/28
- [Bug binutils/22895] integer overflow in read_attribute_value, cvs-commit at gcc dot gnu.org, 2018/02/28
- [Bug binutils/22895] integer overflow in read_attribute_value, nickc at redhat dot com, 2018/02/28