[Bug ld/25327] FAIL: Run pr20276

2020-01-03 Thread nickc at redhat dot com
https://sourceware.org/bugzilla/show_bug.cgi?id=25327

Nick Clifton  changed:

   What|Removed |Added

 CC||nickc at redhat dot com

--- Comment #1 from Nick Clifton  ---
Created attachment 12163
  --> https://sourceware.org/bugzilla/attachment.cgi?id=12163&action=edit
Proposed patch

Hi John,

  Please could you try out the attached patch and let me know if it works ?

Cheers
  Nick

-- 
You are receiving this mail because:
You are on the CC list for the bug.


[Bug ld/25327] FAIL: Run pr20276

2020-01-03 Thread nickc at redhat dot com
https://sourceware.org/bugzilla/show_bug.cgi?id=25327

Nick Clifton  changed:

   What|Removed |Added

 Status|NEW |ASSIGNED

-- 
You are receiving this mail because:
You are on the CC list for the bug.


[Bug ld/25327] FAIL: Run pr20276

2020-01-03 Thread nickc at redhat dot com
https://sourceware.org/bugzilla/show_bug.cgi?id=25327

Nick Clifton  changed:

   What|Removed |Added

   Assignee|unassigned at sourceware dot org   |nickc at redhat dot com

-- 
You are receiving this mail because:
You are on the CC list for the bug.


[Bug ld/25326] FAIL: Run pr19579

2020-01-03 Thread nickc at redhat dot com
https://sourceware.org/bugzilla/show_bug.cgi?id=25326

Nick Clifton  changed:

   What|Removed |Added

 Status|NEW |ASSIGNED
 CC||nickc at redhat dot com
   Assignee|unassigned at sourceware dot org   |nickc at redhat dot com

--- Comment #1 from Nick Clifton  ---
Created attachment 12164
  --> https://sourceware.org/bugzilla/attachment.cgi?id=12164&action=edit
Proposed patch

Hi John,

  Please can you try out the attached patch and let me know if it solves the
problem ?

Cheers
  Nick

-- 
You are receiving this mail because:
You are on the CC list for the bug.


[Bug binutils/25308] Multiple null pointer dereferencs in bfd module due to not checking return value of bfd_malloc

2020-01-03 Thread cvs-commit at gcc dot gnu.org
https://sourceware.org/bugzilla/show_bug.cgi?id=25308

--- Comment #1 from cvs-commit at gcc dot gnu.org  ---
The master branch has been updated by Nick Clifton :

https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=7a0fb7be96e0ce79e1ae429bc1ba913e5244d537

commit 7a0fb7be96e0ce79e1ae429bc1ba913e5244d537
Author: Nick Clifton 
Date:   Fri Jan 3 14:41:02 2020 +

Fix potential illegal memory access failures in the BFD library by ensuring
that the return value from bfd_malloc() is checked before it is used.

PR 25308
* elf-properties.c (_bfd_elf_convert_gnu_properties): Check the
return value from bfd_malloc.
* elf32-arm.c (bfd_elf32_arm_vfp11_fix_veneer_locations): Likewise.
(bfd_elf32_arm_stm32l4xx_fix_veneer_locations): Likewise.
(elf32_arm_filter_cmse_symbols): Likewise.
(elf32_arm_write_section): Likewise.
* mach-o.c (bfd_mach_o_core_fetch_environment): Likewise.
(bfd_mach_o_follow_dsym): Likewise.
* pef.c (bfd_pef_print_loader_section): Likewise.
(bfd_pef_scan_start_address): Likewise.
(bfd_pef_parse_function_stubs): Likewise.
(bfd_pef_parse_symbols): Likewise.

-- 
You are receiving this mail because:
You are on the CC list for the bug.


[Bug binutils/25308] Multiple null pointer dereferencs in bfd module due to not checking return value of bfd_malloc

2020-01-03 Thread nickc at redhat dot com
https://sourceware.org/bugzilla/show_bug.cgi?id=25308

Nick Clifton  changed:

   What|Removed |Added

 Status|UNCONFIRMED |RESOLVED
 CC||nickc at redhat dot com
 Resolution|--- |FIXED

--- Comment #2 from Nick Clifton  ---
Hi Nguyen,

  Thanks for reporting these problems.  I have checked in a patch to
  add tests of the return value from bfd_malloc in the places that
  you indicated.

Cheers
  Nick

-- 
You are receiving this mail because:
You are on the CC list for the bug.


[Bug binutils/25307] Heap-buffer-overflow in bfd/pef.c:bfd_pef_parse_function_stubs()

2020-01-03 Thread nickc at redhat dot com
https://sourceware.org/bugzilla/show_bug.cgi?id=25307

Nick Clifton  changed:

   What|Removed |Added

 Status|UNCONFIRMED |RESOLVED
 CC||nickc at redhat dot com
 Resolution|--- |FIXED

--- Comment #1 from Nick Clifton  ---
Hi Nguyễn,

  Thanks for reporting this bug, and providing such a helpful analysis
  and reproducer.  I have checked in a patch that increases the test at
  line 802 so that it checks that at least 24 bytes are remaining.

Cheers
  Nick

-- 
You are receiving this mail because:
You are on the CC list for the bug.


[Bug binutils/25306] Null Pointer Dereference in bfd/pef.c:bfd_pef_parse_symbols()

2020-01-03 Thread nickc at redhat dot com
https://sourceware.org/bugzilla/show_bug.cgi?id=25306

Nick Clifton  changed:

   What|Removed |Added

 Status|UNCONFIRMED |RESOLVED
 CC||nickc at redhat dot com
 Resolution|--- |FIXED

--- Comment #1 from Nick Clifton  ---
Hi Nguyễn,

  This bug has already been fixed by the patch applied for PR 25308.

Cheers
  Nick

-- 
You are receiving this mail because:
You are on the CC list for the bug.


[Bug binutils/25307] Heap-buffer-overflow in bfd/pef.c:bfd_pef_parse_function_stubs()

2020-01-03 Thread cvs-commit at gcc dot gnu.org
https://sourceware.org/bugzilla/show_bug.cgi?id=25307

--- Comment #2 from cvs-commit at gcc dot gnu.org  ---
The master branch has been updated by Nick Clifton :

https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=f2a3559d54602cecfec6d90f792be4a70ad918ab

commit f2a3559d54602cecfec6d90f792be4a70ad918ab
Author: Nick Clifton 
Date:   Fri Jan 3 16:17:53 2020 +

Fix potential illegal memory access when parsing a corrupt PEF format file.

PR 25307
(bfd_pef_parse_function_stubs): Correct the test that ensures that
there is enough data remaining in the code buffer before
attempting to read a function stub.

-- 
You are receiving this mail because:
You are on the CC list for the bug.


[Bug gas/25311] [PATCH] Replace macro NO_STRING_ESCAPES

2020-01-03 Thread cvs-commit at gcc dot gnu.org
https://sourceware.org/bugzilla/show_bug.cgi?id=25311

--- Comment #1 from cvs-commit at gcc dot gnu.org  ---
The master branch has been updated by Nick Clifton :

https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=16d87673993dc1dba10cd86996a9b016af38da12

commit 16d87673993dc1dba10cd86996a9b016af38da12
Author: Sergey Belyashov 
Date:   Fri Jan 3 16:23:19 2020 +

Allow individual targets to decide if string escapes should be allowed. 
Disable for PPC and Z80.

PR 25311
* as.h (TC_STRING_ESCAPES): Provide a default definition.
* app.c (do_scrub_chars): Use TC_STRING_ESCAPES instead of
NO_STRING_ESCAPES.
* read.c (next_char_of_string): Likewise.
* config/tc-ppc.h (TC_STRING_ESCAPES): Define.
* config/tc-z80.h (TC_STRING_ESCAPES): Define.

-- 
You are receiving this mail because:
You are on the CC list for the bug.


[Bug gas/25311] [PATCH] Replace macro NO_STRING_ESCAPES

2020-01-03 Thread nickc at redhat dot com
https://sourceware.org/bugzilla/show_bug.cgi?id=25311

Nick Clifton  changed:

   What|Removed |Added

 Status|UNCONFIRMED |RESOLVED
 CC||nickc at redhat dot com
 Resolution|--- |FIXED

--- Comment #2 from Nick Clifton  ---
Hi Sergey,

  The patch is fine so I have gone ahead and committed it.

Cheers
  Nick

-- 
You are receiving this mail because:
You are on the CC list for the bug.


[Bug libctf/25155] libctf directory doesn't compile with MinGW

2020-01-03 Thread nick.alcock at oracle dot com
https://sourceware.org/bugzilla/show_bug.cgi?id=25155

Nick Alcock  changed:

   What|Removed |Added

 CC||nick.alcock at oracle dot com
  Component|binutils|libctf

--- Comment #2 from Nick Alcock  ---
Thank you! (And sorry for not noticing this bug flying by.)

I'm looking at this now (see recent traffic on the mailing list). All the
patches Joel has proposed look good, but I think I have a way to fix the E*
class of problems for all time, at the cost of a slight API break affecting no
existing users (see the RFC patch I just posted).

-- 
You are receiving this mail because:
You are on the CC list for the bug.


[Bug libctf/25120] Portability issues in binutils 2.33 due to libctf

2020-01-03 Thread nick.alcock at oracle dot com
https://sourceware.org/bugzilla/show_bug.cgi?id=25120

--- Comment #14 from Nick Alcock  ---
CTF is not ELF-specific. The only intrinsically ELF-specific portion of libctf
is the machinery which associates symbol table entries with CTF entries, and
that isn't even fully implemented yet (because I haven't got to it). Some
things are only implemented for ELF but are perfectly implementable for other
executable formats, notably ctf_open() and ctf_fdopen(), and the sharing of
strings with the executable's string table.

A fix for this is going through review and should probably be applied soon.

-- 
You are receiving this mail because:
You are on the CC list for the bug.