https://gcc.gnu.org/bugzilla/show_bug.cgi?id=106332
--- Comment #3 from liftdat at protonmail dot com ---
(In reply to Andrew Pinski from comment #1)
> The one inside check_offload_target_name (in gcc.cc) will always have at
> least one entry in candidates.
>
> The one inside cmdline_handle_error
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=106332
Bug ID: 106332
Summary: Possible out of bound buffer access in opts-common.c
Product: gcc
Version: 13.0
Status: UNCONFIRMED
Severity: normal
Priority: P3
Compon
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=105403
--- Comment #2 from liftdat at protonmail dot com ---
(In reply to Geoff Keating from comment #1)
> A PCH file is a trusted input, so this really shouldn’t happen, and there
> are surely many other ways to trigger arbitrary code execution if you
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=105403
Bug ID: 105403
Summary: [Bug] Buffer overflow can happen when reading
pchf_data from file
Product: gcc
Version: 11.3.0
Status: UNCONFIRMED
Severity: normal