oss-sec mailing list archives
Re: gcc 4.2 optimizations and integer overflow checks
From: Nico Golde <oss-security+ml () ngolde de>
Date: Mon, 7 Apr 2008 18:39:33 +0200
Hi Steven, * Steven M. Christey <coley () linus mitre org> [2008-04-07 18:24]:
While an unusual bug, we decided to assign a CVE for it. - Steve ====================================================== Name: CVE-2008-1685 Status: Candidate URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1685 Reference: CERT-VN:VU#162289 Reference: URL:http://www.kb.cert.org/vuls/id/162289
[...] Please add http://gcc.gnu.org/bugzilla/show_bug.cgi?id=26763 to the references. Kind regards Nico -- Nico Golde - http://www.ngolde.de - nion () jabber ccc de - GPG: 0x73647CFF For security reasons, all text in this mail is double-rot13 encrypted.
Attachment:
_bin
Description:
Current thread:
- gcc 4.2 optimizations and integer overflow checks Josh Bressers (Apr 07)
- Re: gcc 4.2 optimizations and integer overflow checks Steven M. Christey (Apr 07)
- Re: gcc 4.2 optimizations and integer overflow checks Nico Golde (Apr 07)
- Re: gcc 4.2 optimizations and integer overflow checks Solar Designer (Apr 07)
- Re: gcc 4.2 optimizations and integer overflow checks Nico Golde (Apr 09)
- Re: gcc 4.2 optimizations and integer overflow checks Steven M. Christey (Apr 10)
- Re: gcc 4.2 optimizations and integer overflow checks Marcus Meissner (Apr 18)
- Re: gcc 4.2 optimizations and integer overflow checks Solar Designer (Apr 18)
- Re: gcc 4.2 optimizations and integer overflow checks Richard Guenther (Apr 20)
- Re: gcc 4.2 optimizations and integer overflow checks Nico Golde (Apr 07)
- Re: gcc 4.2 optimizations and integer overflow checks Steven M. Christey (Apr 07)