Opened 8 years ago
Closed 8 years ago
#6597 closed enhancement (fixed)
elfutils-0.162
Reported by: | Owned by: | Fernando de Oliveira | |
---|---|---|---|
Priority: | normal | Milestone: | 7.8 |
Component: | BOOK | Version: | SVN |
Severity: | normal | Keywords: | |
Cc: |
Description (last modified by )
New version
https://fedorahosted.org/releases/e/l/elfutils/0.162/elfutils-0.162.tar.bz2
https://fedorahosted.org/releases/e/l/elfutils/0.162/elfutils-0.162.tar.bz2.sig
https://lists.fedorahosted.org/pipermail/elfutils-devel/2015-June/005002.html
When building and packaging this release please look at the improved configure output which will show all features detected/enabled and the recommended settings (and which features can be enabled, but are not supported). All known ways to crash the elfutils tools and libraries caused by bogus ELF files or DWARF data have been fixed. This release is Valgrind memcheck clean, GCC -fsanitizer=undefined clean and the libelf and libdw libraries don't have unbounded stack usage anymore as checked by GCC -Wstack-usage. ... * NEWS * libdw: Install new header elfutils/known-dwarf.h. dwarf.h Add preliminary DWARF5 constants DW_TAG_atomic_type, DW_LANG_Fortran03, DW_LANG_Fortran08. dwarf_peel_type now also handles DW_TAG_atomic_type. addr2line: Input addresses are now always interpreted as hexadecimal numbers, never as octal or decimal numbers. New option -a, --addresses to print address before each entry. New option -C, --demangle to show demangled symbols. New option --pretty-print to print all information on one line. ar: CVE-2014-9447 Directory traversal vulnerability in ar extraction. backends: x32 support. * GIT SHORTLOG * [175 lines]
Change History (3)
comment:1 by , 8 years ago
Description: | modified (diff) |
---|
comment:2 by , 8 years ago
Owner: | changed from | to
---|---|
Status: | new → assigned |
comment:3 by , 8 years ago
Resolution: | → fixed |
---|---|
Status: | assigned → closed |
Note:
See TracTickets
for help on using tickets.
Fixed at r16120.