| Summary: | Update request: gcc-8.3.1-0.20190802.1.mga7 | ||
|---|---|---|---|
| Product: | Mageia | Reporter: | Thomas Backlund <tmb> |
| Component: | RPM Packages | Assignee: | QA Team <qa-bugs> |
| Status: | RESOLVED FIXED | QA Contact: | |
| Severity: | normal | ||
| Priority: | Normal | CC: | andrewsfarm, sysadmin-bugs, tarazed25 |
| Version: | 7 | Keywords: | advisory, validated_update |
| Target Milestone: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | MGA7-64-OK | ||
| Source RPM: | gcc | CVE: | |
| Status comment: | |||
|
Description
Thomas Backlund
2019-08-08 11:36:23 CEST
Note that this one is also already in Cauldron since ~5 days, so it's already being heavily used without issues This was also used to build the kernel-5.2.7-1 update
Advisory, added to svn:
type: bugfix
subject: Updated gcc packages fix various bugs and compiler crashes
src:
7:
core:
- gcc-8.3.1-0.20190802.1.mga7
description: |
This provides an updated snapshot of the gcc 8.3.1 compiler set, fixing
various bugs, mis-compilations and ICE (Intenal Compiler Error) crashes.
It also adds needed fixes to be able to build the 5.2 series kernels.
references:
- https://bugs.mageia.org/show_bug.cgi?id=25243Keywords:
(none) =>
advisory mga7, x86_64
Started to install missing pakages (before the update) and hit:
A requested package cannot be installed:
libstdc++6-8.3.1-0.20190524.1.mga7.x86_64 (in order to keep libstdc++6-8.3.1-0.20190802.1.mga7.x86_64)
That was pulled in during a recent update test - don't remember which one.
Successfully updated everything else from updates testing.
Noting that this version is already being used successfully tried a local build of celestia, which involves hundreds of C file compilations, a smattering of C++, and one or two other types. No problems encountered.
................
+ /usr/bin/rm -rf /home/lcl/testing/celestia/BUILDROOT/celestia-1.7.0-0.20190423git.920a0c8.2.mga7.x86_64
+ exit 0
succeeded!
$ tree RPMS
RPMS
├── noarch
│ └── celestia-data-1.7.0-0.20190423git.920a0c8.2.mga7.noarch.rpm
└── x86_64
├── celestia-1.7.0-0.20190423git.920a0c8.2.mga7.x86_64.rpm
├── celestia-debuginfo-1.7.0-0.20190423git.920a0c8.2.mga7.x86_64.rpm
└── celestia-debugsource-1.7.0-0.20190423git.920a0c8.2.mga7.x86_64.rpm
OK for QA too.CC:
(none) =>
tarazed25 Addendum to comment 4: Harking back to earlier experiments with ASAN, this snippet from Wikipedia works. // https://en.wikipedia.org/wiki/AddressSanitizer // To compile: g++ -O -g -fsanitize=address -o boom boom.cc int main(int argc, char **argv) { int *array = new int[100]; delete [] array; return array[argc]; // BOOM } $ ./boom ================================================================= ==27851==ERROR: AddressSanitizer: heap-use-after-free on address 0x614000000044 at pc 0x0000004011a4 bp 0x7fff248d2ec0 sp 0x7fff248d2eb8 READ of size 4 at 0x614000000044 thread T0 #0 0x4011a3 in main /home/lcl/qa/asan/test.c:9 #1 0x7f5016d8db0a in __libc_start_main (/lib64/libc.so.6+0x26b0a) #2 0x4010a9 in _start (/data/qa/asan/boom+0x4010a9) 0x614000000044 is located 4 bytes inside of 400-byte region [0x614000000040,0x6140000001d0) freed by thread T0 here: #0 0x7f50172fee90 in operator delete[](void*) (/lib64/libasan.so.5+0xebe90) #1 0x40116e in main /home/lcl/qa/asan/test.c:7 previously allocated by thread T0 here: #0 0x7f50172fe140 in operator new[](unsigned long) (/lib64/libasan.so.5+0xeb140) #1 0x401163 in main /home/lcl/qa/asan/test.c:5 SUMMARY: AddressSanitizer: heap-use-after-free /home/lcl/qa/asan/test.c:9 in main Shadow bytes around the buggy address: 0x0c287fff7fb0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c287fff7fc0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c287fff7fd0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c287fff7fe0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c287fff7ff0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x0c287fff8000: fa fa fa fa fa fa fa fa[fd]fd fd fd fd fd fd fd 0x0c287fff8010: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd 0x0c287fff8020: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd 0x0c287fff8030: fd fd fd fd fd fd fd fd fd fd fa fa fa fa fa fa 0x0c287fff8040: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c287fff8050: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==27851==ABORTING Validating, on the basis of Len's tests and tmb's comments. Keywords:
(none) =>
validated_update An update for this issue has been pushed to the Mageia Updates repository. https://advisories.mageia.org/MGAA-2019-0098.html Resolution:
(none) =>
FIXED |