SHA256
1
0
forked from pool/libdwarf

Commit Graph

  • 084fbe3e54 Accepting request 1194555 from devel:tools factory Dominique Leuenberger 2024-08-18 16:20:19 +00:00
  • eb9d94037c - update to 0.11.0: * Identifies git fix id now for ossfuzz 70721 DW202407-010 * Correcting use-after-free with a specific corrupted DWARF section. * This simplfies getting correct cooked addresses for entries from .debug_ranges * The new code about .debug_ranges had small leaks when the library was told not to record or clean-up most memory allocations. Shown by -fsanitize. * Fixed a mistake in examplev, .debug_ranges * Added new argument to print_ranges_list_to_extra() so it can print both raw and cooked values. * Now calulates the cooked value of .debug_ranges and prints both raw and cooked values. * New date, some Dwarf_Ranges doc has been updated in libdwarf. * Added clarifying comment paragraphs about Dwarf_Ranges * Final on the rnglists ossfuzz issues so far. * ossfuzz 70246 DW202407-002 fixed. * Removing esb_append_printf() which is the last use of *sprintf() * ossfuzz 70244 fixed DW202407-001 * Removing esb_append_printf() as it is no longer necessary. * Added blank line after d= semantic version * Fixed trailing whitespace and indents. * Refine the information on rnglists base with * cc_rnglists_base_via_at (similar to loclists) * Added cc_loclists_base_via_at and devel Dirk Mueller 2024-08-18 13:11:17 +00:00
  • fe4e9ba0e1 Accepting request 1178145 from devel:tools Ana Guerrero 2024-06-03 15:43:37 +00:00
  • 1b09f1e46d Accepting request 1177577 from home:dimstar:Factory Dirk Mueller 2024-06-02 10:17:37 +00:00
  • aca9199f2c Accepting request 1142865 from devel:tools Ana Guerrero 2024-01-31 22:54:25 +00:00
  • eb54e25937 - update to 0.9.1: * "--disable-decompression" tells the build to compile libdwarf and dwarfdump with no reference to the zlib or zstd libraries. * Latest DW_LANG names now present. - build with zstd support Dirk Mueller 2024-01-30 19:57:00 +00:00
  • 82e2bdaf8b Accepting request 1135481 from devel:tools Ana Guerrero 2023-12-28 22:03:40 +00:00
  • f155daf87c - update to 0.9.0: * Added support for reading Apple MacOS universal binaries. * Added callers access to certain fields from object files (for all three supported object formats), and * added the --print-machine-arch option to dwarfdump to show the fields. * Three functions were added to the API, see the Changes section of the latest documentation or in libdwarf.pdf in the release. No functions were deleted or had their meaning changed. * Vulnerabilities found by fuzzing were fixed. * See https://www.prevanders.net/dwarfbug.html for vulnerability details. Dirk Mueller 2023-12-28 13:16:25 +00:00
  • bf5a200dae Accepting request 1127452 from devel:tools Ana Guerrero 2023-11-19 19:16:30 +00:00
  • 8d4d347de2 - update to 0.8.0: * The release fixes many vulnerabilities from corrupt DWARF and/or corrupt Elf. Two new functions are added for DWARF Frame access to get the correct sign of an argument (the pre-existing functions remain in place and working avoiding any need for recompilation or relinking of user code). now pass section indexes as Dwarf_Unsigned instead of Dwarf_Half. to call due to argument list requirements, and never worked. * The dealloc required for dwarf_offset_list() was incorrect, documented in libdwarf.pdf and in the on-line html. users accessing near-identical builds). and the interface was changed to make it easier to use. - replace symlink by directory with hardlinks (bsc#1196198) * Release fixes a n assign offset = offset; - drop libdwarf-gcc11.patch, libdwarf-gcc11-fixup.patch: upstream - libdwarf-gcc11.patch: refresh with upstream patch - update to 20201020: - move libdwarf headers back to the old location are known to work on Linux(Ubuntu on x86_64 and i686), for dwarfdump/libdwarf (the current dwarfdump make check actually does run dwarfdump and or relocation record data are not available in a --disable-libelf build. available in a --disable-libelf build. on sourceforge) to get more detail about the problems found. ensures the build won't use libelf or elf.h anywhere. to access DWARF information. No elf.h, libelf.h or zlib.h should be present. no longer any two-stage aspect of the build. + Fixes libdwarf/dwarfdump vulnerabilities related to detecting Dirk Mueller 2023-11-18 17:12:25 +00:00
  • 73eb52fecf Accepting request 1089639 from devel:tools Dominique Leuenberger 2023-05-30 20:02:21 +00:00
  • 3ec58396e9 - update to 0.7.0: * The release fixes more than 50 vulnerabilities from corrupt DWARF and/or corrupt Elf. * Elf section counts can exceed 16 bits (on linux see man 5 elf) so some function prototype members of struct Dwarf_Obj_Access_Methods_a_s changed. Specifically, om_get_section_info() om_load_section(), and om_relocate_a_section() now pass section indexes as Dwarf_Unsigned instead of Dwarf_Half. * Two functions have been removed from libdwarf.h and the library: dwarf_dnames_abbrev_by_code() and dwarf_dnames_abbrev_form_by_index(). * dwarf_dnames_abbrev_by_code() is slow and pointless. Use either dwarf_dnames_name() or dwarf_dnames_abbrevtable() instead, depending on what you want to accomplish. * dwarf_dnames_abbrev_form_by_index() is not needed, was difficult to call due to argument list requirements, and never worked. Dirk Mueller 2023-05-29 19:24:50 +00:00
  • 66184c8923 Accepting request 1068066 from devel:tools Dominique Leuenberger 2023-02-28 11:49:01 +00:00
  • 825c8e0962 - update to 0.6.0: Fixes for Denial Of Service (possible libdwarf crash): * The dealloc required for dwarf_offset_list() was incorrect, possibly leading to a crash. * The function prototype for dwarf_dietype_offset() changed so it can work correctly on DWARF4 objects. * A memory leak from dwarf_load_loclists() has been fixed. * The function dwarf_get_pubtypes() changed, Dwarf_Type no longer exists, correcting a library design mistake made in 1993. The function applied to DWARF3 and DWARF4 objects. * The set of functions using Dwarf_Type are gone, use Dwarf_Global instead. An object with DW_FORM_strx3 (DWARF5) could result in the library either crashing or returning an inappropriate error. DW_FORM_strx3 is now handled * https://newreleases.io/github/davea42/libdwarf-code?version=v0.6.0 Dirk Mueller 2023-02-27 21:32:59 +00:00
  • 749493e5f0 Accepting request 1039665 from devel:tools Dominique Leuenberger 2022-12-03 09:03:47 +00:00
  • f33e6ec990 Accepting request 1039641 from home:dirkmueller:Factory Dirk Mueller 2022-12-02 21:36:50 +00:00
  • 572d4b78da Accepting request 1035677 from devel:tools Dominique Leuenberger 2022-11-15 12:17:07 +00:00
  • 1d2727f82e - update to 0.4.1 (bsc#1200899, CVE-2022-34299): Dirk Mueller 2022-11-14 14:48:29 +00:00
  • b79cf78873 Accepting request 1007710 from devel:tools Dominique Leuenberger 2022-10-03 18:08:21 +00:00
  • 280d96bfb6 OBS-URL: https://build.opensuse.org/package/show/devel:tools/libdwarf?expand=0&rev=50 Dirk Mueller 2022-10-03 15:29:58 +00:00
  • 5c597c3677 - update to 0.4.2: * memory leak fixes * How to deal with a dwarf_init*() call that fails (DW_DLV_ERROR) in a simple way is finally documented in libdwarf.pdf and in the on-line html. Dirk Mueller 2022-10-03 15:25:03 +00:00
  • 383a44b8bc Accepting request 989491 from devel:tools Richard Brown 2022-07-18 16:34:15 +00:00
  • 15dc5406af - update to 0.4.1: * Two places where a carefully corrupted object file could result in libdwarf crashing a caller due to referencing memory outside the intended read area have been fixed (DW202205-001 and DW202206-001). One related to DW_FORM_ref_sig8, the other to the .debug_pubnames section. * The library now accepts DW_AT_entry_pc in a CU DIE as a base address when DW_AT_low_pc is missing (an extension used by a current compiler). * Added function dwarf_suppress_debuglink_crc() to allow callers to turn off doing a CRC calculation reading GNU debuglink data (saves time for library users accessing near-identical builds). - drop fix-CVE-2022-32200.patch (upstream) Dirk Mueller 2022-07-15 19:12:31 +00:00
  • 3b2c07a83d Accepting request 981183 from devel:tools Dominique Leuenberger 2022-06-08 12:24:45 +00:00
  • f053e116c2 - add fix-CVE-2022-32200.patch (bsc#1200291, CVE-2022-32200) Dirk Mueller 2022-06-07 16:24:43 +00:00
  • 63de3009f2 Accepting request 974321 from devel:tools Dominique Leuenberger 2022-05-02 14:25:45 +00:00
  • 8d1e473e51 Accepting request 973174 from home:jengelh:branches:devel:tools Dirk Mueller 2022-05-02 07:36:57 +00:00
  • cacf614c18 Accepting request 972471 from devel:tools Dominique Leuenberger 2022-04-25 21:35:08 +00:00
  • a80026158d Accepting request 972417 from home:dirkmueller:Factory Dirk Mueller 2022-04-25 07:08:54 +00:00
  • 4a08ed3346 Accepting request 956372 from devel:tools Dominique Leuenberger 2022-02-21 16:46:49 +00:00
  • a2a8c1bc06 - replace symlink by directory with hardlinks (bsc#1196198) Dirk Mueller 2022-02-21 11:11:32 +00:00
  • 94e421626d Accepting request 954118 from devel:tools Dominique Leuenberger 2022-02-15 22:56:58 +00:00
  • 706e706c2c Accepting request 954117 from home:dirkmueller:Factory Dirk Mueller 2022-02-13 21:14:39 +00:00
  • 1fb0d54311 Accepting request 900354 from devel:tools Dominique Leuenberger 2021-06-18 08:13:13 +00:00
  • 41a1aea356 Accepting request 900353 from Java:Factory Dirk Mueller 2021-06-16 10:02:39 +00:00
  • f053987554 - libdwarf-gcc11.patch: refresh with upstream patch Dirk Mueller 2021-06-15 23:51:49 +00:00
  • 030ada1f65 Accepting request 900127 from home:fstrba:branches:devel:tools Dirk Mueller 2021-06-15 12:34:34 +00:00
  • 9178683cf2 Accepting request 899446 from home:fstrba:branches:devel:tools Dirk Mueller 2021-06-15 09:27:58 +00:00
  • b6edecea73 Accepting request 888310 from devel:tools Dominique Leuenberger 2021-04-26 14:38:35 +00:00
  • 49e18261a5 Accepting request 887243 from home:wfrisch:branches:devel:tools Dirk Mueller 2021-04-25 09:43:13 +00:00
  • 6a786e1711 Accepting request 867800 from devel:tools Dominique Leuenberger 2021-02-07 14:13:44 +00:00
  • b402c1d0c2 - update to 20201201: dwarfdump now prints DWARF expression operators each on its own line. This makes viewing DWARF expressions much nicer given the increased use of much longer expressions. Those expression operators that reference DIES are now followed, verified, and the target DW_TAG and DW_AT_name are printed. A new dwarfdump.conf command 'option:' lets one specify option: --format-expr-ops-joined in case you want the old style DWARF expression operators-on-one-line. Where the DWARF DIE children nest > nine-deep dwarfdump switches from indentation by spaces to a nest-level number. Dirk Mueller 2021-01-29 22:03:26 +00:00
  • fe4d59a7f3 Accepting request 844033 from devel:tools Dominique Leuenberger 2020-10-29 08:21:41 +00:00
  • a989a119d9 - update to 20201020: * Fix various read and write outside bounds found via fuzzing Dirk Mueller 2020-10-26 08:33:58 +00:00
  • f1135fa782 Accepting request 832032 from devel:tools Dominique Leuenberger 2020-09-08 20:44:40 +00:00
  • 9ece8680e2 - move libdwarf headers back to the old location Dirk Mueller 2020-09-04 08:28:19 +00:00
  • f652451d04 OBS-URL: https://build.opensuse.org/package/show/devel:tools/libdwarf?expand=0&rev=25 Dirk Mueller 2020-09-02 19:43:01 +00:00
  • 9980b0797d - update to 20200825 (bsc#1142609, CVE-2019-14249) libdwarf now reads .debug_gnu_pubtypes & pubnames (non-standard but gcc creates them in DWARF5) via a small number of new functions and dwarfdump --print-debug-gnu prints both sections. Verifying the .debug_info offsets is not yet done. Dwarfdump now dumps DWARF5 .debug_rnglists and .debug_loclists. To handle DWARF5 there are a small number of new functions. All existing functions are still supported, but to read DWARF5 some small changes are required. In libdwarf see libdwarf2.1.pdf and also see dwarfdump now takes much less malloc() to work, as measured by valgrind --tool=massif and massif-visualizer. A dwarfdump run that did 2.2Gib of malloc/free before the changes now does 1.4GiB. libdwarf and dwarfdump now support DWARF5 .debug_rnglists. The new interfaces are documented in libdwarf/libdwarf2.1.pdf. The new option to dwarfdump is "--print-raw-rnglists". The code (dwarfdump/libdwarf), regressiontests, and readelfobj directories and all their tests are known to work on Linux(Ubuntu on x86_64 and i686), FreeBSD, MacOS Catalina (with Apple Command Line Tools), and IBM s390 (Big Endian!) running Ubuntu Linux. On Windows-MinGW the full regression tests have not been tested, but 'make check' works for dwarfdump/libdwarf (the current dwarfdump make check actually does run dwarfdump and checks that dwarfdump basically works). Now a --disable-libelf configure/build of libdwarf/dwarfdump Dirk Mueller 2020-09-02 19:39:11 +00:00
  • 965ede2d59 Accepting request 720712 from devel:tools Dominique Leuenberger 2019-09-05 10:06:46 +00:00
  • 6d29cb2f5b Accepting request 720456 from home:marxin:static Dirk Mueller 2019-08-02 18:40:21 +00:00
  • f892de3df3 Accepting request 579217 from devel:tools Dominique Leuenberger 2018-02-24 15:37:39 +00:00
  • 6b9fb65566 Accepting request 579030 from home:posophe:branches:devel:tools Dirk Mueller 2018-02-22 22:48:50 +00:00
  • bd9ebf232f Accepting request 448518 from devel:tools Dominique Leuenberger 2017-01-15 10:10:53 +00:00
  • 03f337f7d8 - add missing splitrequires - revert rpm groups messup Dirk Mueller 2017-01-02 14:25:37 +00:00
  • d710eafbc9 Accepting request 448507 from home:jengelh:branches:devel:tools Dirk Mueller 2017-01-02 14:22:39 +00:00
  • f4095a1851 OBS-URL: https://build.opensuse.org/package/show/devel:tools/libdwarf?expand=0&rev=16 Dirk Mueller 2017-01-02 13:21:39 +00:00
  • 40ffc91e10 - update to 20161124 (bsc#1012823, bsc#1001133, CVE-2016-9480, CVE-2016-7410, CVE-2016-7511, CVE-2016-5028, CVE-2016-5029, CVE-2016-5030, CVE-2016-5031, CVE-2016-5032, CVE-2016-5033, CVE-2016-5034, CVE-2016-5035, CVE-2016-5036, CVE-2016-5037, CVE-2016-5038, CVE-2016-5039, CVE-2016-5040, CVE-2016-5041, CVE-2016-5042, CVE-2016-5043, CVE-2016-5044 ): * removes libdwarf-fix-parallel-build.diff - use shared library policy, main package removed and libdwarf1 added Dirk Mueller 2017-01-02 13:21:31 +00:00
  • 5929e01677 OBS-URL: https://build.opensuse.org/package/show/devel:tools/libdwarf?expand=0&rev=14 Dirk Mueller 2017-01-02 13:20:46 +00:00
  • 077aad07f2 - update to 20161124 (bsc#1012823, bsc#1001133, CVE-2016-9480, CVE-2016-7410, CVE-2016-7511, CVE-2016-5028, CVE-2016-5029, CVE-2016-5030, CVE-2016-5031, CVE-2016-5032, CVE-2016-5033, CVE-2016-5034, CVE-2016-5035, CVE-2016-5036, CVE-2016-5037, CVE-2016-5038, CVE-2016-5039, CVE-2016-5040, CVE-2016-5041, CVE-2016-5042, CVE-2016-5043, CVE-2016-5044 ): * removes libdwarf-fix-parallel-build.diff - use shared library policy, main package removed and libdwarf1 added Dirk Mueller 2017-01-02 13:19:42 +00:00
  • a6b01d0b45 Accepting request 282243 from devel:tools Dominique Leuenberger 2015-01-22 20:49:04 +00:00
  • 56d6cfd33b Accepting request 282229 from home:matz2:branches:devel:tools Martin Pluskal 2015-01-21 16:29:32 +00:00
  • fc53ad049a Accepting request 281972 from devel:tools Dominique Leuenberger 2015-01-20 18:04:00 +00:00
  • 7fc1628bfe Accepting request 281962 from home:matz2:branches:devel:tools Martin Pluskal 2015-01-19 15:14:59 +00:00
  • 438e818ae3 Accepting request 258114 from devel:tools Stephan Kulow 2014-10-24 08:48:00 +00:00
  • 0931cd87f1 - Ismail Dönmez 2014-10-23 13:14:37 +00:00
  • 337a6a94eb - Ismail Dönmez 2014-10-23 13:09:59 +00:00
  • 12a259dc70 - Package COPYING and related license files. Ismail Dönmez 2014-10-23 13:06:41 +00:00
  • 2457284012 Accepting request 257391 from home:jengelh:dev Ismail Dönmez 2014-10-18 14:27:32 +00:00
  • da398a6631 Accepting request 144431 from devel:tools Ismail Dönmez 2012-12-08 14:51:49 +00:00
  • d45663dff1 Accepting request 144429 from home:jnweiger:branches:devel:tools Marcus Meissner 2012-12-06 16:37:07 +00:00
  • 6aa1fff3fe Accepting request 104776 from devel:tools Stephan Kulow 2012-02-16 09:05:51 +00:00
  • 4a319cc034 Accepting request 104376 from devel:openSUSE:Factory:patch-license Stephan Kulow 2012-02-13 15:43:34 +00:00
  • 0ae2c24787 Autobuild autoformatter for 71148 Sascha Peilicke 2011-05-26 13:27:42 +00:00
  • 888fa9da3f Accepting request 71148 from devel:tools Sascha Peilicke 2011-05-26 13:27:33 +00:00
  • 568ed64e3e Reinitialize devel project Ismail Dönmez 2011-05-24 11:33:31 +00:00