
CVE-2008-1685
https://notcve.org/view.php?id=CVE-2008-1685
06 Apr 2008 — gcc 4.2.0 through 4.3.0 in GNU Compiler Collection, when casts are not used, considers the sum of a pointer and an int to be greater than or equal to the pointer, which might lead to removal of length testing code that was intended as a protection mechanism against integer overflow and buffer overflow attacks, and provide no diagnostic message about this removal. NOTE: the vendor has determined that this compiler behavior is correct according to section 6.5.6 of the C99 standard (aka ISO/IEC 9899:1999) ** D... • http://gcc.gnu.org/bugzilla/show_bug.cgi?id=26763 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-189: Numeric Errors •

CVE-2008-1367 – Kernel doesn't clear DF for signal handlers
https://notcve.org/view.php?id=CVE-2008-1367
17 Mar 2008 — gcc 4.3.x does not generate a cld instruction while compiling functions used for string manipulation such as memcpy and memmove on x86 and i386, which can prevent the direction flag (DF) from being reset in violation of ABI conventions and cause data to be copied in the wrong direction during signal handling in the Linux kernel, which might allow context-dependent attackers to trigger memory corruption. NOTE: this issue was originally reported for CPU consumption in SBCL. gcc 4.3.x no genera una instrucción... • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=469058 • CWE-399: Resource Management Errors •

CVE-2006-1902
https://notcve.org/view.php?id=CVE-2006-1902
20 Apr 2006 — fold_binary in fold-const.c in GNU Compiler Collection (gcc) 4.1 improperly handles pointer overflow when folding a certain expr comparison to a corresponding offset comparison in cases other than EQ_EXPR and NE_EXPR, which might introduce buffer overflow vulnerabilities into applications that could be exploited by context-dependent attackers.NOTE: the vendor states that the essence of the issue is "not correctly interpreting an offset to a pointer as a signed value." • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=356896 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVE-2000-1219
https://notcve.org/view.php?id=CVE-2000-1219
01 Nov 2000 — The -ftrapv compiler option in gcc and g++ 3.3.3 and earlier does not handle all types of integer overflows, which may leave applications vulnerable to vulnerabilities related to overflows. • http://gcc.gnu.org/ml/gcc-bugs/2002-05/msg00198.html •