[bug #64229] [troff] want diagnostic for diversion length overflow

2024-08-14 Thread G. Branden Robinson
Update of bug #64229 (group groff): Severity: 4 - Important => 3 - Normal Item Group: Crash/Unresponsive => Warning/Suspicious behaviour Status:None => In Progress Assigned to:

[bug #66088] [grn] should generate and interpret `lf` requests

2024-08-14 Thread G. Branden Robinson
URL: Summary: [grn] should generate and interpret `lf` requests Group: GNU roff Submitter: gbranden Submitted: Wed 14 Aug 2024 03:29:42 PM UTC Category: Preprocessor grn

[bug #66076] [xditview] unsafe string handling in xditview.c

2024-08-14 Thread G. Branden Robinson
Update of bug #66076 (group groff): Category: Macro package - others/general => Driver - others/general Item Group:None => Build/Installation Summary: [xditview] Unsafe string handling in xditview.c => [xditview] unsafe string

[bug #66079] [troff] uninitialized local `s` used in `token::add_to_zero_width_node_list()`

2024-08-14 Thread G. Branden Robinson
Update of bug #66079 (group groff): Category: General => Core Item Group:None => Build/Installation Summary: [troff] Uninitialized variable used within add_char function in roff/troff/input.c

[bug #66079] [troff] uninitialized local `s` used in `token::add_to_zero_width_node_list()`

2024-08-14 Thread G. Branden Robinson
Follow-up Comment #2, bug #66079 (group groff): [comment #1 comment #1:] > Added a new patch (with .second) as there is one more occurrence of the same exact bug. I'd rather handle this separately, as it affects the _pic_ preprocessor rather than the formatter proper (_troff_). ___

[bug #66080] [pic] use of unitialized stack variables

2024-08-14 Thread G. Branden Robinson
Update of bug #66080 (group groff): Item Group:None => Build/Installation Summary: [pic] Using uninitialized elements of the "place" structure in "place::follow" function => [pic] use of unitialized stack variables _

[bug #66080] [pic] use of unitialized stack variables

2024-08-14 Thread G. Branden Robinson
Follow-up Comment #2, bug #66080 (group groff): [comment #1 comment #1:] > Added new patch as there is one more place where the same bug appears Thanks. This is the separate item mentioned in bug #66079. ___ Reply to this item at:

[bug #66081] [troff] possible use of uninitialized stack memory

2024-08-14 Thread G. Branden Robinson
Update of bug #66081 (group groff): Category:None => Core Item Group:None => Build/Installation Summary: [troff] Possible accessing uninitialized array in env.cpp => [troff] possible use

[bug #64229] [troff] want diagnostic for diversion length overflow

2024-08-14 Thread G. Branden Robinson
Follow-up Comment #7, bug #64229 (group groff): [comment #6 comment #6:] > I instrumented `macro_diversion::output()` in "div.cpp" and learned that the Linux OOM killer slays the DoS attack proposed in comment #0 at only about 4 million lines of output on my machine. > > While my box isn't suprem

[bug #66079] [troff] uninitialized local `s` used in `token::add_to_zero_width_node_list()`

2024-08-14 Thread G. Branden Robinson
Update of bug #66079 (group groff): Status:None => In Progress Assigned to:None => gbranden ___ Reply to this item at:

[bug #66081] [troff] possible use of uninitialized stack memory

2024-08-14 Thread G. Branden Robinson
Update of bug #66081 (group groff): Status:None => In Progress Assigned to:None => gbranden ___ Reply to this item at:

[bug #66079] [troff] uninitialized local `s` potentially used in `token::add_to_zero_width_node_list()`

2024-08-14 Thread G. Branden Robinson
Update of bug #66079 (group groff): Summary: [troff] uninitialized local `s` used in `token::add_to_zero_width_node_list()` => [troff] uninitialized local `s` potentially used in `token::add_to_zero_width_node_list()` ___