https://gcc.gnu.org/bugzilla/show_bug.cgi?id=81694
--- Comment #7 from Yuan Deng ---
When compiled with O0 or O1, the program work well,
inspite of val is overflowed, the program is actually very safe, and
can not be exploited.
But when compiled with O2 or O3, the result is different. The progra
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=81694
Yuan Deng changed:
What|Removed |Added
Status|RESOLVED|VERIFIED
--- Comment #4 from Yuan Deng ---
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=81694
--- Comment #1 from Yuan Deng ---
Created attachment 41913
--> https://gcc.gnu.org/bugzilla/attachment.cgi?id=41913&action=edit
patch for this vulnerability
Severity: normal
Priority: P3
Component: tree-optimization
Assignee: unassigned at gcc dot gnu.org
Reporter: scdengyuan at gmail dot com
Target Milestone: ---
Created attachment 41912
--> https://gcc.gnu.org/bugzilla/attachment.cgi?id=41912&action=edit
p