|
From: | cvs-commit at gcc dot gnu.org |
Subject: | [Bug binutils/24131] A unsigned integer overflow found in readelf which may cause OOB memory access |
Date: | Fri, 25 Jan 2019 13:17:33 +0000 |
https://sourceware.org/bugzilla/show_bug.cgi?id=24131 --- Comment #1 from cvs-commit at gcc dot gnu.org <cvs-commit at gcc dot gnu.org> --- The master branch has been updated by Nick Clifton <address@hidden>: https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=183445093ebd6be285e29f75b877e62a723918c6 commit 183445093ebd6be285e29f75b877e62a723918c6 Author: Nick Clifton <address@hidden> Date: Fri Jan 25 13:16:06 2019 +0000 Prevent a potential illegal memory access in readelf when parsing a note with a zero name size. PR 24131 * readelf.c (process_notes_at): Prevent an illegal memory access when the note's namesize is zero. (decode_tic6x_unwind_bytecode): Add code to handle the case where no registers are specified in a frame pop instruction. -- You are receiving this mail because: You are on the CC list for the bug.
[Prev in Thread] | Current Thread | [Next in Thread] |