|
From: | cvs-commit at gcc dot gnu.org |
Subject: | [Bug binutils/22895] integer overflow in read_attribute_value |
Date: | Wed, 28 Feb 2018 11:54:07 +0000 |
https://sourceware.org/bugzilla/show_bug.cgi?id=22895 --- Comment #7 from cvs-commit at gcc dot gnu.org <cvs-commit at gcc dot gnu.org> --- The master branch has been updated by Nick Clifton <address@hidden>: https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=12c963421d045a127c413a0722062b9932c50aa9 commit 12c963421d045a127c413a0722062b9932c50aa9 Author: Nick Clifton <address@hidden> Date: Wed Feb 28 11:50:49 2018 +0000 Catch integer overflows/underflows when parsing corrupt DWARF FORM blocks. PR 22895 PR 22893 * dwarf2.c (read_n_bytes): Replace size parameter with dwarf_block pointer. Drop unused abfd parameter. Check the size of the block before initialising the data field. Return the end pointer if the size is invalid. (read_attribute_value): Adjust invocations of read_n_bytes. -- You are receiving this mail because: You are on the CC list for the bug.
[Prev in Thread] | Current Thread | [Next in Thread] |