Summary: | global-buffer-overflow in sh_elf_set_mach_from_flags | ||
---|---|---|---|
Product: | binutils | Reporter: | Alexandre Adamski <aadamski> |
Component: | binutils | Assignee: | Not yet assigned to anyone <unassigned> |
Status: | RESOLVED FIXED | ||
Severity: | normal | CC: | nickc |
Priority: | P2 | ||
Version: | 2.29 | ||
Target Milestone: | --- | ||
Host: | Target: | ||
Build: | Last reconfirmed: | ||
Attachments: |
testcase
report |
Description
Alexandre Adamski
2017-06-13 17:42:37 UTC
Created attachment 10102 [details]
testcase
Created attachment 10103 [details]
report
Additional Information: The command used was `objdump -D <file>`. The compilation flags used were `-g -O2 -fno-omit-frame-pointer -fsanitize=address -fno-sanitize-recover=undefined`. The configuration settings used were `--enable-targets=all --disable-shared`. The master branch has been updated by Nick Clifton <nickc@sourceware.org>: https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=f461bbd847f15657f3dd2f317c30c75a7520da1f commit f461bbd847f15657f3dd2f317c30c75a7520da1f Author: Nick Clifton <nickc@redhat.com> Date: Wed Jun 14 17:01:54 2017 +0100 Fix address violation bug when disassembling a corrupt SH binary. PR binutils/21578 * elf32-sh.c (sh_elf_set_mach_from_flags): Fix check for invalid flag value. Hi Aadamski, Thanks for reporting this bug. This was simple one - a check to make sure that an array access was valid was using the wrong size. I have checked in a patch to fix it. Cheers Nick Alright. Changing the status to FIXED. |