| Summary: | A stack buffer overflow in the nm tool of the GNU Binutils. | ||
|---|---|---|---|
| Product: | binutils | Reporter: | owl337 <v.owl337> |
| Component: | binutils | Assignee: | Not yet assigned to anyone <unassigned> |
| Status: | RESOLVED FIXED | ||
| Severity: | critical | CC: | nickc |
| Priority: | P2 | ||
| Version: | 2.28 | ||
| Target Milestone: | --- | ||
| Host: | Target: | ||
| Build: | Last reconfirmed: | ||
| Project(s) to access: | ssh public key: | ||
| Attachments: | Triggered by "nm -n POC1" | ||
|
Description
owl337
2017-06-24 14:53:55 UTC
The master branch has been updated by Nick Clifton <nickc@sourceware.org>: https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=04e15b4a9462cb1ae819e878a6009829aab8020b commit 04e15b4a9462cb1ae819e878a6009829aab8020b Author: Nick Clifton <nickc@redhat.com> Date: Mon Jun 26 15:46:34 2017 +0100 Fix address violation parsing a corrupt texhex format file. PR binutils/21670 * tekhex.c (getvalue): Check for the source pointer exceeding the end pointer before the first byte is read. Hi Owl, Thanks for reporting this bug. I have checked in a small patch to fix the problem, which was a simple case of not checking for a buffer overrun early enough. Cheers Nick |