Summary: | Buffer overflow (read of size 8) in Dwarf | ||
---|---|---|---|
Product: | binutils | Reporter: | Thuan Pham <thuanpv> |
Component: | binutils | Assignee: | Not yet assigned to anyone <unassigned> |
Status: | RESOLVED FIXED | ||
Severity: | normal | CC: | nickc |
Priority: | P2 | ||
Version: | 2.31 | ||
Target Milestone: | --- | ||
Host: | Target: | ||
Build: | Last reconfirmed: | ||
Attachments: | Bug-revealing sample input |
Description
Thuan Pham
2018-04-14 01:43:43 UTC
The master branch has been updated by Nick Clifton <nickc@sourceware.org>: https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=6aea08d9f3e3d6475a65454da488a0c51f5dc97d commit 6aea08d9f3e3d6475a65454da488a0c51f5dc97d Author: Nick Clifton <nickc@redhat.com> Date: Tue Apr 17 12:35:55 2018 +0100 Fix illegal memory access when parsing corrupt DWARF information. PR 23064 * dwarf.c (process_cu_tu_index): Test for a potential buffer overrun before copying signature pointer. Hi Thuan, Thanks for reporting this bug. I have checked in a small patch to fix the problem, so I hope that the issue is now resolved. Cheers Nick |