|
From: | tobias at stoeckmann dot org |
Subject: | [Bug binutils/20499] gprof: segmentation fault on invalid symbol file |
Date: | Fri, 26 Aug 2016 19:23:30 +0000 |
https://sourceware.org/bugzilla/show_bug.cgi?id=20499 --- Comment #13 from Tobias Stoeckmann <tobias at stoeckmann dot org> --- The check alone does not prevent the integer overflow in xmalloc()s argument. I would recommend to bail out when encountering a file that is simply too large to be sane. See my proposal for details. In fact, my initial patch got it wrong too, ignoring the overflow resulting due to multiplication with sizeof (Sym). -- You are receiving this mail because: You are on the CC list for the bug.
[Prev in Thread] | Current Thread | [Next in Thread] |