[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Bug binutils/21379] readelf: signed integer overflow
From: |
cvs-commit at gcc dot gnu.org |
Subject: |
[Bug binutils/21379] readelf: signed integer overflow |
Date: |
Thu, 13 Apr 2017 15:08:09 +0000 |
https://sourceware.org/bugzilla/show_bug.cgi?id=21379
--- Comment #1 from cvs-commit at gcc dot gnu.org <cvs-commit at gcc dot
gnu.org> ---
The master branch has been updated by Nick Clifton <address@hidden>:
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=7296a62a2a237f6b1ad8db8c38b090e9f592c8cf
commit 7296a62a2a237f6b1ad8db8c38b090e9f592c8cf
Author: Nick Clifton <address@hidden>
Date: Thu Apr 13 16:06:30 2017 +0100
readelf: fix out of range subtraction, seg fault from a NULL pointer and
memory exhaustion, all from parsing corrupt binaries.
PR binutils/21379
* readelf.c (process_dynamic_section): Detect over large section
offsets in the DT_SYMTAB entry.
PR binutils/21345
* readelf.c (process_mips_specific): Catch an unfeasible memory
allocation before it happens and print a suitable error message.
--
You are receiving this mail because:
You are on the CC list for the bug.