|
From: | cvs-commit at gcc dot gnu.org |
Subject: | [Bug binutils/23064] Buffer overflow (read of size 8) in Dwarf |
Date: | Tue, 17 Apr 2018 11:37:08 +0000 |
https://sourceware.org/bugzilla/show_bug.cgi?id=23064 --- Comment #1 from cvs-commit at gcc dot gnu.org <cvs-commit at gcc dot gnu.org> --- The master branch has been updated by Nick Clifton <address@hidden>: https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=6aea08d9f3e3d6475a65454da488a0c51f5dc97d commit 6aea08d9f3e3d6475a65454da488a0c51f5dc97d Author: Nick Clifton <address@hidden> Date: Tue Apr 17 12:35:55 2018 +0100 Fix illegal memory access when parsing corrupt DWARF information. PR 23064 * dwarf.c (process_cu_tu_index): Test for a potential buffer overrun before copying signature pointer. -- You are receiving this mail because: You are on the CC list for the bug.
[Prev in Thread] | Current Thread | [Next in Thread] |