[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Bug binutils/28862] heap-buffer-overflow in parse_stab_string
From: |
cvs-commit at gcc dot gnu.org |
Subject: |
[Bug binutils/28862] heap-buffer-overflow in parse_stab_string |
Date: |
Tue, 08 Feb 2022 11:14:25 +0000 |
https://sourceware.org/bugzilla/show_bug.cgi?id=28862
--- Comment #1 from cvs-commit at gcc dot gnu.org <cvs-commit at gcc dot
gnu.org> ---
The master branch has been updated by Alan Modra <amodra@sourceware.org>:
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=481153777e278b71e694fd2db6b897f7a9e3dcb8
commit 481153777e278b71e694fd2db6b897f7a9e3dcb8
Author: Alan Modra <amodra@gmail.com>
Date: Tue Feb 8 20:21:01 2022 +1030
PR28862, heap-buffer-overflow in parse_stab_string
I have no info on the format of a "SUNPRO C++ Namespace" stab, so am
relying on the previous code being correct in parsing these stabs.
Just don't allow NULs anywhere in the stab.
PR 28862
* stabs.c (parse_stab_string): Don't overrun buffer when parsing
'Y' stab.
--
You are receiving this mail because:
You are on the CC list for the bug.