|
From: | cvs-commit at gcc dot gnu.org |
Subject: | [Bug ld/29849] ERROR: AddressSanitizer: global-buffer-overflow on address in spec_match ../../ld/ldlang.c:223 since 049522cae9798e51dd0c58566a9a2c61ba9100a9 |
Date: | Mon, 05 Dec 2022 14:57:57 +0000 |
https://sourceware.org/bugzilla/show_bug.cgi?id=29849 --- Comment #4 from cvs-commit at gcc dot gnu.org <cvs-commit at gcc dot gnu.org> --- The master branch has been updated by Nick Clifton <nickc@sourceware.org>: https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=3bf5bf547a2ffdbd702804b95b3218040ac470dc commit 3bf5bf547a2ffdbd702804b95b3218040ac470dc Author: Nick Clifton <nickc@redhat.com> Date: Mon Dec 5 14:57:17 2022 +0000 Prevent an illegal memory access when comparing the prefix of a section name regexp. PR 29849 * ldlang.c (spec_match): Check that there is sufficient length in the target name to match the spec's prefix. -- You are receiving this mail because: You are on the CC list for the bug.
[Prev in Thread] | Current Thread | [Next in Thread] |