mirror of
https://sourceware.org/git/binutils-gdb.git
synced 2025-02-17 13:10:12 +08:00
Fix an illegal memory access triggered by an attempt to parse a corrupt input file.
PR 28046 * dwarf2.c (read_ranges): Check that range_ptr does not exceed range_end.
This commit is contained in:
parent
4ff0bb2df5
commit
49910fd88d
@ -1,3 +1,9 @@
|
||||
2021-07-02 Nick Clifton <nickc@redhat.com>
|
||||
|
||||
PR 28046
|
||||
* dwarf2.c (read_ranges): Check that range_ptr does not exceed
|
||||
range_end.
|
||||
|
||||
2021-06-30 YunQiang Su <yunqiang.su@cipunited.com>
|
||||
|
||||
PR mips/28009
|
||||
|
@ -909,7 +909,8 @@ read_address (struct comp_unit *unit, bfd_byte **ptr, bfd_byte *buf_end)
|
||||
if (bfd_get_flavour (unit->abfd) == bfd_target_elf_flavour)
|
||||
signed_vma = get_elf_backend_data (unit->abfd)->sign_extend_vma;
|
||||
|
||||
if (unit->addr_size > (size_t) (buf_end - buf))
|
||||
if (unit->addr_size > (size_t) (buf_end - buf)
|
||||
|| (buf > buf_end))
|
||||
{
|
||||
*ptr = buf_end;
|
||||
return 0;
|
||||
@ -3097,6 +3098,8 @@ read_ranges (struct comp_unit *unit, struct arange *arange,
|
||||
if (ranges_ptr < unit->file->dwarf_ranges_buffer)
|
||||
return false;
|
||||
ranges_end = unit->file->dwarf_ranges_buffer + unit->file->dwarf_ranges_size;
|
||||
if (ranges_ptr >= ranges_end)
|
||||
return false;
|
||||
|
||||
for (;;)
|
||||
{
|
||||
|
Loading…
Reference in New Issue
Block a user