|
From: | cvs-commit at gcc dot gnu.org |
Subject: | [Bug binutils/22385] Integer overflow in coff_get_normalized_symtab |
Date: | Fri, 03 Nov 2017 11:57:17 +0000 |
https://sourceware.org/bugzilla/show_bug.cgi?id=22385 --- Comment #1 from cvs-commit at gcc dot gnu.org <cvs-commit at gcc dot gnu.org> --- The master branch has been updated by Nick Clifton <address@hidden>: https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=6cee897971d4d7cd37d2a686bb6d2aa3e759c8ca commit 6cee897971d4d7cd37d2a686bb6d2aa3e759c8ca Author: Nick Clifton <address@hidden> Date: Fri Nov 3 11:55:21 2017 +0000 Fix excessive memory allocation attempts and possible integer overfloaws when attempting to read a COFF binary with a corrupt symbol count. PR 22385 * coffgen.c (_bfd_coff_get_external_symbols): Check for an overlarge raw syment count. (coff_get_normalized_symtab): Likewise. -- You are receiving this mail because: You are on the CC list for the bug.
[Prev in Thread] | Current Thread | [Next in Thread] |