aboutsummaryrefslogtreecommitdiff
path: root/bfd/dwarf2.c
diff options
context:
space:
mode:
authorNick Clifton <nickc@redhat.com>2017-09-26 14:37:47 +0100
committerNick Clifton <nickc@redhat.com>2017-09-26 14:37:47 +0100
commit30d0157a2ad64e64e5ff9fcc0dbe78a3e682f573 (patch)
tree1e50d97c37058f5709f64f5683a017591a438126 /bfd/dwarf2.c
parent281c4447738409888d9659924937da182a65b4e1 (diff)
downloadgdb-30d0157a2ad64e64e5ff9fcc0dbe78a3e682f573.zip
gdb-30d0157a2ad64e64e5ff9fcc0dbe78a3e682f573.tar.gz
gdb-30d0157a2ad64e64e5ff9fcc0dbe78a3e682f573.tar.bz2
Avoid needless resource usage when processing a corrupt DWARF directory or file name table.
PR 22210 * dwarf2.c (read_formatted_entries): Fail early if we know that the loop parsing data entries will overflow the end of the section.
Diffstat (limited to 'bfd/dwarf2.c')
-rw-r--r--bfd/dwarf2.c10
1 files changed, 10 insertions, 0 deletions
diff --git a/bfd/dwarf2.c b/bfd/dwarf2.c
index ad06120..dd5ac8f 100644
--- a/bfd/dwarf2.c
+++ b/bfd/dwarf2.c
@@ -1938,6 +1938,16 @@ read_formatted_entries (struct comp_unit *unit, bfd_byte **bufp,
return FALSE;
}
+ /* PR 22210. Paranoia check. Don't bother running the loop
+ if we know that we are going to run out of buffer. */
+ if (data_count > (bfd_vma) (buf_end - buf))
+ {
+ _bfd_error_handler (_("Dwarf Error: data count (%Lx) larger than buffer size."),
+ data_count);
+ bfd_set_error (bfd_error_bad_value);
+ return FALSE;
+ }
+
for (datai = 0; datai < data_count; datai++)
{
bfd_byte *format = format_header_data;