diff options
author | Nick Clifton <nickc@redhat.com> | 2022-12-19 11:13:46 +0000 |
---|---|---|
committer | Nick Clifton <nickc@redhat.com> | 2022-12-19 11:13:46 +0000 |
commit | 42f39fdedcf3321cab9964945d3f5bca58967b80 (patch) | |
tree | b132d233254e9007a3253001c41b834759fe7846 /binutils/dwarf.c | |
parent | d14b3ea1c885f3462b9fe26177a47825c3bdbd0a (diff) | |
download | gdb-42f39fdedcf3321cab9964945d3f5bca58967b80.zip gdb-42f39fdedcf3321cab9964945d3f5bca58967b80.tar.gz gdb-42f39fdedcf3321cab9964945d3f5bca58967b80.tar.bz2 |
Fix potential illegal memory accesses when parsing corrupt DWARF data.
PR 29914
* dwarf.c (fetch_indexed_value): Fail if the section is not big
enough to contain a header size field.
(display_debug_addr): Fail if the computed address size is too big
or too small.
Diffstat (limited to 'binutils/dwarf.c')
-rw-r--r-- | binutils/dwarf.c | 14 |
1 files changed, 14 insertions, 0 deletions
diff --git a/binutils/dwarf.c b/binutils/dwarf.c index 03b36afc..b792902 100644 --- a/binutils/dwarf.c +++ b/binutils/dwarf.c @@ -739,6 +739,13 @@ fetch_indexed_value (uint64_t idx, return -1; } + if (section->size < 4) + { + warn (_("Section %s is too small to contain an value indexed from another section!\n"), + section->name); + return -1; + } + uint32_t pointer_size, bias; if (byte_get (section->start, 4) == 0xffffffff) @@ -7770,6 +7777,13 @@ display_debug_addr (struct dwarf_section *section, header = end; idx = 0; + if (address_size < 1 || address_size > sizeof (uint64_t)) + { + warn (_("Corrupt %s section: address size (%x) is wrong"), + section->name, address_size); + return 0; + } + while ((size_t) (end - entry) >= address_size) { uint64_t base = byte_get (entry, address_size); |