aboutsummaryrefslogtreecommitdiff
path: root/zlib/examples
diff options
context:
space:
mode:
authorAlan Modra <amodra@gmail.com>2019-12-26 12:25:31 +1030
committerAlan Modra <amodra@gmail.com>2019-12-26 17:49:03 +1030
commite5af216040aba59952c99d6479ba5279cee6825d (patch)
tree6f012dedae343b175af25c56e1759149b4a7bbb0 /zlib/examples
parentcef2097a8731b04accf50d99c9b5a556cebd5f15 (diff)
downloadgdb-e5af216040aba59952c99d6479ba5279cee6825d.zip
gdb-e5af216040aba59952c99d6479ba5279cee6825d.tar.gz
gdb-e5af216040aba59952c99d6479ba5279cee6825d.tar.bz2
asan: som: heap-buffer-overflow
Triggered by overflow of size calulation resulting in a too small buffer. The testcase found one of the som_bfd_count_ar_symbols problems. * som.c (setup_sections): Don't overflow space_strings_size. Use bfd_malloc2 to catch overflow of size calculation. (som_prep_for_fixups): Use bfd_zalloc2 to catch overflow of size calculation. (som_build_and_write_symbol_table): Similarly use bfd_zmalloc2. (som_slurp_symbol_table): Similarly use bfd_zmalloc2, bfd_malloc2, and bfd_zalloc2. (bfd_som_attach_aux_hdr): Use size_t vars for string length. (som_bfd_count_ar_symbols): Use bfd_malloc2 to catch overflow of size calculation. Use size_t vars for length and catch overflow. (som_slurp_armap): Use bfd_alloc2 to catch overflow of size calculation. (som_bfd_ar_write_symbol_stuff): Similarly use bfd_zmalloc2 and bfd_malloc2. Perform size calculations in bfd_size_type.
Diffstat (limited to 'zlib/examples')
0 files changed, 0 insertions, 0 deletions