From de6a7ee4bd18b7812ee5ff9abb62e2889daa501b Mon Sep 17 00:00:00 2001 From: Alan Modra Date: Tue, 5 Jan 2021 13:17:24 +1030 Subject: asan: heap buffer overflow in _bfd_vms_slurp_egsd * vms-alpha.c (_bfd_vms_slurp_egsd): Read flags after size check. --- bfd/vms-alpha.c | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) (limited to 'bfd/vms-alpha.c') diff --git a/bfd/vms-alpha.c b/bfd/vms-alpha.c index 2c0e812..72d89e5 100644 --- a/bfd/vms-alpha.c +++ b/bfd/vms-alpha.c @@ -1394,14 +1394,13 @@ _bfd_vms_slurp_egsd (bfd *abfd) flagword old_flags; unsigned int nameoff = offsetof (struct vms_egst, namlng); - old_flags = bfd_getl16 (egst->header.flags); - if (nameoff >= gsd_size) goto too_small; entry = add_symbol (abfd, &egst->namlng, gsd_size - nameoff); if (entry == NULL) return FALSE; + old_flags = bfd_getl16 (egst->header.flags); entry->typ = gsd_type; entry->data_type = egst->header.datyp; entry->flags = old_flags; -- cgit v1.1