Prevent an illegal memory access by objdump when parsing a corrupt file on a 32-bit host.
PR 24360 * objdump.c (load_specific_debug_section): Check that the amount of memory to be allocated matches the size of the section.
This commit is contained in:
parent
392a59728b
commit
634557801d
2 changed files with 15 additions and 7 deletions
|
@ -382,10 +382,10 @@ nonfatal (const char *msg)
|
|||
static const char *
|
||||
sanitize_string (const char * in)
|
||||
{
|
||||
static char * buffer = NULL;
|
||||
static unsigned int buffer_len = 0;
|
||||
const char * original = in;
|
||||
char * out;
|
||||
static char * buffer = NULL;
|
||||
static size_t buffer_len = 0;
|
||||
const char * original = in;
|
||||
char * out;
|
||||
|
||||
/* Paranoia. */
|
||||
if (in == NULL)
|
||||
|
@ -2679,6 +2679,7 @@ load_specific_debug_section (enum dwarf_section_display_enum debug,
|
|||
bfd *abfd = (bfd *) file;
|
||||
bfd_byte *contents;
|
||||
bfd_size_type amt;
|
||||
size_t alloced;
|
||||
|
||||
if (section->start != NULL)
|
||||
{
|
||||
|
@ -2694,8 +2695,9 @@ load_specific_debug_section (enum dwarf_section_display_enum debug,
|
|||
section->address = bfd_get_section_vma (abfd, sec);
|
||||
section->user_data = sec;
|
||||
section->size = bfd_get_section_size (sec);
|
||||
amt = section->size + 1;
|
||||
if (amt == 0)
|
||||
/* PR 24360: On 32-bit hosts sizeof (size_t) < sizeof (bfd_size_type). */
|
||||
alloced = amt = section->size + 1;
|
||||
if (alloced != amt || alloced == 0)
|
||||
{
|
||||
section->start = NULL;
|
||||
free_debug_section (debug);
|
||||
|
@ -2704,7 +2706,7 @@ load_specific_debug_section (enum dwarf_section_display_enum debug,
|
|||
(unsigned long long) section->size);
|
||||
return FALSE;
|
||||
}
|
||||
section->start = contents = malloc (amt);
|
||||
section->start = contents = malloc (alloced);
|
||||
if (section->start == NULL
|
||||
|| !bfd_get_full_section_contents (abfd, sec, &contents))
|
||||
{
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue