asan: alpha-vms: memory leaks
[deliverable/binutils-gdb.git] / bfd / ChangeLog
index 8a2120ec2a2f4f06310549998caab25426b229b2..807dc07ca0576fb2b01d9c58173320f90456ba55 100644 (file)
@@ -1,3 +1,62 @@
+2019-12-29  Alan Modra  <amodra@gmail.com>
+
+       * vms-misc.c (_bfd_vms_save_sized_string): Add abfd param, make
+       size a size_t.  Use bfd_alloc rather than bfd_malloc.
+       (_bfd_vms_save_counted_string): Similarly.
+       * vms.h (_bfd_vms_save_sized_string): Update prototype.
+       (_bfd_vms_save_counted_string): Likewise.
+       * vms-alpha.c (_bfd_vms_slurp_ehdr): Adjust
+       _bfd_vms_save_counted_string and bfd_vms_save_sized_string calls.
+       (_bfd_vms_slurp_egsd, parse_module): Likewise.
+       (_bfd_vms_slurp_eisd): Likewise.  Check return status.
+       (alpha_vms_bfd_link_hash_table_free): New function.
+       (alpha_vms_bfd_link_hash_table_create): Arrange to call it.
+       (vms_close_and_cleanup): Free more memory.  Don't release tdata.
+
+2019-12-29  Alan Modra  <amodra@gmail.com>
+
+       * coffcode.h (coff_close_and_cleanup): Redefine to..
+       * coffgen.c (_bfd_coff_close_and_cleanup): ..this.  New function.
+       * libcoff-in.h (_bfd_coff_close_and_cleanup): Declare.
+       * libcoff.h: Regenerate.
+
+2019-12-29  Hannes Domani  <ssbssa@yahoo.de>
+           Alan Modra  <amodra@gmail.com>
+
+       PR 15350
+       * bfd.c (bfd_update_compression_header): Write zlib header for
+       formats other than ELF too.
+
+2019-12-26  Alan Modra  <amodra@gmail.com>
+
+       * som.c (setup_sections): Don't overflow space_strings_size.  Use
+       bfd_malloc2 to catch overflow of size calculation.
+       (som_prep_for_fixups): Use bfd_zalloc2 to catch overflow of size
+       calculation.
+       (som_build_and_write_symbol_table): Similarly use bfd_zmalloc2.
+       (som_slurp_symbol_table): Similarly use bfd_zmalloc2, bfd_malloc2,
+       and bfd_zalloc2.
+       (bfd_som_attach_aux_hdr): Use size_t vars for string length.
+       (som_bfd_count_ar_symbols): Use bfd_malloc2 to catch overflow of
+       size calculation.  Use size_t vars for length and catch overflow.
+       (som_slurp_armap): Use bfd_alloc2 to catch overflow of size
+       calculation.
+       (som_bfd_ar_write_symbol_stuff): Similarly use bfd_zmalloc2 and
+       bfd_malloc2.  Perform size calculations in bfd_size_type.
+
+2019-12-26  Hannes Domani  <ssbssa@yahoo.de>
+
+       * peicode.h (pe_bfd_read_buildid): Free data.
+
+2019-12-23  Alan Modra  <amodra@gmail.com>
+
+       * vms-alpha.c (add_symbol): Add "max" parameter.  Error on string
+       length larger than max.
+       (_bfd_vms_slurp_egsd): Ensure record is at least large enough to
+       read string length byte, error if not.  Pass size to add_symbol.
+       (_bfd_vms_slurp_etir): Don't read past end of buffer when reading
+       type and length.  Allow read of last byte in buffer.
+
 2019-12-23  Alan Modra  <amodra@gmail.com>
 
        * wasm-module.c (wasm_read_leb128): Don't allow oversize shifts.
This page took 0.023795 seconds and 4 git commands to generate.