Catch integer overflows/underflows when parsing corrupt DWARF FORM blocks.
[deliverable/binutils-gdb.git] / bfd / ChangeLog
index 446b978a7a8e2b25902472d91f5ecf8521c909ba..91bc2ef61666ebab216eea0bc3a597bd49d39afe 100644 (file)
@@ -1,3 +1,22 @@
+2018-02-28  Alan Modra  <amodra@gmail.com>
+
+       PR 22887
+       * aoutx.h (swap_std_reloc_in): Correct r_index bound check.
+
+2018-02-28  Nick Clifton  <nickc@redhat.com>
+
+       PR 22895
+       PR 22893
+       * dwarf2.c (read_n_bytes): Replace size parameter with dwarf_block
+       pointer.  Drop unused abfd parameter.  Check the size of the block
+       before initialising the data field.  Return the end pointer if the
+       size is invalid.
+       (read_attribute_value): Adjust invocations of read_n_bytes.
+
+       PR 22894
+       * dwarf1.c (parse_die): Check the length of form blocks before
+       advancing the data pointer.
+
 2018-02-28  Alan Modra  <amodra@gmail.com>
 
        PR 22887
This page took 0.023792 seconds and 4 git commands to generate.