+2022-12-16 Nick Clifton <nickc@redhat.com>
+
+ PR 29908
+ * dwarf.c (display_debug_addr): Check for corrupt header lengths.
+
2022-12-01 Nick Clifton <nickc@redhat.com>
PR 25202
return 0;
}
end = curr_header + length;
+ if (end < entry)
+ {
+ warn (_("Corrupt %s section header: length field (%lx) is too small\n"),
+ section->name, length);
+ return 0;
+ }
SAFE_BYTE_GET_AND_INC (version, curr_header, 2, entry);
if (version != 5)
warn (_("Corrupt %s section: expecting version number 5 in header but found %d instead\n"),
address_size += segment_selector_size;
}
else
- end = section->start + debug_addr_info [i + 1]->addr_base;
+ {
+ end = section->start + debug_addr_info [i + 1]->addr_base;
+
+ if (end < entry)
+ {
+ warn (_("Corrupt %s section: address base of entry %u (%lx) is less than entry %u (%lx)\n"),
+ section->name,
+ i, debug_addr_info [i]->addr_base,
+ i + 1, debug_addr_info [i + 1]->addr_base);
+ return 0;
+ }
+ }
+
header = end;
idx = 0;
+
while ((size_t) (end - entry) >= address_size)
{
uint64_t base = byte_get (entry, address_size);