From: Nick Clifton Date: Mon, 12 Jan 2015 17:28:55 +0000 (+0000) Subject: Another fix for memory access errors trigegred by running readelf on a corrupt binary. X-Git-Url: https://git.libre-soc.org/?a=commitdiff_plain;h=1306a7421c764d1f5e2a08afdb9b5818662c9e9c;p=binutils-gdb.git Another fix for memory access errors trigegred by running readelf on a corrupt binary. PR binutils/17531 * dwarf.c (display_debug_addr): Use xcalloc to allocate the debug_addr_info array. Check for an address_base that is too large. --- diff --git a/binutils/ChangeLog b/binutils/ChangeLog index 75c29c851b5..af7689bf6b1 100644 --- a/binutils/ChangeLog +++ b/binutils/ChangeLog @@ -6,6 +6,9 @@ (process_cu_tu_index): Use xcalloc2 to allocate the CU and TU arrays. (xcalloc2): New function. Like xcalloc, but checks for overflow. + (display_debug_addr): Use xcalloc to allocate the debug_addr_info + array. Check for an address_base that is too large. + * dwarf.h (xcalloc2): Prototype. 2015-01-12 Alan Modra diff --git a/binutils/dwarf.c b/binutils/dwarf.c index 19b4b44cc79..a7310c89272 100644 --- a/binutils/dwarf.c +++ b/binutils/dwarf.c @@ -2276,7 +2276,7 @@ process_debug_info (struct dwarf_section *section, /* Then allocate an array to hold the information. */ debug_information = (debug_info *) cmalloc (num_units, - sizeof (* debug_information)); + sizeof (* debug_information)); if (debug_information == NULL) { error (_("Not enough memory for a debug info array of %u entries\n"), @@ -2824,7 +2824,7 @@ display_debug_lines_raw (struct dwarf_section *section, /* PR 17531: file: 0522b371. */ if (linfo.li_line_range == 0) { - warn (_("Partial .debug_line. section encountered without a prior full .debug_line section")); + warn (_("Partial .debug_line. section encountered without a prior full .debug_line section\n")); return 0; } reset_state_machine (linfo.li_default_is_stmt); @@ -3181,7 +3181,7 @@ display_debug_lines_decoded (struct dwarf_section *section, /* PR 17531: file: 0522b371. */ if (linfo.li_line_range == 0) { - warn (_("Partial .debug_line. section encountered without a prior full .debug_line section")); + warn (_("Partial .debug_line. section encountered without a prior full .debug_line section\n")); return 0; } reset_state_machine (linfo.li_default_is_stmt); @@ -4936,19 +4936,30 @@ display_debug_addr (struct dwarf_section *section, printf (_("Contents of the %s section:\n\n"), section->name); - debug_addr_info = (debug_info **) xmalloc ((num_debug_info_entries + 1) - * sizeof (debug_info *)); + /* PR 17531: file: cf38d01b. + We use xcalloc because a corrupt file may not have initialised all of the + fields in the debug_info structure, which means that the sort below might + try to move uninitialised data. */ + debug_addr_info = (debug_info **) xcalloc ((num_debug_info_entries + 1), + sizeof (debug_info *)); count = 0; for (i = 0; i < num_debug_info_entries; i++) if (debug_information [i].addr_base != DEBUG_INFO_UNAVAILABLE) - debug_addr_info [count++] = debug_information + i; + { + /* PR 17531: file: cf38d01b. */ + if (debug_information[i].addr_base >= section->size) + warn (_("Corrupt address base (%lx) found in debug section %u\n"), + (unsigned long) debug_information[i].addr_base, i); + else + debug_addr_info [count++] = debug_information + i; + } /* Add a sentinel to make iteration convenient. */ debug_addr_info [count] = (debug_info *) xmalloc (sizeof (debug_info)); debug_addr_info [count]->addr_base = section->size; - qsort (debug_addr_info, count, sizeof (debug_info *), comp_addr_base); + for (i = 0; i < count; i++) { unsigned int idx; @@ -5536,7 +5547,7 @@ read_cie (unsigned char *start, unsigned char *end, /* PR 17512: file: 11042-2589-0.004. */ if (start > end) { - warn (_("Augmentation data too long: 0x%lx"), augmentation_data_len); + warn (_("Augmentation data too long: 0x%lx\n"), augmentation_data_len); return end; } } @@ -6279,7 +6290,7 @@ display_debug_frames (struct dwarf_section *section, fc->cfa_exp = rs->cfa_exp; if (frame_need_space (fc, rs->ncols - 1) < 0) { - warn (_("Invalid column number in saved frame state")); + warn (_("Invalid column number in saved frame state\n")); fc->ncols = 0; break; } @@ -6611,7 +6622,7 @@ display_gdb_index (struct dwarf_section *section, if (address_table + address_table_size * (2 + 8 + 4) > section->start + section->size) { - warn (_("Address table extends beyond end of section. %x"), address_table_size); + warn (_("Address table extends beyond end of section.\n")); return 0; } @@ -7145,7 +7156,8 @@ display_debug_not_supported (struct dwarf_section *section, return 1; } -/* Like malloc, but takes two parameters. +/* Like malloc, but takes two parameters like calloc. + Verifies that the first parameter is not too large. Note: does *not* initialise the allocated memory to zero. */ void * cmalloc (size_t nmemb, size_t size) @@ -7157,39 +7169,41 @@ cmalloc (size_t nmemb, size_t size) return xmalloc (nmemb * size); } -/* Like xcalloc, but verifies that the first paramer is not too large. */ +/* Like xmalloc, but takes two parameters like calloc. + Verifies that the first parameter is not too large. + Note: does *not* initialise the allocated memory to zero. */ void * -xcalloc2 (size_t nmemb, size_t size) +xcmalloc (size_t nmemb, size_t size) { /* Check for overflow. */ if (nmemb >= ~(size_t) 0 / size) return NULL; - return xcalloc (nmemb, size); + return xmalloc (nmemb * size); } -/* Like xmalloc, but takes two parameters. - Note: does *not* initialise the allocated memory to zero. */ +/* Like xrealloc, but takes three parameters. + Verifies that the second parameter is not too large. + Note: does *not* initialise any new memory to zero. */ void * -xcmalloc (size_t nmemb, size_t size) +xcrealloc (void *ptr, size_t nmemb, size_t size) { /* Check for overflow. */ if (nmemb >= ~(size_t) 0 / size) return NULL; - return xmalloc (nmemb * size); + return xrealloc (ptr, nmemb * size); } -/* Like xrealloc, but takes three parameters. - Note: does *not* initialise any new memory to zero. */ +/* Like xcalloc, but verifies that the first parameter is not too large. */ void * -xcrealloc (void *ptr, size_t nmemb, size_t size) +xcalloc2 (size_t nmemb, size_t size) { /* Check for overflow. */ if (nmemb >= ~(size_t) 0 / size) return NULL; - return xrealloc (ptr, nmemb * size); + return xcalloc (nmemb, size); } void