[Bug ld/29849] ERROR: AddressSanitizer: global-buffer-overflow on address in spec_match ../../ld/ldlang.c:223 since 049522cae9798e51dd0c58566a9a2c61ba9100a9
https://sourceware.org/bugzilla/show_bug.cgi?id=29849 Nick Clifton changed: What|Removed |Added Status|ASSIGNED|RESOLVED Resolution|--- |FIXED --- Comment #5 from Nick Clifton --- Problem fixed. -- You are receiving this mail because: You are on the CC list for the bug.
[Bug ld/29849] ERROR: AddressSanitizer: global-buffer-overflow on address in spec_match ../../ld/ldlang.c:223 since 049522cae9798e51dd0c58566a9a2c61ba9100a9
https://sourceware.org/bugzilla/show_bug.cgi?id=29849 --- Comment #4 from cvs-commit at gcc dot gnu.org --- The master branch has been updated by Nick Clifton : https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=3bf5bf547a2ffdbd702804b95b3218040ac470dc commit 3bf5bf547a2ffdbd702804b95b3218040ac470dc Author: Nick Clifton Date: Mon Dec 5 14:57:17 2022 + Prevent an illegal memory access when comparing the prefix of a section name regexp. PR 29849 * ldlang.c (spec_match): Check that there is sufficient length in the target name to match the spec's prefix. -- You are receiving this mail because: You are on the CC list for the bug.
[Bug ld/29849] ERROR: AddressSanitizer: global-buffer-overflow on address in spec_match ../../ld/ldlang.c:223 since 049522cae9798e51dd0c58566a9a2c61ba9100a9
https://sourceware.org/bugzilla/show_bug.cgi?id=29849 --- Comment #3 from Michael Matz --- Thanks Nick for cleaning up after me. FWIW I was just testing an equivalent patch on most targets without regressions, so it's good to go. -- You are receiving this mail because: You are on the CC list for the bug.
[Bug ld/29849] ERROR: AddressSanitizer: global-buffer-overflow on address in spec_match ../../ld/ldlang.c:223 since 049522cae9798e51dd0c58566a9a2c61ba9100a9
https://sourceware.org/bugzilla/show_bug.cgi?id=29849 --- Comment #2 from Martin Liska --- Thanks Nick, the patch helps, please commit it. -- You are receiving this mail because: You are on the CC list for the bug.
[Bug ld/29849] ERROR: AddressSanitizer: global-buffer-overflow on address in spec_match ../../ld/ldlang.c:223 since 049522cae9798e51dd0c58566a9a2c61ba9100a9
https://sourceware.org/bugzilla/show_bug.cgi?id=29849 --- Comment #1 from Nick Clifton --- Created attachment 14480 --> https://sourceware.org/bugzilla/attachment.cgi?id=14480=edit Proposed patch Hi Martin, Testing an obsolete target seems slightly suspicious, but I was able to reproduce the failure using a supported target (powerpc-linux-gnu) so the report is valid. It seems that the spec_match() function is insufficiently paranoid. Please could you try the uploaded patch which I think should solve the problem. Cheers Nick -- You are receiving this mail because: You are on the CC list for the bug.
[Bug ld/29849] ERROR: AddressSanitizer: global-buffer-overflow on address in spec_match ../../ld/ldlang.c:223 since 049522cae9798e51dd0c58566a9a2c61ba9100a9
https://sourceware.org/bugzilla/show_bug.cgi?id=29849 Nick Clifton changed: What|Removed |Added Status|NEW |ASSIGNED Assignee|unassigned at sourceware dot org |nickc at redhat dot com CC||nickc at redhat dot com -- You are receiving this mail because: You are on the CC list for the bug.