[Bug ld/29849] ERROR: AddressSanitizer: global-buffer-overflow on address in spec_match ../../ld/ldlang.c:223 since 049522cae9798e51dd0c58566a9a2c61ba9100a9

2022-12-05 Thread nickc at redhat dot com
https://sourceware.org/bugzilla/show_bug.cgi?id=29849

Nick Clifton  changed:

   What|Removed |Added

 Status|ASSIGNED|RESOLVED
 Resolution|--- |FIXED

--- Comment #5 from Nick Clifton  ---
Problem fixed.

-- 
You are receiving this mail because:
You are on the CC list for the bug.


[Bug ld/29849] ERROR: AddressSanitizer: global-buffer-overflow on address in spec_match ../../ld/ldlang.c:223 since 049522cae9798e51dd0c58566a9a2c61ba9100a9

2022-12-05 Thread cvs-commit at gcc dot gnu.org
https://sourceware.org/bugzilla/show_bug.cgi?id=29849

--- Comment #4 from cvs-commit at gcc dot gnu.org  ---
The master branch has been updated by Nick Clifton :

https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=3bf5bf547a2ffdbd702804b95b3218040ac470dc

commit 3bf5bf547a2ffdbd702804b95b3218040ac470dc
Author: Nick Clifton 
Date:   Mon Dec 5 14:57:17 2022 +

Prevent an illegal memory access when comparing the prefix of a section
name regexp.

PR 29849
* ldlang.c (spec_match): Check that there is sufficient length in
the target name to match the spec's prefix.

-- 
You are receiving this mail because:
You are on the CC list for the bug.


[Bug ld/29849] ERROR: AddressSanitizer: global-buffer-overflow on address in spec_match ../../ld/ldlang.c:223 since 049522cae9798e51dd0c58566a9a2c61ba9100a9

2022-12-05 Thread matz at suse dot de
https://sourceware.org/bugzilla/show_bug.cgi?id=29849

--- Comment #3 from Michael Matz  ---
Thanks Nick for cleaning up after me.  FWIW I was just testing an equivalent
patch on most targets without regressions, so it's good to go.

-- 
You are receiving this mail because:
You are on the CC list for the bug.


[Bug ld/29849] ERROR: AddressSanitizer: global-buffer-overflow on address in spec_match ../../ld/ldlang.c:223 since 049522cae9798e51dd0c58566a9a2c61ba9100a9

2022-12-05 Thread mliska at suse dot cz
https://sourceware.org/bugzilla/show_bug.cgi?id=29849

--- Comment #2 from Martin Liska  ---
Thanks Nick, the patch helps, please commit it.

-- 
You are receiving this mail because:
You are on the CC list for the bug.


[Bug ld/29849] ERROR: AddressSanitizer: global-buffer-overflow on address in spec_match ../../ld/ldlang.c:223 since 049522cae9798e51dd0c58566a9a2c61ba9100a9

2022-12-05 Thread nickc at redhat dot com
https://sourceware.org/bugzilla/show_bug.cgi?id=29849

--- Comment #1 from Nick Clifton  ---
Created attachment 14480
  --> https://sourceware.org/bugzilla/attachment.cgi?id=14480=edit
Proposed patch

Hi Martin,

  Testing an obsolete target seems slightly suspicious, but I was able to
reproduce the failure using a supported target (powerpc-linux-gnu) so the
report is valid.

  It seems that the spec_match() function is insufficiently paranoid.  Please
could you try the uploaded patch which I think should solve the problem.

Cheers
  Nick

-- 
You are receiving this mail because:
You are on the CC list for the bug.


[Bug ld/29849] ERROR: AddressSanitizer: global-buffer-overflow on address in spec_match ../../ld/ldlang.c:223 since 049522cae9798e51dd0c58566a9a2c61ba9100a9

2022-12-05 Thread nickc at redhat dot com
https://sourceware.org/bugzilla/show_bug.cgi?id=29849

Nick Clifton  changed:

   What|Removed |Added

 Status|NEW |ASSIGNED
   Assignee|unassigned at sourceware dot org   |nickc at redhat dot com
 CC||nickc at redhat dot com

-- 
You are receiving this mail because:
You are on the CC list for the bug.