[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Bug binutils/29099] Buffer overflow can happen at libiberty/argv.c
From: |
nickc at redhat dot com |
Subject: |
[Bug binutils/29099] Buffer overflow can happen at libiberty/argv.c |
Date: |
Thu, 28 Apr 2022 10:09:25 +0000 |
https://sourceware.org/bugzilla/show_bug.cgi?id=29099
Nick Clifton <nickc at redhat dot com> changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |nickc at redhat dot com
Status|UNCONFIRMED |RESOLVED
Resolution|--- |MOVED
--- Comment #4 from Nick Clifton <nickc at redhat dot com> ---
Hi yguoaz,
Thanks for reporting this problem. Unfortunately the libiberty library
is actually maintained by the GCC project, rather than the binutils, so
you will need to report the issue using their bug reporting system:
https://gcc.gnu.org/bugzilla/enter_bug.cgi?product=gcc
Also - as Andreas points out, in order for pos to be LONG_MAX you would
have to have a file that is so big that it could not possibly be read
into a buffer. Even if running on a 32-bit system, a 4GB file would be
too much to read into a buffer, even if the memory for it could be
allocated. Plus as Alan has pointed out the multiplication will convert
to a size_t, so the overflow is extremely unlikely.
In other words, please do feel to report this bug to the gcc community
if you wish, but it is unlikely that there will ever by a real world
sceanario where this problem could be triggered.
Cheers
Nick
--
You are receiving this mail because:
You are on the CC list for the bug.