https://sourceware.org/bugzilla/show_bug.cgi?id=22905
--- Comment #1 from cvs-commit at gcc dot gnu.org <cvs-commit at gcc dot gnu.org> --- The master branch has been updated by Nick Clifton <ni...@sourceware.org>: https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=d11ae95ea3403559f052903ab053f43ad7821e37 commit d11ae95ea3403559f052903ab053f43ad7821e37 Author: Nick Clifton <ni...@redhat.com> Date: Thu Mar 1 16:14:08 2018 +0000 Prevent illegal memory accesses triggerd by intger overflow when parsing corrupt DWARF information on a 32-bit host. PR 22905 * dwarf.c (display_debug_ranges): Check that the offset loaded from the range_entry structure is valid. -- You are receiving this mail because: You are on the CC list for the bug. _______________________________________________ bug-binutils mailing list bug-binutils@gnu.org https://lists.gnu.org/mailman/listinfo/bug-binutils