https://sourceware.org/bugzilla/show_bug.cgi?id=27294
Bug ID: 27294 Summary: Potentially exploitable Heap Overwrites in avr_elf32_load_records_from_section() Product: binutils Version: 2.36 Status: UNCONFIRMED Severity: critical Priority: P2 Component: binutils Assignee: unassigned at sourceware dot org Reporter: dennis.r at columbia dot edu Target Milestone: --- = Location = https://sourcegraph.com/github.com/bminor/binutils-gdb@a7e3d08a26edefa411269636d7dcae7dd2736659/-/blob/bfd/elf32-avr.c#L4026 https://sourcegraph.com/github.com/bminor/binutils-gdb@a7e3d08a26edefa411269636d7dcae7dd2736659/-/blob/bfd/elf32-avr.c#L4027 https://sourcegraph.com/github.com/bminor/binutils-gdb@a7e3d08a26edefa411269636d7dcae7dd2736659/-/blob/bfd/elf32-avr.c#L4089 = Description = Large section parameter to avr_elf32_load_records_from_section may cause OOM in heap allocation. Later on, may read section data into contents variable, which may be under-allocated via size variable. Overwriting heap data, likely an adjacent chunks metadata, potentially exploitable A second, restricted heap overwrite can is caused by an off-by-one in the same function. Miscounted number of iterations of for loop for (i = 0; i < record_count; ++i). Should stop at record_count-1. This is overwriting heap data, likely an adjacent chunk’s metadata, and potentially exploitable. -- You are receiving this mail because: You are on the CC list for the bug.