https://sourceware.org/bugzilla/show_bug.cgi?id=28834
Nick Clifton <nickc at redhat dot com> changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |nickc at redhat dot com
--- Comment #1 from Nick Clifton <nickc at redhat dot com> ---
Hi Joel,
Hmmm, compressed strings would indeed cause this of problem.
Could you upload the test binary that you are using ?
Compressed sections include a field giving their uncompressed size, so it may
be possible to make use of that. But a malicious actor could create a corrupt
.zdebug_str section with a ridiculously large "real section size" field and
then try to trick the application into allocating a huge amount of memory....
Maybe a simpler solution would be change the heuristic that produces the
error message so that it only complains if the .debug_str section is more than
10x the size of the file ? Just how efficient can (zlib based) text
compression get these days ?
Cheers
Nick
--
You are receiving this mail because:
You are on the CC list for the bug.