[Bug c++/69687] Buffer Overflow in libiberty

2016-05-19 Thread jakub at gcc dot gnu.org
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=69687 --- Comment #15 from Jakub Jelinek --- Author: jakub Date: Thu May 19 12:05:41 2016 New Revision: 236456 URL: https://gcc.gnu.org/viewcvs?rev=236456&root=gcc&view=rev Log: Backported from mainline 2016-05-19 Jakub Jelinek

[Bug c++/69687] Buffer Overflow in libiberty

2016-05-19 Thread jakub at gcc dot gnu.org
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=69687 --- Comment #14 from Jakub Jelinek --- Author: jakub Date: Thu May 19 10:44:31 2016 New Revision: 236452 URL: https://gcc.gnu.org/viewcvs?rev=236452&root=gcc&view=rev Log: Backported from mainline 2016-05-19 Jakub Jelinek

[Bug c++/69687] Buffer Overflow in libiberty

2016-04-08 Thread bernds at gcc dot gnu.org
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=69687 Bernd Schmidt changed: What|Removed |Added Status|UNCONFIRMED |RESOLVED CC|

[Bug c++/69687] Buffer Overflow in libiberty

2016-04-08 Thread bernds at gcc dot gnu.org
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=69687 --- Comment #12 from Bernd Schmidt --- Author: bernds Date: Fri Apr 8 12:10:21 2016 New Revision: 234829 URL: https://gcc.gnu.org/viewcvs?rev=234829&root=gcc&view=rev Log: Fix memory allocation size overflows (PR69687, patch by Marcel Böhme)

[Bug c++/69687] Buffer Overflow in libiberty

2016-03-02 Thread manu at gcc dot gnu.org
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=69687 --- Comment #11 from Manuel López-Ibáñez --- The policy of GNU software is to avoid arbitrary implementation limits whenever possible. (In reply to Marcel Böhme from comment #4) > with n=2*(length of decl + length of arg) characters. Since n is

[Bug c++/69687] Buffer Overflow in libiberty

2016-03-02 Thread trippels at gcc dot gnu.org
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=69687 --- Comment #10 from Markus Trippelsdorf --- Patches should be posted to: gcc-patc...@gcc.gnu.org

[Bug c++/69687] Buffer Overflow in libiberty

2016-03-02 Thread boehme.marcel at gmail dot com
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=69687 --- Comment #9 from Marcel Böhme --- Created attachment 37839 --> https://gcc.gnu.org/bugzilla/attachment.cgi?id=37839&action=edit Proposed Patch * Limiting the length of the mangled string to 264k characters. * Limiting the loop iterations to

[Bug c++/69687] Buffer Overflow in libiberty

2016-02-10 Thread trippels at gcc dot gnu.org
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=69687 Markus Trippelsdorf changed: What|Removed |Added Severity|major |normal

[Bug c++/69687] Buffer Overflow in libiberty

2016-02-10 Thread boehme.marcel at gmail dot com
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=69687 Marcel Böhme changed: What|Removed |Added Severity|normal |major --- Comment #8 from Marcel Böhme -

[Bug c++/69687] Buffer Overflow in libiberty

2016-02-06 Thread boehme.marcel at gmail dot com
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=69687 --- Comment #7 from Marcel Böhme --- Created attachment 37620 --> https://gcc.gnu.org/bugzilla/attachment.cgi?id=37620&action=edit Valgrind This $ cat compileme.c #include #include const char* X00020A___R0020A__U000R03000N

[Bug c++/69687] Buffer Overflow in libiberty

2016-02-06 Thread manu at gcc dot gnu.org
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=69687 Manuel López-Ibáñez changed: What|Removed |Added CC||manu at gcc dot gnu.org --- Commen

[Bug c++/69687] Buffer Overflow in libiberty

2016-02-06 Thread boehme.marcel at gmail dot com
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=69687 --- Comment #5 from Marcel Böhme --- Created attachment 37612 --> https://gcc.gnu.org/bugzilla/attachment.cgi?id=37612&action=edit Debug This

[Bug c++/69687] Buffer Overflow in libiberty

2016-02-05 Thread boehme.marcel at gmail dot com
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=69687 --- Comment #4 from Marcel Böhme --- Here is my preliminary analysis: The function demangle_args (cplus-dem.c:4424) parses the (crafted) mangled function args from the binary. In line 4452, r is read from mangled. In line 4491, we enter a loop wi

[Bug c++/69687] Buffer Overflow in libiberty

2016-02-05 Thread boehme.marcel at gmail dot com
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=69687 --- Comment #3 from Marcel Böhme --- Hi Markus, Indeed, it depends on the use case. I find it quite unsettling to know that common digital forensics tools, such as gdb and objdump, are vulnerable to execute arbitrary code. How much credibility

[Bug c++/69687] Buffer Overflow in libiberty

2016-02-05 Thread trippels at gcc dot gnu.org
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=69687 Markus Trippelsdorf changed: What|Removed |Added CC||trippels at gcc dot gnu.org

[Bug c/69687] Buffer Overflow in libiberty

2016-02-05 Thread boehme.marcel at gmail dot com
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=69687 --- Comment #1 from Marcel Böhme --- Created attachment 37593 --> https://gcc.gnu.org/bugzilla/attachment.cgi?id=37593&action=edit Test Case #2