From: Nick Clifton Date: Wed, 4 Feb 2015 10:40:05 +0000 (+0000) Subject: More fixes for memory access violations triggered by running readelf on fuzzed binaries. X-Git-Tag: gdb-7.10-release~1742 X-Git-Url: http://review.tizen.org/git/?a=commitdiff_plain;h=f3853b34448594744f284fa96f26e41fd533a50d;p=external%2Fbinutils.git More fixes for memory access violations triggered by running readelf on fuzzed binaries. PR binutils/17531 * dwarf.c (read_and_display_attr_value): Test for a block length being so long that it wraps around to before the start of the block. (process_debug_info): Test for section_begin wrapping around to before the start of the section. (display_gdb_index): Test for num_cus being so large that the end address wraps around to before the start of the section. (process_cu_tu_index): Test for j being so large that the section index pool wraps around to before the start of the section. --- diff --git a/binutils/ChangeLog b/binutils/ChangeLog index 4e5f4f2..d5cec77 100644 --- a/binutils/ChangeLog +++ b/binutils/ChangeLog @@ -1,3 +1,15 @@ +2015-02-04 Nick Clifton + + PR binutils/17531 + * dwarf.c (read_and_display_attr_value): Test for a block length + being so long that it wraps around to before the start of the block. + (process_debug_info): Test for section_begin wrapping around to + before the start of the section. + (display_gdb_index): Test for num_cus being so large that the end + address wraps around to before the start of the section. + (process_cu_tu_index): Test for j being so large that the section + index pool wraps around to before the start of the section. + 2015-02-03 Nick Clifton PR binutils/17531 diff --git a/binutils/dwarf.c b/binutils/dwarf.c index bee8b64..b65bb7b 100644 --- a/binutils/dwarf.c +++ b/binutils/dwarf.c @@ -1666,8 +1666,12 @@ read_and_display_attr_value (unsigned long attribute, uvalue = 0; block_start = end; } + /* FIXME: Testing "(block_start + uvalue) < block_start" miscompiles with + gcc 4.8.3 running on an x86_64 host in 32-bit mode. So we pre-compute + block_start + uvalue here. */ + data = block_start + uvalue; /* PR 17512: file: 008-103549-0.001:0.1. */ - if (block_start + uvalue > end) + if (block_start + uvalue > end || data < block_start) { warn (_("Corrupt attribute block length: %lx\n"), (long) uvalue); uvalue = end - block_start; @@ -1687,7 +1691,8 @@ read_and_display_attr_value (unsigned long attribute, uvalue = 0; block_start = end; } - if (block_start + uvalue > end) + data = block_start + uvalue; + if (block_start + uvalue > end || data < block_start) { warn (_("Corrupt attribute block length: %lx\n"), (long) uvalue); uvalue = end - block_start; @@ -1707,7 +1712,8 @@ read_and_display_attr_value (unsigned long attribute, uvalue = 0; block_start = end; } - if (block_start + uvalue > end) + data = block_start + uvalue; + if (block_start + uvalue > end || data < block_start) { warn (_("Corrupt attribute block length: %lx\n"), (long) uvalue); uvalue = end - block_start; @@ -1728,7 +1734,10 @@ read_and_display_attr_value (unsigned long attribute, uvalue = 0; block_start = end; } - if (block_start + uvalue > end) + data = block_start + uvalue; + if (block_start + uvalue > end + /* PR 17531: file: 5b5f0592. */ + || data < block_start) { warn (_("Corrupt attribute block length: %lx\n"), (long) uvalue); uvalue = end - block_start; @@ -2125,7 +2134,7 @@ read_and_display_attr_value (unsigned long attribute, uvalue += cu_offset; if (uvalue >= section->size) - warn (_("Offset %s used as value for DW_AT_import attribute of DIE at offset %lx is too big.\n"), + warn (_("Offset %s used as value for DW_AT_import attribute of DIE at offset 0x%lx is too big.\n"), dwarf_vmatoa ("x", uvalue), (unsigned long) (orig_data - section->start)); else @@ -2259,8 +2268,8 @@ process_debug_info (struct dwarf_section *section, /* Negative values are illegal, they may even cause infinite looping. This can happen if we can't accurately apply - relocations to an object file. */ - if ((signed long) length <= 0) + relocations to an object file, or if the file is corrupt. */ + if ((signed long) length <= 0 || section_begin < start) { warn (_("Corrupt unit length (0x%s) found in section %s\n"), dwarf_vmatoa ("x", length), section->name); @@ -2579,7 +2588,7 @@ process_debug_info (struct dwarf_section *section, printf ("\n"); fflush (stdout); } - warn (_("DIE at offset %lx refers to abbreviation number %lu which does not exist\n"), + warn (_("DIE at offset 0x%lx refers to abbreviation number %lu which does not exist\n"), die_offset, abbrev_number); return 0; } @@ -2617,7 +2626,7 @@ process_debug_info (struct dwarf_section *section, arg = debug_information + unit; else arg = NULL; - + tags = read_and_display_attr (attr->attribute, attr->form, tags, @@ -6713,7 +6722,8 @@ display_gdb_index (struct dwarf_section *section, if (num_cus * 4 < num_cus || constant_pool + cu_vector_offset + 4 + num_cus * 4 - >= section->start + section->size) + >= section->start + section->size + || (constant_pool + cu_vector_offset + 4 + num_cus * 4) < constant_pool) { printf ("\n", num_cus); warn (_("Invalid number of CUs (0x%x) for symbol table slot %d\n"), @@ -6723,6 +6733,7 @@ display_gdb_index (struct dwarf_section *section, if (num_cus > 1) printf ("\n"); + for (j = 0; j < num_cus; ++j) { int is_static; @@ -6913,6 +6924,13 @@ process_cu_tu_index (struct dwarf_section *section, int do_display) { SAFE_BYTE_GET (j, pindex, 4, limit); shndx_list = ppool + j * 4; + /* PR 17531: file: 705e010d. */ + if (shndx_list < ppool) + { + warn (_("Section index pool located before start of section\n")); + return 0; + } + if (do_display) printf (_(" [%3d] Signature: 0x%s Sections: "), i, dwarf_vmatoa64 (signature_high, signature_low,