https://sourceware.org/bugzilla/show_bug.cgi?id=28834

Nick Clifton <nickc at redhat dot com> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
                 CC|                            |nickc at redhat dot com

--- Comment #1 from Nick Clifton <nickc at redhat dot com> ---
Hi Joel,

  Hmmm, compressed strings would indeed cause this of problem.

  Could you upload the test binary that you are using ?

  Compressed sections include a field giving their uncompressed size, so it may
be possible to make use of that.  But a malicious actor could create a corrupt
.zdebug_str section with a ridiculously large "real section size" field and
then try to trick the application into allocating a huge amount of memory....

  Maybe a simpler solution would be change the heuristic that produces the
error message so that it only complains if the .debug_str section is more than
10x the size of the file ?  Just how efficient can (zlib based) text
compression get these days ?

Cheers
  Nick

-- 
You are receiving this mail because:
You are on the CC list for the bug.

Reply via email to